-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Narrated by: Brian R. Scott
- Length: 3 hrs and 35 mins
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Publisher's summary
Ever feel like you don’t even own the hardware and software you paid dearly for?
Ever get the impression that you have to ask for permission before installing or changing a program on your device?
Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads?
You’re not alone.
Half-baked products and services that chip away at your sense of ownership, independence, and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers. None of it is intentional or meant to cause harm, which makes it all the more damning.
There’s a silver lining in all of this, and that is ethical hacking. This book will shine a light on how engineers think and show you how to discern their original intentions, helping you adopt their attitude and perfect their products despite managerial crud doing their worst to stop you.
In a world where everything is slowly becoming more managed and overbearing, this audiobook is an attempt to take back some of that original awesomeness envisioned by engineers and at least make your world a slightly better place.
Here’s just a tiny fraction of the topics covered in this audiobook:
- Fighting against companies
- Ethical hacking defined
- War on the internet
- Engineer’s mind
- The almighty EULA
- The danger of defaults
- John Deere
- Copyright
- YouTube ContentID
- Tracking users
- DRM
- GEMA, the copyright police
- Torrents
- Sports channels
- Megaupload and Anonymous
- Julian Assange
- Patents
- Penetration testing
- Jailbreaking Android/iPhone
- Shut up Cortana
- How an hacker could go about hacking your WiFi and much, much more!
If you want to learn more about ethical hacking, then scroll up and click “add to cart”!
Listeners also enjoyed...
-
Slayers: A Buffyverse Story
- By: Christopher Golden, Amber Benson
- Narrated by: Amber Benson, Charisma Carpenter, James Charles Leary, and others
- Length: 8 hrs and 2 mins
- Original Recording
-
Overall
-
Performance
-
Story
Original cast members from the beloved TV series, Buffy the Vampire Slayer, reunite for an all-new adventure about connections that never die—even if you bury them. A decade has passed since the epic final battle that concluded Buffy the Vampire Slayer (TV). The game-changing spell that gave power to all potential Slayers persists. With new Slayers constantly emerging, things are looking grim for the bad guys.
-
-
A dream come true
- By Anonymous User on 10-12-23
By: Christopher Golden, and others
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
This is it!
- By Marcus on 10-18-23
By: Glen D. Singh
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- By: Lester Evans
- Narrated by: Michael Reaves, Brian R. Scott
- Length: 6 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to avoid getting hacked, having your information spread, and discover the world of ethical hacking then pay attention.... Two manuscripts in one audiobook: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyber-Warfare, Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber-Security of Computer Networks, Including Tips on Social Engineering.
-
-
Misleading
- By D. Reeves on 08-14-19
By: Lester Evans
-
Internet of Things
- What You Need to Know About loT, Big Data, Predictive Analytics, Artificial Intelligence, Machine Learning, Cybersecurity, Business Intelligence, Augmented Reality and Our Future
- By: Neil Wilkins
- Narrated by: Brian R. Scott
- Length: 3 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to learn about the internet of things, then pay attention.... You were just woken up in the middle of the night by smart light bulbs in your house blasting at full power for no reason. Your bleary-eyed investigation shows they tried to download a firmware update and failed. At that moment, Alexa starts quietly whispering sweet nonsense to herself in the corner and Roomba starts slamming into the nearest wall. What do you do? Is your house haunted or have the machines finally started an uprising? Neither - it’s just another day in the IoT wonderland.
-
-
Poor writing
- By Bo Zilovic on 01-26-24
By: Neil Wilkins
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
Slayers: A Buffyverse Story
- By: Christopher Golden, Amber Benson
- Narrated by: Amber Benson, Charisma Carpenter, James Charles Leary, and others
- Length: 8 hrs and 2 mins
- Original Recording
-
Overall
-
Performance
-
Story
Original cast members from the beloved TV series, Buffy the Vampire Slayer, reunite for an all-new adventure about connections that never die—even if you bury them. A decade has passed since the epic final battle that concluded Buffy the Vampire Slayer (TV). The game-changing spell that gave power to all potential Slayers persists. With new Slayers constantly emerging, things are looking grim for the bad guys.
-
-
A dream come true
- By Anonymous User on 10-12-23
By: Christopher Golden, and others
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
This is it!
- By Marcus on 10-18-23
By: Glen D. Singh
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- By: Lester Evans
- Narrated by: Michael Reaves, Brian R. Scott
- Length: 6 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to avoid getting hacked, having your information spread, and discover the world of ethical hacking then pay attention.... Two manuscripts in one audiobook: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyber-Warfare, Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber-Security of Computer Networks, Including Tips on Social Engineering.
