Try free for 30 days
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
Failed to add items
Add to basket failed.
Add to Wish List failed.
Remove from Wish List failed.
Follow podcast failed
Unfollow podcast failed
Buy Now for $27.99
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also picked
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.
-
-
this book is amazing.
- By josh on 07-03-2023
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- By: Kelly Shortridge, Aaron Rinehart - contributor
- Narrated by: April Doty
- Length: 18 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
Threats
- What Every Engineer Should Learn from Star Wars
- By: Adam Shostack
- Narrated by: Joe Hempel
- Length: 10 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a structured and memorable way—about the threats to your systems. You'll move from thinking of security issues as clever one-offs and learn to see the patterns they follow.
-
-
Great Primer for Software Engineers
- By Darren Beukes on 09-04-2024
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
So familiar, yet so riveting!
- By Amazon Customer on 03-05-2024
-
Real-World Cryptography
- By: David Wong
- Narrated by: Derek Dysart
- Length: 13 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging. This audiobook is a joy to listen to - and it might just save your bacon the next time you’re targeted by an adversary after your data.
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.
-
-
this book is amazing.
- By josh on 07-03-2023
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- By: Kelly Shortridge, Aaron Rinehart - contributor
- Narrated by: April Doty
- Length: 18 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
Threats
- What Every Engineer Should Learn from Star Wars
- By: Adam Shostack
- Narrated by: Joe Hempel
- Length: 10 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a structured and memorable way—about the threats to your systems. You'll move from thinking of security issues as clever one-offs and learn to see the patterns they follow.
-
-
Great Primer for Software Engineers
- By Darren Beukes on 09-04-2024
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
So familiar, yet so riveting!
- By Amazon Customer on 03-05-2024
-
Real-World Cryptography
- By: David Wong
- Narrated by: Derek Dysart
- Length: 13 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging. This audiobook is a joy to listen to - and it might just save your bacon the next time you’re targeted by an adversary after your data.
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
All these reviews don't lie
- By Paul Harmat on 03-07-2021
-
CISSP All-in-One Exam Guide, Ninth Edition
- By: Fernando Maymi, Shon Harris
- Narrated by: Teri Schnaubelt
- Length: 51 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2®. CISSP All-in-One Exam Guide, Ninth Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations.
-
-
This helped me pass!!!
- By Ricardo D on 10-01-2024
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- By: Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrated by: Shawn K. Jain
- Length: 7 hrs
- Unabridged
-
Overall
-
Performance
-
Story
In Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What to Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour—from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria—recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes.
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
The Staff Engineer's Path
- A Guide for Individual Contributors Navigating Growth and Change
- By: Tanya Reilly
- Narrated by: Wendy Tremont King
- Length: 13 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
For years, companies have rewarded their most effective engineers with management positions. But treating management as the default path for an engineer with leadership ability doesn't serve the industry well—or the engineer. The staff engineer's path allows engineers to contribute at a high level as role models, driving big projects, determining technical strategy, and raising everyone's skills. This in-depth book shows you how to understand your role, manage your time, master strategic thinking, and set the standard for technical work.
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- By: Josephine Wolff
- Narrated by: Kate Reading
- Length: 14 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity incidents make the news with startling regularity. Each breach makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
Publisher's Summary
175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them
Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link?
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses.
- Hear over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them.
- Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best?
- Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader.
- Get a high-level exposure to why statistics and figures may mislead as well as enlighten.
- Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them.
"You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. . . . Read the book, laugh at the right places, and put your learning to work. You won't regret it."
--From the Foreword by Vint Cerf, Internet Hall of Fame Pioneer
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.