- History & Culture (1,235)
![Teste Audible 30 Tage kostenlos](https://cdn.statically.io/img/m.media-amazon.com/images/G/08/AudibleFR/fr_FR/images/1235-soundwave-1000x200-2.gif)
We're pleased to have you join us
30-day trial with Audible is available.
Best Sellers
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Incredible
- By Adam Murphy on 06-07-24
By: Lyn Alden
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
An OK book but you'll be glad when its finished
- By Ian Hemmings on 19-06-17
By: Kevin Mitnick, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
By: Andy Greenberg
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
I can't tell you how bad this is
- By Paul Beyer on 20-11-23
By: Mike Chapple, and others
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
By: Glen D. Singh
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Incredible
- By Adam Murphy on 06-07-24
By: Lyn Alden
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
An OK book but you'll be glad when its finished
- By Ian Hemmings on 19-06-17
By: Kevin Mitnick, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
By: Andy Greenberg
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
I can't tell you how bad this is
- By Paul Beyer on 20-11-23
By: Mike Chapple, and others
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
By: Glen D. Singh
-
Gray Day
- My Undercover Mission to Expose America's First Cyber Spy
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy....
By: Eric O'Neill
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
Vitally important work
- By Malcolm Lea on 27-05-23
By: Yasha Levine
-
Real-World Cryptography
- By: David Wong
- Narrated by: Derek Dysart
- Length: 13 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging....
By: David Wong
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- By: Jennifer Bleam
- Narrated by: Jennifer Bleam
- Length: 2 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
By: Jennifer Bleam
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- By: Taimur Ijlal
- Narrated by: Craig Neutzling
- Length: 1 hr and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207....
By: Taimur Ijlal
-
Cybersecurity
- A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to discover how to protect yourself, your family, and business against cyber attacks, then pay attention...Have you been curious about how hackers choose their victims or develop their attack plans? Have you been hacked before? Listen to find out more....
-
-
If you have a passing interest and you’re not concerned about clear explanation.
- By Mr. S. Sorin on 28-12-22
By: Quinn Kiser
-
Hacking with Kali Linux
- A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
- By: Peter Bradley
- Narrated by: Cliff Weldon
- Length: 1 hr and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you fascinated by the idea of hacking? Do you want to learn the secrets of ethical hackers? This practical, step-by-step guide audiobook will teach you all you need to know! Listen to find out more....
-
-
The reader reads out loud the links and the syntaxes of the programs absolutely not enjoyable
- By Viktor Rostas on 22-04-24
By: Peter Bradley
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- By: Brian Krebs
- Narrated by: Christopher Lane
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans....
-
-
Was hoping for a lot more
- By dubman23 on 09-12-14
By: Brian Krebs
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
By: Mike Chapple, and others
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- By: Kimberly Burk Cordova
- Narrated by: Hannah Stone
- Length: 3 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Discover the powerful results that await you when you listen to "Cybersecurity for Entrepreneurs"! With this book, you will not only gain an advantage in the digital age but you will also protect your digital assets, maintain customer trust, and understand the latest cybersecurity technologies
-
-
Essential Listening for Entrepreneurs
- By Brandee Jankoski on 15-07-24
-
ISO 9001:2015
- A Pocket Guide
- By: Steve Watkins, Nick Orchiston
- Narrated by: Andy Cresswell
- Length: 1 hr and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. This is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard....
-
-
Very good intro into ISO9001
- By Mr on 30-01-22
By: Steve Watkins, and others
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- By: Lester Evans
- Narrated by: Brian R. Scott
- Length: 3 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Find out more....
-
-
Weird
- By J on 13-03-19
By: Lester Evans
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Fascinating subject and an amazing story
- By Just little old me on 01-04-15
By: Kim Zetter
-
Hacking for Beginners: Everything You Need to Know to Become an Elite Hacker
- By: Dexter Silverstein
- Narrated by: Jason R. Gray
- Length: 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
Welcome to the wonderful world of hacking, a seemingly magical world, crafted out of the heart of mystery and wonder, but an oh so very real world where those who hesitate for even just a moment end up in trouble, and only the elite have what it takes to survive! Listen for more....
-
-
Incredible!
- By Matty on 20-08-19
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are....
-
-
Ok for those with 0 knowledge but avoid if techie
- By Rob on 02-02-19
By: Charles Arthur
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
A very interesting read
- By LondonBubble on 28-02-23
By: Renee Dudley, and others
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- By: Taimur Ijlal
- Narrated by: Scott Mandeville
- Length: 4 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals.
By: Taimur Ijlal
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- By: Josephine Wolff
- Narrated by: Kate Reading
- Length: 14 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity incidents make the news with startling regularity. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures....
-
-
Surprisingly good despite the title
- By Mr on 19-01-20
By: Josephine Wolff
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- By: Taimur Ijlal
- Narrated by: Sean Oblak
- Length: 1 hr and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced....
By: Taimur Ijlal
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
By: Mike Chapple, and others
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- By: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrated by: Mike Lenz
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
By: Brian Allen, and others
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
-
Excellent study guide, learn CISM anywhere
- By NP on 13-09-23
New Releases
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- By: Kimberly Burk Cordova
- Narrated by: Hannah Stone
- Length: 3 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Discover the powerful results that await you when you listen to "Cybersecurity for Entrepreneurs"! With this book, you will not only gain a strategic advantage in the digital age but you will also protect your digital assets, maintain customer trust, and understand the latest cybersecurity technologies to leverage for your business.
