Bestsellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
It’s the ledger stupid
- By Jessica Hopman on 03-14-24
By: Lyn Alden
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 24 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
-
-
minor flaw but great content
- By A L on 03-04-25
By: Mike Chapple, and others
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
-
-
Great book
- By KatieLynn on 10-08-24
By: Joseph Steinberg, and others
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
It’s the ledger stupid
- By Jessica Hopman on 03-14-24
By: Lyn Alden
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 24 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
-
-
minor flaw but great content
- By A L on 03-04-25
By: Mike Chapple, and others
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
-
-
Great book
- By KatieLynn on 10-08-24
By: Joseph Steinberg, and others
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
-
Amazing story
- By Katie W. on 06-08-24
By: Joseph Cox
-
SIE Exam Prep Made Simple!
- Complete Review Edition Study Guide for the Security Industry Essentials Exam
- By: Evan Benitez
- Narrated by: dNathanielWilliamsVO
- Length: 7 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
You are no doubt a busy professional with a lot of things going on! It can be challenging to find the time to study in preparation for the SIE exam. However, the truth is that the SIE test is a challenging test. It is normal to have some anxiety about taking this test.
-
-
Straightforward and Effective
- By Shelia Briggs on 05-13-25
By: Evan Benitez
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
-
-
WHY NARRATE MASSIVE URLs?!?!!
- By pinkington on 05-30-24
By: Mike Chapple, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- By: Jake T. Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies....
-
-
Very basic, not helpful for testing
- By Michael R. Young on 03-02-24
By: Jake T. Mills
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist and how to identify, protect against, detect, and respond to them....
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Gray Day
- My Undercover Mission to Expose America's First Cyber Spy
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy....
-
-
A Real Spy Story
- By Darren Sapp on 04-06-19
By: Eric O'Neill
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity....
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
DeFi and the Future of Finance
- By: Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
- Narrated by: David de Vries
- Length: 3 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
During the Global Financial Crisis in 2008, our financial infrastructure failed. Governments bailed out the very institutions that let the economy down. This episode spurred a serious rethink of our financial system....
-
-
extremely hard to understand
- By kondwani h. on 07-22-22
By: Campbell R. Harvey, and others
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles....
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments.
-
-
This one stands out
- By Dennis on 04-29-24
By: Jamie Murphy
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- By: Phil Champagne
- Narrated by: Stephanie Murphy
- Length: 7 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
The book of Satoshi, the collected writings of Satoshi Nakamoto....
-
-
Great historic read that'll teach the blockchain
- By Peter Hanson on 05-19-16
By: Phil Champagne
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform security, and more....
-
-
Disruptive reading of URLs
- By Customer on 04-22-22
By: Ben Malisow
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- By: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
-
-
Political biased for absolutely no reason
- By Red on 09-28-24
By: Byron Tau
-
Quantum Physics Simplified
- From Wave-Particle Duality to Quantum Computing; Satisfy Your Curiosity, Explore Field Theory and Other Mind-Bending Concepts in an Easy-to-Understand Way, Without Complex Math
- By: James Vast
- Narrated by: Calvin Sweers
- Length: 3 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you fascinated by the cosmos and eager to explore the quantum realm without complex equations? Curious about wave-particle duality or how quantum theories impact everyday life, from computing to futuristic tech?
-
-
Uncomplicated Explanation of Quantum Physics
- By Donesa Walker on 05-13-25
By: James Vast
New releases
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- By: Jeffrey Caruso
- Narrated by: Mike Lenz
- Length: 4 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
By: Jeffrey Caruso
-
Security and Smart Contract Audits
- Protecting Your Project from Hacks and Exploits
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unlock the secrets to securing the future with "Security and Smart Contract Audits," the ultimate guide for navigating the complex world of blockchain security. As digital landscapes evolve, so do the threats that lurk within them. This comprehensive eBook demystifies the intricacies of smart contract security, providing invaluable insights for developers, tech enthusiasts, and business leaders alike. Begin your journey by understanding the foundational elements of blockchain security and the vital role smart contracts play in safeguarding digital transactions. Delve into the depths of ...
By: Barrett Williams, and others
-
Mastering Cybersecurity using Python (Volume 1)
- By: Abhishek Singh
- Narrated by: Virtual Voice
- Length: 7 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
Mastering Cybersecurity using Python (Volume 1): A Comprehensive Guide! This book will taken you on a journey through the foundational aspects of cybersecurity, from understanding threats and frameworks to hands-on Python scripting for network scanning, cryptography, web security, and cybercrime analysis. You will explored tools like Scapy, BeautifulSoup, and Selenium, and delved into legal frameworks like the IT Act, 2000, and the MITRE ATT&CK framework. Structured into 11 chapters, the book progresses from fundamentals to advanced techniques, with real-world examples, legal insights, and ...
