-
NIST Cybersecurity & Privacy Program and Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More than Ever Before, It's Essential to Keep Your Data Safe from Hackers.
- Narrated by: Tom Brooks
- Length: 2 hrs and 30 mins
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great supplement to the physical book
- By Andrea Christine on 06-08-24
By: Bruce Brown
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 1 hr and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Blockchain: Two Books
- The Complete Edition on the Blockchain Basics, Technology and Its Application in Cryptocurrency and Other Industries That Are Happening Now
- By: Lee Sebastian
- Narrated by: John Flemming
- Length: 3 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Need to learn blockchain quickly? This crash course will get you up to speed on the basics quickly. This two-in-one audiobook bundle covers all important aspects of blockchain and its applications, especially in cryptocurrency.
By: Lee Sebastian
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- By: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrated by: Gwen Bettwy
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- By SMB on 09-21-21
By: Gwen Bettwy, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great supplement to the physical book
- By Andrea Christine on 06-08-24
By: Bruce Brown
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 1 hr and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Blockchain: Two Books
- The Complete Edition on the Blockchain Basics, Technology and Its Application in Cryptocurrency and Other Industries That Are Happening Now
- By: Lee Sebastian
- Narrated by: John Flemming
- Length: 3 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Need to learn blockchain quickly? This crash course will get you up to speed on the basics quickly. This two-in-one audiobook bundle covers all important aspects of blockchain and its applications, especially in cryptocurrency.
By: Lee Sebastian
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- By: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrated by: Gwen Bettwy
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- By SMB on 09-21-21
By: Gwen Bettwy, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- By Cristen Mini on 01-15-24
By: Matthew K. Sharp, and others
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
How to Measure Anything in Cybersecurity Risk
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Patrick Cronin
- Length: 10 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
-
Not appropriate for audio, buy a hard copy instead
- By Wanderer on 01-20-17
By: Douglas W. Hubbard, and others
-
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
- By: Paul Rosenzweig, The Great Courses
- Narrated by: Paul Rosenzweig
- Length: 9 hrs and 41 mins
- Original Recording
-
Overall
-
Performance
-
Story
Cyberspace is the 21st century’s greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.
-
-
A well-packaged set of zero surprises.
- By Todd Algren on 04-24-14
By: Paul Rosenzweig, and others
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
CISSP All-in-One Exam Guide, Ninth Edition
- By: Fernando Maymi, Shon Harris
- Narrated by: Teri Schnaubelt
- Length: 51 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2®. CISSP All-in-One Exam Guide, Ninth Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations.
-
-
I passed and so can you
- By jim weigle on 01-31-24
By: Fernando Maymi, and others
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- By Customer on 04-22-22
By: Ben Malisow
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- By: Murphy Rangel
- Narrated by: Luciano Marin
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
By: Murphy Rangel
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- By: David James Carmack
- Narrated by: Ivan Busenius
- Length: 3 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
Publisher's summary
More than ever, organizations must balance a rapidly evolving cybersecurity threat landscape against the need to fulfill business requirements on an enterprise level. To help them measure and manage their cybersecurity risk in this larger context, NIST has convened stakeholders to develop the NIST cybersecurity framework (CSF), which helps organizations understand their cybersecurity risks (threats, vulnerabilities, and impacts) and how to reduce those risks with customized measures.
Initially intended for US private-sector owners and operators of critical infrastructure, the voluntary framework’s user base has grown dramatically across the nation and globe. The framework integrates industry standards and best practices. It provides a common language that allows staff at all levels within an organization—and at all points in a supply chain—to develop a shared understanding of their cybersecurity risks.
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades.
Cybersecurity experts agree: no one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls, in addition to the usual cybersecurity best practices.
Related to this topic
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Title is the best part of the book
- By Ener Systems on 06-16-19
By: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Big Data in Practice
- How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
- By: Bernard Marr
- Narrated by: Piers Hampton
- Length: 7 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data. Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This book fills the knowledge gap by showing how major companies are using big data every day, from an up-close, on-the-ground perspective.
-
-
Good book for managers
- By Capnbody on 01-08-18
By: Bernard Marr
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
The Women
- A Novel
- By: Kristin Hannah
- Narrated by: Julia Whelan, Kristin Hannah
- Length: 14 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
Women can be heroes. When twenty-year-old nursing student Frances “Frankie” McGrath hears these words, it is a revelation. Raised in the sun-drenched, idyllic world of Southern California and sheltered by her conservative parents, she has always prided herself on doing the right thing. But in 1965, the world is changing, and she suddenly dares to imagine a different future for herself. When her brother ships out to serve in Vietnam, she joins the Army Nurse Corps and follows his path.
-
-
WOW. Just Wow
- By Joanne DeVuono on 02-08-24
By: Kristin Hannah
-
Eruption
- By: Michael Crichton, James Patterson
- Narrated by: Scott Brick
- Length: 10 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Michael Crichton, creator of Jurassic Park, ER, Twister, and Westworld, had a passion project he’d been pursuing for years, ahead of his untimely passing in 2008. Knowing how special it was, his wife, Sherri Crichton, held back his notes and the partial manuscript until she found the right author to complete it: James Patterson, the world’s most popular storyteller.
