-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- Narrated by: Matthew Waterson
- Length: 7 hrs and 45 mins
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $17.19
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Cryptography: Cryptography Theory & Practice Made Easy!
- By: Solis Tech
- Narrated by: Millian Quinteros
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is Cryptography what you want to learn? Always wondered about its history from modern to traditional Cryptography? Does it interest you how Cryptosystems work?
-
-
Good book for the basics
- By Sensible on 02-29-16
By: Solis Tech
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
The Code Book
- The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- By: Simon Singh
- Narrated by: Patty Nieman
- Length: 10 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In his first book since the best-selling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
-
-
Great overview of the history of cryptography and code breaking
- By Oliver J. Siodmak on 02-15-24
By: Simon Singh
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Cryptography: Cryptography Theory & Practice Made Easy!
- By: Solis Tech
- Narrated by: Millian Quinteros
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is Cryptography what you want to learn? Always wondered about its history from modern to traditional Cryptography? Does it interest you how Cryptosystems work?
-
-
Good book for the basics
- By Sensible on 02-29-16
By: Solis Tech
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
The Code Book
- The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- By: Simon Singh
- Narrated by: Patty Nieman
- Length: 10 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In his first book since the best-selling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
-
-
Great overview of the history of cryptography and code breaking
- By Oliver J. Siodmak on 02-15-24
By: Simon Singh
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Blockchain Blueprint & Technology Ultimate Guide
- Learn Everything You Need To
- By: Raymond Kazuya
- Narrated by: Lukas Arnold
- Length: 1 hr and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Blockchain Technology innovation is the next technological advancement and revolution that has some serious far reaching implications worldwide. World business/commerce as we know today will become more secure, efficient, fluid and reliable due to Blockchain Technology. Don't get left behind on this next big trend and ride the wave of technological advancement! Learn everything you need to know about Blockchain Technology and join the revolution! You do not want to miss out!
-
-
Basics of Blockchain
- By Keith on 02-02-18
By: Raymond Kazuya
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601 (Sixth Edition)
- By: Wm. Arthur Conklin, Greg White
- Narrated by: Derek Shoales
- Length: 30 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
-
-
great study materials
- By Zak West on 12-03-23
By: Wm. Arthur Conklin, and others
-
The Kubernetes Book
- By: Nigel Poulton
- Narrated by: Nigel Poulton
- Length: 4 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
Containers are revolutionizing the way we build, ship, and run our applications. But like all good things, they come with their own set of challenges. This is where Kubernetes enters the scene. Kubernetes helps you deploy and manage containerized applications at scale. With Kubernetes, you can develop your applications on your laptop, deploy to your chosen cloud platform, migrate to a different cloud platform, and even migrate to your private cloud at your on-premises datacenter.
-
-
Finally a technical book for Audible
- By Dave K on 08-28-19
By: Nigel Poulton
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- By: Noah Zhang
- Narrated by: Gary Westphalen
- Length: 2 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Our society has become saturated with internet-connected devices and trackers everywhere. From home routers to your mobile phones, most people are easily hacked if targeted. In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual.
-
-
Wonderful experience
- By Byars on 10-21-19
By: Noah Zhang
Publisher's summary
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies - in short, everything we do online. Increasingly, it also runs in the background of our smart refrigerators, thermostats, electronic car keys, and even the cars themselves. As our daily devices get smarter, cyberspace - home to all the networks that connect them - grows.
Broadly defined as a set of tools for establishing security in this expanding cyberspace, cryptography enables us to protect and share our information. Understanding the basics of cryptography is the key to recognizing the significance of the security technologies we encounter every day, which will then help us respond to them.
What are the implications of connecting to an unprotected Wi-Fi network? Is it really so important to have different passwords for different accounts? Is it safe to submit sensitive personal information to a given app or to convert money to Bitcoin? In clear, concise writing, information security expert Keith Martin answers all these questions and more, revealing the many crucial ways we all depend on cryptographic technology.
More from the same
Related to this topic
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- By: Steven Levy
- Narrated by: Rich Miller
- Length: 14 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- By Chip L. on 05-22-21
By: Steven Levy
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Backfired: The Vaping Wars
- By: Leon Neyfakh, Prologue Projects
- Narrated by: Leon Neyfakh, Arielle Pardes
- Length: 7 hrs and 21 mins
- Original Recording
-
Overall
-
Performance
-
Story
When two Stanford graduate students set out to create a new kind of cigarette that wouldn’t kill them, they didn’t foresee all the obstacles that lay ahead — or the powerful forces their invention would unleash. Nearly 10 years after the launch of the JUUL, Backfired: The Vaping Wars asks: Could e-cigarettes have been the solution to one of the world’s most pressing public health problems—or was this technology doomed to introduce a whole new generation to nicotine, and end up perpetuating an intractable addiction?
