Cryptography
The Key to Digital Security, How It Works, and Why It Matters
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $17.19
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Matthew Waterson
-
By:
-
Keith Martin
About this listen
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies - in short, everything we do online. Increasingly, it also runs in the background of our smart refrigerators, thermostats, electronic car keys, and even the cars themselves. As our daily devices get smarter, cyberspace - home to all the networks that connect them - grows.
Broadly defined as a set of tools for establishing security in this expanding cyberspace, cryptography enables us to protect and share our information. Understanding the basics of cryptography is the key to recognizing the significance of the security technologies we encounter every day, which will then help us respond to them.
What are the implications of connecting to an unprotected Wi-Fi network? Is it really so important to have different passwords for different accounts? Is it safe to submit sensitive personal information to a given app or to convert money to Bitcoin? In clear, concise writing, information security expert Keith Martin answers all these questions and more, revealing the many crucial ways we all depend on cryptographic technology.
©2020 Keith Martin (P)2020 HighBridge, a division of Recorded BooksListeners also enjoyed...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Cryptography: Cryptography Theory & Practice Made Easy!
- By: Solis Tech
- Narrated by: Millian Quinteros
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is Cryptography what you want to learn? Always wondered about its history from modern to traditional Cryptography? Does it interest you how Cryptosystems work?
-
-
Good book for the basics
- By Sensible on 02-29-16
By: Solis Tech
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
The Code Book
- The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- By: Simon Singh
- Narrated by: Patty Nieman
- Length: 10 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In his first book since the best-selling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
-
-
D jrrg errn rq frghv << you can break this
- By Gudmundur Hardarson on 10-09-24
By: Simon Singh
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Cryptography: Cryptography Theory & Practice Made Easy!
- By: Solis Tech
- Narrated by: Millian Quinteros
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is Cryptography what you want to learn? Always wondered about its history from modern to traditional Cryptography? Does it interest you how Cryptosystems work?
-
-
Good book for the basics
- By Sensible on 02-29-16
By: Solis Tech
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
The Code Book
- The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- By: Simon Singh
- Narrated by: Patty Nieman
- Length: 10 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In his first book since the best-selling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
-
-
D jrrg errn rq frghv << you can break this
- By Gudmundur Hardarson on 10-09-24
By: Simon Singh
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Blockchain Blueprint & Technology Ultimate Guide
- Learn Everything You Need To
- By: Raymond Kazuya
- Narrated by: Lukas Arnold
- Length: 1 hr and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Blockchain Technology innovation is the next technological advancement and revolution that has some serious far reaching implications worldwide. World business/commerce as we know today will become more secure, efficient, fluid and reliable due to Blockchain Technology. Don't get left behind on this next big trend and ride the wave of technological advancement! Learn everything you need to know about Blockchain Technology and join the revolution! You do not want to miss out!
-
-
Basics of Blockchain
- By Keith on 02-02-18
By: Raymond Kazuya
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601 (Sixth Edition)
- By: Wm. Arthur Conklin, Greg White
- Narrated by: Derek Shoales
- Length: 30 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
-
-
great study materials
- By Zak West on 12-03-23
By: Wm. Arthur Conklin, and others
-
The Kubernetes Book
- By: Nigel Poulton
- Narrated by: Nigel Poulton
- Length: 4 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
Containers are revolutionizing the way we build, ship, and run our applications. But like all good things, they come with their own set of challenges. This is where Kubernetes enters the scene. Kubernetes helps you deploy and manage containerized applications at scale. With Kubernetes, you can develop your applications on your laptop, deploy to your chosen cloud platform, migrate to a different cloud platform, and even migrate to your private cloud at your on-premises datacenter.
-
-
Finally a technical book for Audible
- By Dave K on 08-28-19
By: Nigel Poulton
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- By: Noah Zhang
- Narrated by: Gary Westphalen
- Length: 2 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Our society has become saturated with internet-connected devices and trackers everywhere. From home routers to your mobile phones, most people are easily hacked if targeted. In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual.
