- History & Culture (1,154)
Most Popular
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Best macro economic book I have read
- By Anonymous User on 21-02-2024
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Really wanted to enjoy this
- By Nick on 27-02-2020
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Great book, even better narration.
- By Jared Neaves on 14-02-2019
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
i feel scammed now
- By Marko on 13-01-2020
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
A very interesting listen
- By I. Larsen on 23-07-2020
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
-
-
informative and etnertaining
- By Alan wade on 18-12-2019
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Best macro economic book I have read
- By Anonymous User on 21-02-2024
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Really wanted to enjoy this
- By Nick on 27-02-2020
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Great book, even better narration.
- By Jared Neaves on 14-02-2019
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
i feel scammed now
- By Marko on 13-01-2020
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
A very interesting listen
- By I. Larsen on 23-07-2020
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
-
-
informative and etnertaining
- By Alan wade on 18-12-2019
-
Dollars, Gold, and Bitcoin
- The Fed's Hidden Agenda and How to Profit from It
- By: John S. Pennington Jr.
- Narrated by: John S. Pennington Jr.
- Length: 6 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
There’s a secret war going on for the future of money. The United States government—as it has for generations—is winning. And you can too....
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
-
NFT, Metaverse & Cryptocurrency Trading
- The Complete Guide To Investing In Crypto, Non-Fungible Tokens, Blockchain Technology, Metaverse, And Digital Artwork | Achieve Financial Freedom.
- By: James Holm
- Narrated by: Darren Stephen Ferguson
- Length: 30 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Master options trading and harness its potential for exponential gains. Learn the fundamental principles of cryptocurrency investing. Unlock the secrets of cryptocurrency trading....
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
One of the best books money can buy
- By Icarus on 11-01-2021
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- By: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrated by: Mike Lenz
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
this book is amazing.
- By josh on 07-03-2023
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- By: Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrated by: Rebecca Lam
- Length: 13 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story.
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- By: SentinelOne Publication, Migo Kedem - introduction
- Narrated by: SentinelOne
- Length: 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time....
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
A Thrilling Eye-Opener
- By Jason on 20-05-2017
-
The Wires of War
- Technology and the Global Struggle for Power
- By: Jacob Helberg
- Narrated by: Jesse Einstein
- Length: 11 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
From 2016 to 2020, Jacob Helberg led Google’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war....
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
-
-
Excellent listen :)
- By Amazon Customer on 09-07-2019
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- By: Taimur Ijlal
- Narrated by: Sean Oblak
- Length: 1 hr and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced....
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- By: Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrated by: Shawn K. Jain
- Length: 7 hrs
- Unabridged
-
Overall
-
Performance
-
Story
A team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats....
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities....
-
-
realistic approach
- By Edgar Croes on 03-02-2022
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs....
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
-
Better experienced as a read book
- By Todd on 18-08-2016
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- By: Bruce Brown, convocourses
- Narrated by: Kim Pepper
- Length: 3 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks....
-
Hackers & Painters
- Big Ideas from the Computer Age
- By: Paul Graham
- Narrated by: Mark Sando
- Length: 7 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Find out....
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
This cat-and-mouse story of a vast FBI sting operation reveals how the criminal underworld has become a globalized economy in its own right—one that can't be policed without crossing complicated ethical boundaries.
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- By: Learn Computer Hacking in Deep
- Narrated by: Jowanna Lewis
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization....
-
The Language of Deception
- Weaponizing Next Generation AI
- By: Justin Hutchens
- Narrated by: Mike Chamberlain
- Length: 10 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes....
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- By: Jennifer Bleam
- Narrated by: Jennifer Bleam
- Length: 2 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
New Releases
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- By: Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrated by: Rebecca Lam
- Length: 13 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
-
Cyberspace Guardians
- A Comprehensive Guide for Choosing the Right CISO
- By: Dr. Sylvester Cotton
- Narrated by: Chris Walsh
- Length: 2 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the intriguing world of digital defense with Dr. Sylvester “Sly” Cotton’s masterpiece, “Cyberspace Guardians.” In an era dominated by an intricate web of technology, Dr. Cotton unravels the mysteries of safeguarding the vast realm of cyberspace. This book is your guiding light in the quest to understand the role of a Chief Information Security Officer (CISO), the sentinel of our digital universes. The labyrinth of cyberspace is riddled with unseen dangers, lurking shadows, and unseen adversaries seeking to undermine our technological advancements.
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- By: Aram Sinnreich, Jesse Gilbert
- Narrated by: Jonathan Todd Ross
- Length: 11 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- By: Dana Onyshko
- Narrated by: Gary Westphalen, Jon Bratton
- Length: 5 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management. Do you feel that cyber security is indispensable in todays digital-dependent world? Do you want to introduce yourself to the world of cyber security but are easily overwhelmed or not sure where to start? Are you concerned about your own digital devices and networks, do you suspect they may be hacked or reporting information about your daily habits to unknown databases?
