The Art of Deception
Controlling the Human Element of Security
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $21.49
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Nick Sullivan
-
By:
-
Kevin Mitnick
About this listen
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent.
Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
©2003 Kevin D. Mitnick (P)2009 Tantor AudioListeners also enjoyed...
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Permanent Record
- By: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- By Ryan L on 09-22-19
By: Edward Snowden
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Permanent Record
- By: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- By Ryan L on 09-22-19
By: Edward Snowden
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- By: Perry Carpenter, Kevin Mitnick - foreword
- Narrated by: Stephen Bel Davies
- Length: 12 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good information between nonsense
- By Anonymous User on 03-04-24
By: Perry Carpenter, and others
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- By: Christopher Hadnagy, Seth Schulman
- Narrated by: Christopher Hadnagy
- Length: 8 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
-
-
Instead of this, buy “Social Engineering, Second Edition”.
- By Jessica on 11-30-21
By: Christopher Hadnagy, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Social Engineering
- The Art of Human Hacking
- By: Paul Wilson - foreword, Christopher Hadnagy
- Narrated by: A. T. Chandler
- Length: 14 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
-
-
Pass on this or read it yourself
- By Michael Brand on 06-09-21
By: Paul Wilson - foreword, and others
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
Related to this topic
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- By: Frank W. Abagnale
- Narrated by: Raymond Todd
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- By Sheila on 06-05-07
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Where Wizards Stay Up Late
- The Origins of the Internet
- By: Katie Hafner, Matthew Lyon
- Narrated by: Mark Douglas Nelson
- Length: 10 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Twenty-five years ago, it didn't exist. Today, 20 million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960s, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices.
-
-
Absolutely fascinating and we'll researched
- By Elsa Braun on 10-01-16
By: Katie Hafner, and others
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- By: Frank W. Abagnale
- Narrated by: Raymond Todd
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- By Sheila on 06-05-07
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Where Wizards Stay Up Late
- The Origins of the Internet
- By: Katie Hafner, Matthew Lyon
- Narrated by: Mark Douglas Nelson
- Length: 10 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Twenty-five years ago, it didn't exist. Today, 20 million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960s, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices.
-
-
Absolutely fascinating and we'll researched
- By Elsa Braun on 10-01-16
By: Katie Hafner, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Exploding the Phone
- The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell
- By: Phil Lapsley
- Narrated by: Johann North
- Length: 12 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before smartphones, back even before the Internet and personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary "harmonic telegraph", by the middle of the 20th century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.
-
-
Great Story along with Great Technical Research
- By Elsa Braun on 04-25-16
By: Phil Lapsley
-
High-Tech, High-Touch Customer Service
- Inspire Timeless Loyalty in the Demanding New World of Social Commerce
- By: Micah Solomon
- Narrated by: Micah Solomon, Sean Pratt
- Length: 6 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In an age of Twitter, smartphones, and self-service kiosks, high-tech but still high-touch customer service is the answer. Today’s customers are a hard bunch to crack. Time-strapped, screen-addicted, value-savvy, and socially engaged, their expectations are tougher than ever for a business to keep up with. They are empowered like never before and expect businesses to respect that sense of empowerment - lashing out at those that don’t. Take heart: Old-fashioned customer service, fully retooled for today’s blistering pace and digitally connected reality, is what you need to build the kind of loyal customer base that allows you to survive - and thrive.
-
-
This is the book that cracks the code!
- By Nick Morgan on 04-30-13
By: Micah Solomon
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Exceptional Service, Exceptional Profit
- The Secrets of Building a Five-Star Customer Service Organization
- By: Leonardo Inghilleri, Micah Solomon
- Narrated by: Sean Pratt
- Length: 5 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a tight market, your most powerful growth engine - and your best protection from competitive inroads - is this: Put everything you can into cultivating true customer loyalty. Loyal customers are less sensitive to price competition, more forgiving of small glitches, and, ultimately, become "walking billboards" who will happily promote your brand.
