- History & Culture (1,556)
Bestsellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Gray Day
- My Undercover Mission to Expose America's First Cyber Spy
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy....
-
-
A Real Spy Story
- By Darren Sapp on 04-06-19
By: Eric O'Neill
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Gray Day
- My Undercover Mission to Expose America's First Cyber Spy
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy....
-
-
A Real Spy Story
- By Darren Sapp on 04-06-19
By: Eric O'Neill
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- By: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
-
-
Up to date in an information tsunami world
- By Mark A Vega on 04-23-24
By: Byron Tau
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
By: Mike Chapple, and others
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
By: Joseph Steinberg, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles....
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity....
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Too Much Political Bias
- By Dreux on 02-18-23
By: Bruce Schneier
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
-
-
This is it!
- By Marcus on 10-18-23
By: Glen D. Singh
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
Hacking for Beginners
- A Step-by-Step Guide to Learn How to Hack Websites, Smartphones, Wireless Networks, Work with Social Engineering, Complete a Penetration Test, and Keep Your Computer Safe
- By: Julian James McKinnon
- Narrated by: Ivan Busenius
- Length: 3 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This guidebook is going to spend some time taking a look at the world of hacking and some of the great techniques that come with this type of process as well....
-
-
Insights are unique and turn me perceive deeply
- By Chasidy on 12-30-19
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 9 hrs
- Unabridged
-
Overall
-
Performance
-
Story
This cat-and-mouse story of a vast FBI sting operation reveals how the criminal underworld has become a globalized economy in its own right—one that can't be policed without crossing complicated ethical boundaries....
By: Joseph Cox
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- By: Jake T. Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies....
-
-
Very basic, not helpful for testing
- By Michael R. Young on 03-02-24
By: Jake T. Mills
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification.
-
-
Gratitude and Admiration
- By Frank on 04-18-24
By: Jamie Murphy
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom.
By: Eugene H. Spafford, and others
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing....
-
-
Case Studies and Practical Application
- By Anonymous User on 12-24-23
By: Jake T Mills
-
Dollars, Gold, and Bitcoin
- The Fed's Hidden Agenda and How to Profit from It
- By: John S. Pennington Jr.
- Narrated by: John S. Pennington Jr.
- Length: 6 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
There’s a secret war going on for the future of money. The United States government—as it has for generations—is winning. And you can too....
-
-
Thought Provoking and Inspiring
- By Olivia on 04-17-24
-
Scam Me If You Can
- Simple Strategies to Outsmart Today's Rip-off Artists
- By: Frank Abagnale
- Narrated by: Jason Culp
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you at risk of being scammed? Former con artist and best-selling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks....
-
-
Very basic, full with scary stories, but little actionable information
- By EI on 10-18-19
By: Frank Abagnale
-
Docker in Action
- By: Jeff Nickoloff
- Narrated by: Aiden Humphreys
- Length: 10 hrs and 12 mins
- Unabridged
-
Overall
-
Performance
-
Story
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After an explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications....
-
-
Thank you!
- By Anonymous on 01-21-23
By: Jeff Nickoloff
New releases
-
Modern Scams & Scammers
- Shielding Yourself: Navigating and Defending Against Modern Day Scams
- By: S C
- Narrated by: Virtual Voice
- Length: 1 hr and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Book Description: "Modern Scams $ Scammers: Shielding Yourself: Navigating and Defending Against Modern Day Scams" In an era where deceit is just a click away, "Modern Scams $ Scammers Shielding Yourself: Navigating and Defending Against Modern Scams" emerges as an essential guide to safeguard your financial and personal security. This comprehensive book dives deep into the murky waters of scams, offering a clear and authoritative exploration of the various tactics used by scammers and providing actionable advice on how to protect yourself. Whether you're a senior trying to navigate the ...
By: S C
-
Conversations in Communication: Volume 3
- Technology and Cybersecurity: How They Protect and Shape an Organization
- By: Philip Weinholtz
- Narrated by: Virtual Voice
- Length: 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
A technology and cybersecurity handbook. Today's organizations are experiencing a major change in the way they work and think. Interconnectivity requires individuals who are responsible for network and system administration to be proactive in their assessment of security concerns. Technology and Cybersecurity: How They Protect and Shape an Organization is the 3rd Volume in the Conversations in Communication series. It is a technology and cybersecurity handbook dedicated to analyzing and assessing the best options for organizations to secure their intellectual property.
