- History & Culture (1,601)
Bestsellers
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
-
Using technology to catch criminals
- By rascal on 07-01-24
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
-
Using technology to catch criminals
- By rascal on 07-01-24
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
By: Joseph Steinberg, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles....
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality....
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
-
-
WHY read out entire URLs?!
- By pinkington on 05-30-24
By: Mike Chapple, and others
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- By: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
-
-
Wow. This book opened my eyes
- By Austin Frangoules on 06-04-24
By: Byron Tau
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
-
-
This is it!
- By Marcus on 10-18-23
By: Glen D. Singh
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- By: Jake T. Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies....
-
-
Very basic, not helpful for testing
- By Michael R. Young on 03-02-24
By: Jake T. Mills
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Too Much Political Bias
- By Dreux on 02-18-23
By: Bruce Schneier
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
CompTIA CASP+ Certification
- The Ultimate Study Guide to Master the Advanced Security Practitioner Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unravel the intricate layers of modern cybersecurity with the comprehensive guide to the CompTIA CASP+ Certification Advanced Security Practitioner. Dive into the depths of this dynamic field as this book becomes your companion in mastering the multifaceted world of digital defense....
-
-
Cheers to the creators of this audiobook! 🎉
- By Maverick Steel on 03-14-24
By: Jake T Mills
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom.
By: Eugene H. Spafford, and others
-
CompTIA CySA+ Certification
- The Ultimate Study Guide to Practice Questions With Answers and Master the Cybersecurity Analyst Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Unlock the doors to a world of cybersecurity mastery with "Mastering CySA+: A Comprehensive Guide to CompTIA CySA+ Certification." This meticulously crafted guide is your key to conquering the challenges of the CompTIA Cybersecurity Analyst (CySA+) certification....
-
-
Equipping You for Cyber Empowerment!
- By Karina Vazquez on 03-15-24
By: Jake T Mills
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity....
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- By: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, and others
- Narrated by: The Voice Gallery
- Length: 8 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started....
-
-
A Must for Aspiring Cybersecurity Professionals
- By Chuck S on 02-12-23
By: Dr. Gerald Auger, and others
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills.
-
-
This needs a lot of work as for someone who is studying for this exam I learned nothing
- By Erik Krumholz on 05-15-24
By: Jake T Mills
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- By: L.D. Knowings
- Narrated by: David Van Der Molen
- Length: 3 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
Worried about hackers? Fight back with confidence! Discover straightforward steps to safeguard your online presence perfect for non-techies and pros alike.
-
-
Simple and Effective
- By Anonymous User on 06-13-24
By: L.D. Knowings
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
New releases
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- By: Anthony Farrior
- Narrated by: Jennifer Workman
- Length: 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
By: Anthony Farrior
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- By: Jonathan Rigdon
- Narrated by: Kevin Brooker
- Length: 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
By: Jonathan Rigdon
-
Cybersecurity Governance
- A guide for executives who need to understand cybersecurity in plain, actionable language
- By: Darryl Carlton
- Narrated by: Virtual Voice
- Length: 6 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
Offering insights tailored for high-level decision-makers, this guide is an indispensable resource for any executive committed to enhancing their organization’s cybersecurity posture, ensuring a robust, informed response to the omnipresent threat of cyber intrusion. In today’s digital age, no business is immune to the relentless threat of cyberattacks that besiege organizations globally on a daily basis. The stark reality is that it’s not a matter of if but when your systems will become a target, potentially leading to significant data breaches and operational disruptions. As a leader...
By: Darryl Carlton
-
Conquer the CFCE Exam: Your Guide to Success as a Certified Forensic Computer Examiner
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the CFCE Exam: Your Guide to Success as a Certified Forensic Computer Examiner" is an essential resource for aspiring forensic examiners seeking to achieve CFCE certification. This comprehensive guide covers all aspects of digital forensics, including evidence acquisition, file system analysis, metadata extraction, and email forensics. Each chapter provides detailed explanations, practical techniques, and real-world case studies to help you develop the skills needed to conduct thorough and accurate forensic investigations. The book begins with an overview of the CFCE certification ...
-
Conquer the enCE Exam: Your Guide to Success as an EnCase Certified Examiner
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the enCE Exam: Your Guide to Success as an EnCase Certified Examiner" is an essential resource for anyone aspiring to become an EnCase Certified Examiner. This comprehensive guide covers every aspect of the enCE certification process, offering in-depth knowledge, practical insights, and step-by-step instructions to help you master the material and excel in both the written and practical phases of the exam. The book begins with an introduction to EnCase and the enCE certification, followed by detailed chapters on preparing for the exam, understanding digital forensics, and setting ...
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- By: Anthony Farrior
- Narrated by: Jennifer Workman
- Length: 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
By: Anthony Farrior
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- By: Jonathan Rigdon
- Narrated by: Kevin Brooker
- Length: 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
By: Jonathan Rigdon
-
Cybersecurity Governance
- A guide for executives who need to understand cybersecurity in plain, actionable language
- By: Darryl Carlton
- Narrated by: Virtual Voice
- Length: 6 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
Offering insights tailored for high-level decision-makers, this guide is an indispensable resource for any executive committed to enhancing their organization’s cybersecurity posture, ensuring a robust, informed response to the omnipresent threat of cyber intrusion. In today’s digital age, no business is immune to the relentless threat of cyberattacks that besiege organizations globally on a daily basis. The stark reality is that it’s not a matter of if but when your systems will become a target, potentially leading to significant data breaches and operational disruptions. As a leader...