-
-
Essential Listening for Entrepreneurs
- By Brandee Jankoski on 15-07-24
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- By: Anthony Farrior
- Narrated by: Jennifer Workman
- Length: 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
By: Anthony Farrior
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- By: Jonathan Rigdon
- Narrated by: Kevin Brooker
- Length: 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
By: Jonathan Rigdon
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- By: L.D. Knowings
- Narrated by: William Goldman
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
-
A Comprehensive Learning Tool
- By Isabelle Webb on 25-06-24
By: L.D. Knowings
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- By: Omar Santos, Petar Radanliev
- Narrated by: Max Newland
- Length: 11 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
By: Omar Santos, and others
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- By: Kimberly Burk Cordova
- Narrated by: Hannah Stone
- Length: 3 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Discover the powerful results that await you when you listen to "Cybersecurity for Entrepreneurs"! With this book, you will not only gain a strategic advantage in the digital age but you will also protect your digital assets, maintain customer trust, and understand the latest cybersecurity technologies to leverage for your business.
-
-
Essential Listening for Entrepreneurs
- By Brandee Jankoski on 15-07-24
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- By: Anthony Farrior
- Narrated by: Jennifer Workman
- Length: 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
By: Anthony Farrior
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- By: Jonathan Rigdon
- Narrated by: Kevin Brooker
- Length: 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
By: Jonathan Rigdon
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- By: L.D. Knowings
- Narrated by: William Goldman
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
-
A Comprehensive Learning Tool
- By Isabelle Webb on 25-06-24
By: L.D. Knowings
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- By: Omar Santos, Petar Radanliev
- Narrated by: Max Newland
- Length: 11 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
By: Omar Santos, and others
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- By: André Edmond
- Narrated by: Scotty Kwas
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you been struggling to find a guide that explains how to get started in cybersecurity? Does your lack of experience make it difficult to get your first job? The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points. The lack of a guiding hand leaves them stranded, not knowing which doors to knock on or which paths to tread.
By: André Edmond
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- By: L.D. Knowings
- Narrated by: David Van Der Molen
- Length: 3 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
You're not a tech wizard, and you don't need to be. This book speaks directly to you the concerned netizen, the proactive parent, the small business owner, or the budding entrepreneur. It's designed to break down the complexities of cybersecurity into something you can understand and apply.
-
-
A Dummy's Guide for Beginners
- By Timothy Gillian on 11-06-24
By: L.D. Knowings
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes--the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld.
By: Joseph Cox
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- By: Razi Rais, Christina Morillo, Evan Gilman, and others
- Narrated by: Mike Chamberlain
- Length: 12 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
By: Razi Rais, and others
-
World War ‘D’
- The Intersection of Cyber and Biological Pandemics
- By: Christopher Rence
- Narrated by: Liam Alan
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Life has never been easier thanks to the advancement of technology. However, with all new technological advancements also come new risks. The most drastically increasing issue in the world today is not biological warfare, but cyber warfare. Data has become the single most valuable commodity in today’s world, and, of course, there are always people lurking around the corner, trying to get their hands on it.
-
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
- By: Omar Santos, Samer Salam, Hazim Dahir
- Narrated by: Phil Schoen
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.
By: Omar Santos, and others
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- By: Robert L Cogmon, Robert L. Cogmon
- Narrated by: Dalan Decker
- Length: 2 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks. Characters such as Deja Digital serve as examples of the value of technical know-how and inventiveness in building defenses against cyberattacks.
By: Robert L Cogmon, and others
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- By: Bruce Brown
- Narrated by: Kim Pepper
- Length: 3 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
By: Bruce Brown
-
Securing the CI/CD Pipeline
- Best Practices for DevSecOps
- By: Sai Sravan Cherukuri
- Narrated by: Tyler Nissen
- Length: 4 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
"SECURING THE CI/CD PIPELINE: Best Practices for DevSecOps" is a comprehensive guide that integrates security into Continuous Integration and Continuous Deployment (CI/CD) pipelines. Essential for anyone in modern software development, it emphasizes balancing speed and security.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- By: Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrated by: Rebecca Lam
- Length: 13 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
By: Jon R. Lindsay - editor, and others
-
Cyberspace Guardians
- A Comprehensive Guide for Choosing the Right CISO
- By: Dr. Sylvester Cotton
- Narrated by: Chris Walsh
- Length: 2 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the intriguing world of digital defense with Dr. Sylvester “Sly” Cotton’s masterpiece, “Cyberspace Guardians.” In an era dominated by an intricate web of technology, Dr. Cotton unravels the mysteries of safeguarding the vast realm of cyberspace. This book is your guiding light in the quest to understand the role of a Chief Information Security Officer (CISO), the sentinel of our digital universes. The labyrinth of cyberspace is riddled with unseen dangers, lurking shadows, and unseen adversaries seeking to undermine our technological advancements.
-
The Art of the Steal
- How to Protect Yourself and Your Business from Fraud, America's #1 Crime
- By: Frank W. Abagnale
- Narrated by: Barrett Whitener
- Length: 8 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Catch Me if You Can, Frank W. Abagnale recounted his youthful career as a master imposter and forger. In The Art of the Steal, Abagnale tells the remarkable story of how he parlayed his knowledge of cons and scams into a successful career as a consultant on preventing financial foul play—while showing you how to identify and outsmart perpetrators of fraud.