- History & Culture (1,574)
Bestsellers
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
This cat-and-mouse story of a vast FBI sting operation reveals how the criminal underworld has become a globalized economy in its own right—one that can't be policed without crossing complicated ethical boundaries.
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
This cat-and-mouse story of a vast FBI sting operation reveals how the criminal underworld has become a globalized economy in its own right—one that can't be policed without crossing complicated ethical boundaries.
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- By: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
-
-
You sort of knew it already…
- By Leigh Munsil on 05-08-24
By: Byron Tau
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
By: Joseph Steinberg, and others
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles....
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- By: Jennifer Bleam
- Narrated by: Jennifer Bleam
- Length: 2 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
-
-
The insight and approach Jennifer provided on cybersecurity sales and marketing.
- By Amazon Customer on 02-10-24
By: Jennifer Bleam
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us....
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
CompTIA CASP+ Certification
- The Ultimate Study Guide to Master the Advanced Security Practitioner Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unravel the intricate layers of modern cybersecurity with the comprehensive guide to the CompTIA CASP+ Certification Advanced Security Practitioner. Dive into the depths of this dynamic field as this book becomes your companion in mastering the multifaceted world of digital defense....
-
-
A cybersecurity odyssey! 🌈
- By Jaylen Hulu on 03-10-24
By: Jake T Mills
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- By: Taimur Ijlal
- Narrated by: Scott Mandeville
- Length: 4 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals.
By: Taimur Ijlal
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity....
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Too Much Political Bias
- By Dreux on 02-18-23
By: Bruce Schneier
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively.
-
-
Comprehensive and Accessible Cybersecurity Guide
- By Robert Brown on 05-24-24
By: L.D. Knowings
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
-
-
WHY read out entire URLs?!
- By pinkington on 05-30-24
By: Mike Chapple, and others
-
Gray Day
- My Undercover Mission to Expose America's First Cyber Spy
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy....
-
-
A Real Spy Story
- By Darren Sapp on 04-06-19
By: Eric O'Neill
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs....
-
-
Bland
- By Jonathan on 09-01-21
-
Scam Me If You Can
- Simple Strategies to Outsmart Today's Rip-off Artists
- By: Frank Abagnale
- Narrated by: Jason Culp
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you at risk of being scammed? Former con artist and best-selling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks....
-
-
Very basic, full with scary stories, but little actionable information
- By EI on 10-18-19
By: Frank Abagnale
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
-
-
This is it!
- By Marcus on 10-18-23
By: Glen D. Singh
-
Simple CISSP
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 16 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
Simple CISSP has been intentionally kept as brief as possible without the "fluff" many other tomes include....
-
-
OK, as a compendium with other sources
- By Greg Turner on 08-12-17
By: Phil Martin
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back....
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
New releases
-
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
- By: Omar Santos, Samer Salam, Hazim Dahir
- Narrated by: Phil Schoen
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.
By: Omar Santos, and others
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- By: Robert L Cogmon, Robert L. Cogmon
- Narrated by: Dalan Decker
- Length: 2 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks. Characters such as Deja Digital serve as examples of the value of technical know-how and inventiveness in building defenses against cyberattacks.
By: Robert L Cogmon, and others
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- By: Bruce Brown
- Narrated by: Kim Pepper
- Length: 3 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
By: Bruce Brown
-
Securing the CI/CD Pipeline
- Best Practices for DevSecOps
- By: Sai Sravan Cherukuri
- Narrated by: Tyler Nissen
- Length: 4 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
"SECURING THE CI/CD PIPELINE: Best Practices for DevSecOps" is a comprehensive guide that integrates security into Continuous Integration and Continuous Deployment (CI/CD) pipelines. Essential for anyone in modern software development, it emphasizes balancing speed and security.
-
Data Privacy Across Borders
- Crafting Corporate Strategies
- By: Lambert Hogenhout, Amanda Wang
- Narrated by: Virtual Voice
- Length: 4 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Apply a step-by-step approach to develop your organization’s global data privacy strategy. Data is everywhere. Organizations continuously use data in new ways, often generating cross-border data flows. At the same time, concern about the use of personal data is growing. Every year, more countries adopt data privacy laws and our expectations increase on how companies respect our private data. A data privacy strategy is no longer just about compliance—it is good business. A clear and effective data privacy program can build customer trust and strengthen a brand’s reputation. We cover ...
