-
The Cybersecurity Playbook
- How Every Leader and Employee Can Contribute to a Culture of Security
- Narrated by: Chloe Cannon
- Length: 4 hrs and 59 mins
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $16.00
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Publisher's summary
Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity - but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This audiobook provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization's security is only as strong as its weakest link, this audiobook offers specific strategies for employees at every level.
Drawing from her experience as CMO of one of the world's largest cybersecurity companies, author Allison Cerra incorporates straightforward assessments, adaptable action plans, and many current examples to provide practical recommendations for cybersecurity policies. By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this audiobook will help you deploy cybersecurity measures using easy-to-follow methods and proven techniques, develop a practical security plan tailor-made for your specific needs, and incorporate vital security practices into your everyday workflow quickly and efficiently.
Listeners also enjoyed...
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- By Peter on 11-23-15
By: Gene Kim, and others
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- By Peter on 11-23-15
By: Gene Kim, and others
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
Cybersecurity Leadership
- Powering the Modern Organization
- By: Mansur Hasib
- Narrated by: Mansur Hasib
- Length: 7 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process.
-
-
CIOs and CISOs should read this book...
- By Chad L Fulgham on 08-12-15
By: Mansur Hasib
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- By Cristen Mini on 01-15-24
By: Matthew K. Sharp, and others
-
How to Measure Anything in Cybersecurity Risk
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Patrick Cronin
- Length: 10 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
-
Not appropriate for audio, buy a hard copy instead
- By Wanderer on 01-20-17
By: Douglas W. Hubbard, and others
-
How Google Works
- By: Eric Schmidt, Jonathan Rosenberg, Alan Eagle
- Narrated by: Holter Graham, Jonathan Rosenberg
- Length: 9 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Google Executive Chairman and ex-CEO Eric Schmidt and former SVP of Products Jonathan Rosenberg came to Google over a decade ago as proven technology executives. At the time, the company was already well-known for doing things differently, reflecting the visionary - and frequently contrarian - principles of founders Larry Page and Sergey Brin. If Eric and Jonathan were going to succeed, they realized they would have to relearn everything they thought they knew about management and business.
-
-
Painfully ignorant
- By kameir on 10-13-14
By: Eric Schmidt, and others
Related to this topic
-
Becoming Facebook
- The 10 Challenges That Defined the Company That's Disrupting the World
- By: Mike Hoefflinger
- Narrated by: Nicholas Techosky
- Length: 7 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Facebook's founding is legend: In a Harvard dorm, wunderkind Mark Zuckerberg invented a new way to connect with friends...and the rest is history. But for the people who actually molded this great idea into a game-changing $300 billion company, the experience was far more tumultuous and uncertain than we might expect. Mike Hoefflinger was one of those Facebook insiders.
-
-
mainly a tribute to the success of FB
- By Anonymous User on 10-07-18
By: Mike Hoefflinger
-
High-Tech, High-Touch Customer Service
- Inspire Timeless Loyalty in the Demanding New World of Social Commerce
- By: Micah Solomon
- Narrated by: Micah Solomon, Sean Pratt
- Length: 6 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In an age of Twitter, smartphones, and self-service kiosks, high-tech but still high-touch customer service is the answer. Today’s customers are a hard bunch to crack. Time-strapped, screen-addicted, value-savvy, and socially engaged, their expectations are tougher than ever for a business to keep up with. They are empowered like never before and expect businesses to respect that sense of empowerment - lashing out at those that don’t. Take heart: Old-fashioned customer service, fully retooled for today’s blistering pace and digitally connected reality, is what you need to build the kind of loyal customer base that allows you to survive - and thrive.
-
-
This is the book that cracks the code!
- By Nick Morgan on 04-30-13
By: Micah Solomon
-
Ghost Work
- How to Stop Silicon Valley from Building a New Global Underclass
- By: Mary L. Gray, Siddharth Suri
- Narrated by: Will Damron
- Length: 8 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hidden beneath the surface of the internet, a new, stark reality is looming - one that cuts to the very heart of our endless debates about the impact of AI. Anthropologist Mary L. Gray and computer scientist Siddharth Suri team up to unveil how services delivered by companies like Amazon, Google, Microsoft, and Uber can only function smoothly thanks to the judgment and experience of a vast, invisible human labor force. These people doing "ghost work" make the internet seem smart. An estimated 8 percent of Americans have worked at least once in this "ghost economy".
