Cybersecurity Basics
Cyber Attacks, Network Security, and Threat Prevention
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Steven McGarry
-
By:
-
Pete Michaels
About this listen
Are you confident in your safety in cyberspace?
Take this chance to learn about cybersecurity, because the criminals hiding behind the screen are ready to strike - and you won’t see them coming! If you have felt exposed online, then this book is for you. In this book, I take you on a journey and show you how you are exposed in the cyberworld. Together, we will learn about the fundamentals of cybersecurity and discover the tools that hackers use to invade your privacy, steal your information, and hold you at ransom.
In this book, you will learn how hackers use malicious software to monitor your activity online and exploit vulnerabilities to gain unwanted access to your computers. This book is meant for the ordinary person who wants to know how they can protect themselves online. By using examples of people who have been victims of phishing attacks, people who have been victims of ransomware attacks, and people who have recovered from cyberattacks, you will learn about the measures you can take to protect yourself online. Specifically, we discuss how to be safe when browsing the internet, how to protect your data from unauthorized access and modification, as well as how to keep your networks secure.
It doesn’t matter if you are a teenager, a working parent, a business person, or a senior citizen. Everyone is at risk, but anyone can be cyber secure. Finally, in this book you will learn how to be cyber-resilient and recover from cyberattacks.
You have the power to protect yourself, so grab the chance now and begin your journey toward cybersecurity.
©2021 Green Lion Publishing (P)2021 Green Lion PublishingListeners also enjoyed...
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- By: Anthony Hack
- Narrated by: Jordan Gunner
- Length: 3 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook...Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn. Hopefully, this audiobook will give you the most basic information so that you will be able to do this properly.
By: Anthony Hack
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- By: Erick Stack
- Narrated by: Clay Bel le Fort
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
By: Erick Stack
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- By: Murphy Rangel
- Narrated by: Luciano Marin
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
By: Murphy Rangel
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- By: Anthony Hack
- Narrated by: Robert Plank
- Length: 3 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking. You don't hear about the ethical hacking in the news, but there are people out there with the same job description fighting the malicious hackers daily, and they get the bad rep.
By: Anthony Hack
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- By: Anthony Hack
- Narrated by: Jordan Gunner
- Length: 3 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook...Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn. Hopefully, this audiobook will give you the most basic information so that you will be able to do this properly.
By: Anthony Hack
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- By: Erick Stack
- Narrated by: Clay Bel le Fort
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
By: Erick Stack
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- By: Murphy Rangel
- Narrated by: Luciano Marin
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
By: Murphy Rangel
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- By: Anthony Hack
- Narrated by: Robert Plank
- Length: 3 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking. You don't hear about the ethical hacking in the news, but there are people out there with the same job description fighting the malicious hackers daily, and they get the bad rep.
By: Anthony Hack
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- By: David James Carmack
- Narrated by: Ivan Busenius
- Length: 3 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
AWS: A Comprehensive Guide to Mastering Amazon Web Services
- By: Aaron Hudson
- Narrated by: Mat Clista
- Length: 4 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
You are about to learn the limitless power of Amazon Web Services (AWS) to decide whether it is the perfect cloud computing solution for your business! Efficient, high performing, and profitable companies around the world have realized that cloud computing is the secret to massive growth and efficiency in service delivery on a global scale especially because it (cloud computing) allows data access from anywhere in the world.
-
-
One of the best book!
- By Russell Kish on 01-05-20
By: Aaron Hudson
-
Computer Networking First Step
- The Essential Guide to Networking to Introduce Yourself to The Computer Network Through a Top-Down Approach and Various Infrastructures (Programming)
- By: Tim Wired
- Narrated by: Jacob McNatt
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
While you may have never thought of networking in detail, this book will introduce you to the basics of networking, the different types of networks available, the types of network topologies that you will encounter, the concept of server virtualization, and details of how to handle network breaches.
