-
Cybersecurity Incident & Vulnerability Response Playbooks
- Narrado por: Tom Brooks
- Duración: 2 h y 23 m
Failed to add items
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Compra ahora por US$6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Los oyentes también disfrutaron...
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- De: Recorded Future
- Narrado por: Chris Pace
- Duración: 2 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
-
Basic information for starters
- De SUNIL VARKEY en 03-11-19
De: Recorded Future
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- De: Jamie Murphy
- Narrado por: Tom Brooks
- Duración: 3 h y 43 m
- Versión completa
-
General
-
Narración:
-
Historia
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Evaluate your preparedness
- De Anonymous User en 09-28-23
De: Jamie Murphy
-
Microsoft Certified Azure Administrator
- The Ultimate Guide to Practice Test Questions, Answers, and Master the Associate Exam
- De: Jamie Murphy
- Narrado por: Tom Brooks
- Duración: 5 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Whether you're an Azure enthusiast aiming to validate your skills or an IT professional seeking to enhance your career prospects, this book will empower you to become a certified Azure Administrator Associate. With a solid grasp of Azure's key principles and hands-on expertise, you'll be well-prepared to meet the growing demand for Azure administrators in today's competitive job market. Start your journey to certification success today.
-
-
Aspiring
- De Anonymous User en 11-27-23
De: Jamie Murphy
-
Cryptology for Beginners
- #1 Guide for Security, Encryption, Crypto, Algorithms and Python
- De: Jake T Mills
- Narrado por: Tom Brooks
- Duración: 3 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In a world where data flows freely and communication spans the globe, the need for secure and private communication has never been more critical. This book invites you on an illuminating journey into the captivating realm of secure communication, demystifying the intricate techniques that have protected secrets and guarded information for centuries.
-
-
Strongly recommend
- De Anonymous User en 09-05-23
De: Jake T Mills
-
How to Measure Anything in Cybersecurity Risk
- De: Douglas W. Hubbard, Richard Seiersen
- Narrado por: Patrick Cronin
- Duración: 10 h y 21 m
- Versión completa
-
General
-
Narración:
-
Historia
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
-
Not appropriate for audio, buy a hard copy instead
- De Wanderer en 01-20-17
De: Douglas W. Hubbard, y otros
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
solid advice
- De Dan Casebolt en 12-12-23
De: Rick Howard
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- De: Recorded Future
- Narrado por: Chris Pace
- Duración: 2 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
-
Basic information for starters
- De SUNIL VARKEY en 03-11-19
De: Recorded Future
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- De: Jamie Murphy
- Narrado por: Tom Brooks
- Duración: 3 h y 43 m
- Versión completa
-
General
-
Narración:
-
Historia
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Evaluate your preparedness
- De Anonymous User en 09-28-23
De: Jamie Murphy
-
Microsoft Certified Azure Administrator
- The Ultimate Guide to Practice Test Questions, Answers, and Master the Associate Exam
- De: Jamie Murphy
- Narrado por: Tom Brooks
- Duración: 5 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Whether you're an Azure enthusiast aiming to validate your skills or an IT professional seeking to enhance your career prospects, this book will empower you to become a certified Azure Administrator Associate. With a solid grasp of Azure's key principles and hands-on expertise, you'll be well-prepared to meet the growing demand for Azure administrators in today's competitive job market. Start your journey to certification success today.
-
-
Aspiring
- De Anonymous User en 11-27-23
De: Jamie Murphy
-
Cryptology for Beginners
- #1 Guide for Security, Encryption, Crypto, Algorithms and Python
- De: Jake T Mills
- Narrado por: Tom Brooks
- Duración: 3 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In a world where data flows freely and communication spans the globe, the need for secure and private communication has never been more critical. This book invites you on an illuminating journey into the captivating realm of secure communication, demystifying the intricate techniques that have protected secrets and guarded information for centuries.
-
-
Strongly recommend
- De Anonymous User en 09-05-23
De: Jake T Mills
-
How to Measure Anything in Cybersecurity Risk
- De: Douglas W. Hubbard, Richard Seiersen
- Narrado por: Patrick Cronin
- Duración: 10 h y 21 m
- Versión completa
-
General
-
Narración:
-
Historia
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
-
Not appropriate for audio, buy a hard copy instead
- De Wanderer en 01-20-17
De: Douglas W. Hubbard, y otros
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
solid advice
- De Dan Casebolt en 12-12-23
De: Rick Howard
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
This is it!
