- History & Culture (1,564)
Bestsellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- By: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
-
-
You sort of knew it already…
- By Leigh Munsil on 05-08-24
By: Byron Tau
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- By: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
-
-
You sort of knew it already…
- By Leigh Munsil on 05-08-24
By: Byron Tau
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
By: Joseph Steinberg, and others
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
The Hacker Crackdown
- Law and Disorder on the Electronic Frontier
- By: Bruce Sterling
- Narrated by: Tom Parks
- Length: 12 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bruce Sterling delves into the world of high-tech crime and punishment in one of the first books to explore the cyberspace breaches that threaten national security....
-
-
Great bit of journalism chronicling a bygone era.
- By Amazon Customer on 12-20-20
By: Bruce Sterling
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Too Much Political Bias
- By Dreux on 02-18-23
By: Bruce Schneier
-
Gray Day
- My Undercover Mission to Expose America's First Cyber Spy
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy....
-
-
A Real Spy Story
- By Darren Sapp on 04-06-19
By: Eric O'Neill
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles....
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively.
-
-
Clear and Comprehensive Introduction
- By Michael Martin on 05-19-24
By: L.D. Knowings
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- By: Jennifer Bleam
- Narrated by: Jennifer Bleam
- Length: 2 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
-
-
The insight and approach Jennifer provided on cybersecurity sales and marketing.
- By Amazon Customer on 02-10-24
By: Jennifer Bleam
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
-
-
This is it!
- By Marcus on 10-18-23
By: Glen D. Singh
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
By: Mike Chapple, and others
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity....
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
This cat-and-mouse story of a vast FBI sting operation reveals how the criminal underworld has become a globalized economy in its own right—one that can't be policed without crossing complicated ethical boundaries.
By: Joseph Cox
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- By: Aram Sinnreich, Jesse Gilbert
- Narrated by: Jonathan Todd Ross
- Length: 11 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.
By: Aram Sinnreich, and others
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing....
-
-
Case Studies and Practical Application
- By Anonymous User on 12-24-23
By: Jake T Mills
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- By: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, and others
- Narrated by: The Voice Gallery
- Length: 8 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started....
-
-
A Must for Aspiring Cybersecurity Professionals
- By Chuck S on 02-12-23
By: Dr. Gerald Auger, and others
-
The Language of Deception
- Weaponizing Next Generation AI
- By: Justin Hutchens
- Narrated by: Mike Chamberlain
- Length: 10 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes....
By: Justin Hutchens
New releases
-
Cloud Computing: Risks and Rewards
- An In-Depth Guide to the Advantages and Disadvantages of Cloud Computing
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 1 hr and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing the ultimate guide to Cloud Computing, the eBook that will revolutionize the way you think about technology! With chapters ranging from an introduction to cloud computing all the way to future trends and data sovereignty, this essential guidebook covers everything you need to know about the cloud. In Chapter 2, you'll delve into the evolution of this game-changing technology, while Chapter 3 offers a comprehensive understanding of the various types of cloud computing. Chapters 4 and 5 examine the benefits and drawbacks of adopting cloud computing, ensuring you're fully informed ...
By: Barrett Williams, and others
-
Cyberspace Guardians
- A Comprehensive Guide for Choosing the Right CISO
- By: Dr. Sylvester Cotton
- Narrated by: Chris Walsh
- Length: 2 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the intriguing world of digital defense with Dr. Sylvester “Sly” Cotton’s masterpiece, “Cyberspace Guardians.” In an era dominated by an intricate web of technology, Dr. Cotton unravels the mysteries of safeguarding the vast realm of cyberspace. This book is your guiding light in the quest to understand the role of a Chief Information Security Officer (CISO), the sentinel of our digital universes. The labyrinth of cyberspace is riddled with unseen dangers, lurking shadows, and unseen adversaries seeking to undermine our technological advancements.