-
-
Wonderful experience
- By Byars on 10-21-19
By: Noah Zhang
Related to this topic
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- By: Steven Levy
- Narrated by: Rich Miller
- Length: 14 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- By Chip L. on 05-22-21
By: Steven Levy
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- By: Steven Levy
- Narrated by: Rich Miller
- Length: 14 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- By Chip L. on 05-22-21
By: Steven Levy
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- By: Sean Cannell, Benji Travis
- Narrated by: Sean Cannell, Benji Travis
- Length: 5 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- By Scott on 08-04-19
By: Sean Cannell, and others
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- By: Gretchen Bakke
- Narrated by: Emily Caudwell
- Length: 11 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- By Ronald on 09-24-16
By: Gretchen Bakke
-
Slenderman
- Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls
- By: Kathleen Hale
- Narrated by: Therese Plummer
- Length: 9 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
On May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two 12-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier’s violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called “Slenderman”. Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.
-
-
Excellent narration
- By Pink Amy on 08-21-22
By: Kathleen Hale
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Doom Guy
- Life in First Person
- By: John Romero
- Narrated by: John Romero
- Length: 17 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Doom Guy: Life in First Person is the long-awaited autobiography of gaming’s original rock star and the cocreator of DOOM, Quake, and Wolfenstein—some of the most recognizable and important titles in video game history. Credited with the invention of the first-person shooter, a genre that continues to dominate the market today, he is gaming royalty. Told in remarkable detail, a byproduct of his hyperthymesia, Romero recounts his storied career.
-
-
Intimate stories of gaming history in First Person
- By Emyli on 07-28-23
By: John Romero
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
Glow Kids
- How Screen Addiction Is Hijacking Our Kids - and How to Break the Trance
- By: Nicholas Kardaras PhD
- Narrated by: Jonathan Davis
- Length: 11 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Glow Kids, Dr. Nicholas Kardaras will examine how technology - more specifically, age-inappropriate screen tech, with all of its glowing ubiquity - has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis.
-
-
Fear Mongering - a modern day Mazes and Monsters
- By Veronica on 11-03-20
-
Tesla
- Inventor of the Electrical Age
- By: W. Bernard Carlson
- Narrated by: Allan Robertson
- Length: 16 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Nikola Tesla was a major contributor to the electrical revolution that transformed daily life at the turn of the 20th century. His inventions, patents, and theoretical work formed the basis of modern AC electricity, and contributed to the development of radio and television. Like his competitor Thomas Edison, Tesla was one of America's first celebrity scientists, enjoying the company of New York high society and dazzling the likes of Mark Twain with his electrical demonstrations. An astute self-promoter and gifted showman, he cultivated a public image of the eccentric genius.
-
-
A detailed examination of Tesla's work
- By Jean on 02-01-14
-
The Complete Software Developer's Career Guide
- How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job
- By: John Sonmez
- Narrated by: John Sonmez
- Length: 20 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technical knowledge alone isn't enough - increase your software development income by leveling up your soft skills Early in his software developer career, John Sonmez discovered that technical knowledge alone isn't enough to break through to the next income level - developers need "soft skills" like the ability to learn new technologies just in time, communicate clearly with management and consulting clients, negotiate a fair hourly rate, and unite teammates and coworkers in working toward a common goal.
-
-
The Complete Bro-grammer's Career Guide
- By Leels on 09-18-19
By: John Sonmez
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
People who viewed this also viewed...
-
The Code Book
- The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- By: Simon Singh
- Narrated by: Patty Nieman
- Length: 10 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In his first book since the best-selling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
-
-
D jrrg errn rq frghv << you can break this
- By Gudmundur Hardarson on 10-09-24
By: Simon Singh
-
Real-World Cryptography
- By: David Wong
- Narrated by: Derek Dysart
- Length: 13 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging. This audiobook is a joy to listen to - and it might just save your bacon the next time you’re targeted by an adversary after your data.
-
-
Great book, but better when read than listened
- By Markus Läll on 04-01-22
By: David Wong
-
Cryptography
- By: Panos Louridas
- Narrated by: Tom Beyer
- Length: 6 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets.
