Bestsellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
It’s the ledger stupid
- By Jessica Hopman on 03-14-24
By: Lyn Alden
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 24 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
-
-
minor flaw but great content
- By A L on 03-04-25
By: Mike Chapple, and others
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline.
-
-
No supplemental PDF
- By Rasheed Flenoid on 10-17-23
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
-
-
Great book
- By KatieLynn on 10-08-24
By: Joseph Steinberg, and others
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
-
Amazing story
- By Katie W. on 06-08-24
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
It’s the ledger stupid
- By Jessica Hopman on 03-14-24
By: Lyn Alden
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 24 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
-
-
minor flaw but great content
- By A L on 03-04-25
By: Mike Chapple, and others
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline.
-
-
No supplemental PDF
- By Rasheed Flenoid on 10-17-23
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
-
-
Great book
- By KatieLynn on 10-08-24
By: Joseph Steinberg, and others
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
-
Amazing story
- By Katie W. on 06-08-24
By: Joseph Cox
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
-
-
WHY NARRATE MASSIVE URLs?!?!!
- By pinkington on 05-30-24
By: Mike Chapple, and others
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back....
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles....
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
SIE Exam Prep Made Simple!
- Complete Review Edition Study Guide for the Security Industry Essentials Exam
- By: Evan Benitez
- Narrated by: dNathanielWilliamsVO
- Length: 7 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
You are no doubt a busy professional with a lot of things going on! It can be challenging to find the time to study in preparation for the SIE exam. However, the truth is that the SIE test is a challenging test. It is normal to have some anxiety about taking this test.
-
-
Clear and Concise Review
- By Eddie Barker on 05-18-25
By: Evan Benitez
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist and how to identify, protect against, detect, and respond to them....
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Too Much Political Bias
- By Dreux on 02-18-23
By: Bruce Schneier
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity....
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- By: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
-
-
Political biased for absolutely no reason
- By Red on 09-28-24
By: Byron Tau
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- By: Alsden Keir
- Narrated by: Darren Guido
- Length: 1 hr and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends.
-
-
Subtle Clues You Can’t Afford to Miss
- By Steven Turner on 07-29-25
By: Alsden Keir
-
Hackers & Painters
- Big Ideas from the Computer Age
- By: Paul Graham
- Narrated by: Mark Sando
- Length: 7 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Find out....
-
-
a mindsett that sets people apart
- By Andrew at the BlackFox on 09-10-21
By: Paul Graham
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
CompTIA A+ & Security+ Ultimate Study Guide
- Pass 220-1101, 220-1102 & SY0-701 with 450+ Practice Questions, Exam Tips & Career-Ready IT Skills
- By: Josh Russell
- Narrated by: Tom Brooks
- Length: 5 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
This comprehensive, beginner-friendly study bundle blends two high-impact certification paths into one clear, exam-focused roadmap. Whether you're a total newcomer or brushing up your skills, this guide provides everything you need to pass the exams—and thrive in the tech industry.
-
-
Bootcamp in my ears
- By UK on 07-28-25
By: Josh Russell
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills.
-
-
Get someone who knows the topic to read it, and don't pad the run time.
- By JTCheetah on 06-17-25
By: Jake T Mills
New releases
-
Computer Safety for Seniors Made Easy
- Protecting Your Digital Life
- By: James Bernstein
- Narrated by: Virtual Voice
- Length: 1 hr and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
**Not Just for Seniors!** You may think that things such as computers, email and the internet are dangerous and there is always someone waiting to steal your personal information or hack your computer. Fortunately, that is not the case and it is not too difficult to protect yourself from online threats such as cybercriminals, viruses and spyware. With a little common sense and some help as to what to look for and what to avoid when using your computer to do things such surf the internet, shop online, check your email, and manage your finances, you can actually stay quite safe without too ...
By: James Bernstein
-
The Human Firewall
- A Cultural Resilience Framework
- By: Paul Thomas
- Narrated by: Virtual Voice
- Length: 3 hrs
- Unabridged
-
Overall
-
Performance
-
Story
What Happens After the Breach Isn’t Just Technical A novel about burnout, breach response, and the people behind the metrics. What if the real cybersecurity risk is not the malware, but the silence? Not the exploit, but the exhaustion? What if the firewall is not a device at all, but a person, and that person is close to breaking? The Human Firewall is a novel set inside a financial services firm facing more than just cyber incidents. It follows Daniel, Layla, Tom, Angela, and Raya as they navigate high-pressure incident response while quietly enduring burnout, doubt, and unspoken fatigue...
By: Paul Thomas
-
Strategic Data Governance Policy List
- A pocket reference of cold hard truth to help businesses implement emerging technologies through data governance
- By: Hanabal Khaing
- Narrated by: Virtual Voice
- Length: 3 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Strategic Data Governance Policy List is a pocket reference of cold hard truth to help businesses NOT to be part of the 52 percent of Fortune 500 companies and 86 percent of smaller businesses that go bankrupt in less than 20 years due to lack of data governance, lack of innovation, lack of implementation of emerging technologies, data breaches, regulatory fines, and massive privacy violation and regulatory compliance settlements. The book has a list of data governance policies all businesses should implement for cybersecurity. For example, 80 percent of businesses store passwords in plain ...