In Exceptional Service, Exceptional Profit, insiders Leonardo Inghilleri and Micah Solomon reveal the secrets of providing online and offline customer service so superior it nearly guarantees loyalty.
-
-
Great book, recommended!
- By KLD on 07-03-15
By: Leonardo Inghilleri, and others
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- By: Steven Levy
- Narrated by: Rich Miller
- Length: 14 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- By Chip L. on 05-22-21
By: Steven Levy
-
@War
- The Rise of the Military-Internet Complex
- By: Shane Harris
- Narrated by: Stephen R. Thorne
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- By Greg on 02-06-15
By: Shane Harris
-
Technically Wrong
- Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
- By: Sara Wachter-Boettcher
- Narrated by: Andrea Emmes
- Length: 5 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed, or why. It's time we change that. Many of the services we rely on are full of oversights, biases, and downright ethical nightmares. Chatbots that harass women. Signup forms that fail anyone who's not straight. Social media sites that send peppy messages about dead relatives. Algorithms that put more black people behind bars.
-
-
Pretty good but not complete
- By Casey on 10-29-17
-
The Watchers
- The Rise of America's Surveillance State
- By: Shane Harris
- Narrated by: Kirby Heyborne
- Length: 15 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Our surveillance state was born in the brain of Admiral John Poindexter in 1983. Poindexter, President Ronald Reagan's national security adviser, realized that the United States might have prevented the terrorist massacre of 241 Marines in Beirut if only intelligence agencies had been able to analyze in real time data they had on the attackers. Poindexter poured government know-how and funds into his dream---a system that would sift reams of data for signs of terrorist activity.
-
-
Important context for privacy debate
- By Keefer on 09-17-11
By: Shane Harris
-
The Starfish and the Spider
- The Unstoppable Power of Leaderless Organizations
- By: Ori Brafman, Rod Beckstrom
- Narrated by: Sean Pratt
- Length: 5 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you cut off a spider's leg, it's crippled; if you cut off its head, it dies. But if you cut off a starfish's leg it grows a new one, and the old leg can grow into an entirely new starfish. The Starfish and the Spider argues that organizations fall into two categories: "spiders", which have a rigid hierarchy, and "starfish", which rely on the power of peer relationships.
-
-
Centralized and decentralized models
- By Chan Meng on 12-07-07
By: Ori Brafman, and others
-
All the Rave
- The Rise and Fall of Shawn Fanning’s Napster
- By: Joseph Menn
- Narrated by: John Rubinstein
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The definitive inside account of the file-sharing revolution that overthrew the music industry, All the Rave reveals the family betrayal, greed, and mismanagement that hijacked one the most fundamental innovations of the Internet era. Named one of the three best books of 2003 by Investigative Reporters and Editors Inc., All the Rave has been out of print until now and unavailable in most formats. Author and veteran technology journalist Joseph Menn also wrote 2010's Fatal System Error: The Hunt for the New Crime Lords who are Bringing Down the Internet.
-
-
The Far-reaching Karma of Napster
- By Susie on 04-29-13
By: Joseph Menn
People who viewed this also viewed...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Social Engineering
- The Art of Human Hacking
- By: Paul Wilson - foreword, Christopher Hadnagy
- Narrated by: A. T. Chandler
- Length: 14 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
-
-
Pass on this or read it yourself
- By Michael Brand on 06-09-21
By: Paul Wilson - foreword, and others
-
Unmasking the Social Engineer
- The Human Element of Security
- By: Christopher Hadnagy, Paul F. Kelly, Paul Ekman
- Narrated by: Christopher Hadnagy
- Length: 5 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding nonverbal communications with the knowledge of how social engineers, scam artists, and con men use these skills to build feelings of trust and rapport in their targets. The author helps listeners understand how to identify and detect social engineers and scammers by analyzing their nonverbal behavior. Unmasking the Social Engineer shows how attacks work.