-
The Art of the Steal
- How to Protect Yourself and Your Business from Fraud, America's #1 Crime
- By: Frank W. Abagnale
- Narrated by: Barrett Whitener
- Length: 8 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Catch Me if You Can, Frank W. Abagnale recounted his youthful career as a master imposter and forger. In The Art of the Steal, Abagnale tells the remarkable story of how he parlayed his knowledge of cons and scams into a successful career as a consultant on preventing financial foul play—while showing you how to identify and outsmart perpetrators of fraud.
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
-
Clear and Comprehensive Introduction
- By Michael Martin on 05-19-24
By: L.D. Knowings
-
Modern Scams & Scammers
- Shielding Yourself: Navigating and Defending Against Modern Day Scams
- By: S C
- Narrated by: Virtual Voice
- Length: 1 hr and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Book Description: "Modern Scams $ Scammers: Shielding Yourself: Navigating and Defending Against Modern Day Scams" In an era where deceit is just a click away, "Modern Scams $ Scammers Shielding Yourself: Navigating and Defending Against Modern Scams" emerges as an essential guide to safeguard your financial and personal security. This comprehensive book dives deep into the murky waters of scams, offering a clear and authoritative exploration of the various tactics used by scammers and providing actionable advice on how to protect yourself. Whether you're a senior trying to navigate the ...
By: S C
-
Conversations in Communication: Volume 3
- Technology and Cybersecurity: How They Protect and Shape an Organization
- By: Philip Weinholtz
- Narrated by: Virtual Voice
- Length: 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
A technology and cybersecurity handbook. Today's organizations are experiencing a major change in the way they work and think. Interconnectivity requires individuals who are responsible for network and system administration to be proactive in their assessment of security concerns. Technology and Cybersecurity: How They Protect and Shape an Organization is the 3rd Volume in the Conversations in Communication series. It is a technology and cybersecurity handbook dedicated to analyzing and assessing the best options for organizations to secure their intellectual property.
By: Philip Weinholtz
-
Cloud Computing: Risks and Rewards
- An In-Depth Guide to the Advantages and Disadvantages of Cloud Computing
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 1 hr and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing the ultimate guide to Cloud Computing, the eBook that will revolutionize the way you think about technology! With chapters ranging from an introduction to cloud computing all the way to future trends and data sovereignty, this essential guidebook covers everything you need to know about the cloud. In Chapter 2, you'll delve into the evolution of this game-changing technology, while Chapter 3 offers a comprehensive understanding of the various types of cloud computing. Chapters 4 and 5 examine the benefits and drawbacks of adopting cloud computing, ensuring you're fully informed ...
By: Barrett Williams, and others
-
Cyberspace Guardians
- A Comprehensive Guide for Choosing the Right CISO
- By: Dr. Sylvester Cotton
- Narrated by: Chris Walsh
- Length: 2 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the intriguing world of digital defense with Dr. Sylvester “Sly” Cotton’s masterpiece, “Cyberspace Guardians.” In an era dominated by an intricate web of technology, Dr. Cotton unravels the mysteries of safeguarding the vast realm of cyberspace. This book is your guiding light in the quest to understand the role of a Chief Information Security Officer (CISO), the sentinel of our digital universes. The labyrinth of cyberspace is riddled with unseen dangers, lurking shadows, and unseen adversaries seeking to undermine our technological advancements.
-
The Art of the Steal
- How to Protect Yourself and Your Business from Fraud, America's #1 Crime
- By: Frank W. Abagnale
- Narrated by: Barrett Whitener
- Length: 8 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Catch Me if You Can, Frank W. Abagnale recounted his youthful career as a master imposter and forger. In The Art of the Steal, Abagnale tells the remarkable story of how he parlayed his knowledge of cons and scams into a successful career as a consultant on preventing financial foul play—while showing you how to identify and outsmart perpetrators of fraud.
