- History & Culture (1,559)
Bestsellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
By: Joseph Steinberg, and others
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- By: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
-
-
You sort of knew it already…
- By Leigh Munsil on 05-08-24
By: Byron Tau
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Gray Day
- My Undercover Mission to Expose America's First Cyber Spy
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy....
-
-
A Real Spy Story
- By Darren Sapp on 04-06-19
By: Eric O'Neill
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
-
-
This is it!
- By Marcus on 10-18-23
By: Glen D. Singh
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments.
-
-
This one stands out
- By Dennis on 04-29-24
By: Jamie Murphy
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Too Much Political Bias
- By Dreux on 02-18-23
By: Bruce Schneier
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity....
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively.
-
-
Clear Guidance on Pen Testing
- By Stanley Rouse on 05-11-24
By: L.D. Knowings
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- By: Jennifer Bleam
- Narrated by: Jennifer Bleam
- Length: 2 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
-
-
The insight and approach Jennifer provided on cybersecurity sales and marketing.
- By Amazon Customer on 02-10-24
By: Jennifer Bleam
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
By: Mike Chapple, and others
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom.
By: Eugene H. Spafford, and others
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- By: Phil Champagne
- Narrated by: Stephanie Murphy
- Length: 7 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
The book of Satoshi, the collected writings of Satoshi Nakamoto....
-
-
Great historic read that'll teach the blockchain
- By Peter Hanson on 05-19-16
By: Phil Champagne
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- By: Jake T. Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies....
-
-
Very basic, not helpful for testing
- By Michael R. Young on 03-02-24
By: Jake T. Mills
-
Dark Mirror
- Edward Snowden and the American Surveillance State
- By: Barton Gellman
- Narrated by: Barton Gellman
- Length: 12 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden touched off a global debate in 2013 when he gave Barton Gellman, Laura Poitras, and Glenn Greenwald each a vast and explosive archive of highly classified files revealing the extent of the American government’s access to our every communication....
-
-
Amazing blindspot
- By Dreux on 06-07-20
By: Barton Gellman
-
Hacking: 3 Books in 1: A Beginners Guide for Hackers
- How to Hack Websites, Smartphones, Wireless Networks + Linux Basic for Hackers (Command Line and All the Essentials) + Hacking with Kali Linux
- By: Julian James McKinnon
- Narrated by: Ivan Busenius
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether you are an unethical or ethical hacker, you will use a lot of the same techniques, and this guidebook is going to explore them in more detail along the way, turning you from a novice to a professional in no time....
-
-
Terrible
- By SDT2000USA on 11-30-21
New releases
-
The Art of the Steal
- How to Protect Yourself and Your Business from Fraud, America's #1 Crime
- By: Frank W. Abagnale
- Narrated by: Barrett Whitener
- Length: 8 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Catch Me if You Can, Frank W. Abagnale recounted his youthful career as a master imposter and forger. In The Art of the Steal, Abagnale tells the remarkable story of how he parlayed his knowledge of cons and scams into a successful career as a consultant on preventing financial foul play—while showing you how to identify and outsmart perpetrators of fraud.
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
-
Clear Guidance on Pen Testing
- By Stanley Rouse on 05-11-24
By: L.D. Knowings
-
Modern Scams & Scammers
- Shielding Yourself: Navigating and Defending Against Modern Day Scams
- By: S C
- Narrated by: Virtual Voice
- Length: 1 hr and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Book Description: "Modern Scams $ Scammers: Shielding Yourself: Navigating and Defending Against Modern Day Scams" In an era where deceit is just a click away, "Modern Scams $ Scammers Shielding Yourself: Navigating and Defending Against Modern Scams" emerges as an essential guide to safeguard your financial and personal security. This comprehensive book dives deep into the murky waters of scams, offering a clear and authoritative exploration of the various tactics used by scammers and providing actionable advice on how to protect yourself. Whether you're a senior trying to navigate the ...
By: S C
-
Conversations in Communication: Volume 3
- Technology and Cybersecurity: How They Protect and Shape an Organization
- By: Philip Weinholtz
- Narrated by: Virtual Voice
- Length: 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
A technology and cybersecurity handbook. Today's organizations are experiencing a major change in the way they work and think. Interconnectivity requires individuals who are responsible for network and system administration to be proactive in their assessment of security concerns. Technology and Cybersecurity: How They Protect and Shape an Organization is the 3rd Volume in the Conversations in Communication series. It is a technology and cybersecurity handbook dedicated to analyzing and assessing the best options for organizations to secure their intellectual property.
By: Philip Weinholtz
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- By: Aram Sinnreich, Jesse Gilbert
- Narrated by: Jonathan Todd Ross
- Length: 11 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.