-
-
Thank you…
- By Jay R Ewing on 06-24-24
By: Leon Neyfakh, and others
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- By: Steven Levy
- Narrated by: Rich Miller
- Length: 14 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- By Chip L. on 05-22-21
By: Steven Levy
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Backfired: The Vaping Wars
- By: Leon Neyfakh, Prologue Projects
- Narrated by: Leon Neyfakh, Arielle Pardes
- Length: 7 hrs and 21 mins
- Original Recording
-
Overall
-
Performance
-
Story
When two Stanford graduate students set out to create a new kind of cigarette that wouldn’t kill them, they didn’t foresee all the obstacles that lay ahead — or the powerful forces their invention would unleash. Nearly 10 years after the launch of the JUUL, Backfired: The Vaping Wars asks: Could e-cigarettes have been the solution to one of the world’s most pressing public health problems—or was this technology doomed to introduce a whole new generation to nicotine, and end up perpetuating an intractable addiction?
-
-
Thank you…
- By Jay R Ewing on 06-24-24
By: Leon Neyfakh, and others
-
This Is Not a Game with Marc Fennell
- By: Marc Fennell
- Narrated by: Marc Fennell
- Length: 3 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
This Is Not a Game is the extraordinary untold story of the internet’s first conspiracy theory, the legend of Ong’s Hat. Marc Fennell will dive deep into a previously unexplored world of tech hippies, eccentric web subcultures and simmering paranoia, uncovering how this tongue-in-cheek artistic experiment backfired on its creator and went on to influence much of what’s wrong with the internet today.
-
-
WOW!
- By pondo on 05-09-24
By: Marc Fennell
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- By: Sean Cannell, Benji Travis
- Narrated by: Sean Cannell, Benji Travis
- Length: 5 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- By Scott on 08-04-19
By: Sean Cannell, and others
-
Early True Believers
- The Untold Story of Silicon Alley
- By: Vanessa Grigoriadis, Adam Fisher
- Narrated by: Vanessa Grigoriadis
- Length: 4 hrs and 23 mins
- Original Recording
-
Overall
-
Performance
-
Story
Early True Believers: The Untold Story of Silicon Alley is a 1990s saga of ambition and innovation set in Manhattan’s Silicon Alley, a swath of downtown that served as New York City’s nerve center of tech entrepreneurship. The series features the stories of a forgotten cohort of early internet visionaries, countercultural social networks, the digital gold rush, and the lavish events that came with it, including one held in an underground Tribeca bunker that abruptly ended in a police raid—a harbinger of the upheaval to come.
By: Vanessa Grigoriadis, and others
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- By: Gretchen Bakke
- Narrated by: Emily Caudwell
- Length: 11 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- By Ronald on 09-24-16
By: Gretchen Bakke
-
Doom Guy
- Life in First Person
- By: John Romero
- Narrated by: John Romero
- Length: 17 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Doom Guy: Life in First Person is the long-awaited autobiography of gaming’s original rock star and the cocreator of DOOM, Quake, and Wolfenstein—some of the most recognizable and important titles in video game history. Credited with the invention of the first-person shooter, a genre that continues to dominate the market today, he is gaming royalty. Told in remarkable detail, a byproduct of his hyperthymesia, Romero recounts his storied career.
-
-
Intimate stories of gaming history in First Person
- By Emyli on 07-28-23
By: John Romero
-
Glow Kids
- How Screen Addiction Is Hijacking Our Kids - and How to Break the Trance
- By: Nicholas Kardaras PhD
- Narrated by: Jonathan Davis
- Length: 11 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Glow Kids, Dr. Nicholas Kardaras will examine how technology - more specifically, age-inappropriate screen tech, with all of its glowing ubiquity - has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis.
-
-
Fear Mongering - a modern day Mazes and Monsters
- By Veronica on 11-03-20
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
The Complete Software Developer's Career Guide
- How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job
- By: John Sonmez
- Narrated by: John Sonmez
- Length: 20 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technical knowledge alone isn't enough - increase your software development income by leveling up your soft skills Early in his software developer career, John Sonmez discovered that technical knowledge alone isn't enough to break through to the next income level - developers need "soft skills" like the ability to learn new technologies just in time, communicate clearly with management and consulting clients, negotiate a fair hourly rate, and unite teammates and coworkers in working toward a common goal.