By: Lambert Hogenhout, and others
-
Crimes Against Data
- 101 true crime stories of people abusing and misusing data
- By: Merrill Albert
- Narrated by: Virtual Voice
- Length: 3 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Read true crime stories of people abusing and misusing data. Just because there’s data doesn’t necessarily mean it’s the right data or people are using it properly. And as the saying goes, those who do not learn history are doomed to repeat it. Documenting and understanding these stories can prevent them from happening again. Through a career in data, Merrill sees data problems (data crimes) caused by people treating data improperly. Recognizing data crimes is the first step in getting a resolution. This book details incidents of data crimes and their impact. Although not the person ...
By: Merrill Albert
-
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
- By: Omar Santos, Samer Salam, Hazim Dahir
- Narrated by: Phil Schoen
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.
By: Omar Santos, and others
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- By: Robert L Cogmon, Robert L. Cogmon
- Narrated by: Dalan Decker
- Length: 2 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks. Characters such as Deja Digital serve as examples of the value of technical know-how and inventiveness in building defenses against cyberattacks.
By: Robert L Cogmon, and others
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- By: Bruce Brown
- Narrated by: Kim Pepper
- Length: 3 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
By: Bruce Brown
-
Securing the CI/CD Pipeline
- Best Practices for DevSecOps
- By: Sai Sravan Cherukuri
- Narrated by: Tyler Nissen
- Length: 4 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
"SECURING THE CI/CD PIPELINE: Best Practices for DevSecOps" is a comprehensive guide that integrates security into Continuous Integration and Continuous Deployment (CI/CD) pipelines. Essential for anyone in modern software development, it emphasizes balancing speed and security.
-
Data Privacy Across Borders
- Crafting Corporate Strategies
- By: Lambert Hogenhout, Amanda Wang
- Narrated by: Virtual Voice
- Length: 4 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Apply a step-by-step approach to develop your organization’s global data privacy strategy. Data is everywhere. Organizations continuously use data in new ways, often generating cross-border data flows. At the same time, concern about the use of personal data is growing. Every year, more countries adopt data privacy laws and our expectations increase on how companies respect our private data. A data privacy strategy is no longer just about compliance—it is good business. A clear and effective data privacy program can build customer trust and strengthen a brand’s reputation. We cover ...
By: Lambert Hogenhout, and others
-
Crimes Against Data
- 101 true crime stories of people abusing and misusing data
- By: Merrill Albert
- Narrated by: Virtual Voice
- Length: 3 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Read true crime stories of people abusing and misusing data. Just because there’s data doesn’t necessarily mean it’s the right data or people are using it properly. And as the saying goes, those who do not learn history are doomed to repeat it. Documenting and understanding these stories can prevent them from happening again. Through a career in data, Merrill sees data problems (data crimes) caused by people treating data improperly. Recognizing data crimes is the first step in getting a resolution. This book details incidents of data crimes and their impact. Although not the person ...
By: Merrill Albert
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- By: Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrated by: Rebecca Lam
- Length: 13 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
By: Jon R. Lindsay - editor, and others
-
Hacker Mindset
- Psychological Tactics and Strategies for Mastering Social Engineering
- By: Josh Luberisse
- Narrated by: Virtual Voice
- Length: 5 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Hacker Mindset: Psychological Tactics and Strategies for Mastering Social Engineering" is an authoritative and comprehensive guide that delves deep into the psychology of cyber attackers and equips cybersecurity professionals with the knowledge and tools to defend against social engineering attacks. This essential resource offers a unique blend of psychological insights and practical cybersecurity strategies, making it an invaluable asset for red teamers, ethical hackers, and security professionals seeking to enhance their skills and protect critical systems and assets. With a focus on ...
By: Josh Luberisse
-
Cloud Computing: Risks and Rewards
- An In-Depth Guide to the Advantages and Disadvantages of Cloud Computing
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 1 hr and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing the ultimate guide to Cloud Computing, the eBook that will revolutionize the way you think about technology! With chapters ranging from an introduction to cloud computing all the way to future trends and data sovereignty, this essential guidebook covers everything you need to know about the cloud. In Chapter 2, you'll delve into the evolution of this game-changing technology, while Chapter 3 offers a comprehensive understanding of the various types of cloud computing. Chapters 4 and 5 examine the benefits and drawbacks of adopting cloud computing, ensuring you're fully informed ...
