- History & Culture (1,078)
Most Popular
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Comprehensive and insightful
- By AmazonFrenzy on 24-11-2023
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
A Thrilling Eye-Opener
- By Jason on 20-05-2017
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Really wanted to enjoy this
- By Nick on 27-02-2020
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
i feel scammed now
- By Marko on 13-01-2020
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Great book, even better narration.
- By Jared Neaves on 14-02-2019
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Comprehensive and insightful
- By AmazonFrenzy on 24-11-2023
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
A Thrilling Eye-Opener
- By Jason on 20-05-2017
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Really wanted to enjoy this
- By Nick on 27-02-2020
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
i feel scammed now
- By Marko on 13-01-2020
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Great book, even better narration.
- By Jared Neaves on 14-02-2019
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- By: Raymond Phillips
- Narrated by: Randal Schaffer
- Length: 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself....
-
Threats
- What Every Engineer Should Learn from Star Wars
- By: Adam Shostack
- Narrated by: Joe Hempel
- Length: 10 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems....
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
-
-
Excellent listen :)
- By Amazon Customer on 09-07-2019
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's a signal paradox of our times that we live in an information society but do not know how it works....
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
A book about people hacking finance, law and politics etc
- By Anonymous User on 13-07-2023
-
Information Systems Security NIST 800 2-in-1
- RMF Foundations & Controls
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 5 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing Information Systems Security NIST 800 2-in-1, featuring both RMF ISSO Foundation Guide and RMF ISSO: NIST 800-53. This comprehensive series is your ultimate roadmap to success, designed to simplify the complexities of NIST 800-53 security controls....
-
CISA Cybersecurity Strategic Plan FY2024-2026
- By: Cybersecurity and Infrastructure Security Agency
- Narrated by: Tom Brooks
- Length: 2 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
Malicious cyber actors recognize our dependence on technology and constantly attempt to exploit this reliance for financial or strategic gain. Too often, they succeed....
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
The Truth Machine
- The Blockchain and the Future of Everything
- By: Michael J. Casey, Paul Vigna
- Narrated by: Sean Runnette
- Length: 10 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet’s next big thing: the blockchain....
-
-
15mins of running down Donald Trump was baffling
- By Anonymous User on 21-02-2021
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them....
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back....
-
-
US point of view but not overly American
- By jasper on 28-07-2020
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- By: Jennifer Bleam
- Narrated by: Jennifer Bleam
- Length: 2 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
-
DeFi and the Future of Finance
- By: Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
- Narrated by: David de Vries
- Length: 3 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
During the Global Financial Crisis in 2008, our financial infrastructure failed. Governments bailed out the very institutions that let the economy down. This episode spurred a serious rethink of our financial system....
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- By: Samuel Castro
- Narrated by: Devon Michael Scott
- Length: 2 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations....
-
Scam Me If You Can
- Simple Strategies to Outsmart Today's Rip-off Artists
- By: Frank Abagnale
- Narrated by: Jason Culp
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you at risk of being scammed? Former con artist and best-selling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks....
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
A very interesting listen
- By I. Larsen on 23-07-2020
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities....
-
-
realistic approach
- By Edgar Croes on 03-02-2022
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
-
-
informative and etnertaining
- By Alan wade on 18-12-2019
-
Building a Career in Cybersecurity
- The Strategy and Skills You Need to Succeed
- By: Yuri Diogenes
- Narrated by: Michael F. Walworth
- Length: 4 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity is one of the world’s fastest growing, most exciting fields—but that doesn’t mean it’s easy to enter the industry and succeed....
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
Average book, not great.
- By SUBHADEEP SENGUPTA on 13-03-2022
-
How to Measure Anything in Cybersecurity Risk
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Patrick Cronin
- Length: 10 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection....
-
Circuit Engineering + Cryptography + CompTIA A+
- By: Solis Tech
- Narrated by: Millian Quinteros
- Length: 4 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
You'll learn step by step how to increase your electrical skills, the anatomy of a circuit, and all your basic knowledge in one download....
New Releases
-
Dollars, Gold, and Bitcoin
- The Fed's Hidden Agenda and How to Profit from It
- By: John S. Pennington Jr.