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
-
Clear and Comprehensive Introduction
- By Michael Martin on 05-19-24
By: L.D. Knowings
-
Modern Scams & Scammers
- Shielding Yourself: Navigating and Defending Against Modern Day Scams
- By: S C
- Narrated by: Virtual Voice
- Length: 1 hr and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Book Description: "Modern Scams $ Scammers: Shielding Yourself: Navigating and Defending Against Modern Day Scams" In an era where deceit is just a click away, "Modern Scams $ Scammers Shielding Yourself: Navigating and Defending Against Modern Scams" emerges as an essential guide to safeguard your financial and personal security. This comprehensive book dives deep into the murky waters of scams, offering a clear and authoritative exploration of the various tactics used by scammers and providing actionable advice on how to protect yourself. Whether you're a senior trying to navigate the ...
By: S C
-
Conversations in Communication: Volume 3
- Technology and Cybersecurity: How They Protect and Shape an Organization
- By: Philip Weinholtz
- Narrated by: Virtual Voice
- Length: 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
A technology and cybersecurity handbook. Today's organizations are experiencing a major change in the way they work and think. Interconnectivity requires individuals who are responsible for network and system administration to be proactive in their assessment of security concerns. Technology and Cybersecurity: How They Protect and Shape an Organization is the 3rd Volume in the Conversations in Communication series. It is a technology and cybersecurity handbook dedicated to analyzing and assessing the best options for organizations to secure their intellectual property.
By: Philip Weinholtz
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- By: Aram Sinnreich, Jesse Gilbert
- Narrated by: Jonathan Todd Ross
- Length: 11 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.
By: Aram Sinnreich, and others
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
By: Eugene H. Spafford, and others
-
Cybersecurity for Kittens
- A Purr-fect Guide to Staying Safe Online
- By: Jean-Jacques Reibel
- Narrated by: Virtual Voice
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Cybersecurity for Kittens: A Purr-fect Guide to Staying Safe Online" is an adorable and informative guide designed to teach young kittens—the future savvy cats of the digital world—how to navigate and secure their online lives. Through engaging and kitten-friendly language, the book covers the basics of cybersecurity, from understanding the cyber jungle to protecting one's digital paw prints. Each chapter explores different cybersecurity threats such as phishing, malware, and the nuances of social engineering, with playful analogies to help little learners grasp complex concepts. The ...
-
Cybersecurity Governance and Compliance
- A Comprehensive Guide for Professionals in Effective Cybersecurity Governance and Compliance
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Immerse yourself in the rapidly evolving landscape of "Cybersecurity Governance and Compliance." This comprehensive new eBook guides you into the intricate world of cybersecurity, from governance models to compliance regulations, offering deep insights and practical advice. The book begins by covering significant aspects of cybersecurity governance. It expands on various models, their significance, and the specific challenges involved. Subsequently, it spotlights the key players in cybersecurity governance, highlighting the roles of governments, private sectors, and non-profit organizations...
By: Barrett Williams, and others
-
Network Security Essentials
- Protecting Digital Infrastructures
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 4 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing "Network Security Essentials", the must-have guide for professionals navigating the transformative landscape of network security in the digital age. This comprehensive eBook provides rich, multi-faceted insights that penetrate the surface of network security, revealing the depths of this essential discipline like never before. Starting with a clear introduction to Network Security, the book seamlessly guides you through the dynamic world of digital infrastructures. Explore the integral role they play in business today and discover practical strategies to protect them from myriad...
By: Barrett Williams, and others
-
Third Monkey
- Engraining a Warrior’s Ethos into your Cybersecurity Culture and Practice
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 1 hr and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
In today's rapidly-evolving technological landscape, cybersecurity has become a top priority for businesses and organizations around the globe. But with new threats emerging every day, it can be challenging to stay on top of the latest best practices and strategies. That's where Third Monkey comes in. This groundbreaking eBook dives deep into the importance of developing a values-driven culture within your organization to strengthen your cybersecurity defenses. From defining warrior ethos in cybersecurity to understanding the psychology of human behavior, this comprehensive guide covers it ...