-
-
Misleading
- By D. Reeves on 08-14-19
By: Lester Evans
-
Internet of Things
- What You Need to Know About loT, Big Data, Predictive Analytics, Artificial Intelligence, Machine Learning, Cybersecurity, Business Intelligence, Augmented Reality and Our Future
- By: Neil Wilkins
- Narrated by: Brian R. Scott
- Length: 3 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to learn about the internet of things, then pay attention.... You were just woken up in the middle of the night by smart light bulbs in your house blasting at full power for no reason. Your bleary-eyed investigation shows they tried to download a firmware update and failed. At that moment, Alexa starts quietly whispering sweet nonsense to herself in the corner and Roomba starts slamming into the nearest wall. What do you do? Is your house haunted or have the machines finally started an uprising? Neither - it’s just another day in the IoT wonderland.
-
-
Poor writing
- By Bo Zilovic on 01-26-24
By: Neil Wilkins
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Blockchain Blueprint & Technology Ultimate Guide
- Learn Everything You Need To
- By: Raymond Kazuya
- Narrated by: Lukas Arnold
- Length: 1 hr and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Blockchain Technology innovation is the next technological advancement and revolution that has some serious far reaching implications worldwide. World business/commerce as we know today will become more secure, efficient, fluid and reliable due to Blockchain Technology. Don't get left behind on this next big trend and ride the wave of technological advancement! Learn everything you need to know about Blockchain Technology and join the revolution! You do not want to miss out!
-
-
Basics of Blockchain
- By Keith on 02-02-18
By: Raymond Kazuya
-
Designing Data-Intensive Applications
- The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
- By: Martin Kleppmann
- Narrated by: Benjamin Lange
- Length: 20 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
Author Martin Kleppmann helps you navigate the diverse data landscape by examining the pros and cons of various technologies for processing and storing data. Software keeps changing, but the fundamental principles remain the same. With this book, software engineers and architects will learn how to apply those ideas in practice, and how to make full use of data in modern applications.
-
-
Must read for senior+ software engineers
- By Navid v on 05-29-21
By: Martin Kleppmann
-
In the Plex
- How Google Thinks, Works, and Shapes Our Lives
- By: Steven Levy
- Narrated by: L. J. Ganser
- Length: 19 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Few companies in history have ever been as successful and as admired as Google, the company that has transformed the Internet and become an indispensable part of our lives. How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes listeners inside Google headquarters - the Googleplex - to explain how Google works.
-
-
Just ok for me
- By Everyday Mom on 04-23-11
By: Steven Levy
-
Cryptocurrency
- A Beginner’s Guide to Trading and Investing in Bitcoin and Other Blockchain Currencies
- By: Louis Zeman
- Narrated by: Eric Linden
- Length: 1 hr and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
Fiind everything you need to know in order to get started investing and trading cryptocurrency successfully including a simple, easy-to-understand explanation of just what cryptocurrency is and why you should care about it. You will also learn the basics of investing successfully and a complete, step-by-step walkthrough that will have you buying and selling cryptocurrency in a matter of minutes.
-
-
Great Narration.
- By Havlik on 04-30-21
By: Louis Zeman
-
Social Media Mastery: Two Manuscripts
- Facebook Advertising & Instagram Marketing. Best Practices for Influencers, Your Brand, and Your Business
- By: Mark Hollister, Susan Smith
- Narrated by: Heath Douglas
- Length: 5 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to learn how to increase your sales and leads and grow your following fast, then check out this two-in-one audiobook. You'll learn how to use Facebook advertising and Instagram marketing to build a real audience and sell more.
-
-
try this
- By Melvin on 01-28-20
By: Mark Hollister, and others
-
Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming
- From User-Friendly HTML to the More Advanced Python. C, C++, C#, Coding, Rasberry Pi and Black Hat Hacking
- By: Adesh Silva
- Narrated by: Mitchell Reuter
- Length: 3 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
Did you know that coding and programming jobs are one of the most secure and best-paid jobs around the world? According to BSL, the median annual wage for computer programmers was $84,280 in 2018. The field is growing strong and companies are headhunting coders. But even if you don't want to become a professional coder, programming skills increase your salary in other fields such as marketing, finance, and business analysis. Several studies have shown that programming skills added more than $20,000 to the annual salary.
-
-
Such an amazing audio-book.
- By Warren Peace on 03-23-20
By: Adesh Silva
-
SQL: From Beginner to Intermediate
- The Latest Guide to Mastering SQL (2020 Edition)
- By: Johnny Page
- Narrated by: Austin R. Stoler
- Length: 3 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the competitive job market, the need for SQL developers has increased dramatically over the years, but every “programmer” is still focused on web design or app development. SQL development is the new hidden talent that big companies are looking for that nobody really knows about. This high-paying skill is easy to learn and can guarantee your future, but everyone overlooks it because hardly anyone knows it exists. You can learn SQL in weeks.