By: Hanabal Khaing
-
Cyber Law In India
- 2nd Edition
- By: Ajit Singh
- Narrated by: Virtual Voice
- Length: 6 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
The genesis of this book, "Cyber Law In India," lies in the pressing need for a resource that demystifies this complex subject for the next generation of legal minds. Traditional legal education has often treated cyber law as a peripheral topic. However, the National Education Policy (NEP) 2020 rightfully emphasizes a multidisciplinary, practical, and skill-oriented approach to learning. It calls for an education that equips students to tackle real-world problems with critical thinking and ethical grounding. This book is a direct response to that call. Key Features of the Book: 1. NEP 2020 ...
By: Ajit Singh
-
THE PIG BUTCHERS OF CAMBODIA
- A Story of Scams, Slavery, and Survival in Southeast Asia
- By: Richard Alanson
- Narrated by: Virtual Voice
- Length: 1 hr and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
THE PIG BUTCHERS OF CAMBODIA A Story of Scams, Slavery, and Survival in Southeast Asia They answered job ads. They were trafficked. Then they were forced to scam the world — or be beaten. Across the glittering skyline of Sihanoukville, Cambodia, and behind the guarded gates of shadowy compounds in Myanmar and Laos, an invisible empire has risen. One built not on drugs or guns — but on texts, crypto, and heartbreak. Welcome to the world of pig butchering scams: the cruel fusion of digital fraud and modern slavery that’s quietly raking in billions. In this in depth exposé, the author ...
By: Richard Alanson
-
Digital Self-Defense for Real People
- How to Protect Your Data, Avoid Scams, and Stay Safe Online Without Being a Tech Expert
- By: Bob Bittex
- Narrated by: Virtual Voice
- Length: 2 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Protect yourself from scams, identity theft, and digital disasters - no tech degree required. Digital Self-Defense for Real People is your everyday guide to staying safe in today’s online world. Whether you're a parent, retiree, college student, or small business owner, this book gives you the tools you need to protect your personal data, avoid scams, and build digital confidence - without the jargon or overwhelm. Cybercrime is exploding. In 2024 alone, Americans lost over $12.5 billion to fraud, phishing, and identity theft - and everyday people like you are the top targets. This isn’t...
By: Bob Bittex
-
Computer Safety for Seniors Made Easy
- Protecting Your Digital Life
- By: James Bernstein
- Narrated by: Virtual Voice
- Length: 1 hr and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
**Not Just for Seniors!** You may think that things such as computers, email and the internet are dangerous and there is always someone waiting to steal your personal information or hack your computer. Fortunately, that is not the case and it is not too difficult to protect yourself from online threats such as cybercriminals, viruses and spyware. With a little common sense and some help as to what to look for and what to avoid when using your computer to do things such surf the internet, shop online, check your email, and manage your finances, you can actually stay quite safe without too ...
By: James Bernstein
-
The Human Firewall
- A Cultural Resilience Framework
- By: Paul Thomas
- Narrated by: Virtual Voice
- Length: 3 hrs
- Unabridged
-
Overall
-
Performance
-
Story
What Happens After the Breach Isn’t Just Technical A novel about burnout, breach response, and the people behind the metrics. What if the real cybersecurity risk is not the malware, but the silence? Not the exploit, but the exhaustion? What if the firewall is not a device at all, but a person, and that person is close to breaking? The Human Firewall is a novel set inside a financial services firm facing more than just cyber incidents. It follows Daniel, Layla, Tom, Angela, and Raya as they navigate high-pressure incident response while quietly enduring burnout, doubt, and unspoken fatigue...
By: Paul Thomas
-
Strategic Data Governance Policy List
- A pocket reference of cold hard truth to help businesses implement emerging technologies through data governance
- By: Hanabal Khaing
- Narrated by: Virtual Voice
- Length: 3 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Strategic Data Governance Policy List is a pocket reference of cold hard truth to help businesses NOT to be part of the 52 percent of Fortune 500 companies and 86 percent of smaller businesses that go bankrupt in less than 20 years due to lack of data governance, lack of innovation, lack of implementation of emerging technologies, data breaches, regulatory fines, and massive privacy violation and regulatory compliance settlements. The book has a list of data governance policies all businesses should implement for cybersecurity. For example, 80 percent of businesses store passwords in plain ...
By: Hanabal Khaing
-
Cyber Law In India
- 2nd Edition
- By: Ajit Singh
- Narrated by: Virtual Voice
- Length: 6 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
The genesis of this book, "Cyber Law In India," lies in the pressing need for a resource that demystifies this complex subject for the next generation of legal minds. Traditional legal education has often treated cyber law as a peripheral topic. However, the National Education Policy (NEP) 2020 rightfully emphasizes a multidisciplinary, practical, and skill-oriented approach to learning. It calls for an education that equips students to tackle real-world problems with critical thinking and ethical grounding. This book is a direct response to that call. Key Features of the Book: 1. NEP 2020 ...