By: Philip Weinholtz
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- By: Aram Sinnreich, Jesse Gilbert
- Narrated by: Jonathan Todd Ross
- Length: 11 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.
By: Aram Sinnreich, and others
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
By: Eugene H. Spafford, and others
-
Cybersecurity for Kittens
- A Purr-fect Guide to Staying Safe Online
- By: Jean-Jacques Reibel
- Narrated by: Virtual Voice
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Cybersecurity for Kittens: A Purr-fect Guide to Staying Safe Online" is an adorable and informative guide designed to teach young kittens—the future savvy cats of the digital world—how to navigate and secure their online lives. Through engaging and kitten-friendly language, the book covers the basics of cybersecurity, from understanding the cyber jungle to protecting one's digital paw prints. Each chapter explores different cybersecurity threats such as phishing, malware, and the nuances of social engineering, with playful analogies to help little learners grasp complex concepts. The ...
-
Inside the Dark Web
- A Comprehensive Guide to Its Mechanics and Risks
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 1 hr and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
Step into the mysterious and elusive realm of "Inside the Dark Web," an eye-opening eBook that sheds light on the lesser-known and often misunderstood corners of the digital world. This captivating and informative journey will take you through the many layers of the internet, as you unravel the secrets of the Surface Web, Deep Web, and Dark Web, and plunge into the world of hidden .onion websites. Discover the intricacies of navigating the Dark Web through the TOR Network, where anonymity and privacy reign supreme. Learn the vital role Virtual Private Networks (VPNs) play in securing your ...
By: Barrett Williams, and others
-
Modern Scams & Scammers
- Shielding Yourself: Navigating and Defending Against Modern Day Scams
- By: S C
- Narrated by: Virtual Voice
- Length: 1 hr and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Book Description: "Modern Scams $ Scammers: Shielding Yourself: Navigating and Defending Against Modern Day Scams" In an era where deceit is just a click away, "Modern Scams $ Scammers Shielding Yourself: Navigating and Defending Against Modern Scams" emerges as an essential guide to safeguard your financial and personal security. This comprehensive book dives deep into the murky waters of scams, offering a clear and authoritative exploration of the various tactics used by scammers and providing actionable advice on how to protect yourself. Whether you're a senior trying to navigate the ...
By: S C
-
Conversations in Communication: Volume 3
- Technology and Cybersecurity: How They Protect and Shape an Organization
- By: Philip Weinholtz
- Narrated by: Virtual Voice
- Length: 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
A technology and cybersecurity handbook. Today's organizations are experiencing a major change in the way they work and think. Interconnectivity requires individuals who are responsible for network and system administration to be proactive in their assessment of security concerns. Technology and Cybersecurity: How They Protect and Shape an Organization is the 3rd Volume in the Conversations in Communication series. It is a technology and cybersecurity handbook dedicated to analyzing and assessing the best options for organizations to secure their intellectual property.
By: Philip Weinholtz
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- By: Aram Sinnreich, Jesse Gilbert
- Narrated by: Jonathan Todd Ross
- Length: 11 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.
By: Aram Sinnreich, and others
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
By: Eugene H. Spafford, and others
-
Cybersecurity for Kittens
- A Purr-fect Guide to Staying Safe Online
- By: Jean-Jacques Reibel
- Narrated by: Virtual Voice
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Cybersecurity for Kittens: A Purr-fect Guide to Staying Safe Online" is an adorable and informative guide designed to teach young kittens—the future savvy cats of the digital world—how to navigate and secure their online lives. Through engaging and kitten-friendly language, the book covers the basics of cybersecurity, from understanding the cyber jungle to protecting one's digital paw prints. Each chapter explores different cybersecurity threats such as phishing, malware, and the nuances of social engineering, with playful analogies to help little learners grasp complex concepts. The ...