-
-
Thanks author for sharing this audible.
- By Rodger Williams on 03-25-20
By: Johnny Page
-
Machine Learning for Smart Learners
- Discover and Learn About Neural Network, Dataset, Python, Libraries and Applications to Build Intelligent Systems
- By: Melvin Doyle
- Narrated by: Valentina Di Paola
- Length: 3 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Machine learning and deep learning are changing technology as we know it. Critical infrastructure decisions are now driven by fine-tuned algorithms trained with huge data sets. In this guide, you're going to be handed all the information and tools you need to transform data into powerful insights.
-
-
This is a joke or a hoax
- By Anonymous User on 01-29-20
By: Melvin Doyle
-
How To Win With Your Data Visualizations
- The 5 Part Guide For Junior Analysts To Create Effective Data Visualizations And Engaging Data Stories
- By: Elizabeth Clarke
- Narrated by: Brennan Koenigsreuter
- Length: 4 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Smacking some numbers onto a pie chart is old news and simply doesn't work anymore. Keeping your audience inspired and on the edge of their seats through an engaging data story is what we as business professionals should be striving to do. How to Win with Your Data Visualizations uncovers the fundamentals of what makes a winning data presentation and has laid them out in five easy-to-understand parts you can immediately apply to your next chart and presentation to see a winning data story unfold.
-
-
Well researched
- By Abby on 02-11-23
By: Elizabeth Clarke
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- By: Brian Krebs
- Narrated by: Christopher Lane
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Risky topic, but Br. Krebs hits it out of the park
- By RRiley on 12-21-14
By: Brian Krebs
Related to this topic
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Who Controls the Internet
- Illusions of a Borderless World
- By: Jack Goldsmith, Tim Wu
- Narrated by: Bob Loza
- Length: 6 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is the Internet erasing national borders? Who's really in control of what's happening on the Net--Internet engineers, rogue programmers, the United Nations, or powerful countries?In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world.
-
-
Mostly delves into questions of law
- By Amazon Customer on 05-07-11
By: Jack Goldsmith, and others
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff
-
The Filter Bubble
- What the Internet Is Hiding from You
- By: Eli Pariser
- Narrated by: Kirby Heyborne
- Length: 7 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
In December 2009, Google began customizing its search results for each user. Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, Google's change in policy is symptomatic of the most significant shift to take place on the Web in recent years: the rise of personalization.
-
-
Now in the top 3 best books I've ever read
- By Brian Esserlieu on 05-26-11
By: Eli Pariser
-
Technically Wrong
- Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
- By: Sara Wachter-Boettcher
- Narrated by: Andrea Emmes
- Length: 5 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed, or why. It's time we change that. Many of the services we rely on are full of oversights, biases, and downright ethical nightmares. Chatbots that harass women. Signup forms that fail anyone who's not straight. Social media sites that send peppy messages about dead relatives. Algorithms that put more black people behind bars.
-
-
Pretty good but not complete
- By Casey on 10-29-17
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Who Controls the Internet
- Illusions of a Borderless World
- By: Jack Goldsmith, Tim Wu
- Narrated by: Bob Loza
- Length: 6 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is the Internet erasing national borders? Who's really in control of what's happening on the Net--Internet engineers, rogue programmers, the United Nations, or powerful countries?In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world.
-
-
Mostly delves into questions of law
- By Amazon Customer on 05-07-11
By: Jack Goldsmith, and others
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff
-
The Filter Bubble
- What the Internet Is Hiding from You
- By: Eli Pariser
- Narrated by: Kirby Heyborne
- Length: 7 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
In December 2009, Google began customizing its search results for each user. Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, Google's change in policy is symptomatic of the most significant shift to take place on the Web in recent years: the rise of personalization.
-
-
Now in the top 3 best books I've ever read
- By Brian Esserlieu on 05-26-11
By: Eli Pariser
-
Technically Wrong
- Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
- By: Sara Wachter-Boettcher
- Narrated by: Andrea Emmes
- Length: 5 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed, or why. It's time we change that. Many of the services we rely on are full of oversights, biases, and downright ethical nightmares. Chatbots that harass women. Signup forms that fail anyone who's not straight. Social media sites that send peppy messages about dead relatives. Algorithms that put more black people behind bars.
