- History & Culture (1,220)
![Teste Audible 30 Tage kostenlos](https://cdn.statically.io/img/m.media-amazon.com/images/G/08/AudibleFR/fr_FR/images/1235-soundwave-1000x200-2.gif)
We're pleased to have you join us
30-day trial with Audible is available.
Best Sellers
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Incredible
- By Adam Murphy on 06-07-24
By: Lyn Alden
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
I can't tell you how bad this is
- By Paul Beyer on 20-11-23
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
By: Andy Greenberg
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
A very interesting read
- By LondonBubble on 28-02-23
By: Renee Dudley, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Bad book
- By Dionysis Zindros on 07-12-19
By: Kevin Mitnick
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Incredible
- By Adam Murphy on 06-07-24
By: Lyn Alden
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
I can't tell you how bad this is
- By Paul Beyer on 20-11-23
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
By: Andy Greenberg
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
A very interesting read
- By LondonBubble on 28-02-23
By: Renee Dudley, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Bad book
- By Dionysis Zindros on 07-12-19
By: Kevin Mitnick
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
By: Mike Chapple, and others
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
-
Excellent study guide, learn CISM anywhere
- By NP on 13-09-23
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
An OK book but you'll be glad when its finished
- By Ian Hemmings on 19-06-17
By: Kevin Mitnick, and others
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- By: Razi Rais, Christina Morillo, Evan Gilman, and others
- Narrated by: Mike Chamberlain
- Length: 12 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.
By: Razi Rais, and others
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- By: Bruce Brown
- Narrated by: Kim Pepper
- Length: 3 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
By: Bruce Brown
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
-
-
A good thorough grounding in cyber security principles
- By Jetskis on 12-06-19
By: Raef Meeuwisse
-
Threats
- What Every Engineer Should Learn from Star Wars
- By: Adam Shostack
- Narrated by: Joe Hempel
- Length: 10 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems....
By: Adam Shostack
-
The Hacker Crackdown
- Law and Disorder on the Electronic Frontier
- By: Bruce Sterling
- Narrated by: Tom Parks
- Length: 12 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bruce Sterling delves into the world of high-tech crime and punishment in one of the first books to explore the cyberspace breaches that threaten national security....
By: Bruce Sterling
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- By: Jennifer Bleam
- Narrated by: Jennifer Bleam
- Length: 2 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
By: Jennifer Bleam
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Fascinating History of Hacking
- By James on 19-07-19
By: Joseph Menn
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
white man bad, blabla
- By julien on 19-01-24
By: Bruce Schneier
-
The NIST Framework (CSF) 2.0
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 2 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks.
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Fascinating subject and an amazing story
- By Just little old me on 01-04-15
By: Kim Zetter
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- By: Bruce Brown
- Narrated by: Kim Pepper
- Length: 11 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application....
By: Bruce Brown
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
By: Glen D. Singh
-
How I Rob Banks
- And Other Such Places
- By: FC
- Narrated by: Paul Brion
- Length: 7 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
Renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on....
-
-
A robot like (emotionless) American male voice
- By Deano on 09-11-23
By: FC
-
Computer Networking
- An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and Hacking
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area....
-
-
Don’t bother
- By Ian on 03-05-22
By: Quinn Kiser
-
PRINCE2 Agile: An Implementation Pocket Guide
- Step-by-Step Advice for Every Project Type
- By: Jamie Lynn Cooke
- Narrated by: Kate Rose Martin
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The hands-on guide you need to successfully deliver your projects within the PRINCE2 Agile framework....
-
-
Awful - content and reading
- By Walter on 28-08-19
By: Jamie Lynn Cooke
-
There's a War Going On but No One Can See It
- By: Huib Modderkolk
- Narrated by: Omar Baroud
- Length: 8 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late....
-
-
learned so much
- By Caramelcow on 03-04-24
By: Huib Modderkolk
-
Industry of Anonymity
- Inside the Business of Cybercrime
- By: Jonathan Lusthaus
- Narrated by: David Stifel
- Length: 11 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research in the world's technology-crime hot spots....
-
-
interesting material
- By Andy Roxburgh on 02-03-19
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- By: Learn Computer Hacking in Deep
- Narrated by: Jowanna Lewis
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization....
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
-
good book but might be better as a read
- By TvW on 24-07-15
By: Glenn Greenwald
-
A Practical Guide to GDPR
- By: David Cauchi
- Narrated by: Dean Collins
- Length: 1 hr and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
A practical guide to the EU General Data Protection Regulation (GDPR)....
By: David Cauchi
-
ISO 9001:2015
- A Pocket Guide
- By: Steve Watkins, Nick Orchiston
- Narrated by: Andy Cresswell
- Length: 1 hr and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. This is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard....