- De Marcus en 10-18-23
De: Glen D. Singh
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- De Cristen Mini en 01-15-24
De: Matthew K. Sharp, y otros
-
Cybersecurity Essentials
- De: Charles J. Brooks, Christopher Grow, Philip Craig, y otros
- Narrado por: Ryan Burke
- Duración: 17 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- De Kassandra Clauser en 06-07-19
De: Charles J. Brooks, y otros
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- De: Quinn Kiser
- Narrado por: Ivan Busenius
- Duración: 7 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- De Scott Redfern en 10-01-21
De: Quinn Kiser
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- De: Bruce Brown
- Narrado por: Frank Block
- Duración: 1 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great
- De josh en 02-13-24
De: Bruce Brown
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- De: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, y otros
- Narrado por: The Voice Gallery
- Duración: 8 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
-
-
A Must for Aspiring Cybersecurity Professionals
- De Chuck S en 02-12-23
De: Dr. Gerald Auger, y otros
-
Navigating the Cybersecurity Career Path
- Insider Advice for Navigating from Your First Gig to the C-Suite
- De: Helen Patton
- Narrado por: Leslie Howard
- Duración: 7 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
De: Helen Patton
Resumen del Editor
The Cybersecurity and Infrastructure Security Agency (CISA) is committed to leading the response to cybersecurity incidents and vulnerabilities to safeguard the nation's critical assets. Section 6 of Executive Order 14028 directed DHS, via CISA, to “develop a standard set of operational procedures (playbook) to be used in planning and conducting cybersecurity vulnerability and incident response activity respecting Federal Civilian Executive Branch (FCEB) Information Systems.
Overview: This document presents two playbooks, one for incident response and one for vulnerability response. These playbooks provide FCEB agencies with a standard set of procedures to identify, coordinate, remediate, recover, and track successful mitigations from incidents and vulnerabilities affecting FCEB systems, data, and networks. In addition, future iterations of these playbooks may be useful for organizations outside of the FCEB to standardize incident response practices.
Working together across all federal government organizations has proven to be an effective model for addressing vulnerabilities and incidents.
Building on lessons learned from previous incidents and incorporating industry best practices, CISA intends for these playbooks to evolve the federal government’s practices for cybersecurity response through standardizing shared practices that bring together the best people and processes to drive coordinated actions
- The standardized processes and procedures . described in these playbooks:
- Facilitate better coordination and effective response among affected organizations,
- Enable tracking of cross-organizational successful actions,
- Allow for cataloging of incidents to better manage future events, and
- Guide analysis and discovery.
Agencies should use these playbooks to help shape overall defensive cyber operations to ensure consistent and effective response and coordinated communication of response activities.
Scope: These playbooks are for FCEB entities to focus on criteria for response and thresholds for coordination and reporting. They include communications between FCEB entities and CISA; the connective coordination between incident and vulnerability response activities; and common definitions for key cybersecurity terms and aspects of the response process.
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
Más títulos del mismo
Relacionado con este tema
-
Red Team
- How to Succeed by Thinking Like the Enemy
- De: Micah Zenko
- Narrado por: Christopher Lane
- Duración: 11 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Red teaming. It is a practice as old as the Devil's Advocate, the 11th-century Vatican official charged with discrediting candidates for sainthood. Today, red teams - comprised primarily of fearless skeptics and those assuming the role of saboteurs who seek to better understand the interests, intentions, and capabilities of institutions or potential competitors - are used widely in both the public and private sector.
-
-
Repetitive
- De Pax S Whitmore en 07-12-16
De: Micah Zenko
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- De: Adam Segal
- Narrado por: Don Hagen
- Duración: 10 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
-
Wrong narrator for material
- De Locnar en 02-21-17
De: Adam Segal
-
Driving Digital
- The Leader's Guide to Business Transformation Through Technology
- De: Isaac Sacolick
- Narrado por: Tom Parks
- Duración: 10 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
The race is on to become a digital enterprise. Every organization has a plan for updating products, technologies, and business processes. But that's not enough anymore. With disruptive startups outperforming industry stalwarts, executives everywhere are pushing greater growth and innovation. Staying competitive demands a complete digital transformation.
-
-
Best book I have read on Digital Transformation
- De Holistic Health en 10-20-17
De: Isaac Sacolick
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Title is the best part of the book
- De Ener Systems en 06-16-19
De: Bruce Schneier
-
This Is Not a Game with Marc Fennell
- De: Marc Fennell
- Narrado por: Marc Fennell
- Duración: 3 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
This Is Not a Game is the extraordinary untold story of the internet’s first conspiracy theory, the legend of Ong’s Hat. Marc Fennell will dive deep into a previously unexplored world of tech hippies, eccentric web subcultures and simmering paranoia, uncovering how this tongue-in-cheek artistic experiment backfired on its creator and went on to influence much of what’s wrong with the internet today.
-
-
WOW!
- De pondo en 05-09-24
De: Marc Fennell
-
Red Team
- How to Succeed by Thinking Like the Enemy
- De: Micah Zenko
- Narrado por: Christopher Lane
- Duración: 11 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Red teaming. It is a practice as old as the Devil's Advocate, the 11th-century Vatican official charged with discrediting candidates for sainthood. Today, red teams - comprised primarily of fearless skeptics and those assuming the role of saboteurs who seek to better understand the interests, intentions, and capabilities of institutions or potential competitors - are used widely in both the public and private sector.