By: Darryl Carlton
-
Conquer the CFCE Exam: Your Guide to Success as a Certified Forensic Computer Examiner
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the CFCE Exam: Your Guide to Success as a Certified Forensic Computer Examiner" is an essential resource for aspiring forensic examiners seeking to achieve CFCE certification. This comprehensive guide covers all aspects of digital forensics, including evidence acquisition, file system analysis, metadata extraction, and email forensics. Each chapter provides detailed explanations, practical techniques, and real-world case studies to help you develop the skills needed to conduct thorough and accurate forensic investigations. The book begins with an overview of the CFCE certification ...
-
Conquer the enCE Exam: Your Guide to Success as an EnCase Certified Examiner
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the enCE Exam: Your Guide to Success as an EnCase Certified Examiner" is an essential resource for anyone aspiring to become an EnCase Certified Examiner. This comprehensive guide covers every aspect of the enCE certification process, offering in-depth knowledge, practical insights, and step-by-step instructions to help you master the material and excel in both the written and practical phases of the exam. The book begins with an introduction to EnCase and the enCE certification, followed by detailed chapters on preparing for the exam, understanding digital forensics, and setting ...
-
Conquer the CISM Exam: Your Guide to Success as a Certified Information Systems Manager
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the CISM Exam: Your Guide to Success as a Certified Information Security Manager" is an essential resource for anyone aiming to achieve the prestigious CISM certification. This comprehensive guide covers all critical domains of the CISM exam, including Information Security Governance, Information Risk Management, Information Security Program Development and Management, and Information Security Incident Management. The book begins with an overview of the CISM certification and its importance in the field of information security management. It then delves into each domain in detail, ...
-
Conquer the CISA Exam: Your Guide to Success as a Certified Information Systems Auditor
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the CISA Exam: Your Guide to Success as a Certified Information Systems Auditor" is an essential resource for anyone aiming to achieve the prestigious CISA certification. This comprehensive guide covers all the critical domains of the CISA exam, including Information Systems Auditing Process, Governance and Management of IT, Information Systems Acquisition, Development and Implementation, Information Systems Operations and Business Resilience, and Protection of Information Assets. The book begins with an overview of the CISA certification and its importance in the field of ...
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- By: L.D. Knowings
- Narrated by: William Goldman
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
-
Comprehensive and Well-Structured
- By Tracy Covington on 06-23-24
By: L.D. Knowings
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- By: Omar Santos, Petar Radanliev
- Narrated by: Max Newland
- Length: 11 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
By: Omar Santos, and others
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- By: André Edmond
- Narrated by: Scotty Kwas
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you been struggling to find a guide that explains how to get started in cybersecurity? Does your lack of experience make it difficult to get your first job? The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points. The lack of a guiding hand leaves them stranded, not knowing which doors to knock on or which paths to tread.
By: André Edmond
-
Mastering Kali Purple
- For Vulnerability Assessment and Penetration Testing
- By: EL MOSTAFA OUCHEN
- Narrated by: Virtual Voice
- Length: 3 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Purple is a comprehensive security tool that combines offensive and defensive methodologies, providing a versatile platform for vulnerability assessment and penetration testing. Originating from Kali Linux, it combines aggressive tactics with vigilant defenses, embodying the purple teaming concept. This book aims to serve as a comprehensive guide for mastering Kali Purple, catering to both beginners and seasoned professionals. It covers various aspects of security, including application, database, wireless, and cloud security. Beyond technical aspects, it also discusses social ...
-
Conquer the CHFI Exam: Your Guide to Success as a Computer Hacking Forensic Investigator
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Prepare to excel in the Computer Hacking Forensic Investigator (CHFI) certification exam with "Conquer the CHFI Exam: Your Guide to Success as a Computer Hacking Forensic Investigator." This comprehensive study guide covers all critical topics to ensure you master the skills needed to succeed. Dive into the Computer Forensics Investigation Process, understanding the systematic approach to identifying, preserving, and analyzing digital evidence. Learn essential techniques for Digital Evidence Acquisition, ensuring the integrity and admissibility of evidence in legal proceedings. Explore the ...
-
Conquer the CEH Exam: Your Guide to Success as a Certified Ethical Hacker
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the CEH Exam: Your Guide to Success as a Certified Ethical Hacker" is an essential resource for anyone preparing to become a Certified Ethical Hacker (CEH). This comprehensive study guide covers all critical topics needed to pass the CEH exam and excel in the field of ethical hacking. The book is meticulously structured to provide both theoretical knowledge and practical skills necessary for identifying and mitigating security threats. The guide begins with Footprinting and Reconnaissance Techniques, teaching methods to gather information about target systems and networks, a ...
-
Conquer the GPEN Exam: Your Guide to Success as a GIAC Penetration Tester
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unlock your potential as a cybersecurity professional with "Conquer the GPEN Exam: Your Guide to Success as a GIAC Penetration Tester." This comprehensive study guide is your essential companion in mastering the GPEN certification, equipping you with the knowledge and skills needed to excel in penetration testing. Dive deep into the methodologies and techniques crucial for identifying and mitigating security vulnerabilities. Explore the entire penetration testing process, from planning and reconnaissance to scanning, exploitation, and post-exploitation. Learn effective information-gathering...
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- By: L.D. Knowings
- Narrated by: David Van Der Molen
- Length: 3 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
You're not a tech wizard, and you don't need to be. This book speaks directly to you the concerned netizen, the proactive parent, the small business owner, or the budding entrepreneur. It's designed to break down the complexities of cybersecurity into something you can understand and apply.
-
-
Simple and Effective
- By Anonymous User on 06-13-24
By: L.D. Knowings
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes--the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld.
-
-
Using technology to catch criminals
- By rascal on 07-01-24
By: Joseph Cox
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- By: Razi Rais, Christina Morillo, Evan Gilman, and others
- Narrated by: Mike Chamberlain
- Length: 12 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
By: Razi Rais, and others