- Narrated by: John S. Pennington Jr.
- Length: 6 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Since the creation of the Federal Reserve more than one hundred years ago, the American dollar has become the most successful product (of any kind) of all time and the language of commerce for the planet. From the Gold Reserve Act to Bretton Woods to the petrodollar and beyond, the U.S. has successfully ridden the waves of historical transformation to stay on top.
-
CISSP
- Beginner's Guide with Hints and Techniques Easy and Practical Ways to Acquire Knowledge on Information Systems Security
- By: Gilbert Pierce
- Narrated by: Randolph Bell
- Length: 11 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
When it comes to information security, having a Certified Information Systems Security Professional (CISSP) credential is essential. In this chapter, we will give an in-depth introduction to CISSP, describing its relevance in the world of information security, and offering suggestions on how to prepare for the CISSP test. In addition, we will discuss some of the topics that will be covered in the exam.
-
Election Hacks: Lindell v. Zeidman
- Exposing the $5 Million Election Myth
- By: Bob Zeidman
- Narrated by: Bob Zeidman
- Length: 8 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
Mike Lindell, the MyPillow magnate, has been inciting crowds by publicly declaring he has proof of voting machine tampering that threw the 2020 election from Donald Trump to Joe Biden. Bob Zeidman, who invented the field of software forensics, was invited by Lindell in 2021 to examine and verify the alleged proof. What he found was bogus data, manipulated results, and dangerous conspiracy theories.
-
Cybersecurity Jobs 3-in-1 Value Bundle
- Resume Marketing, Career Paths and Work From Home with Cybersecurity
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 5 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this series, you can be a part of one of the fastest, highest-salary career paths in IT.
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- By: Bruce Brown
- Narrated by: Kim Pepper
- Length: 11 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application. Equip yourself with a dual weapon against cyber threats – a theoretical understanding and actionable strategies. Whether you're a cybersecurity novice or a seasoned expert, this 2-in-1 bundle is a must-have resource.
-
Hacking with Kali Linux
- Advanced Techniques and Strategies (Computer Programming)
- By: Ryan Campbell
- Narrated by: Scott Mandeville
- Length: 3 hrs and 12 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book is the ultimate resource for anyone seeking to become a cybersecurity expert or take their hacking game to a whole new level! Don't miss the opportunity to join the ranks of elite ethical hackers.
-
Dollars, Gold, and Bitcoin
- The Fed's Hidden Agenda and How to Profit from It
- By: John S. Pennington Jr.
- Narrated by: John S. Pennington Jr.
- Length: 6 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Since the creation of the Federal Reserve more than one hundred years ago, the American dollar has become the most successful product (of any kind) of all time and the language of commerce for the planet. From the Gold Reserve Act to Bretton Woods to the petrodollar and beyond, the U.S. has successfully ridden the waves of historical transformation to stay on top.
-
CISSP
- Beginner's Guide with Hints and Techniques Easy and Practical Ways to Acquire Knowledge on Information Systems Security
- By: Gilbert Pierce
- Narrated by: Randolph Bell
- Length: 11 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
When it comes to information security, having a Certified Information Systems Security Professional (CISSP) credential is essential. In this chapter, we will give an in-depth introduction to CISSP, describing its relevance in the world of information security, and offering suggestions on how to prepare for the CISSP test. In addition, we will discuss some of the topics that will be covered in the exam.
-
Election Hacks: Lindell v. Zeidman
- Exposing the $5 Million Election Myth
- By: Bob Zeidman
- Narrated by: Bob Zeidman
- Length: 8 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
Mike Lindell, the MyPillow magnate, has been inciting crowds by publicly declaring he has proof of voting machine tampering that threw the 2020 election from Donald Trump to Joe Biden. Bob Zeidman, who invented the field of software forensics, was invited by Lindell in 2021 to examine and verify the alleged proof. What he found was bogus data, manipulated results, and dangerous conspiracy theories.
-
Cybersecurity Jobs 3-in-1 Value Bundle
- Resume Marketing, Career Paths and Work From Home with Cybersecurity
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 5 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this series, you can be a part of one of the fastest, highest-salary career paths in IT.
