Most Popular
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall5 out of 5 stars 46
-
Performance5 out of 5 stars 42
-
Story5 out of 5 stars 42
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
5 out of 5 stars
-
Well researched and written
- By Anonymous on 14-08-2025
By: Lyn Alden
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall4.5 out of 5 stars 39
-
Performance4.5 out of 5 stars 36
-
Story4.5 out of 5 stars 36
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
5 out of 5 stars
-
An entertaining account of an underappreciated story
- By Will Scates Frances on 27-07-2024
By: Joseph Cox
-
Hackers & Painters
- Big Ideas from the Computer Age
- By: Paul Graham
- Narrated by: Mark Sando
- Length: 7 hrs and 44 mins
- Unabridged
-
Overall5 out of 5 stars 4
-
Performance5 out of 5 stars 4
-
Story5 out of 5 stars 4
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Find out....
By: Paul Graham
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall4.5 out of 5 stars 139
-
Performance5 out of 5 stars 122
-
Story4.5 out of 5 stars 122
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
5 out of 5 stars
-
Great book, even better narration.
- By Jared Neaves on 14-02-2019
By: Kevin Mitnick, and others
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall5 out of 5 stars 4
-
Performance5 out of 5 stars 4
-
Story5 out of 5 stars 4
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
-
5 out of 5 stars
-
Excellent listen :)
- By Amazon Customer on 09-07-2019
By: Raef Meeuwisse
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall5 out of 5 stars 46
-
Performance5 out of 5 stars 42
-
Story5 out of 5 stars 42
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
5 out of 5 stars
-
Well researched and written
- By Anonymous on 14-08-2025
By: Lyn Alden
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall4.5 out of 5 stars 39
-
Performance4.5 out of 5 stars 36
-
Story4.5 out of 5 stars 36
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
5 out of 5 stars
-
An entertaining account of an underappreciated story
- By Will Scates Frances on 27-07-2024
By: Joseph Cox
-
Hackers & Painters
- Big Ideas from the Computer Age
- By: Paul Graham
- Narrated by: Mark Sando
- Length: 7 hrs and 44 mins
- Unabridged
-
Overall5 out of 5 stars 4
-
Performance5 out of 5 stars 4
-
Story5 out of 5 stars 4
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Find out....
By: Paul Graham
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall4.5 out of 5 stars 139
-
Performance5 out of 5 stars 122
-
Story4.5 out of 5 stars 122
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
5 out of 5 stars
-
Great book, even better narration.
- By Jared Neaves on 14-02-2019
By: Kevin Mitnick, and others
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall5 out of 5 stars 4
-
Performance5 out of 5 stars 4
-
Story5 out of 5 stars 4
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
-
5 out of 5 stars
-
Excellent listen :)
- By Amazon Customer on 09-07-2019
By: Raef Meeuwisse
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall5 out of 5 stars 2
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline.
By: Mike Chapple, and others
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall5 out of 5 stars 93
-
Performance5 out of 5 stars 81
-
Story4.5 out of 5 stars 82
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security....
-
5 out of 5 stars
-
Really good narration
- By Anonymous on 11-10-2025
By: Cliff Stoll
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall4.5 out of 5 stars 18
-
Performance5 out of 5 stars 15
-
Story4.5 out of 5 stars 15
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
-
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
- By: Omar Santos, Samer Salam, Hazim Dahir
- Narrated by: Phil Schoen
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
In this comprehensive guide, Cisco professionals engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.
By: Omar Santos, and others
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall4.5 out of 5 stars 15
-
Performance4.5 out of 5 stars 14
-
Story4.5 out of 5 stars 14
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security....
-
4 out of 5 stars
-
Good, needs an update
- By Amazon Customer on 20-11-2024
By: Kevin Mitnick
-
OSCP Offensive Security Certified Professional
- Practice Tests with Answers to Pass the OSCP Ethical Hacking Certification Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Delve into a multifaceted exploration of offensive security practices, meticulously designed to equip enthusiasts and seasoned professionals alike with the prowess and acumen required to excel in the ever-evolving cybersecurity landscape....
By: Jake T Mills
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
By: Mike Chapple, and others
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall4 out of 5 stars 20
-
Performance4 out of 5 stars 16
-
Story4.5 out of 5 stars 16
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
-
5 out of 5 stars
-
informative and etnertaining
- By Alan wade on 18-12-2019
By: Roger A. Grimes
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- By: Razi Rais, Christina Morillo, Evan Gilman, and others
- Narrated by: Mike Chamberlain
- Length: 12 hrs and 5 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.
By: Razi Rais, and others
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- By: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrated by: Mike Lenz
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
By: Brian Allen, and others
-
Scam Me If You Can
- Simple Strategies to Outsmart Today's Rip-off Artists
- By: Frank Abagnale
- Narrated by: Jason Culp
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall4.5 out of 5 stars 6
-
Performance4.5 out of 5 stars 6
-
Story4.5 out of 5 stars 6
Are you at risk of being scammed? Former con artist and best-selling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks....
