
Think Like a Hacker
A Sysadmin's Guide to Cybersecurity
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
$0.99/mo for the first 3 months

Buy for $6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Mike Wood
About this listen
Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage.
Learn how advanced attackers break into networks. Understand how attackers use concepts of access and authorization to jump from one computer to the next. Dive into how and why attackers use custom implants and back doors inside an enterprise. Be introduced to the concept of service-centric design - and how it can help improve both security and usability.
To defend against hackers, you must first learn to think like a hacker.
©2017 Michael J. Melone (P)2018 Michael J. MeloneListeners also enjoyed...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Unplugged Alpha
- The No Bullsh*t Guide to Winning with Women & Life
- By: Richard Cooper
- Narrated by: Richard Cooper
- Length: 4 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Men have been conditioned to be the quintessential "nice guy". They're trained to be overly humble, kind to a fault, and that just "being themselves" is enough to attract and keep the woman of their dreams. Men are told to believe that conventional masculinity is toxic and to put women ahead of their own interests, passions, and purpose. This book exposes the comforting lies you've been told throughout your life for what they really are, enabling you to become a truly authentic alpha who chases excellence and leads a successful passion-filled life.
-
-
Great content, unprofessional recording
- By Truth Seeker on 04-07-21
By: Richard Cooper
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Tools of Titans
- The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers
- By: Tim Ferriss
- Narrated by: Ray Porter, Kaleo Griffith, Tim Ferriss, and others
- Length: 22 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The latest groundbreaking tome from Tim Ferriss, the number-one New York Times best-selling author of The 4-Hour Workweek. For the last two years, I've interviewed more than 200 world-class performers for my podcast, The Tim Ferriss Show. The guests range from super celebs (Jamie Foxx, Arnold Schwarzenegger, etc.) and athletes (icons of powerlifting, gymnastics, surfing, etc.) to legendary Special Operations commanders and black-market biochemists. For most of my guests, it’s the first time they’ve agreed to a two-to-three-hour interview.
-
-
If I could sum it up: too much of a good thing
- By Brian Sachetta on 06-08-20
By: Tim Ferriss
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Unplugged Alpha
- The No Bullsh*t Guide to Winning with Women & Life
- By: Richard Cooper
- Narrated by: Richard Cooper
- Length: 4 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Men have been conditioned to be the quintessential "nice guy". They're trained to be overly humble, kind to a fault, and that just "being themselves" is enough to attract and keep the woman of their dreams. Men are told to believe that conventional masculinity is toxic and to put women ahead of their own interests, passions, and purpose. This book exposes the comforting lies you've been told throughout your life for what they really are, enabling you to become a truly authentic alpha who chases excellence and leads a successful passion-filled life.
-
-
Great content, unprofessional recording
- By Truth Seeker on 04-07-21
By: Richard Cooper
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Tools of Titans
- The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers
- By: Tim Ferriss
- Narrated by: Ray Porter, Kaleo Griffith, Tim Ferriss, and others
- Length: 22 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The latest groundbreaking tome from Tim Ferriss, the number-one New York Times best-selling author of The 4-Hour Workweek. For the last two years, I've interviewed more than 200 world-class performers for my podcast, The Tim Ferriss Show. The guests range from super celebs (Jamie Foxx, Arnold Schwarzenegger, etc.) and athletes (icons of powerlifting, gymnastics, surfing, etc.) to legendary Special Operations commanders and black-market biochemists. For most of my guests, it’s the first time they’ve agreed to a two-to-three-hour interview.
-
-
If I could sum it up: too much of a good thing
- By Brian Sachetta on 06-08-20
By: Tim Ferriss
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
How I Rob Banks
- And Other Such Places
- By: FC
- Narrated by: Paul Brion
- Length: 7 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In How I Rob Banks: And Other Such Places, renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. In the book, you'll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes.