By: Barrett Williams, and others
-
Raspberry Pi Security
- Build Your Own DIY Home Security System with Pi
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 1 hr and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing "Raspberry Pi Security" - the ultimate guide to building a DIY home security system using the power and versatility of Raspberry Pi. This comprehensive eBook will transform how you protect your home by putting you in control of designing and implementing a personalized security setup tailored to your specific needs. Dive into the exciting world of Raspberry Pi and home security with Chapter 1, learning the basics and getting ready for the technological journey ahead. Discover how to choose the perfect Raspberry Pi model for your security system in Chapter 2. Step by step, the ...
By: Barrett Williams, and others
-
Defending Data in Virtual Environments
- Exploring the Importance of Secure Cloud Computing
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 4 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Welcome to the world of "Defending Data in Virtual Environments" - a guide that enhances your understanding of data security in the cloud computing landscape. This insightful eBook promises to be a game-changer for those seeking to navigate the complex topography of cloud security. In the first few chapters, we dive deep into the basics of cloud computing, helping you to understand the key concepts, benefits, and varied models of cloud services. The narrative progresses to include the fundamental and pivotal aspects of cloud security, followed by an in-depth discussion on threats, ...
By: Barrett Williams, and others
-
Ethical Hacking Unleashed
- Master the Art of Ethical Hacking and Strengthen Cybersecurity
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive headfirst into the thrilling world of cybersecurity with the compelling eBook, "Ethical Hacking Unleashed." This comprehensive guide serves as your roadmap to understanding the nuances of ethical hacking, unfolding its layers chapter by chapter, section by section. Embrace the adrenaline rush of a daredevil hacker, coupled with the righteousness of a protector, as you decipher the intricacies of cyber fortification. "Ethical Hacking Unleashed" kickstarts your journey with the rudimentary question, "What is Ethical Hacking?" before plunging deeper, touching upon critical aspects, ...
By: Barrett Williams, and others
-
Cyber Guardian
- Navigating the Complex World of Incident Response Strategies
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the pulse-racing and rapidly evolving world of cybersecurity with our new eBook, "Cyber Guardian". This comprehensive guide, structured with clarity and ease of understanding, is designed to arm you with crucial knowledge, techniques, and strategies in dealing with the multi-faceted realm of cyber threats and incident responses. Pave your way through the foggy landscape of cyber threats in Chapter 1, where you'll get acquainted with its impacts on businesses, the common threats and the emerging challenges. This is designed to offer a sturdy foundation in comprehending the complex ...
By: Barrett Williams, and others
-
Inside the Dark Web
- A Comprehensive Guide to Its Mechanics and Risks
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 1 hr and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
Step into the mysterious and elusive realm of "Inside the Dark Web," an eye-opening eBook that sheds light on the lesser-known and often misunderstood corners of the digital world. This captivating and informative journey will take you through the many layers of the internet, as you unravel the secrets of the Surface Web, Deep Web, and Dark Web, and plunge into the world of hidden .onion websites. Discover the intricacies of navigating the Dark Web through the TOR Network, where anonymity and privacy reign supreme. Learn the vital role Virtual Private Networks (VPNs) play in securing your ...
By: Barrett Williams, and others
-
Hidden Fortunes
- Unveiling the Secrets of Privacy Coins and Anonymity
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 2 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ready to uncover the secrets of the cryptic cryptocurrency world? 'Hidden Fortunes' holds the gateway to your financial future, taking you on an exciting and strategic tour through the terra incognita of privacy coins. Chapter 1 kickstarts your trek with an all-embracing overview of cryptocurrency, painting a clear and vivid picture of its evolution and burgeoning implications, setting the stage for the elite players that shape and maneuver this digital underworld. As you delve deeper into 'Hidden Fortunes', each chapter peels back another layer of understanding. Behold the advent of ...
By: Barrett Williams, and others