By: Barrett Williams, and others
-
Cyberspace Guardians
- A Comprehensive Guide for Choosing the Right CISO
- By: Dr. Sylvester Cotton
- Narrated by: Chris Walsh
- Length: 2 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the intriguing world of digital defense with Dr. Sylvester “Sly” Cotton’s masterpiece, “Cyberspace Guardians.” In an era dominated by an intricate web of technology, Dr. Cotton unravels the mysteries of safeguarding the vast realm of cyberspace. This book is your guiding light in the quest to understand the role of a Chief Information Security Officer (CISO), the sentinel of our digital universes. The labyrinth of cyberspace is riddled with unseen dangers, lurking shadows, and unseen adversaries seeking to undermine our technological advancements.
-
The Art of the Steal
- How to Protect Yourself and Your Business from Fraud, America's #1 Crime
- By: Frank W. Abagnale
- Narrated by: Barrett Whitener
- Length: 8 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Catch Me if You Can, Frank W. Abagnale recounted his youthful career as a master imposter and forger. In The Art of the Steal, Abagnale tells the remarkable story of how he parlayed his knowledge of cons and scams into a successful career as a consultant on preventing financial foul play—while showing you how to identify and outsmart perpetrators of fraud.
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
-
Comprehensive and Accessible Cybersecurity Guide
- By Robert Brown on 05-24-24
By: L.D. Knowings
-
Modern Scams & Scammers
- Shielding Yourself: Navigating and Defending Against Modern Day Scams
- By: S C
- Narrated by: Virtual Voice
- Length: 1 hr and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Book Description: "Modern Scams $ Scammers: Shielding Yourself: Navigating and Defending Against Modern Day Scams" In an era where deceit is just a click away, "Modern Scams $ Scammers Shielding Yourself: Navigating and Defending Against Modern Scams" emerges as an essential guide to safeguard your financial and personal security. This comprehensive book dives deep into the murky waters of scams, offering a clear and authoritative exploration of the various tactics used by scammers and providing actionable advice on how to protect yourself. Whether you're a senior trying to navigate the ...
By: S C
-
Conversations in Communication: Volume 3
- Technology and Cybersecurity: How They Protect and Shape an Organization
- By: Philip Weinholtz
- Narrated by: Virtual Voice
- Length: 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
A technology and cybersecurity handbook. Today's organizations are experiencing a major change in the way they work and think. Interconnectivity requires individuals who are responsible for network and system administration to be proactive in their assessment of security concerns. Technology and Cybersecurity: How They Protect and Shape an Organization is the 3rd Volume in the Conversations in Communication series. It is a technology and cybersecurity handbook dedicated to analyzing and assessing the best options for organizations to secure their intellectual property.
By: Philip Weinholtz
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- By: Aram Sinnreich, Jesse Gilbert
- Narrated by: Jonathan Todd Ross
- Length: 11 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.
-
-
Tackles Daunting Subject with Aplomb and Elan
- By Phil Dejean on 05-23-24
By: Aram Sinnreich, and others
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- By: Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrated by: Rich Boniface
- Length: 15 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
By: Eugene H. Spafford, and others
-
Cybersecurity for Kittens
- A Purr-fect Guide to Staying Safe Online
- By: Jean-Jacques Reibel
- Narrated by: Virtual Voice
- Length: 1 hr and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Cybersecurity for Kittens: A Purr-fect Guide to Staying Safe Online" is an adorable and informative guide designed to teach young kittens—the future savvy cats of the digital world—how to navigate and secure their online lives. Through engaging and kitten-friendly language, the book covers the basics of cybersecurity, from understanding the cyber jungle to protecting one's digital paw prints. Each chapter explores different cybersecurity threats such as phishing, malware, and the nuances of social engineering, with playful analogies to help little learners grasp complex concepts. The ...
-
Cybersecurity Governance and Compliance
- A Comprehensive Guide for Professionals in Effective Cybersecurity Governance and Compliance
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 3 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Immerse yourself in the rapidly evolving landscape of "Cybersecurity Governance and Compliance." This comprehensive new eBook guides you into the intricate world of cybersecurity, from governance models to compliance regulations, offering deep insights and practical advice. The book begins by covering significant aspects of cybersecurity governance. It expands on various models, their significance, and the specific challenges involved. Subsequently, it spotlights the key players in cybersecurity governance, highlighting the roles of governments, private sectors, and non-profit organizations...
By: Barrett Williams, and others