By: Ajit Singh
-
THE PIG BUTCHERS OF CAMBODIA
- A Story of Scams, Slavery, and Survival in Southeast Asia
- By: Richard Alanson
- Narrated by: Virtual Voice
- Length: 1 hr and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
THE PIG BUTCHERS OF CAMBODIA A Story of Scams, Slavery, and Survival in Southeast Asia They answered job ads. They were trafficked. Then they were forced to scam the world — or be beaten. Across the glittering skyline of Sihanoukville, Cambodia, and behind the guarded gates of shadowy compounds in Myanmar and Laos, an invisible empire has risen. One built not on drugs or guns — but on texts, crypto, and heartbreak. Welcome to the world of pig butchering scams: the cruel fusion of digital fraud and modern slavery that’s quietly raking in billions. In this in depth exposé, the author ...
By: Richard Alanson
-
Digital Self-Defense for Real People
- How to Protect Your Data, Avoid Scams, and Stay Safe Online Without Being a Tech Expert
- By: Bob Bittex
- Narrated by: Virtual Voice
- Length: 2 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Protect yourself from scams, identity theft, and digital disasters - no tech degree required. Digital Self-Defense for Real People is your everyday guide to staying safe in today’s online world. Whether you're a parent, retiree, college student, or small business owner, this book gives you the tools you need to protect your personal data, avoid scams, and build digital confidence - without the jargon or overwhelm. Cybercrime is exploding. In 2024 alone, Americans lost over $12.5 billion to fraud, phishing, and identity theft - and everyday people like you are the top targets. This isn’t...
By: Bob Bittex
-
The Value Chasm
- How Corporate Greed and Government Neglect Broke the Digital Commons
- By: Mark Craddock
- Narrated by: Virtual Voice
- Length: 13 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
The catastrophic failures of Heartbleed, Log4Shell, and the XZ Utils backdoor were not isolated incidents. They were warning shots. They were symptoms of a much deeper and more dangerous crisis: our digital world is built on the unrecognised, uncompensated, and unsustainable labour of a handful of "accidental gatekeepers". The “free” and open-source software that powers our governments, banks, and critical national infrastructure isn’t free, it’s running on a hidden debt of human burnout that is about to come due. In The Value Chasm, you will discover the profound market failure at ...
By: Mark Craddock
-
CompTIA A+ & Security+ Ultimate Study Guide
- Pass 220-1101, 220-1102 & SY0-701 with 450+ Practice Questions, Exam Tips & Career-Ready IT Skills
- By: Josh Russell
- Narrated by: Tom Brooks
- Length: 5 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
This comprehensive, beginner-friendly study bundle blends two high-impact certification paths into one clear, exam-focused roadmap. Whether you're a total newcomer or brushing up your skills, this guide provides everything you need to pass the exams—and thrive in the tech industry.
-
-
Bootcamp in my ears
- By UK on 07-28-25
By: Josh Russell
-
Attack Surface Management
- Strategies and Techniques for Safeguarding Your Digital Assets
- By: Ron Eddings, MJ Kaufmann
- Narrated by: Dean Gallagher
- Length: 14 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Authors Ron Eddings and MJ Kaufmann offer actionable solutions for newcomers and experts alike, using machine learning and AI techniques. ASM helps you routinely assess digital assets to gain complete insight into vulnerabilities, and potential threats.
By: Ron Eddings, and others
-
Quantum Security
- Practical implementation with Q-SLICE and QUANTA
- By: Jeremy Green
- Narrated by: Virtual Voice
- Length: 4 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
In an era of rapid technological change, quantum computing stands poised to break the cryptographic foundations upon which our digital world is built. While many organisations see quantum threats as distant and abstract, the risk of “harvest now, decrypt later” attacks is real and growing. This practical guide bridges the gap between academic research and operational security, providing a clear path to building quantum-resilient defences. Drawing on extensive PhD research into quantum computing and more than 20 years of cybersecurity experience, Jeremy Green introduces two pioneering ...
By: Jeremy Green
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- By: Roger A. Grimes
- Narrated by: Mike Lenz
- Length: 13 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
By: Roger A. Grimes
-
Standardized
- The MSP’s Guide to Avoiding Lawsuits, Scaling Compliance, and Winning High-Value Clients
- By: Bruce McCully
- Narrated by: Bruce McCully
- Length: 4 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
The MSPs that are dominating the market aren’t selling IT anymore. They’re selling protection—protection from regulators, cyber insurance denials, and lawsuits that are wiping out businesses like yours. Standardized: The MSP’s Guide to Avoiding Lawsuits, Scaling Compliance, and Winning High-Value Clients isn’t theory—it’s a battle-tested blueprint for turning compliance into a scalable, profitable service that keeps clients loyal and lawyers off your back.
By: Bruce McCully