-
-
The Complete Bro-grammer's Career Guide
- By Leels on 09-18-19
By: John Sonmez
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
The Box
- How the Shipping Container Made the World Smaller and the World Economy Bigger
- By: Marc Levinson
- Narrated by: Adam Lofbomm
- Length: 12 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In April 1956, a refitted oil tanker carried 58 shipping containers from Newark to Houston. From that modest beginning, container shipping developed into a huge industry that made the boom in global trade possible. The Box tells the dramatic story of the container's creation, the decade of struggle before it was widely adopted, and the sweeping economic consequences of the sharp fall in transportation costs that containerization brought about.
-
-
Fascinating Topic sometimes lost in minutiae
- By zombie64 on 07-15-14
By: Marc Levinson
-
Slenderman
- Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls
- By: Kathleen Hale
- Narrated by: Therese Plummer
- Length: 9 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
On May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two 12-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier’s violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called “Slenderman”. Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.
-
-
Excellent narration
- By Pink Amy on 08-21-22
By: Kathleen Hale
-
Sex, Race, and Robots
- How to Be Human in the Age of AI
- By: Dr. Ayanna Howard
- Narrated by: Amandla Stenberg
- Length: 6 hrs and 15 mins
- Original Recording
-
Overall
-
Performance
-
Story
In the movies, robots can be terrifying. In reality, thinking machines are disrupting the world in ways that are even more disturbing than in Hollywood fantasies - but they also have the potential to change our lives for the better. In this stirring, visionary work, acclaimed roboticist Dr. Ayanna Howard explores how the tech world’s racial and sexual biases are infecting the next generation of Artificial Intelligence, with profoundly negative effects for humans of all genders and races.
-
-
Will not return
- By bilihor on 12-26-20
People who viewed this also viewed...
-
Cryptography: Cryptography Theory & Practice Made Easy!
- By: Solis Tech
- Narrated by: Millian Quinteros
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is Cryptography what you want to learn? Always wondered about its history from modern to traditional Cryptography? Does it interest you how Cryptosystems work?
-
-
Good book for the basics
- By Sensible on 02-29-16
By: Solis Tech
-
Real-World Cryptography
- By: David Wong
- Narrated by: Derek Dysart
- Length: 13 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging. This audiobook is a joy to listen to - and it might just save your bacon the next time you’re targeted by an adversary after your data.
-
-
Great book, but better when read than listened
- By Markus Läll on 04-01-22
By: David Wong
-
The Code Book
- The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- By: Simon Singh
- Narrated by: Patty Nieman
- Length: 10 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In his first book since the best-selling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
-
-
Great overview of the history of cryptography and code breaking
- By Oliver J. Siodmak on 02-15-24
By: Simon Singh
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Data and Goliath
- The Hidden Battles to Capture Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
-
Cryptography
- A Very Short Introduction
- By: Fred Piper, Sean Murphy
- Narrated by: L. J. Ganser
- Length: 4 hrs and 26 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce.
By: Fred Piper, and others
-
Cryptography: Cryptography Theory & Practice Made Easy!
- By: Solis Tech
- Narrated by: Millian Quinteros
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is Cryptography what you want to learn? Always wondered about its history from modern to traditional Cryptography? Does it interest you how Cryptosystems work?
-
-
Good book for the basics
- By Sensible on 02-29-16
By: Solis Tech
-
Real-World Cryptography
- By: David Wong
- Narrated by: Derek Dysart
- Length: 13 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging. This audiobook is a joy to listen to - and it might just save your bacon the next time you’re targeted by an adversary after your data.
-
-
Great book, but better when read than listened
- By Markus Läll on 04-01-22
By: David Wong
-
The Code Book
- The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- By: Simon Singh
- Narrated by: Patty Nieman
- Length: 10 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In his first book since the best-selling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
-
-
Great overview of the history of cryptography and code breaking
- By Oliver J. Siodmak on 02-15-24
By: Simon Singh
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Data and Goliath
- The Hidden Battles to Capture Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
-
Cryptography
- A Very Short Introduction
- By: Fred Piper, Sean Murphy
- Narrated by: L. J. Ganser
- Length: 4 hrs and 26 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce.