By: Abhishek Singh
-
Agentic AI: Navigating Risks and Security Challenges
- A Beginner’s Guide to Understanding the New Threat Landscape of AI Agents
- By: Taimur Ijlal
- Narrated by: Virtual Voice
- Length: 2 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you prepared for AI systems that don’t just follow instructions—but create their own goals? Struggling to make sense of the emerging risks posed by increasingly autonomous AI systems? Worried about how to secure, govern, and control agentic AI before it makes decisions that go beyond your intent? Want to protect your organization from reputational, legal, or financial fallout—but don’t know where to start? If so, Agentic AI: Navigating Risks and Security Challenges is for you. In this practical and beginner-friendly guide, cybersecurity expert Taimur Ijlal introduces you to the ...
By: Taimur Ijlal
-
IAM at 2035: A Future Guide to Identity Security
- By: Simon Moffatt
- Narrated by: Virtual Voice
- Length: 11 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Identity and Access Management has never been so important. From securing the workforce and improving employee productivity, to supporting online transactions, payments and media, IAM is foundational. There are more identities than ever before under management, a larger variety of identity types from consumers to workloads, smart devices to contractors - all accessing an ever increasing range of integrated systems, APIs and pieces of data. This sprawling IAM landscape is also under attack - from external adversaries, regulators, malicious insiders and even budget holders - wanting more from...
By: Simon Moffatt
-
Evaluation of Some SMTP Testing, Email Verification, Header Analysis, SSL Checkers, Email Delivery, Email Forwarding and WordPress Email Tools
- By: Dr. Hidaia Mahmood Alassouli
- Narrated by: Virtual Voice
- Length: 3 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Simple Mail Transfer Protocol (SMTP) is a set of rules used while sending emails. Usually, this protocol is associated with IMAP or POP3. However, SMTP is utilized to deliver messages, while POP3 and IMAP are utilized to receive them. The SMTP testing tool identifies issues with email security in your server that can hinder your email delivery. It checks the health status of your outgoing email server and notifies you about the detected problems, such as connectivity issues, and how to tackle them. An SMTP test tool can identify SMTP server issues and troubleshoot them to keep your email ...
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- By: Jeffrey Caruso
- Narrated by: Mike Lenz
- Length: 4 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
By: Jeffrey Caruso
-
Security and Smart Contract Audits
- Protecting Your Project from Hacks and Exploits
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unlock the secrets to securing the future with "Security and Smart Contract Audits," the ultimate guide for navigating the complex world of blockchain security. As digital landscapes evolve, so do the threats that lurk within them. This comprehensive eBook demystifies the intricacies of smart contract security, providing invaluable insights for developers, tech enthusiasts, and business leaders alike. Begin your journey by understanding the foundational elements of blockchain security and the vital role smart contracts play in safeguarding digital transactions. Delve into the depths of ...
By: Barrett Williams, and others
-
Mastering Cybersecurity using Python (Volume 1)
- By: Abhishek Singh
- Narrated by: Virtual Voice
- Length: 7 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
Mastering Cybersecurity using Python (Volume 1): A Comprehensive Guide! This book will taken you on a journey through the foundational aspects of cybersecurity, from understanding threats and frameworks to hands-on Python scripting for network scanning, cryptography, web security, and cybercrime analysis. You will explored tools like Scapy, BeautifulSoup, and Selenium, and delved into legal frameworks like the IT Act, 2000, and the MITRE ATT&CK framework. Structured into 11 chapters, the book progresses from fundamentals to advanced techniques, with real-world examples, legal insights, and ...
By: Abhishek Singh
-
Agentic AI: Navigating Risks and Security Challenges
- A Beginner’s Guide to Understanding the New Threat Landscape of AI Agents
- By: Taimur Ijlal
- Narrated by: Virtual Voice
- Length: 2 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you prepared for AI systems that don’t just follow instructions—but create their own goals? Struggling to make sense of the emerging risks posed by increasingly autonomous AI systems? Worried about how to secure, govern, and control agentic AI before it makes decisions that go beyond your intent? Want to protect your organization from reputational, legal, or financial fallout—but don’t know where to start? If so, Agentic AI: Navigating Risks and Security Challenges is for you. In this practical and beginner-friendly guide, cybersecurity expert Taimur Ijlal introduces you to the ...