-
-
Interesting research, disappointing analysis
- By Rafael Rosa on 05-11-19
By: Mary L. Gray, and others
-
Ask Your Developer
- How to Harness the Power of Software Developers and Win in the 21st Century
- By: Jeff Lawson
- Narrated by: Jeff Lawson
- Length: 9 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Jeff Lawson, developer turned CEO of Twilio (one of Bloomberg Businessweek's Top 50 Companies to Watch in 2021), creates a new playbook for unleashing the full potential of software developers in any organization, showing how to help management utilize this coveted and valuable workforce to enable growth, solve a wide range of business problems, and drive digital transformation.
-
-
Two and Half Stars
- By Anonymous User on 12-16-21
By: Jeff Lawson
-
What to Do When Machines Do Everything
- How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data
- By: Malcolm Frank, Paul Roehrig, Ben Pring
- Narrated by: Eric Jason Martin
- Length: 7 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
What to Do When Machines Do Everything is a guidebook to succeeding in the next generation of the digital economy. When systems running on artificial intelligence can drive our cars, diagnose medical patients, and manage our finances more effectively than humans, it raises profound questions on the future of work and how companies compete.
-
-
Assumes that machine learning will grow very slow
- By Nathan Burnham on 05-06-17
By: Malcolm Frank, and others
-
Who Says Elephants Can't Dance?
- Inside IBM's Historic Turnaround
- By: Louis V. Gerstner Jr.
- Narrated by: Edward Herrmann
- Length: 8 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 1990, IBM had its most profitable year ever. By 1993, the company was on a watch list for extinction, victimized by its own lumbering size, an insular corporate culture, and the PC era IBM had itself helped invent.
-
-
Moderate Start, Picks up FAST!
- By Art H on 02-08-05
-
Becoming Facebook
- The 10 Challenges That Defined the Company That's Disrupting the World
- By: Mike Hoefflinger
- Narrated by: Nicholas Techosky
- Length: 7 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Facebook's founding is legend: In a Harvard dorm, wunderkind Mark Zuckerberg invented a new way to connect with friends...and the rest is history. But for the people who actually molded this great idea into a game-changing $300 billion company, the experience was far more tumultuous and uncertain than we might expect. Mike Hoefflinger was one of those Facebook insiders.
-
-
mainly a tribute to the success of FB
- By Anonymous User on 10-07-18
By: Mike Hoefflinger
-
High-Tech, High-Touch Customer Service
- Inspire Timeless Loyalty in the Demanding New World of Social Commerce
- By: Micah Solomon
- Narrated by: Micah Solomon, Sean Pratt
- Length: 6 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In an age of Twitter, smartphones, and self-service kiosks, high-tech but still high-touch customer service is the answer. Today’s customers are a hard bunch to crack. Time-strapped, screen-addicted, value-savvy, and socially engaged, their expectations are tougher than ever for a business to keep up with. They are empowered like never before and expect businesses to respect that sense of empowerment - lashing out at those that don’t. Take heart: Old-fashioned customer service, fully retooled for today’s blistering pace and digitally connected reality, is what you need to build the kind of loyal customer base that allows you to survive - and thrive.
-
-
This is the book that cracks the code!
- By Nick Morgan on 04-30-13
By: Micah Solomon
-
Ghost Work
- How to Stop Silicon Valley from Building a New Global Underclass
- By: Mary L. Gray, Siddharth Suri
- Narrated by: Will Damron
- Length: 8 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hidden beneath the surface of the internet, a new, stark reality is looming - one that cuts to the very heart of our endless debates about the impact of AI. Anthropologist Mary L. Gray and computer scientist Siddharth Suri team up to unveil how services delivered by companies like Amazon, Google, Microsoft, and Uber can only function smoothly thanks to the judgment and experience of a vast, invisible human labor force. These people doing "ghost work" make the internet seem smart. An estimated 8 percent of Americans have worked at least once in this "ghost economy".
-
-
Interesting research, disappointing analysis
- By Rafael Rosa on 05-11-19
By: Mary L. Gray, and others
-
Ask Your Developer
- How to Harness the Power of Software Developers and Win in the 21st Century
- By: Jeff Lawson
- Narrated by: Jeff Lawson
- Length: 9 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Jeff Lawson, developer turned CEO of Twilio (one of Bloomberg Businessweek's Top 50 Companies to Watch in 2021), creates a new playbook for unleashing the full potential of software developers in any organization, showing how to help management utilize this coveted and valuable workforce to enable growth, solve a wide range of business problems, and drive digital transformation.
-
-
Two and Half Stars
- By Anonymous User on 12-16-21
By: Jeff Lawson
-
What to Do When Machines Do Everything
- How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data
- By: Malcolm Frank, Paul Roehrig, Ben Pring
- Narrated by: Eric Jason Martin
- Length: 7 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
What to Do When Machines Do Everything is a guidebook to succeeding in the next generation of the digital economy. When systems running on artificial intelligence can drive our cars, diagnose medical patients, and manage our finances more effectively than humans, it raises profound questions on the future of work and how companies compete.