-
Inside the Dark Web
- A Comprehensive Guide to Its Mechanics and Risks
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 1 hr and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
Step into the mysterious and elusive realm of "Inside the Dark Web," an eye-opening eBook that sheds light on the lesser-known and often misunderstood corners of the digital world. This captivating and informative journey will take you through the many layers of the internet, as you unravel the secrets of the Surface Web, Deep Web, and Dark Web, and plunge into the world of hidden .onion websites. Discover the intricacies of navigating the Dark Web through the TOR Network, where anonymity and privacy reign supreme. Learn the vital role Virtual Private Networks (VPNs) play in securing your ...
By: Barrett Williams, and others
-
Cyber Warriors
- Unveiling the Secret Heroes Safeguarding Our Nation in the Digital Battlefield
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Step into the future of warfare with 'Cyber Warriors', a detailed and insightful guide that unravels the enigmatic world of cyber warfare and its worldwide implications. This compelling narrative acquaints you with the new face of warfare that has transitioned from the physical battlefield into the digital spaces shaping our lives today. Dive deep into realms of cyberspace, where emerging enemies lurk in the shadows. These non-state actors and cyber criminals pose a novel variety of threats to nations, corporations, and individuals alike. 'Cyber Warriors' uncovers the wide-reaching impact ...
By: Barrett Williams, and others
-
The Art of Crypto Risk Management
- Maximizing Returns while Minimizing Risks
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 4 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Venture into the exhilarating world of cryptocurrency with "The Art of Crypto Risk Management" - your ultimate guide to navigating the volatile yet intriguing landscape of digital currency trading. Welcome to this enriching exploration of cryptocurrency! Starting from the basics of blockchain technology, the book delves into the wide variety of cryptocurrencies, providing ground-level insight into emerging digital monetary systems. Are you intrigued by the idea of crypto investment but deterred by its notorious volatility? This guide unveils the oft-unseen aspect of risk management, helping...
By: Barrett Williams, and others
-
Cybersecurity Governance and Compliance
- A Comprehensive Guide for Professionals in Effective Cybersecurity Governance and Compliance
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Immerse yourself in the rapidly evolving landscape of "Cybersecurity Governance and Compliance." This comprehensive new eBook guides you into the intricate world of cybersecurity, from governance models to compliance regulations, offering deep insights and practical advice. The book begins by covering significant aspects of cybersecurity governance. It expands on various models, their significance, and the specific challenges involved. Subsequently, it spotlights the key players in cybersecurity governance, highlighting the roles of governments, private sectors, and non-profit organizations...
By: Barrett Williams, and others
-
Cryptocurrency Market Mastery
- A Guide to Navigating the Bull and Bear Markets in the CryptoVerse
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Welcome to the illuminating universe of 'Cryptocurrency Market Mastery,' a guide that ushers you into the dynamic world of cryptocurrency with precision and clarity. If you are peering towards the enigmatic vocabulary of the crypto-marketplace, anticipate a clear comprehension of 'Cryptocurrency Basics,' while exploring the orbits of top cryptocurrencies. The eBook dives into the mystical landscape of the 'Cryptocurrency Market,' elucidating concepts like Market Capitalization and underscoring the role of trading volume. Here's where rhetoric meets reality, as you get acquainted with the ...
By: Barrett Williams, and others
-
Mastering Ethical Hacking
- Unleash Your Defensive Skills in the World of Ethical Hacking
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 5 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing your go-to guide in the world of cybersecurity, "Mastering Ethical Hacking." This comprehensive, exciting, and instructive eBook takes you on a journey into the intriguing universe of ethical hacking. It aims to empower you with the knowledge and techniques to protect and secure virtual environments from the darker corners of the cyber world. There's an increasing need for ethical hackers in today's digital age, and this high-value guide introduces you to the fascinating world of ethical hacking and cybersecurity. Starting with a detailed understanding of the importance and role...