By: Frank Abagnale
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 19 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments.
By: Jamie Murphy
-
CompTIA CASP+ Certification
- The Ultimate Study Guide to Master the Advanced Security Practitioner Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 17 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Unravel the intricate layers of modern cybersecurity with the comprehensive guide to the CompTIA CASP+ Certification Advanced Security Practitioner. Dive into the depths of this dynamic field as this book becomes your companion in mastering the multifaceted world of digital defense....
By: Jake T Mills
-
CompTIA CySA+ Certification
- The Ultimate Study Guide to Practice Questions With Answers and Master the Cybersecurity Analyst Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Unlock the doors to a world of cybersecurity mastery with "Mastering CySA+: A Comprehensive Guide to CompTIA CySA+ Certification." This meticulously crafted guide is your key to conquering the challenges of the CompTIA Cybersecurity Analyst (CySA+) certification....
By: Jake T Mills
-
A Concise Introduction to GDPR
- By: ITSM Press
- Narrated by: Tom Howery
- Length: 26 mins
- Unabridged
-
Overall5 out of 5 stars 1
-
Performance2 out of 5 stars 1
-
Story5 out of 5 stars 1
A concise introductory guide to the EU General Data Protection Regulation (GDPR)....
-
5 out of 5 stars
-
This is how all We Should Be,Respect Privacy
- By Anonymous on 25-07-2021
By: ITSM Press
-
A Concise Introduction to ISO/IEC 27001:2013
- By: ITSM Press
- Narrated by: Tom Howery
- Length: 28 mins
- Unabridged
-
Overall3 out of 5 stars 1
-
Performance4 out of 5 stars 1
-
Story2 out of 5 stars 1
This is a concise introductory guide to the information security management systems (ISMS) standard ISO/IEC 27001:2013.
By: ITSM Press
-
Networking All-in-One for Dummies (9th Edition)
- By: Doug Lowe
- Narrated by: David Stifel
- Length: 27 hrs and 39 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Every network administrator needs Networking All-in-One for Dummies, the comprehensive learning resource and reliable desk reference.
By: Doug Lowe
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
By: Joseph Steinberg, and others
-
Threats
- What Every Engineer Should Learn from Star Wars
- By: Adam Shostack
- Narrated by: Joe Hempel
- Length: 10 hrs and 7 mins
- Unabridged
-
Overall5 out of 5 stars 1
-
Performance5 out of 5 stars 1
-
Story5 out of 5 stars 1
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems....
-
5 out of 5 stars
-
Great Primer for Software Engineers
- By Darren Beukes on 09-04-2024
By: Adam Shostack
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall4.5 out of 5 stars 259
-
Performance4.5 out of 5 stars 229
-
Story4.5 out of 5 stars 228
Kevin Mitnick was the most elusive computer break-in artist in history....
-
1 out of 5 stars
-
i feel scammed now
- By Marko on 13-01-2020
By: Kevin Mitnick, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall4.5 out of 5 stars 92
-
Performance4.5 out of 5 stars 81
-
Story4.5 out of 5 stars 81
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
5 out of 5 stars
-
A Thrilling Eye-Opener
- By Jason on 20-05-2017
By: Kim Zetter
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall4.5 out of 5 stars 51
-
Performance4.5 out of 5 stars 42
-
Story4.5 out of 5 stars 42
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
5 out of 5 stars
-
A very interesting listen
- By I. Larsen on 23-07-2020
By: Joseph Menn
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall5 out of 5 stars 11
-
Performance4 out of 5 stars 9
-
Story5 out of 5 stars 9
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
5 out of 5 stars
-
One of the best books money can buy
- By Icarus on 11-01-2021
By: Yasha Levine
New Releases
-
Spies, Lies, and Cybercrime
- Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 10 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Cybercriminals, domestic and foreign, are launching attacks day and night using malware, phishing scams, deepfakes, artificial intelligence, and other unscrupulous schemes designed to steal your data and hold it hostage. When they win, it costs nations, businesses, and individuals trillions of dollars annually. It’s possible to fight back, but it’ll take more than a strong password. Drawing on his years of experience as an FBI spy hunter and national security strategist, Eric O’Neill casts light on these malicious actors’ tactics for stealing personal data and exploiting victims.
By: Eric O'Neill
-
Networking All-in-One for Dummies (9th Edition)
- By: Doug Lowe
- Narrated by: David Stifel
- Length: 27 hrs and 39 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
With clear and trustworthy information, Networking All-in-One for Dummies is the perfect beginner's guide AND the perfect professional reference book. Small networks, large networks, business networks, cloud networks―it's all covered. Learn how to set up a network and keep it functioning, using Windows Server, Linux, and related technologies.