-
-
Assumes that machine learning will grow very slow
- By Nathan Burnham on 05-06-17
By: Malcolm Frank, and others
-
Who Says Elephants Can't Dance?
- Inside IBM's Historic Turnaround
- By: Louis V. Gerstner Jr.
- Narrated by: Edward Herrmann
- Length: 8 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 1990, IBM had its most profitable year ever. By 1993, the company was on a watch list for extinction, victimized by its own lumbering size, an insular corporate culture, and the PC era IBM had itself helped invent.
-
-
Moderate Start, Picks up FAST!
- By Art H on 02-08-05
-
Think Like Amazon
- 50 1/2 Ideas to Become a Digital Leader
- By: John Rossman
- Narrated by: Jeff Cummings, John Rossman
- Length: 9 hrs and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
“What would Jeff do?” Since leaving Amazon to advise start-ups and corporations, John Rossman has been asked this question countless times by executives who want to know “the secret” behind Amazon’s historic success. In this step-by-step guide, he provides 50½ answers drawn from his experience as an Amazon executive - and shows today’s business leaders how to think like Amazon, strategize like Bezos, and beat the competition like nobody’s business.
-
-
A must read if you really want to innovate like Amazon
- By Npino on 05-19-19
By: John Rossman
-
Big Data in Practice
- How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
- By: Bernard Marr
- Narrated by: Piers Hampton
- Length: 7 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data. Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This book fills the knowledge gap by showing how major companies are using big data every day, from an up-close, on-the-ground perspective.
-
-
Good book for managers
- By Capnbody on 01-08-18
By: Bernard Marr
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Artificial Intelligence: 101 Things You Must Know Today About Our Future
- By: Lasse Rouhiainen
- Narrated by: Rodger Paxton
- Length: 8 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence is changing our world faster than we can imagine, and it will impact every area of our lives. And this is happening whether we like it or not. You might have heard that many jobs will be replaced by automation and robots, but did you also know that at the same time a huge number of new jobs will be created by AI? This book covers many fascinating and timely topics related to artificial intelligence, including: self-driving cars, robots, chatbots, and how AI will impact the job market, business processes, and entire industries, just to name a few.
-
-
Completely useless
- By Joe V on 03-29-19
By: Lasse Rouhiainen
-
Hug Your Haters
- How to Embrace Complaints and Keep Your Customers
- By: Jay Baer
- Narrated by: Jay Baer
- Length: 5 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technology has evaporated the barriers of complaint. With smartphones and always-on Internet access, consumers complain more often and across more channels, many of them public. This requires a completely new system for instantly finding, evaluating, and addressing these complaints. Jay Baer and Edison Research conducted a landmark study of more than 2,000 consumers and found that not all complainers ("haters") are created equal.
-
-
Such a waste of time
- By hadi maghsoudi on 03-19-16
By: Jay Baer
-
System Error
- Where Big Tech Went Wrong and How We Can Reboot
- By: Rob Reich, Mehran Sahami, Jeremy M. Weinstein
- Narrated by: Kaleo Griffith
- Length: 11 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In no more than the blink of an eye, a naïve optimism about technology’s liberating potential has given way to a dystopian obsession with biased algorithms, surveillance capitalism, and job-displacing robots. System Error exposes the root of our current predicament - how big tech’s relentless focus on optimization is driving a future that reinforces discrimination, erodes privacy, displaces workers, and pollutes the information we get- and outlines steps we can take to change course, renew our democracy, and save ourselves.
-
-
Excellent on tech. Weak on political speech.
- By Kindle Customer on 11-05-21
By: Rob Reich, and others
-
The Amazon Way: Amazon's 14 Leadership Principles
- By: John Rossman, Tom Alberg - foreword
- Narrated by: Jeff Cummings
- Length: 4 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The 3rd edition of The Amazon Way is one of the rare business leadership books giving actionable insights for innovation and business growth to be the basis for your digital transformation gameplan. The Amazon Way translates Amazon's unique culture and management practices into insights and opportunities, as only an Amazon executive and expert advisor could do for the Amazon Leadership Principles giving listeners one of the essential business leadership books for the digital era.
-
-
Good overview about Amazon
- By MrsSnuggs0512 on 06-05-24
By: John Rossman, and others
-
Technically Wrong
- Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
- By: Sara Wachter-Boettcher
- Narrated by: Andrea Emmes
- Length: 5 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed, or why. It's time we change that. Many of the services we rely on are full of oversights, biases, and downright ethical nightmares. Chatbots that harass women. Signup forms that fail anyone who's not straight. Social media sites that send peppy messages about dead relatives. Algorithms that put more black people behind bars.