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- By: Bruce Brown
- Narrated by: Kim Pepper
- Length: 11 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application. Equip yourself with a dual weapon against cyber threats – a theoretical understanding and actionable strategies. Whether you're a cybersecurity novice or a seasoned expert, this 2-in-1 bundle is a must-have resource.
-
Hacking with Kali Linux
- Advanced Techniques and Strategies (Computer Programming)
- By: Ryan Campbell
- Narrated by: Scott Mandeville
- Length: 3 hrs and 12 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book is the ultimate resource for anyone seeking to become a cybersecurity expert or take their hacking game to a whole new level! Don't miss the opportunity to join the ranks of elite ethical hackers.
-
OSCP Offensive Security Certified Professional
- Practice Tests with Answers to Pass the OSCP Ethical Hacking Certification Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether you're a budding cybersecurity enthusiast or a seasoned professional seeking to fortify your skill set, this book is your gateway to success. Equip yourself with the knowledge, strategies, and expertise essential not just for acing an exam, but for thriving in a dynamic cybersecurity career.
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- By: Kelly Shortridge, Aaron Rinehart - contributor
- Narrated by: April Doty
- Length: 18 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
The Missing Training Manual
- SOC-Security Operations Center
- By: Michael A Goedeker
- Narrated by: Mandy Grant-Grierson
- Length: 4 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
"The Missing Training Manual: Security Operations Center", addressed the gap between the theoretical knowledge and practical skills required for SOC analysts. The book provides a comprehensive guide to SOC Operations, covering topics such as threat intelligence analysis, incident response, and vulnerability management, among other areas.
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently. The book's goal is for the listener to walk away with a deep understanding of money and monetary history, both in terms of theoretical foundations and in terms of practical implications.
-
-
Comprehensive and insightful
- By AmazonFrenzy on 24-11-2023
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- By: Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrated by: Shawn K. Jain
- Length: 7 hrs
- Unabridged
-
Overall
-
Performance
-
Story
In Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What to Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour—from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria—recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes.
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- By: Sean D. Mack
- Narrated by: William Sarris
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks.
-
NFT, Metaverse & Cryptocurrency Trading
- The Complete Guide To Investing In Crypto, Non-Fungible Tokens, Blockchain Technology, Metaverse, And Digital Artwork | Achieve Financial Freedom.
- By: James Holm
- Narrated by: Darren Stephen Ferguson
- Length: 30 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Master options trading and harness its potential for exponential gains. Learn the fundamental principles of cryptocurrency investing. Unlock the secrets of cryptocurrency trading. Explore the Defi investment guide for beginners and capitalize on decentralized finance opportunities. Embark on your metaverse journey with the metaverse beginner's guide.
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- By: Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
- Narrated by: Christopher Hadnagy, Michele Fincher
- Length: 5 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website.
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- By: Michael A. Goedeker MSc
- Narrated by: Mandy Grant-Grierson
- Length: 3 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s 2022. Do you know if your online information is safe? According to a study by the University of Maryland, hackers attack internet-connected computers every 39 seconds. The same technology that’s made information sharing easier has put our privacy at risk more than ever. But it doesn’t stop there. International warfare is now waged on the digital stage, changing how countries influence global conflicts' outcomes. We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare.
-
Building a Career in Cybersecurity
- The Strategy and Skills You Need to Succeed
- By: Yuri Diogenes
- Narrated by: Michael F. Walworth
- Length: 4 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity is one of the world’s fastest growing, most exciting fields—but that doesn’t mean it’s easy to enter the industry and succeed. Now there’s a complete guide to creating a great cybersecurity career, whether you’re migrating to cybersecurity from another field or already a cybersecurity professional.
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- By: Gregory C. Rasner
- Narrated by: Mike Lenz
- Length: 6 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk.
-
StopRansomware Guide
- By: CISA NSA FBI and Multistate Information Sharing and Analysis Center
- Narrated by: Tom Brooks
- Length: 3 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Over time, malicious actors have adjusted their ransomware tactics to be more destructive and impactful, and have also exfiltrated victim data and pressured victims to pay by threatening to release the stolen data.