By: Aram Sinnreich, and others
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
By: Eugene H. Spafford, and others
-
The Art of the Steal
- How to Protect Yourself and Your Business from Fraud, America's #1 Crime
- By: Frank W. Abagnale
- Narrated by: Barrett Whitener
- Length: 8 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Catch Me if You Can, Frank W. Abagnale recounted his youthful career as a master imposter and forger. In The Art of the Steal, Abagnale tells the remarkable story of how he parlayed his knowledge of cons and scams into a successful career as a consultant on preventing financial foul play—while showing you how to identify and outsmart perpetrators of fraud.
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
-
Clear Guidance on Pen Testing
- By Stanley Rouse on 05-11-24
By: L.D. Knowings
-
Modern Scams & Scammers
- Shielding Yourself: Navigating and Defending Against Modern Day Scams
- By: S C
- Narrated by: Virtual Voice
- Length: 1 hr and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Book Description: "Modern Scams $ Scammers: Shielding Yourself: Navigating and Defending Against Modern Day Scams" In an era where deceit is just a click away, "Modern Scams $ Scammers Shielding Yourself: Navigating and Defending Against Modern Scams" emerges as an essential guide to safeguard your financial and personal security. This comprehensive book dives deep into the murky waters of scams, offering a clear and authoritative exploration of the various tactics used by scammers and providing actionable advice on how to protect yourself. Whether you're a senior trying to navigate the ...
By: S C
-
Conversations in Communication: Volume 3
- Technology and Cybersecurity: How They Protect and Shape an Organization
- By: Philip Weinholtz
- Narrated by: Virtual Voice
- Length: 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
A technology and cybersecurity handbook. Today's organizations are experiencing a major change in the way they work and think. Interconnectivity requires individuals who are responsible for network and system administration to be proactive in their assessment of security concerns. Technology and Cybersecurity: How They Protect and Shape an Organization is the 3rd Volume in the Conversations in Communication series. It is a technology and cybersecurity handbook dedicated to analyzing and assessing the best options for organizations to secure their intellectual property.
By: Philip Weinholtz
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- By: Aram Sinnreich, Jesse Gilbert
- Narrated by: Jonathan Todd Ross
- Length: 11 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.
By: Aram Sinnreich, and others
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
By: Eugene H. Spafford, and others
-
Cybersecurity for Kittens
- A Purr-fect Guide to Staying Safe Online
- By: Jean-Jacques Reibel
- Narrated by: Virtual Voice
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Cybersecurity for Kittens: A Purr-fect Guide to Staying Safe Online" is an adorable and informative guide designed to teach young kittens—the future savvy cats of the digital world—how to navigate and secure their online lives. Through engaging and kitten-friendly language, the book covers the basics of cybersecurity, from understanding the cyber jungle to protecting one's digital paw prints. Each chapter explores different cybersecurity threats such as phishing, malware, and the nuances of social engineering, with playful analogies to help little learners grasp complex concepts. The ...
-
Cybersecurity Governance and Compliance
- A Comprehensive Guide for Professionals in Effective Cybersecurity Governance and Compliance
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Immerse yourself in the rapidly evolving landscape of "Cybersecurity Governance and Compliance." This comprehensive new eBook guides you into the intricate world of cybersecurity, from governance models to compliance regulations, offering deep insights and practical advice. The book begins by covering significant aspects of cybersecurity governance. It expands on various models, their significance, and the specific challenges involved. Subsequently, it spotlights the key players in cybersecurity governance, highlighting the roles of governments, private sectors, and non-profit organizations...
By: Barrett Williams, and others
-
Network Security Essentials
- Protecting Digital Infrastructures
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 4 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing "Network Security Essentials", the must-have guide for professionals navigating the transformative landscape of network security in the digital age. This comprehensive eBook provides rich, multi-faceted insights that penetrate the surface of network security, revealing the depths of this essential discipline like never before. Starting with a clear introduction to Network Security, the book seamlessly guides you through the dynamic world of digital infrastructures. Explore the integral role they play in business today and discover practical strategies to protect them from myriad...
By: Barrett Williams, and others
-
Defending Data in Virtual Environments
- Exploring the Importance of Secure Cloud Computing
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 4 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Welcome to the world of "Defending Data in Virtual Environments" - a guide that enhances your understanding of data security in the cloud computing landscape. This insightful eBook promises to be a game-changer for those seeking to navigate the complex topography of cloud security. In the first few chapters, we dive deep into the basics of cloud computing, helping you to understand the key concepts, benefits, and varied models of cloud services. The narrative progresses to include the fundamental and pivotal aspects of cloud security, followed by an in-depth discussion on threats, ...