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- By: Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrated by: Rebecca Lam
- Length: 13 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
-
Cyberspace Guardians
- A Comprehensive Guide for Choosing the Right CISO
- By: Dr. Sylvester Cotton
- Narrated by: Chris Walsh
- Length: 2 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the intriguing world of digital defense with Dr. Sylvester “Sly” Cotton’s masterpiece, “Cyberspace Guardians.” In an era dominated by an intricate web of technology, Dr. Cotton unravels the mysteries of safeguarding the vast realm of cyberspace. This book is your guiding light in the quest to understand the role of a Chief Information Security Officer (CISO), the sentinel of our digital universes. The labyrinth of cyberspace is riddled with unseen dangers, lurking shadows, and unseen adversaries seeking to undermine our technological advancements.
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- By: Aram Sinnreich, Jesse Gilbert
- Narrated by: Jonathan Todd Ross
- Length: 11 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- By: Dana Onyshko
- Narrated by: Gary Westphalen, Jon Bratton
- Length: 5 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management. Do you feel that cyber security is indispensable in todays digital-dependent world? Do you want to introduce yourself to the world of cyber security but are easily overwhelmed or not sure where to start? Are you concerned about your own digital devices and networks, do you suspect they may be hacked or reporting information about your daily habits to unknown databases?
-
#Hacked
- 10 Practical Cybersecurity Tips to Help Protect Personal or Business Information
- By: Albert Whale
- Narrated by: Dana Lara Meecham
- Length: 2 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
The #HACKED book (2024 edition) is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity. Whether you're a business owner, student, or just someone who wants to stay safe online, The #HACKED book has everything you need to know.
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments. From concepts to advanced techniques, this book offers a structured and accessible approach to understanding the nuances of cloud security.
-
Zero Trust
- Navigating Cybersecurity Risks in Third-Party Environments
- By: Jafar Hasan
- Narrated by: Andrew Baldwin, Jafar Hasan
- Length: 6 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In today's digital age, where businesses operate in an interconnected and rapidly evolving technological landscape, cybersecurity has emerged as a critical concern. With the increasing reliance on digital systems, cloud services, and interconnected networks, organizations face many cybersecurity challenges that demand proactive and robust risk management strategies.
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification. Navigating through fundamental concepts and advanced techniques, this book serves as a trusted companion for those seeking to master the intricate landscape of cybersecurity.
-
51 Essential Cyber Terms Explained for Leaders
- A Non-Technical Guide. Each Term Defined, Explained and with a Practical Example to Increase Your Leadership Impact
- By: Marco Ryan, Andrew Fitzmaurice
- Narrated by: James Moors
- Length: 2 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Marco Ryan, a Cyber Leader in Residence at a leading UK Business School and with over 25 years of Digital and Cyber Senior Leadership experience with companies such as bp, specializes in making the world of Digital, AI, and Cyber simple, jargon-free and easy to understand for Leaders, even if they have no background in technology or IT. This book is like no other in Cybersecurity. Each term is arranged alphabetically making it easy to find, with a formal definition, then a simple jargon-free explanation and then a real-life example.
-
The NIST Framework (CSF) 2.0
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 2 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization - regardless of its size, sector, or maturity - to better understand, assess, prioritize, and communicate its cybersecurity efforts.
-
#HACKED2
- Practical Guidance for Dealing with Threats to Your Business and Privacy
- By: Albert E. Whale, Thomas Albert, Chuck Brooks, and others
- Narrated by: David Roth
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
#HACKED2 is the follow-up to an award-winning book #HACKED, that was written with industry leaders in cybersecurity. It offers practical advice about what you can do if your business or privacy has been threatened, but it also provides multiple viewpoints on how these issues are being addressed across various fields around the globe - making this resource essential for anyone who wants better awareness of global threats faced today!
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- By: Roger A. Grimes
- Narrated by: Ray Greenley
- Length: 11 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- By: Ed Adams
- Narrated by: Rich Miller
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
-
Code Dependent
- Living in the Shadow of AI
- By: Madhumita Murgia
- Narrated by: Madhumita Murgia
- Length: 9 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Through the voices of ordinary people in places far removed from Silicon Valley, Code Dependent explores the impact of a set of powerful, flawed, and often exploitative technologies on individuals, communities, and our wider society. Madhumita Murgia, AI Editor at the FT, exposes how AI can strip away our collective and individual sense of agency – and shatter our illusion of free will.
-
Digital Fortress
- Navigating Cyber Threats: Mastering the Art of Online Security and Privacy
- By: David Goodin
- Narrated by: Siah Clark
- Length: 3 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide is crafted for those who find themselves intrigued by the origins of malware or seeking effective strategies to fend off online dangers. Whether your knowledge of computers is minimal or you possess a foundational understanding, this book stands as a beacon, illuminating the often intimidating realm of computer security.