-
-
Very good intro into ISO9001
- By Mr on 30-01-22
By: Steve Watkins, and others
New Releases
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- By: Anthony Farrior
- Narrated by: Jennifer Workman
- Length: 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
By: Anthony Farrior
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- By: Jonathan Rigdon
- Narrated by: Kevin Brooker
- Length: 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
By: Jonathan Rigdon
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- By: L.D. Knowings
- Narrated by: William Goldman
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
-
A Comprehensive Learning Tool
- By Isabelle Webb on 25-06-24
By: L.D. Knowings
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- By: Omar Santos, Petar Radanliev
- Narrated by: Max Newland
- Length: 11 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
By: Omar Santos, and others
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- By: André Edmond
- Narrated by: Scotty Kwas
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you been struggling to find a guide that explains how to get started in cybersecurity? Does your lack of experience make it difficult to get your first job? The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points. The lack of a guiding hand leaves them stranded, not knowing which doors to knock on or which paths to tread.
By: André Edmond
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- By: Anthony Farrior
- Narrated by: Jennifer Workman
- Length: 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
By: Anthony Farrior
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- By: Jonathan Rigdon
- Narrated by: Kevin Brooker
- Length: 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
By: Jonathan Rigdon
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- By: L.D. Knowings
- Narrated by: William Goldman
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
-
A Comprehensive Learning Tool
- By Isabelle Webb on 25-06-24
By: L.D. Knowings
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- By: Omar Santos, Petar Radanliev
- Narrated by: Max Newland
- Length: 11 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
By: Omar Santos, and others
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- By: André Edmond
- Narrated by: Scotty Kwas
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you been struggling to find a guide that explains how to get started in cybersecurity? Does your lack of experience make it difficult to get your first job? The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points. The lack of a guiding hand leaves them stranded, not knowing which doors to knock on or which paths to tread.
By: André Edmond
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- By: L.D. Knowings
- Narrated by: David Van Der Molen
- Length: 3 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
You're not a tech wizard, and you don't need to be. This book speaks directly to you the concerned netizen, the proactive parent, the small business owner, or the budding entrepreneur. It's designed to break down the complexities of cybersecurity into something you can understand and apply.
-
-
A Dummy's Guide for Beginners
- By Timothy Gillian on 11-06-24
By: L.D. Knowings
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes--the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld.
By: Joseph Cox
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- By: Razi Rais, Christina Morillo, Evan Gilman, and others
- Narrated by: Mike Chamberlain
- Length: 12 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
By: Razi Rais, and others
-
World War ‘D’
- The Intersection of Cyber and Biological Pandemics
- By: Christopher Rence
- Narrated by: Liam Alan
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Life has never been easier thanks to the advancement of technology. However, with all new technological advancements also come new risks. The most drastically increasing issue in the world today is not biological warfare, but cyber warfare. Data has become the single most valuable commodity in today’s world, and, of course, there are always people lurking around the corner, trying to get their hands on it.
-
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
- By: Omar Santos, Samer Salam, Hazim Dahir
- Narrated by: Phil Schoen
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.
By: Omar Santos, and others
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- By: Robert L Cogmon, Robert L. Cogmon
- Narrated by: Dalan Decker
- Length: 2 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks. Characters such as Deja Digital serve as examples of the value of technical know-how and inventiveness in building defenses against cyberattacks.
By: Robert L Cogmon, and others
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- By: Bruce Brown
- Narrated by: Kim Pepper
- Length: 3 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
By: Bruce Brown
-
Securing the CI/CD Pipeline
- Best Practices for DevSecOps
- By: Sai Sravan Cherukuri
- Narrated by: Tyler Nissen
- Length: 4 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
"SECURING THE CI/CD PIPELINE: Best Practices for DevSecOps" is a comprehensive guide that integrates security into Continuous Integration and Continuous Deployment (CI/CD) pipelines. Essential for anyone in modern software development, it emphasizes balancing speed and security.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- By: Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrated by: Rebecca Lam
- Length: 13 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
By: Jon R. Lindsay - editor, and others
-
Cyberspace Guardians
- A Comprehensive Guide for Choosing the Right CISO
- By: Dr. Sylvester Cotton
- Narrated by: Chris Walsh
- Length: 2 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the intriguing world of digital defense with Dr. Sylvester “Sly” Cotton’s masterpiece, “Cyberspace Guardians.” In an era dominated by an intricate web of technology, Dr. Cotton unravels the mysteries of safeguarding the vast realm of cyberspace. This book is your guiding light in the quest to understand the role of a Chief Information Security Officer (CISO), the sentinel of our digital universes. The labyrinth of cyberspace is riddled with unseen dangers, lurking shadows, and unseen adversaries seeking to undermine our technological advancements.
-
The Art of the Steal
- How to Protect Yourself and Your Business from Fraud, America's #1 Crime
- By: Frank W. Abagnale
- Narrated by: Barrett Whitener
- Length: 8 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Catch Me if You Can, Frank W. Abagnale recounted his youthful career as a master imposter and forger. In The Art of the Steal, Abagnale tells the remarkable story of how he parlayed his knowledge of cons and scams into a successful career as a consultant on preventing financial foul play—while showing you how to identify and outsmart perpetrators of fraud.
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
-
Essential
- By Jose Griffin on 17-05-24
By: L.D. Knowings