By: Barrett Williams, and others
-
Scaling the Chains
- Conquering the Trilemma of Speed, Security, and Decentralization in Blockchain Technology
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 2 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the enigmatic realm of Blockchain with our new eBook, "Scaling the Chains." Explore the marvels of this decentralized wonder, as it transforms the digitalscape of business, finance, law, and more. This is not just a guide; it's an engaging journey crafted for the voraciously curious minds that ache to untangle the labyrinth of Blockchain technology. Venture systematically through Blockchain's birth, evolution, and up to the current breakthroughs. Unravel the core intricacies of this tech phenomenon, which stands at the fascinating intersection of cryptography, computer science, ...
By: Barrett Williams, and others
-
Defending the Digital Domain
- Navigating the Complexities of Risk Management in Cybersecurity
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the depths of cybersecurity with the exciting new eBook, "Defending the Digital Domain." This insightful read doesn't just skim the surface of digital defense but shatter layers and layers of erudition, fueling your mind with comprehensive know-how of cybersecurity. The eBook is segmented into ten captivating chapters, each dedicated to an aspect of cybersecurity risk management that equips you with understanding and articulately presents necessary information. From an introduction to this vast field, looming cyber threats, to the in-depth analysis of risk management principles, ...
By: Barrett Williams, and others
-
Inside the Dark Web
- A Comprehensive Guide to Its Mechanics and Risks
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 1 hr and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
Step into the mysterious and elusive realm of "Inside the Dark Web," an eye-opening eBook that sheds light on the lesser-known and often misunderstood corners of the digital world. This captivating and informative journey will take you through the many layers of the internet, as you unravel the secrets of the Surface Web, Deep Web, and Dark Web, and plunge into the world of hidden .onion websites. Discover the intricacies of navigating the Dark Web through the TOR Network, where anonymity and privacy reign supreme. Learn the vital role Virtual Private Networks (VPNs) play in securing your ...
By: Barrett Williams, and others
-
Decentralized Medicine
- Embracing Blockchain for Secure and Interoperable Healthcare Data
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 2 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the transformative realm of "Decentralized Medicine", a compelling eBook that delves into the fascinating intersection of healthcare and cutting-edge blockchain technology. This eBook is essential for those curious about disruptive technologies and the exciting possibilities they present to medicine. Beginning with a comprehensive introduction to blockchain, the eBook lays a solid foundation for understanding this extraordinary technology. From its evolution to its diverse applicability across industries, this education will prepare you for the more specific discussions to follow....
By: Barrett Williams, and others
-
Proactive Defense Strategies for Security Operations and Monitoring
- Enhancing Security Measures through Proactive Measures and Efficient Monitoring
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 2 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive deep into the world of security with the eBook, 'Proactive Defense Strategies for Security Operations and Monitoring.' This engrossing book serves as a comprehensive guide to understanding and embracing the proactive approach to defense strategies. Chapter 1 sets the ground, introducing you to the very basics of proactive defense and its significant importance in security operations. Chapter 2 takes you through fundamental aspects and potential vulnerabilities of security operations, while also providing an insight into the functioning of a robust Security Operations Center. Is ...
By: Barrett Williams, and others
-
Secure Strides
- Enhancing Security through In-depth Assessment
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
Strap in for a page-turning journey into the realm of cyber protection and security systems with "Secure Strides!" Every inch of this comprehensive guide offers enlightening information about the intricate tapestry that constitutes the world of penetration testing and cybersecurity. Embark with us from Chapter One, delving into the captivating introduction to Penetration Testing and distinguishing between ethical hacking and penetration testing, leaving no stone unturned when it comes to a comprehensive understanding of the topic. Chapter Two enlightens eager minds about system ...
By: Barrett Williams, and others
-
Secure Development
- Strategies and Best Practices for Ensuring Software Security
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 4 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Immerse yourself in the world of software security with the new eBook "Secure Development." This comprehensive guide provides meticulous insights into the creation of secure, resilient applications, addressing common misconceptions and guiding you through the foundations of application security. Learn to understand, anticipate, and mitigate application attacks, and master the basic principles of creating a robust defense system for your software. Delve into the specifics of secure designing that can inhibit cyber attackers from exploiting your application. From minimizing the attack surface...
By: Barrett Williams, and others
-
Inevitable Progress
- Striking a Balance between Innovation and Arms Control
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Embark on an intellectual journey with the latest exceptional ebook, "Inevitable Progress." Exploring the complex intersections of technology, security, and the evolving international arms control discourse, this comprehensive guide makes intricate concepts accessible and engaging. "Inevitable Progress" unveils the intricacies of high-tech security, highlighting the rise of advanced technologies, security threats evolution, and the importance of adaptation in a rapidly changing security environment. The book provokes thought, paves the way to understanding complex dilemmas, and fosters a ...
By: Barrett Williams, and others