By: Taimur Ijlal
-
IAM at 2035: A Future Guide to Identity Security
- By: Simon Moffatt
- Narrated by: Virtual Voice
- Length: 11 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Identity and Access Management has never been so important. From securing the workforce and improving employee productivity, to supporting online transactions, payments and media, IAM is foundational. There are more identities than ever before under management, a larger variety of identity types from consumers to workloads, smart devices to contractors - all accessing an ever increasing range of integrated systems, APIs and pieces of data. This sprawling IAM landscape is also under attack - from external adversaries, regulators, malicious insiders and even budget holders - wanting more from...
By: Simon Moffatt
-
Evaluation of Some SMTP Testing, Email Verification, Header Analysis, SSL Checkers, Email Delivery, Email Forwarding and WordPress Email Tools
- By: Dr. Hidaia Mahmood Alassouli
- Narrated by: Virtual Voice
- Length: 3 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Simple Mail Transfer Protocol (SMTP) is a set of rules used while sending emails. Usually, this protocol is associated with IMAP or POP3. However, SMTP is utilized to deliver messages, while POP3 and IMAP are utilized to receive them. The SMTP testing tool identifies issues with email security in your server that can hinder your email delivery. It checks the health status of your outgoing email server and notifies you about the detected problems, such as connectivity issues, and how to tackle them. An SMTP test tool can identify SMTP server issues and troubleshoot them to keep your email ...
-
How to be Human Online
- A Guide to Digital Etiquette and Empathy in the Age of Screens
- By: Dr Richard L Travis
- Narrated by: Virtual Voice
- Length: 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
How to be Human Online: A Guide to Digital Etiquette and Empathy in the Age of Screens) We live online now more than ever—but are we really showing up as our best selves? In a world shaped by social media, comment threads, and Zoom calls, it’s easy to forget there’s a human being behind every screen. How to Be Human Online is your essential guide to navigating the digital world with kindness, clarity, and emotional intelligence. Whether you're replying to emails, commenting on posts, dating via apps, or participating in group chats, this book offers practical strategies and thoughtful...
-
The Ultimate Prepper’s Readiness Collection
- Preparedness Collection, Book 4
- By: Urban Readiness Collective
- Narrated by: Ben Staab
- Length: 7 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
In today’s fast-changing world, preparedness is essential. Whether you're planning for natural disasters, protecting your digital life, or streamlining your emergency kits, this 3-in-1 collection equips you with real-world strategies to take control of your safety and peace of mind.
-
-
Lock it down before SHTF
- By Buddies Online on 05-09-25
-
Basic Setup of FortiMail Mail Server
- By: Dr. Hidaia Mahmood Alassouli
- Narrated by: Virtual Voice
- Length: 3 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Email is a critical tool for everyday business communication and productivity. Fortinet's email security solution - FortiMail delivers advanced multi-layered protection against the full spectrum of email-borne threats. Powered by FortiGuard Labs threat intelligence and integrated into the Fortinet Security Fabric, FortiMail helps your organization prevent, detect, and respond to email-based threats including spam, phishing, malware, zero-day threats, impersonation, and Business Email Compromise (BEC) attacks. FortiMail virtual machines provide complete flexibility and portability for ...
-
Basic Setup of FortiGate Firewall
- By: Dr. Hidaia Mahmood Alassouli, Alassouli
- Narrated by: Virtual Voice
- Length: 8 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Fortinet offers the most comprehensive solutions to help industries accelerate security, maximize productivity, preserve user experience, and lower total cost of ownership. A FortiGate firewall is a comprehensive network security solution that provides firewall protection, intrusion prevention, antivirus and antimalware scanning, VPN connectivity, and other security features. FortiGate firewall is also a router. It offers real-time threat intelligence to help you stay one step ahead of cyber attackers. When a firewall executes packet filtering, it examines the packets of data, comparing it ...
By: Dr. Hidaia Mahmood Alassouli, and others
-
THE FUTURE OF TRANSLATION: Integrating ISO 18587 for Competitive Advantage
- Achieving Business Growth and MT Post-Editing Excellence Through ISO 18587
- By: DR. MOHAMED-ALI IBRAHIM
- Narrated by: Virtual Voice
- Length: 2 hrs
- Unabridged
-
Overall
-
Performance
-
Story
THE FUTURE OF TRANSLATION: Integrating ISO 18587 for Competitive Advantage Achieving Business Growth and MT Post-Editing Excellence Through ISO 18587 Introduction In a rapidly evolving digital landscape, machine translation (MT) plays a pivotal role in business communication. However, achieving post-editing excellence requires more than just automated tools—it demands adherence to international standards like ISO 18587. The Future of Translation explores how integrating ISO 18587 not only enhances MT post-editing quality but also drives business growth by providing a competitive edge in ...