By: Panos Louridas
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- By: Gabriella Coleman
- Narrated by: Tavia Gilbert
- Length: 13 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
-
A Bit like Listening to a Police Scanner
- By J. E. JORDAN on 05-11-17
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- By: Steven Levy
- Narrated by: Rich Miller
- Length: 14 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- By Chip L. on 05-22-21
By: Steven Levy
-
The Code Book
- The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- By: Simon Singh
- Narrated by: Patty Nieman
- Length: 10 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In his first book since the best-selling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
-
-
D jrrg errn rq frghv << you can break this
- By Gudmundur Hardarson on 10-09-24
By: Simon Singh
-
Real-World Cryptography
- By: David Wong
- Narrated by: Derek Dysart
- Length: 13 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging. This audiobook is a joy to listen to - and it might just save your bacon the next time you’re targeted by an adversary after your data.
-
-
Great book, but better when read than listened
- By Markus Läll on 04-01-22
By: David Wong
-
Cryptography
- By: Panos Louridas
- Narrated by: Tom Beyer
- Length: 6 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets.
By: Panos Louridas
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- By: Gabriella Coleman
- Narrated by: Tavia Gilbert
- Length: 13 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
-
A Bit like Listening to a Police Scanner
- By J. E. JORDAN on 05-11-17
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- By: Steven Levy
- Narrated by: Rich Miller
- Length: 14 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- By Chip L. on 05-22-21
By: Steven Levy
-
Think for Yourself
- Restoring Common Sense in an Age of Experts and Artificial Intelligence
- By: Vikram Mansharamani
- Narrated by: Mike Lenz
- Length: 9 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
As Vikram Mansharamani shows in this eye-opening book, our complex, data-flooded world has made us ever more reliant on experts, protocols, and technology. We've stopped thinking for ourselves. Of course, experts, protocols, and computer-based systems are essential to helping us make informed decisions. What we need is a new approach for integrating these information sources more effectively. The author provides principles and techniques for doing just that, empowering listeners with a more critical and nuanced approach to making decisions.
-
-
Good audio book
- By Amazon Customer on 11-26-20
-
The Dark Net
- Inside the Digital Underworld
- By: Jamie Bartlett
- Narrated by: Matt Bates
- Length: 7 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this important and revealing book, Jamie Bartlett takes us deep into the digital underworld and presents an extraordinary look at the Internet we don't know. Beginning with the rise of the Internet and the conflicts and battles that defined its early years, Bartlett reports on trolls, pornographers, drug dealers, hackers, political extremists, Bitcoin programmers, and vigilantes - and puts a human face on those who have many reasons to stay anonymous.
-
-
Good, but incomplete
- By Peter on 05-03-17
By: Jamie Bartlett
-
The Ethical Algorithm
- The Science of Socially Aware Algorithm Design
- By: Michael Kearns, Aaron Roth
- Narrated by: Teri Schnaubelt
- Length: 6 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Michael Kearns and Aaron Roth explain how we can better embed human principles into machine code - without halting the advance of data-driven scientific exploration.
-
-
very relevant and important, especially with all the developments today
- By Amazon Customer on 11-08-23
By: Michael Kearns, and others
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
The Master Algorithm
- How the Quest for the Ultimate Learning Machine Will Remake Our World
- By: Pedro Domingos
- Narrated by: Mel Foster
- Length: 13 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Under the aegis of machine learning in our data-driven machine age, computers are programming themselves and learning about - and solving - an extraordinary range of problems, from the mundane to the most daunting. Today it is machine learning programs that enable Amazon and Netflix to predict what users will like, Apple to power Siri's ability to understand voices, and Google to pilot cars.
-
-
Great book, irritating narration
- By N. G. PEPIN on 09-24-15
By: Pedro Domingos
-
If It's Smart, It's Vulnerable
- By: Mikko Hypponen
- Narrated by: Rich Miller
- Length: 7 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
All our devices and gadgets—from our refrigerators to our home security systems—are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing.
-
-
One of the best books on this topic
- By hamilton on 02-25-24
By: Mikko Hypponen
-
Artificial Intelligence for Dummies
- By: John Mueller, Luca Massaron
- Narrated by: Chris Sorensen
- Length: 13 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll get a clear overview of artificial intelligence technology, the common misconceptions surrounding it, and a fascinating look at its applications in everything from self-driving cars and drones to its contributions in the medical field.