-
-
If you don't have a text copy of the book, beware
- By A Consumer on 04-08-20
By: Tim Wired
-
Computer Networking Beginner Guide
- What Is the Computer Network and How to Learn It in a Simple Way? The Easy Step by Step Guide for Beginners
- By: Tim Wired
- Narrated by: Jacob McNatt
- Length: 4 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Computer networking is an essential framework for the internet to work for most of us. The tech term can be overwhelming for some, but it exists in almost all homes, offices, businesses, and establishments that are connected to the internet. In this audiobook, we will discuss the most basic principles behind computer networking without the complexities of technical jargon (technical terms will be explained). Easy explanations will be provided to expound on the technical concepts.
By: Tim Wired
-
Computer Networking Beginners Guide
- Ultimate Guide to Master Communication System Including Cisco and Ccna, Wireless, and Cloud Technology, System...and IP Subnetting (Computer Networking Easy)
- By: Ramon Base
- Narrated by: Chris Lynch
- Length: 3 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you a student or a professional who is keen to learn about computer networks? Are you fascinated by the world of computers and every other system that is responsible for the efficient operation of such a wonderful human invention? When you deal with computers on a daily basis, you should be aware of the backbone which supports this incredible invention. The truth is: Computers and technology rule the world today, and most of us are not aware of the network that is responsible for their efficient operation
-
-
Thankful to author for this audiobook
- By Joseph C. Gates on 10-29-19
By: Ramon Base
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- By: Norman Laurence
- Narrated by: Cole Niblett
- Length: 14 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
-
Almost unlistenable
- By Kelly A. Ohlert on 12-31-21
By: Norman Laurence
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
-
Ethereum
- Everything a Beginner Needs to Know on Ethereum
- By: George Doros
- Narrated by: Keith A. Bailey
- Length: 3 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Would you look at Ethereum and ask yourself how to use it? Did you use bitcoin but want to try something new? That is the book for you, then! Bitcoin isn't the only digital legal tender out there; the fact is that there is a lot of useful and valuable digital currency out there on the market today, and Ethereum is the second most popular currency after bitcoin.
-
-
The narrative is like listening to paint dry
- By Eric Johnston on 09-27-21
By: George Doros
-
Blockchain Basics
- A Simple Non-Technical Blockchain Book
- By: Lee Sebastian
- Narrated by: John Fleming
- Length: 1 hr and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Blockchain is a distributed ledger technology that has many applications, such as finance, security, banking, insurance, transportation companies, and much more. Blockchain can become a core fundamental component to all industries in the near future, similar to how the Internet evolved. This book is about the basics of blockchain technology and its applications, especially in cryptocurrency, and how it will eventually make a difference in your everyday life.
-
-
Not technical. Not simple. Yet still two basic
- By Heath McCarthy on 10-19-18
By: Lee Sebastian
-
Cybersecurity
- A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to discover how to protect yourself, your family, and business against cyber attacks, then pay attention...Have you been curious about how hackers choose their victims or develop their attack plans? Have you been hacked before? Do you want to learn to protect your systems and networks from hackers? This audiobook serves as a launchpad for learning more about the Internet and cybersecurity. Throughout this audiobook, you will take a journey into the world of cybercrimes and cybersecurity.
-
-
Secure your information through this audiobook.
- By Roger Strong on 08-24-21
By: Quinn Kiser
-
Essential CISA Exam Guide: Updated for the 26th Edition
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 22 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Essential CISA has been made with a single goal in mind - to present the CISA material in a way that is easy to absorb without leaving any content behind. Plenty of examples are included to drive the points home so when it comes time to take the CISA exam, you are ready!
-
-
Good material, besides being the currently only
- By Ariel on 12-22-19
By: Phil Martin
-
Computer Hacking Beginners Guide
- How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
- By: Alan T. Norman
- Narrated by: Jack Ares
- Length: 1 hr and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book will teach you how you can protect yourself from most common hacking attacks - by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a counter-hack.
-
-
I had to jump back and forth.