By: Doug Lowe
-
The Consent Illusion
- Understanding Terms & Conditions
- By: Elira Fontayne
- Narrated by: Herbert F. Mosley
- Length: 1 hr and 58 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
This book explores what Elira Fontayne calls the “consent illusion.” On the surface, you are giving consent every time you tap the button. In reality, that consent is often uninformed, rushed, or based on blind trust in the platform. The illusion lies in the appearance of choice—when in truth, few users have the time, patience, or expertise to truly understand what they’ve agreed to.
By: Elira Fontayne
-
Stepping Through Cybersecurity Risk Management
- A Systems Thinking Approach
- By: Jennifer L. Bayuk
- Narrated by: Nick Mondelli
- Length: 11 hrs and 17 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Stepping Through Cybersecurity Risk Management covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting.
-
Cloud Native Application Protection Platforms
- A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
- By: Russ Miles, Stephen Giguere, Taylor Smith
- Narrated by: Rich Miller
- Length: 5 hrs and 53 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Cloud native security isn't a game for individual players. It requires team collaboration with a platform that can help cloud security engineers, developers, and operations people do their best work. That's what the cloud native application protection platform (CNAPP) delivers. With this guide, you'll learn how CNAPPs can help you consolidate security through DevSecOps across cloud native technologies, practices, and application lifecycles.
By: Russ Miles, and others
-
Privacy Crisis
- How to Maintain Your Privacy Without Becoming a Hermit
- By: Chris Parker
- Narrated by: Jem Matzan
- Length: 12 hrs and 34 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Privacy Crisis is a comprehensive guide to understanding how your personal information is being used against you for the benefit of scammers, stalkers, greedy corporations, and political propagandists—and how you can neutralize those threats without withdrawing from the modern world and living like a hermit.
By: Chris Parker
-
Spies, Lies, and Cybercrime
- Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 10 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Cybercriminals, domestic and foreign, are launching attacks day and night using malware, phishing scams, deepfakes, artificial intelligence, and other unscrupulous schemes designed to steal your data and hold it hostage. When they win, it costs nations, businesses, and individuals trillions of dollars annually. It’s possible to fight back, but it’ll take more than a strong password. Drawing on his years of experience as an FBI spy hunter and national security strategist, Eric O’Neill casts light on these malicious actors’ tactics for stealing personal data and exploiting victims.
By: Eric O'Neill
-
Networking All-in-One for Dummies (9th Edition)
- By: Doug Lowe
- Narrated by: David Stifel
- Length: 27 hrs and 39 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
With clear and trustworthy information, Networking All-in-One for Dummies is the perfect beginner's guide AND the perfect professional reference book. Small networks, large networks, business networks, cloud networks―it's all covered. Learn how to set up a network and keep it functioning, using Windows Server, Linux, and related technologies.
By: Doug Lowe
-
The Consent Illusion
- Understanding Terms & Conditions
- By: Elira Fontayne
- Narrated by: Herbert F. Mosley
- Length: 1 hr and 58 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
This book explores what Elira Fontayne calls the “consent illusion.” On the surface, you are giving consent every time you tap the button. In reality, that consent is often uninformed, rushed, or based on blind trust in the platform. The illusion lies in the appearance of choice—when in truth, few users have the time, patience, or expertise to truly understand what they’ve agreed to.
By: Elira Fontayne
-
Stepping Through Cybersecurity Risk Management
- A Systems Thinking Approach
- By: Jennifer L. Bayuk
- Narrated by: Nick Mondelli
- Length: 11 hrs and 17 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Stepping Through Cybersecurity Risk Management covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting.
-
Cloud Native Application Protection Platforms
- A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
- By: Russ Miles, Stephen Giguere, Taylor Smith
- Narrated by: Rich Miller
- Length: 5 hrs and 53 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Cloud native security isn't a game for individual players. It requires team collaboration with a platform that can help cloud security engineers, developers, and operations people do their best work. That's what the cloud native application protection platform (CNAPP) delivers. With this guide, you'll learn how CNAPPs can help you consolidate security through DevSecOps across cloud native technologies, practices, and application lifecycles.
By: Russ Miles, and others
-
Privacy Crisis
- How to Maintain Your Privacy Without Becoming a Hermit
- By: Chris Parker
- Narrated by: Jem Matzan
- Length: 12 hrs and 34 mins
- Unabridged
-
Overall0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Story0 out of 5 stars 0
Privacy Crisis is a comprehensive guide to understanding how your personal information is being used against you for the benefit of scammers, stalkers, greedy corporations, and political propagandists—and how you can neutralize those threats without withdrawing from the modern world and living like a hermit.
By: Chris Parker