-
-
total bum and misleading audio - dont waste your money or time
- By J. Chisholm on 07-03-24
By: FC
-
The Six Pillars of Self-Esteem
- By: Dr. Nathaniel Branden
- Narrated by: Dr. Nathaniel Branden
- Length: 3 hrs and 23 mins
- Abridged
-
Overall
-
Performance
-
Story
Immense in scope and vision and filled with brilliant insights into human nature, this program is the ultimate work on the psychology of self-esteem. Listen and find out the strength Dr. Branden's six pillars will award you.
-
-
Like listening to a psych professor but no help.
- By Leslie, children's author and teacher😊 on 02-14-15
-
Ultralearning
- Master Hard Skills, Outsmart the Competition, and Accelerate Your Career
- By: Scott H. Young
- Narrated by: Scott H. Young
- Length: 7 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Future-proof your career and maximize your competitive advantage by learning the skill necessary to stay relevant, reinvent yourself, and adapt to whatever the workplace throws your way in this essential guide. Scott Young incorporates the latest research about the most effective learning methods and the stories of other ultralearners like himself - among them Ben Franklin, Judit Polgar, and Richard Feynman, as well as a host of others, such as little-known modern polymaths like Nigel Richards who won the World Championship of French Scrabble - without knowing French.
-
-
I Thought I Already Knew Something About Learning
- By Tyler L on 09-08-19
By: Scott H. Young
-
The Pragmatic Programmer: 20th Anniversary Edition, 2nd Edition
- Your Journey to Mastery
- By: David Thomas, Andrew Hunt
- Narrated by: Anna Katarina
- Length: 9 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dave Thomas and Andy Hunt wrote the first edition of this influential book in 1999 to help their clients create better software and rediscover the joy of coding. These lessons have helped a generation of programmers examine the very essence of software development. Now, 20 years later, this new edition re-examines what it means to be a modern programmer. Topics range from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse.
-
-
An excellent and entertaining technical book
- By Amazon Customer on 01-21-20
By: David Thomas, and others
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- By: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrated by: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Length: 12 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- By Silvershopper on 01-18-23
By: Laurent Richard, and others
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Cryptology for Beginners
- #1 Guide for Security, Encryption, Crypto, Algorithms and Python
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 3 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where data flows freely and communication spans the globe, the need for secure and private communication has never been more critical. This book invites you on an illuminating journey into the captivating realm of secure communication, demystifying the intricate techniques that have protected secrets and guarded information for centuries.
-
-
Strongly recommend
- By Anonymous User on 09-05-23
By: Jake T Mills
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- By: Erick Stack
- Narrated by: Clay Bel le Fort
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
By: Erick Stack
What listeners say about Think Like a Hacker
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Erica
- 09-03-18
what can expect from a text book?
typical text book might be more beneficial to read along.
also if this is optional why do I have to o have 15 words?
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Marco Rubio
- 03-21-19
Nicely exposed
An eye opener to new fields, truly insightful and educative to some of us avid learners
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Alejandro Hernandez
- 08-07-18
Short and to the point
Great listen, although short it gets to the main topics. Subject matter is mostly for new listeners on the subject. Experienced listeners won't find new topics that they have not covered elsewhere on the subject
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story
- Amazon Customer
- 04-03-18
A strategic analysis on the digital age...
Cyber warfare is the new threat in a geopolitical environment of uncertainty... this book explains the concepts and mechanism of how and what hackers can do in cyber space.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Wiktor
- 12-23-19
academic handbook
this is one of those books which shouldn't be made as an audiobook. It's form and contents is not suitable for reading out loud. you must be really concentrated to follow. Making an audiobook out of a academic handbook which contains tones of lists, examples and definitions is not a simple task.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
- Andres G.
- 11-08-19
Like reading a vague book on IT Security
the author talks about many complex scenarios that are briefly explained. Seems like a terms and definitions audiobook, ok if this is the first time hearing this info, not at all what I expected.
blah blah blah...
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Matthew E
- 06-20-19
Very basic
I found the book to be very basic and not that helpful. A lot of super basic examples of what hackers use. If you never used a computer or an electronic device, this book will be good for you.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!