- By HyPEAe on 05-16-20
By: Alan T. Norman
Related to this topic
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Cyber War
- The Next Threat to National Security and What to Do About It
- By: Robert K. Knake, Richard A. Clarke
- Narrated by: Pete Larkin
- Length: 10 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- By Britt Adams on 09-13-22
By: Robert K. Knake, and others
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Cyber War
- The Next Threat to National Security and What to Do About It
- By: Robert K. Knake, Richard A. Clarke
- Narrated by: Pete Larkin
- Length: 10 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- By Britt Adams on 09-13-22
By: Robert K. Knake, and others
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
@War
- The Rise of the Military-Internet Complex
- By: Shane Harris
- Narrated by: Stephen R. Thorne
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- By Greg on 02-06-15
By: Shane Harris
-
Big Data in Practice
- How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
- By: Bernard Marr
- Narrated by: Piers Hampton
- Length: 7 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data. Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This book fills the knowledge gap by showing how major companies are using big data every day, from an up-close, on-the-ground perspective.
-
-
Good book for managers
- By Capnbody on 01-08-18
By: Bernard Marr
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- By: Sean Cannell, Benji Travis
- Narrated by: Sean Cannell, Benji Travis
- Length: 5 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- By Scott on 08-04-19
By: Sean Cannell, and others
-
Doom Guy
- Life in First Person
- By: John Romero
- Narrated by: John Romero
- Length: 17 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Doom Guy: Life in First Person is the long-awaited autobiography of gaming’s original rock star and the cocreator of DOOM, Quake, and Wolfenstein—some of the most recognizable and important titles in video game history. Credited with the invention of the first-person shooter, a genre that continues to dominate the market today, he is gaming royalty. Told in remarkable detail, a byproduct of his hyperthymesia, Romero recounts his storied career.
-
-
Intimate stories of gaming history in First Person
- By Emyli on 07-28-23
By: John Romero
-
Slenderman
- Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls
- By: Kathleen Hale
- Narrated by: Therese Plummer
- Length: 9 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
On May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two 12-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier’s violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called “Slenderman”. Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.
-
-
Excellent narration
- By Pink Amy on 08-21-22
By: Kathleen Hale
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- By: Gretchen Bakke
- Narrated by: Emily Caudwell
- Length: 11 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- By Ronald on 09-24-16
By: Gretchen Bakke
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
Prediction Machines
- The Simple Economics of Artificial Intelligence
- By: Ajay Agrawal, Joshua Gans, Avi Goldfarb
- Narrated by: LJ Ganser
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence does the seemingly impossible - driving cars, trading stocks, and teaching children. But facing the sea change that AI will bring can be paralyzing. How should companies set strategies, governments design policies, and people plan their lives for a world so different from what we know? In Prediction Machines, three eminent economists recast the rise of AI as a drop in the cost of prediction. With this single, masterful stroke, they lift the curtain on the AI-is-magic hype and show how basic tools from economics provide clarity about the AI revolution and a basis for action by CEOs, managers, policy makers, investors, and entrepreneurs.
-
-
Not sure what I was expecting, but underwhelmed
- By William J Brown on 09-27-18
By: Ajay Agrawal, and others
-
Tesla
- Inventor of the Electrical Age
- By: W. Bernard Carlson
- Narrated by: Allan Robertson
- Length: 16 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Nikola Tesla was a major contributor to the electrical revolution that transformed daily life at the turn of the 20th century. His inventions, patents, and theoretical work formed the basis of modern AC electricity, and contributed to the development of radio and television. Like his competitor Thomas Edison, Tesla was one of America's first celebrity scientists, enjoying the company of New York high society and dazzling the likes of Mark Twain with his electrical demonstrations. An astute self-promoter and gifted showman, he cultivated a public image of the eccentric genius.
-
-
A detailed examination of Tesla's work
- By Jean on 02-01-14
-
Algorithms of Oppression
- How Search Engines Reinforce Racism
- By: Safiya Umoja Noble
- Narrated by: Shayna Small
- Length: 6 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Run a Google search for “black girls” - what will you find? “Big Booty” and other sexually explicit terms are likely to come up as top search terms. But, if you type in “white girls”, the results are radically different. The suggested porn sites and un-moderated discussions about “why black women are so sassy” or “why black women are so angry” presents a disturbing portrait of black womanhood in modern society. In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search engines like Google offer an equal playing field for all forms of ideas, identities, and activities.
-
-
Read this book. Tell everyone you know about it.
- By Joshua Daniel-Wariya on 06-06-19