-
-
Pretty good but not complete
- By Casey on 10-29-17
-
Targeted
- How Technology Is Revolutionizing Advertising and the Way Companies Reach Consumers
- By: Mike Smith
- Narrated by: Michael Smith
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Far from the catchy television spots and sleek magazine spreads are the comparatively modest ads that pop up on websites and in Internet searches. But don't be fooled - online advertising is exploding. Growing at a compound annual rate near 20%, it is now the second-largest advertising channel in the United States. Part history, part guidebook, part prediction for the future, Targeted tells the story of the companies, individuals, and innovations driving this revolution.
-
-
Dense Language, Mediocre Narration
- By Fawn on 12-06-16
By: Mike Smith
-
The Starfish and the Spider
- The Unstoppable Power of Leaderless Organizations
- By: Ori Brafman, Rod Beckstrom
- Narrated by: Sean Pratt
- Length: 5 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you cut off a spider's leg, it's crippled; if you cut off its head, it dies. But if you cut off a starfish's leg it grows a new one, and the old leg can grow into an entirely new starfish. The Starfish and the Spider argues that organizations fall into two categories: "spiders", which have a rigid hierarchy, and "starfish", which rely on the power of peer relationships.
-
-
Centralized and decentralized models
- By Chan Meng on 12-07-07
By: Ori Brafman, and others
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
All the Rave
- The Rise and Fall of Shawn Fanning’s Napster
- By: Joseph Menn
- Narrated by: John Rubinstein
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The definitive inside account of the file-sharing revolution that overthrew the music industry, All the Rave reveals the family betrayal, greed, and mismanagement that hijacked one the most fundamental innovations of the Internet era. Named one of the three best books of 2003 by Investigative Reporters and Editors Inc., All the Rave has been out of print until now and unavailable in most formats. Author and veteran technology journalist Joseph Menn also wrote 2010's Fatal System Error: The Hunt for the New Crime Lords who are Bringing Down the Internet.
-
-
The Far-reaching Karma of Napster
- By Susie on 04-29-13
By: Joseph Menn
What listeners say about Ethical Hacking
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Barry Helenh
- 02-11-19
Great for getting started on the yellow brick road
Excellent read and just enough materials to get pointed in the right direction, top book.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Gusty
- 07-24-19
basic
Very basic and redundant. It was tough to finish only being 3 hours long. Will keep lookijg for the right one for me.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Gentleman Ujar
- 02-11-19
True to its title
This book does as promised - it gives the basics of penetration testing. When you're done reading this book you'll have an understanding of the most popular tools, be able to perform a pen test, interpret the results of your pen test, and shore up any cracks in your network/site.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Jason T. Chen
- 02-11-19
useful and Worthy
Very easy to read, very fun and interesting! I'm more into databases but the way everything integrates now in the current IT world, I realized that I need to get a better understanding of how to protect my database servers network or at least, being able to discuss about security with my network team without feeling lost. This books is about how to protect yourself from the very "nasty" and "wild" Internet world we all are living in. It will change your false sense of security at work or home, trust me! Even though this is not an in-depth volume about the testing tools or techniques, this book delivers what is promised on the cover and much more!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Alexander B. Talbot
- 02-09-19
A listing of tools
A good reference to look through - but it's not going to teach you anything like an actual recipe where you actually cook something and get an item you can eat. Should have been called Ethical Hacking.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Robert Leone
- 03-15-19
not what I expected but was decent
this book is for someone that may want to get into this kind of stuff and it almost hints at teaching you such things. although they teach you some things it's basically there to tell you why you would want to do this , how you can use it, and why you would. so if you are looking for a reason. this might be a good book. and also not know much of anything at all.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Silaoon Rome
- 02-11-19
A great on ramp for hackers.
Great book for the newbies, but also a nice resource for everybody that wants to know a structured, repeatable process to get going on network pen testing. Pat is the man!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Linda Cherylh
- 02-11-19
The author done a fabulous job.
Lester Evans has done a great job in a short, easy to read topical starting point for learning pen-testing. He has clear and concise details and examples to help you understand "where to start" when learning about cyber security. As a professor myself, I recommend this inexpensive tool to get my students engaged in security and gives them a way to ease into the subject materials.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Hanna Macleod
- 02-11-19
Beginners book
I have intermediate/beginner knowledge and always wanted to expand out. This is pretty good in that area and terms used are easy for beginner to get. Ended up being my top pick out of the books I purchased on this topic. Highly recommend to add to a collection. It's not a huge book but a decent size and the print isn't too small.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Wilda Sullivan
- 02-11-19
Too Basic, still great work.
Yeah, I understand the title states it's the Beginner’s Guide but I believe it could cover more deeper the knowledge involved in the techniques. Knowing the underlying technologies is fundamental for understanding how to use the same techniques in different scenarios and hence having more sophisticated tests.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!