-
-
Pretty good but not complete
- By Casey on 10-29-17
-
Human + Machine
- Reimagining Work in the Age of AI
- By: Paul R. Daugherty, H. James Wilson
- Narrated by: Jamie Renell
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
Look around you. Artificial intelligence is no longer just a futuristic notion. It's here right now - in software that senses what we need, supply chains that "think" in real time, and robots that respond to changes in their environment. Twenty-first-century pioneer companies are already using AI to innovate and grow fast. The bottom line is this: Businesses that understand how to harness AI can surge ahead. Those that neglect it will fall behind. Which side are you on?
-
-
A golf course book
- By C. Surdak on 07-30-18
By: Paul R. Daugherty, and others
-
Reality Check
- Outsmarting, Outmanaging, and Outmarketing Your Competition
- By: Guy Kawasaki
- Narrated by: Paul Boehmer
- Length: 14 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Silicon Valley slang, a "bozo explosion" is what causes a lean, mean, fighting machine of a company to slide into mediocrity. As Guy Kawasaki puts it, "If the two most popular words in your company are partner and strategic, and partner has become a verb, and strategic is used to describe decisions and activities that don't make sense"...then it's time for a reality check.
-
-
The Reality of Reality Check
- By Ben on 08-18-09
By: Guy Kawasaki
-
The Art of the Start 2.0
- The Time-Tested, Battle-Hardened Guide for Anyone Starting Anything
- By: Guy Kawasaki
- Narrated by: Paul Boehmer
- Length: 8 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether you're an entrepreneur, an intrapreneur, or a not-for-profit leader, there's no shortage of advice on such topics as writing a business plan, recruiting, raising capital, and branding. In fact there are so many books, articles, and websites that many startups get bogged down to the point of paralysis, or they focus on the wrong priorities and go broke before they discover their mistakes.
-
-
Like a collection of about.com articles
- By Lee on 06-15-15
By: Guy Kawasaki
-
Attacker's Advantage
- Turning Uncertainty into Breakthrough Opportunities
- By: Ram Charan
- Narrated by: Mark Bramhall
- Length: 6 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Attacker's Advantage, Charan reveals the upside of uncertainty for those leaders who are nimbly positioned to anticipate the catalysts of disruption and embrace change. He updates and adapts the principles of his previous best sellers to address the current turbulent business environment, cutting through the veil of complexity to concentrate on the new customer needs and expectations and providing the tools for corporate leaders to take their companies to a higher level.
-
-
Fantastic book - volume lower than usual
- By James Gajewski on 06-14-15
By: Ram Charan
People who viewed this also viewed...
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- By: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, and others
- Narrated by: The Voice Gallery
- Length: 8 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
-
-
A Must for Aspiring Cybersecurity Professionals
- By Chuck S on 02-12-23
By: Dr. Gerald Auger, and others
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- By Jonathan on 11-16-19
By: Roger A. Grimes
-
Dark Territory
- The Secret History of Cyber War
- By: Fred Kaplan
- Narrated by: Malcolm Hillgartner
- Length: 9 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
-
-
Best narrator - Malcolm Hillgartner
- By Greg Davis on 07-20-16
By: Fred Kaplan
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- By: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, and others
- Narrated by: The Voice Gallery
- Length: 8 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
-
-
A Must for Aspiring Cybersecurity Professionals
- By Chuck S on 02-12-23
By: Dr. Gerald Auger, and others
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- By Jonathan on 11-16-19
By: Roger A. Grimes
-
Dark Territory
- The Secret History of Cyber War
- By: Fred Kaplan
- Narrated by: Malcolm Hillgartner
- Length: 9 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
-
-
Best narrator - Malcolm Hillgartner
- By Greg Davis on 07-20-16
By: Fred Kaplan
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- By Customer on 04-22-22
By: Ben Malisow
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever.
-
-
Great book
- By KatieLynn on 10-08-24
By: Joseph Steinberg, and others
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Navigating the Cybersecurity Career Path
- Insider Advice for Navigating from Your First Gig to the C-Suite
- By: Helen Patton
- Narrated by: Leslie Howard
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
By: Helen Patton
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Cybersecurity
- The Insights You Need from Harvard Business Review
- By: Harvard Business Review, Alex Blau, Andrew Burt, and others
- Narrated by: Jonathan Todd Ross
- Length: 2 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone's responsibility, from the boardroom to the break room.
By: Harvard Business Review, and others
What listeners say about The Cybersecurity Playbook
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Carolinian
- 12-16-20
good for non technical, a bit too much filler
Lots of good advice for the non technical. Went outside the topic scope a few times.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!