-
OKTA: The Final Login – Your Guide to Becoming an Identity Superhero
- By: Scott Markham
- Narrated by: Virtual Voice
- Length: 5 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Book Description – OKTA: The Final Login – Your Guide to Becoming an Identity Superhero Passwords are passé. Identity is everything. And if you've ever dreamed of donning a digital cape and protecting your organization's logins from villainous breaches and user chaos… this is your origin story. OKTA: The Final Login isn’t just another IT manual. It’s your witty, wise-cracking guide to mastering the identity frontier—where SSO, MFA, lifecycle management, and conditional access form your arsenal, and downtime is your arch-nemesis. Whether you’re just stepping into the realm of ...
By: Scott Markham
-
Generative AI: Strategies for Risk Management and Secure Implementations
- By: Raj Badhwar
- Narrated by: Virtual Voice
- Length: 14 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the rapidly evolving world of Generative AI, security and governance are critical to ensuring safe and responsible use. This book offers a comprehensive exploration of the security challenges, risks, and solutions specific to Generative AI models. From understanding the fundamentals of Generative AI and implementing secure architectures, to addressing key threats such as data leakage, model poisoning, and prompt injection attacks, this book provides practical strategies to safeguard AI systems. With a dedicated focus on AI governance and the deployment of robust security controls, it ...
By: Raj Badhwar
-
The Little Cybersecurity Book, Part 1
- By: Thomas Johnston
- Narrated by: Benji Gillespie
- Length: 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you looking to greatly grow your understanding of Cybersecurity? Here is an author with two decades of Corporate America experience at Fortune 30 companies. This listen is a powerful journey into cybersecurity, fluency in the language of risk, and expanding a predictive mindset. You will be envisioning solutions, programs, and conversations before you can put it down.
By: Thomas Johnston
-
The Business of Secrets
- Adventures in Selling Encryption Around the World
- By: Fred Kinch
- Narrated by: Troy Mullins
- Length: 9 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
What was it like to sell cryptographic equipment post WWII, after the era of Alan Turing and the Enigma machine? Join the author as he markets more modern equipment to the “CIA’s” and “NSA’s” of some 80 countries around the world; gaining trust where the first instinct is to trust no one, especially someone from the U.S. In this intriguing world, learn about the relationships between intelligence organizations and who they “really” consider a trustworthy ally and friend.
By: Fred Kinch
-
A Beginner’s Guide to Digital Prepping & Practical Cybersecurity
- Simple Steps to Protect Your Data, Prevent Hacking, and Secure Your Family Online (Preparedness Collection, Book 3)
- By: Urban Readiness Collective, Silver Valley Publishing
- Narrated by: Ben Staab
- Length: 2 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Protect Your Digital Life in Minutes—Even If You’re Not Tech-Savvy! Every click, every login, and every online interaction exposes you to digital threats—identity theft, hacking, and scams that can compromise your personal and financial security. But what if protecting yourself was simpler than you thought?" A Beginner’s Guide to Digital Prepping & Practical Cybersecurity" cuts through the confusion, offering clear, step-by-step strategies to safeguard your accounts, secure your family’s digital footprint, and prevent cyber threats—without requiring advanced technical skills.
-
-
Amazing book
- By The Curious Reader on 05-12-25
By: Urban Readiness Collective, and others
-
How to Start a Cybersecurity Consulting Business
- Your Guide to Launching, Managing, and Growing a Cybersecurity Consultancy
- By: VentureNest Books
- Narrated by: Andy David Jones
- Length: 2 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
In an era where digital threats are ever-present, the need for cybersecurity solutions is at an all-time high. How to Start a Cybersecurity Consulting Business is a crucial resource for those who want to establish a successful consulting firm in this booming industry.
-
Piggy Banks to Digital Wallets
- How to Make Sense of Cryptocurrencies and Simplify Emerging Technologies to Grow and Transfer Wealth
- By: L. Gary Boomer, Ashton N. Boomer
- Narrated by: Wes Baker
- Length: 2 hrs and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where the clink of coins in a piggy bank has evolved into the click of digital transactions, understanding modern money can seem daunting—especially for grandparents who want to bridge the gap and demystify the realm of cryptocurrencies and blockchain technology for their curious grandchildren. Inspired by a heartfelt conversation with his seven-year-old grandson about his cherished old coin bank, Piggy Banks to Digital Wallets takes you on a journey that begins with the familiar and traditional and helps you move into the fascinating realm of electronic finance.
By: L. Gary Boomer, and others