-
-
Loved
- By vrukav6 on 07-24-23
By: Christopher Hadnagy, and others
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Social Engineering
- The Art of Human Hacking
- By: Paul Wilson - foreword, Christopher Hadnagy
- Narrated by: A. T. Chandler
- Length: 14 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
-
-
Pass on this or read it yourself
- By Michael Brand on 06-09-21
By: Paul Wilson - foreword, and others
-
Unmasking the Social Engineer
- The Human Element of Security
- By: Christopher Hadnagy, Paul F. Kelly, Paul Ekman
- Narrated by: Christopher Hadnagy
- Length: 5 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding nonverbal communications with the knowledge of how social engineers, scam artists, and con men use these skills to build feelings of trust and rapport in their targets. The author helps listeners understand how to identify and detect social engineers and scammers by analyzing their nonverbal behavior. Unmasking the Social Engineer shows how attacks work.
-
-
Loved
- By vrukav6 on 07-24-23
By: Christopher Hadnagy, and others
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- By Jonathan on 11-16-19
By: Roger A. Grimes
-
Dark Territory
- The Secret History of Cyber War
- By: Fred Kaplan
- Narrated by: Malcolm Hillgartner
- Length: 9 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
-
-
Best narrator - Malcolm Hillgartner
- By Greg Davis on 07-20-16
By: Fred Kaplan
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- By: Perry Carpenter, Kevin Mitnick - foreword
- Narrated by: Stephen Bel Davies
- Length: 12 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good information between nonsense
- By Anonymous User on 03-04-24
By: Perry Carpenter, and others
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
Permanent Record
- By: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- By Ryan L on 09-22-19
By: Edward Snowden
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- By: Christopher Hadnagy, Seth Schulman
- Narrated by: Christopher Hadnagy
- Length: 8 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
-
-
Instead of this, buy “Social Engineering, Second Edition”.
- By Jessica on 11-30-21
By: Christopher Hadnagy, and others
What listeners say about The Art of Deception
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- David Patton
- 08-13-24
Great Book!
Though, some of the info is super outdated, the base of the knowledge is perfect!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Naj Qazi
- 12-15-23
Amazing book on IT Security!
It was the most exciting read on IT Security. Some material felt a little dated, but most information and strategies are still relevant today!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- John M. Mulholland
- 09-07-24
Great content but very dated
A lot of great things to think about and practice but the information is fairly old.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Anonymous User
- 12-27-20
Stories of deception and how to prevent them
The book contains very interesting stories of how People steal information from big and small businesses. It goes over the steps the saboteurs take and how they think in great detail. The final chapters van be skipped for a non professional reader as it details how to form trainings on these topics.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story
- Anonymous User
- 08-24-24
La información brindada sobre la ingeniería social.
lo que más me gustó fue la narración, y lo que no es que al ser uno solo, a la hora de narrar los diálogos, a veces me costaba seguirlos sin perder un poco el hilo. igualmente aclaro que el Inglés no es mi lengua materna, eso también puede influir
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Heather HH
- 10-04-24
Loved the stories!
This was so interesting to me as a person who knows absolutely nothing about the tech world. I was surprised how humorous it was and throughly enjoyed all of his stories. I’ll be looking for more from this author for sure!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- James S.
- 02-01-21
Good security device delivered by old misogynist
Mr. Minnick may know his IT security but makes clear in his book that he doesn't think women can be hackers and that the only time they can be social engineers is if they seduce people. Cringed throughout.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
14 people found this helpful
-
Overall
-
Performance
-
Story
- Abdelrahman Samy
- 10-07-20
A must read for any one in the cybersecurity indus
A lot of useful information and ready for you policies to apply in your company. A highly recommended book.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story
- Frank
- 03-23-22
Not bad
Not bad information. It could’ve been shortened by a few hours, though. Seems like he repeated himself several times.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- chardragon03
- 11-05-24
Great Info
Moves well with good stories and follows up frequently with what was previously covered. Great book from a legend.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!