-
-
Outdated
- By Timothy C. on 05-31-23
By: John Mueller, and others
-
The Code Breaker
- Jennifer Doudna, Gene Editing, and the Future of the Human Race
- By: Walter Isaacson
- Narrated by: Kathe Mazur, Walter Isaacson
- Length: 16 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
The bestselling author of Leonardo da Vinci and Steve Jobs returns with a “compelling” (The Washington Post) account of how Nobel Prize winner Jennifer Doudna and her colleagues launched a revolution that will allow us to cure diseases, fend off viruses, and have healthier babies.
-
-
Except for the author, this book is good!
- By Johan on 03-14-21
By: Walter Isaacson
-
Designing Data-Intensive Applications
- The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
- By: Martin Kleppmann
- Narrated by: Benjamin Lange
- Length: 20 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
Author Martin Kleppmann helps you navigate the diverse data landscape by examining the pros and cons of various technologies for processing and storing data. Software keeps changing, but the fundamental principles remain the same. With this book, software engineers and architects will learn how to apply those ideas in practice, and how to make full use of data in modern applications.
-
-
Must read for senior+ software engineers
- By Navid v on 05-29-21
By: Martin Kleppmann
-
The Coming Wave
- Technology, Power, and the Twenty-First Century's Greatest Dilemma
- By: Mustafa Suleyman, Michael Bhaskar - contributor
- Narrated by: Mustafa Suleyman
- Length: 11 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
We are approaching a critical threshold in the history of our species. Everything is about to change. Soon you will live surrounded by AIs. They will organize your life, operate your business, and run core government services. You will live in a world of DNA printers and quantum computers, engineered pathogens and autonomous weapons, robot assistants and abundant energy.
-
-
Click bait
- By Buyer on 09-11-23
By: Mustafa Suleyman, and others
-
Co-Intelligence
- Living and Working with AI
- By: Ethan Mollick
- Narrated by: Ethan Mollick
- Length: 4 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Something new entered our world in November 2022—the first general purpose AI that could pass for a human and do the kinds of creative, innovative work that only humans could do previously. Wharton professor Ethan Mollick immediately understood what ChatGPT meant: after millions of years on our own, humans had developed a kind of co-intelligence that could augment, or even replace, human thinking. Through his writing, speaking, and teaching, Mollick has become one of the most prominent and provocative explainers of AI.
-
-
great intro book marred by poor narration
- By Amazon Customer on 04-14-24
By: Ethan Mollick
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
What listeners say about Cryptography
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Harlow
- 01-24-22
High Quality, Professional Book
This is exactly what I had hoped for. High Quality book on encryption that covers everything except for the really technical details of the actual mathematics behind each type of encryption.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
- J.R.Lloyd
- 10-15-21
Good intro
this was my first technical audio book. the narrator did a great job. expected this to be borring as most technical material is.
***If you're looking for a more in-depth look at crypto, this is a book, is not it.***
what this book is, is a very excellent overview of cryptography. to help non-technical people understand what's going on in cyberspace. For that purpose, I can recommend this book.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Don’t Buy
- 02-21-23
Anxious about online security?
Absolutely read this book if you are anxious about security for your smart home or many personal computing devices. It is not an easy read, but the author and narrator are hilarious in their writing and in their delivery! You will be better informed and more relaxed by the end of it.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Glenn Nunes
- 03-30-21
Greatly enjoyed and learned
I’m studying for the Security+ exam and this audiobook was exactly what I wanted to help make cryptology interesting and much accessible to me. The narrator is excellent and unlike most other audiobooks about technically subjects that I’ve consumed so far, it was excellent and engaging in the audio format. Bravo on a great audiobook.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story
- Anonymous User
- 04-27-22
very insightful
gives you a really good ground knowledge on cryptography and touch a little bitcoin but mostly about our own security
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- L
- 02-12-23
Not good for audio
Too technical for audio. Needs to stay in type written format and not be used for audio. Good reference for hard type.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!