-
-
I expected a better story
- By Robert Powers on 06-06-24
By: Michael Crichton, and others
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Title is the best part of the book
- By Ener Systems on 06-16-19
By: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Big Data in Practice
- How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
- By: Bernard Marr
- Narrated by: Piers Hampton
- Length: 7 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data. Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This book fills the knowledge gap by showing how major companies are using big data every day, from an up-close, on-the-ground perspective.
-
-
Good book for managers
- By Capnbody on 01-08-18
By: Bernard Marr
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
The Women
- A Novel
- By: Kristin Hannah
- Narrated by: Julia Whelan, Kristin Hannah
- Length: 14 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
Women can be heroes. When twenty-year-old nursing student Frances “Frankie” McGrath hears these words, it is a revelation. Raised in the sun-drenched, idyllic world of Southern California and sheltered by her conservative parents, she has always prided herself on doing the right thing. But in 1965, the world is changing, and she suddenly dares to imagine a different future for herself. When her brother ships out to serve in Vietnam, she joins the Army Nurse Corps and follows his path.
-
-
WOW. Just Wow
- By Joanne DeVuono on 02-08-24
By: Kristin Hannah
-
Eruption
- By: Michael Crichton, James Patterson
- Narrated by: Scott Brick
- Length: 10 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Michael Crichton, creator of Jurassic Park, ER, Twister, and Westworld, had a passion project he’d been pursuing for years, ahead of his untimely passing in 2008. Knowing how special it was, his wife, Sherri Crichton, held back his notes and the partial manuscript until she found the right author to complete it: James Patterson, the world’s most popular storyteller.
-
-
I expected a better story
- By Robert Powers on 06-06-24
By: Michael Crichton, and others
-
You Like It Darker
- Stories
- By: Stephen King
- Narrated by: Will Patton, Stephen King
- Length: 20 hrs and 12 mins
- Unabridged
-
Overall
-
Performance
-
Story
“You like it darker? Fine, so do I,” writes Stephen King in the afterword to this magnificent new collection of twelve stories that delve into the darker part of life—both metaphorical and literal. King has, for half a century, been a master of the form, and these stories, about fate, mortality, luck, and the folds in reality where anything can happen, are as rich and riveting as his novels, both weighty in theme and a huge pleasure to digest.
-
-
What happened to the chapter titles
- By MztCB on 05-25-24
By: Stephen King
-
Mad Love
- By: Wendy Walker
- Narrated by: Julia Whelan, Alexis Bledel, Renée Elise Goldsberry, and others
- Length: 4 hrs and 11 mins
- Original Recording
-
Overall
-
Performance
-
Story
They were madly in love. The perfect couple. That was the story everyone in South River believed...until Gin Talcott and Adam Archer are found shot in their bed. Adam is dead at the scene. Gin is fighting for her life. Detectives Greta Jessup and Finn Pate are assigned to the case. Greta has a long history with Gin’s first husband, Eddie, and is determined to protect his 18-year-old twins. Piper discovered the bodies. Daniel is missing—and so is Adam’s gun.
-
-
Surprised
- By marcie on 05-25-24
By: Wendy Walker
-
Funny Story
- By: Emily Henry
- Narrated by: Julia Whelan
- Length: 11 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Daphne always loved the way her fiancé Peter told their story. How they met (on a blustery day), fell in love (over an errant hat), and moved back to his lakeside hometown to begin their life together. He really was good at telling it…right up until the moment he realized he was actually in love with his childhood best friend Petra.
-
-
Funny Story is a Wonderful Read
- By Cathy Sykora on 04-24-24
By: Emily Henry
-
Atomic Habits
- An Easy & Proven Way to Build Good Habits & Break Bad Ones
- By: James Clear
- Narrated by: James Clear
- Length: 5 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
No matter your goals, Atomic Habits offers a proven framework for improving - every day. James Clear, one of the world's leading experts on habit formation, reveals practical strategies that will teach you exactly how to form good habits, break bad ones, and master the tiny behaviors that lead to remarkable results. If you're having trouble changing your habits, the problem isn't you. The problem is your system. Bad habits repeat themselves again and again not because you don't want to change, but because you have the wrong system for change.
-
-
Author went overboard hawking his site
- By CHughes on 06-25-19
By: James Clear
-
First Lie Wins
- A Novel
- By: Ashley Elston
- Narrated by: Saskia Maarleveld
- Length: 9 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
The identity comes first: Evie Porter. Once she’s given a name and location by her mysterious boss Mr. Smith, she learns everything there is to know about the town and the people in it. Then the mark: Ryan Sumner. The last piece of the puzzle is the job. Evie isn’t privy to Mr. Smith’s real identity, but she knows this job will be different. Ryan has gotten under her skin, and she’s starting to envision a different sort of life for herself. But Evie can’t make any mistakes—especially after what happened last time.
-
-
What’s The lie?