By: Fred Piper, and others
-
Cyber War
- The Next Threat to National Security and What to Do About It
- By: Robert K. Knake, Richard A. Clarke
- Narrated by: Pete Larkin
- Length: 10 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- By Britt Adams on 09-13-22
By: Robert K. Knake, and others
-
Understanding Software
- Max Kanat-Alexander on Simplicity, Coding, and How to Suck Less as a Programmer
- By: Max Kanat-Alexander
- Narrated by: Steve Menasche
- Length: 6 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Understanding Software, Max Kanat-Alexander, Technical Lead for Code Health at Google, shows you how to bring simplicity back to computer programming. Max explains to you why programmers suck, and how to suck less as a programmer. There's just too much complex stuff in the world. Complex stuff can't be used, and it breaks too easily. Complexity is stupid. Simplicity is smart.
-
-
I want more books like this on audible
- By Nathaniel C. on 12-13-19
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- By Jonathan on 11-16-19
By: Roger A. Grimes
-
The Dark Net
- Inside the Digital Underworld
- By: Jamie Bartlett
- Narrated by: Matt Bates
- Length: 7 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this important and revealing book, Jamie Bartlett takes us deep into the digital underworld and presents an extraordinary look at the Internet we don't know. Beginning with the rise of the Internet and the conflicts and battles that defined its early years, Bartlett reports on trolls, pornographers, drug dealers, hackers, political extremists, Bitcoin programmers, and vigilantes - and puts a human face on those who have many reasons to stay anonymous.
-
-
Good, but incomplete
- By Peter on 05-03-17
By: Jamie Bartlett
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Wireless Wars
- China’s Dangerous Domination of 5G and How We’re Fighting Back
- By: Jonathan Pelson
- Narrated by: Chris Abell
- Length: 8 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Author Jon Pelson explains how America invented cellular technology, taught China how to make the gear, and then handed them the market. Pelson shares never-before-told stories from the executives and scientists who built the industry and describes how China undercut and destroyed competing equipment makers, freeing themselves to export their nation’s network gear - and their surveillance state. He also reveals China’s successful program to purchase the support of the world’s leading political, business, and military figures in their effort to control rival nations’ networks.
-
-
This man is spot on!
- By Robert Avel on 04-05-22
By: Jonathan Pelson
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- By: Gabriella Coleman
- Narrated by: Tavia Gilbert
- Length: 13 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
-
A Bit like Listening to a Police Scanner
- By J. E. JORDAN on 05-11-17
-
Breaking and Entering
- The Extraordinary Story of a Hacker Called "Alien"
- By: Jeremy N. Smith
- Narrated by: Jonathan Todd Ross
- Length: 12 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
When she arrived at MIT in the 1990s, Alien wanted to study aerospace engineering, but she was soon drawn to the school’s venerable tradition of high-risk physical trespassing: the original “hacking”. Within a year, one of her hallmates was dead, two others were on trial, and two had been institutionalized. Alien’s adventures were only just beginning.
-
-
Waste of time. There is no story here.
- By WD on 01-28-19
By: Jeremy N. Smith
-
Dark Territory
- The Secret History of Cyber War
- By: Fred Kaplan
- Narrated by: Malcolm Hillgartner
- Length: 9 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
-
-
Best narrator - Malcolm Hillgartner
- By Greg Davis on 07-20-16
By: Fred Kaplan
What listeners say about Cryptography
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Harlow
- 01-24-22
High Quality, Professional Book
This is exactly what I had hoped for. High Quality book on encryption that covers everything except for the really technical details of the actual mathematics behind each type of encryption.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
- J.R.Lloyd
- 10-15-21
Good intro
this was my first technical audio book. the narrator did a great job. expected this to be borring as most technical material is.
***If you're looking for a more in-depth look at crypto, this is a book, is not it.***
what this book is, is a very excellent overview of cryptography. to help non-technical people understand what's going on in cyberspace. For that purpose, I can recommend this book.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Don’t Buy
- 02-21-23
Anxious about online security?
Absolutely read this book if you are anxious about security for your smart home or many personal computing devices. It is not an easy read, but the author and narrator are hilarious in their writing and in their delivery! You will be better informed and more relaxed by the end of it.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Glenn Nunes
- 03-30-21
Greatly enjoyed and learned
I’m studying for the Security+ exam and this audiobook was exactly what I wanted to help make cryptology interesting and much accessible to me. The narrator is excellent and unlike most other audiobooks about technically subjects that I’ve consumed so far, it was excellent and engaging in the audio format. Bravo on a great audiobook.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story
- Anonymous User
- 04-27-22
very insightful
gives you a really good ground knowledge on cryptography and touch a little bitcoin but mostly about our own security
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- L
- 02-12-23
Not good for audio
Too technical for audio. Needs to stay in type written format and not be used for audio. Good reference for hard type.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!