By: Barrett Williams, and others
-
Secure Strides
- Enhancing Security through In-depth Assessment
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
Strap in for a page-turning journey into the realm of cyber protection and security systems with "Secure Strides!" Every inch of this comprehensive guide offers enlightening information about the intricate tapestry that constitutes the world of penetration testing and cybersecurity. Embark with us from Chapter One, delving into the captivating introduction to Penetration Testing and distinguishing between ethical hacking and penetration testing, leaving no stone unturned when it comes to a comprehensive understanding of the topic. Chapter Two enlightens eager minds about system ...
By: Barrett Williams, and others
-
Bitcoin Brilliance
- A Comprehensive Guide to Understanding the World's First and Most Influential Cryptocurrency
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Embark on an enlightening journey to the world of cryptocurrencies with our new eBook, "Bitcoin Brilliance." This comprehensive guide invites you to take a deep dive into the mysteries and marvels of the revolutionary digital currency, Bitcoin – the vanguard of a financial era. Opening with an introduction to Bitcoin, you’ll learn about its emergence and historical significance. Bitcoin is more than just a passing trend. Understanding the nuances of cryptocurrency becomes easier as we examine, in simple terms, its fundamental concept and draw comparisons with traditional currencies. ...
By: Barrett Williams, and others
-
Defending the Digital Domain
- Navigating the Complexities of Risk Management in Cybersecurity
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the depths of cybersecurity with the exciting new eBook, "Defending the Digital Domain." This insightful read doesn't just skim the surface of digital defense but shatter layers and layers of erudition, fueling your mind with comprehensive know-how of cybersecurity. The eBook is segmented into ten captivating chapters, each dedicated to an aspect of cybersecurity risk management that equips you with understanding and articulately presents necessary information. From an introduction to this vast field, looming cyber threats, to the in-depth analysis of risk management principles, ...
By: Barrett Williams, and others
-
Defending Data in Virtual Environments
- Exploring the Importance of Secure Cloud Computing
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 4 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Welcome to the world of "Defending Data in Virtual Environments" - a guide that enhances your understanding of data security in the cloud computing landscape. This insightful eBook promises to be a game-changer for those seeking to navigate the complex topography of cloud security. In the first few chapters, we dive deep into the basics of cloud computing, helping you to understand the key concepts, benefits, and varied models of cloud services. The narrative progresses to include the fundamental and pivotal aspects of cloud security, followed by an in-depth discussion on threats, ...
By: Barrett Williams, and others
-
Fortified Web
- A comprehensive guide to web application security and protection strategies
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 4 hrs and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
Welcome to a world where cyber threats are evolving every day and web security is more significant than ever. Embark on a journey with the new eBook, "Fortified Web." Dive into an in-depth exploration of web application security, cyber attacks, and prolific preventive strategies, divided into 15 captivating chapters. Looking to understand why web applications often fall prey to cyber threats? Chapter 3 is a goldmine, with its meticulously designed sections, ranging from software interaction with cybersecurity to securing the boundaries of web applications. Want to understand protection ...
By: Barrett Williams, and others
-
Altcoins and the Cryptocurrency Ecosystem
- Unlocking the Potential Beyond Bitcoin
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
Prepare to be immersed in the captivating world of Altcoins with the release of the must-read eBook, 'Altcoins and the Cryptocurrency Ecosystem'. Exploring the captivating universe that lies beyond Bitcoin, this resounding new publication is an illuminating guide through the evolving dimensions of alternative digital currencies. Right from the introduction of Altcoins to the speculation of their future, this book takes you on a thrilling journey into the depths of the Cryptocurrency Ecosystem. Discover the genealogy of Altcoins; from their origins as First Generation Altcoins trailing all ...
By: Barrett Williams, and others
-
Decentralized Identities
- Exploring Blockchain Solutions for Secure Authentication
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 2 hrs and 12 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unlock the transformative potential of Blockchain and Digital Identity with the ground-breaking eBook, "Decentralized Identities." This book serves as a comprehensive guide for both enthusiasts and skeptics alike, delving deep into the fundamentals of digital identity and the principles driving Blockchain. Chapter 1 introduces you to the world of digital identity and blockchain. Chapter 2 then chronicles the fascinating evolution from traditional identity verification towards a digital approach – a shift that's capturing global attention. Chapter 3 delves into the mechanics of Blockchain,...
By: Barrett Williams, and others