- By Luke Schafer on 01-13-24
By: Ashley Elston
-
The Perfect Son
- By: Freida McFadden
- Narrated by: Suzie Althens, Daniel Thomas May
- Length: 7 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Erika Cass has a perfect family and a perfect life. Until the evening when two detectives show up at her front door. A high school girl has vanished from Erika's quiet suburban neighborhood. The police suspect the worst - murder. And Erika's teenage son, Liam, was the last person to see the girl alive. Erika has always sensed something dark and disturbed in her seemingly perfect older child. She wants to believe he's innocent, but as the evidence mounts, she can't deny the truth - Liam may have done the unthinkable.
-
-
If you love animals give this one a miss!
- By Rachel on 08-18-22
By: Freida McFadden
-
The Accidental Dating Experiment
- By: Lauren Blakely
- Narrated by: Andi Arndt, Jacob Morgan
- Length: 6 hrs and 55 mins
- Original Recording
-
Overall
-
Performance
-
Story
Eight years ago I fell into a secret summer fling with my best friend’s little sister before our lives went in different directions. Now, I’m the grumpy to Juliet’s sunshine on a popular dating podcast we host, and when a wealthy fan gives us a charming coastal cottage as the biggest thank you ever, we head to the town where I grew up to give it a makeover. And find the house has only one bed. Located under a mirrored ceiling.
-
-
The kind of Romance everyone needs in their collection!
- By M. Santos on 04-11-24
By: Lauren Blakely
-
48 Laws of Power
- By: Robert Greene
- Narrated by: Richard Poe
- Length: 23 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Amoral, cunning, ruthless, and instructive, this piercing work distills 3,000 years of the history of power into 48 well-explicated laws. This bold volume outlines the laws of power in their unvarnished essence, synthesizing the philosophies of Machiavelli, Sun Tzu, Carl von Clausewitz, and other infamous strategists. The 48 Laws of Power will fascinate any listener interested in gaining, observing, or defending against ultimate control.
-
-
You don't have to be a psychopath to like this.
- By Gaggleframpf on 02-25-16
By: Robert Greene
-
Just for the Summer
- By: Abby Jimenez
- Narrated by: Christine Lakin, Zachary Webber, Abby Jimenez
- Length: 11 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Justin has a curse, and thanks to a Reddit thread, it's now all over the internet. Every woman he dates goes on to find their soul mate the second they break up. When a woman slides into his DMs with the same problem, they come up with a plan: They'll date each other and break up. Their curses will cancel each other’s out, and they’ll both go on to find the love of their lives. It’s a bonkers idea… and it just might work.
-
-
Good but heavy
- By Maria on 04-04-24
By: Abby Jimenez
-
The Anxious Generation
- How the Great Rewiring of Childhood Is Causing an Epidemic of Mental Illness
- By: Jonathan Haidt
- Narrated by: Sean Pratt, Jonathan Haidt
- Length: 10 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
There is no bigger public health story now than the collapse in youth mental health. The numbers are terrifying and dominate our headlines. There has been much debate over how we got here, and what to do next, and bestselling author and social psychologist Jonathan Haidt is at the white-hot center of that discourse. Haidt has spent his career speaking wisdom and truth into the most difficult landscapes—communities polarized by politics and religion, campuses battling culture wars, and now the perfect storm contributing to a public health emergency for Gen Z.
-
-
Empower parents, Not governments
- By Vance V. Ginn on 04-14-24
By: Jonathan Haidt
-
The Psychology of Money
- Timeless Lessons on Wealth, Greed, and Happiness
- By: Morgan Housel
- Narrated by: Chris Hill
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
Money - investing, personal finance, and business decisions - is typically taught as a math-based field, where data and formulas tell us exactly what to do. But in the real world people don’t make financial decisions on a spreadsheet. They make them at the dinner table, or in a meeting room, where personal history, your own unique view of the world, ego, pride, marketing, and odd incentives are scrambled together. In The Psychology of Money, award-winning author Morgan Housel shares 19 short stories exploring the strange ways people think about money.
-
-
Could be summarized in one sentence
- By Alex on 05-30-21
By: Morgan Housel
-
The Mountain Is You
- Transforming Self-Sabotage into Self-Mastery
- By: Brianna Wiest
- Narrated by: Stacey Glemboski
- Length: 5 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
Coexisting but conflicting needs create self-sabotaging behaviors. This is why we resist efforts to change, often until they feel completely futile. But by extracting crucial insight from our most damaging habits, building emotional intelligence by better understanding our brains and bodies, releasing past experiences at a cellular level, and learning to act as our highest potential future selves, we can step out of our own way and into our potential.
-
-
Underwelming
- By Erin on 04-20-22
By: Brianna Wiest
Love Books? You'll Love Audible.
Transform your day
Replace endless scrolling with endless listening. Chores can be fun.
Listen everywhere
Download titles to listen offline, wherever you are in the world.
Carry your entire Library
Your stories go where you go. Audiobooks don’t weigh a thing.
Listen and learn
Discover stories that can change your mind, your well-being, and your life.
Reach your reading goals
You can’t turn pages while you drive—but you can press play.
Find your niche
WIth thousands of titles to explore, there’s something for everyone.