-
-
Repetitive
- De Pax S Whitmore en 07-12-16
De: Micah Zenko
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- De: Adam Segal
- Narrado por: Don Hagen
- Duración: 10 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
-
Wrong narrator for material
- De Locnar en 02-21-17
De: Adam Segal
-
Driving Digital
- The Leader's Guide to Business Transformation Through Technology
- De: Isaac Sacolick
- Narrado por: Tom Parks
- Duración: 10 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
The race is on to become a digital enterprise. Every organization has a plan for updating products, technologies, and business processes. But that's not enough anymore. With disruptive startups outperforming industry stalwarts, executives everywhere are pushing greater growth and innovation. Staying competitive demands a complete digital transformation.
-
-
Best book I have read on Digital Transformation
- De Holistic Health en 10-20-17
De: Isaac Sacolick
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Title is the best part of the book
- De Ener Systems en 06-16-19
De: Bruce Schneier
-
This Is Not a Game with Marc Fennell
- De: Marc Fennell
- Narrado por: Marc Fennell
- Duración: 3 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
This Is Not a Game is the extraordinary untold story of the internet’s first conspiracy theory, the legend of Ong’s Hat. Marc Fennell will dive deep into a previously unexplored world of tech hippies, eccentric web subcultures and simmering paranoia, uncovering how this tongue-in-cheek artistic experiment backfired on its creator and went on to influence much of what’s wrong with the internet today.
-
-
WOW!
- De pondo en 05-09-24
De: Marc Fennell
-
Superintelligence
- Paths, Dangers, Strategies
- De: Nick Bostrom
- Narrado por: Napoleon Ryan
- Duración: 14 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- De Gary en 09-12-14
De: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- De: Sean Cannell, Benji Travis
- Narrado por: Sean Cannell, Benji Travis
- Duración: 5 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- De Scott en 08-04-19
De: Sean Cannell, y otros
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- De: Gretchen Bakke
- Narrado por: Emily Caudwell
- Duración: 11 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- De Ronald en 09-24-16
De: Gretchen Bakke
-
Glow Kids
- How Screen Addiction Is Hijacking Our Kids - and How to Break the Trance
- De: Nicholas Kardaras PhD
- Narrado por: Jonathan Davis
- Duración: 11 h y 5 m
- Versión completa
-
General
-
Narración:
-
Historia
In Glow Kids, Dr. Nicholas Kardaras will examine how technology - more specifically, age-inappropriate screen tech, with all of its glowing ubiquity - has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis.
-
-
Fear Mongering - a modern day Mazes and Monsters
- De Veronica en 11-03-20
-
Doom Guy
- Life in First Person
- De: John Romero
- Narrado por: John Romero
- Duración: 17 h y 4 m
- Versión completa
-
General
-
Narración:
-
Historia
Doom Guy: Life in First Person is the long-awaited autobiography of gaming’s original rock star and the cocreator of DOOM, Quake, and Wolfenstein—some of the most recognizable and important titles in video game history. Credited with the invention of the first-person shooter, a genre that continues to dominate the market today, he is gaming royalty. Told in remarkable detail, a byproduct of his hyperthymesia, Romero recounts his storied career.
-
-
Intimate stories of gaming history in First Person
- De Emyli en 07-28-23
De: John Romero
-
Social Media Marketing Workbook: 2024 Edition - How to Use Social Media for Business
- De: Jason McDonald PhD
- Narrado por: Michael Goodrick
- Duración: 14 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
Learn social media marketing in plain English—step by step! Buy the workbook used at Stanford Continuing Studies to teach social media marketing for business. The 2023 updated edition—all info verified and a new chapter on TikTok, plus revisions on LinkedIn, Facebook, and other major platforms....
-
-
Great SM Reference
- De Anne en 12-31-18
-
Slenderman
- Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls
- De: Kathleen Hale
- Narrado por: Therese Plummer
- Duración: 9 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
On May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two 12-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier’s violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called “Slenderman”. Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.
-
-
Excellent narration
- De Pink Amy en 08-21-22
De: Kathleen Hale
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- De: Steven Levy
- Narrado por: Mike Chamberlain
- Duración: 20 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- De Dan Collins en 07-01-16
De: Steven Levy
-
Recoding History: Audacious Women Who Shaped Our Digital World
- De: Treefort Media
- Narrado por: Reshma Saujani
- Duración: 4 h y 48 m
- Grabación Original
-
General
-
Narración:
-
Historia
Recoding History: The Audacious Women Who Shaped Our Digital World is an immersive look into the lives of some of computer history's most ingenious and audacious women. Pulling from the Computer History Museum’s archives and hosted by Reshma Saujani, the founder of Girls Who Code, listeners will learn and laugh along with these great minds as they recount their stories in their own words.
-
-
Breaking the Glass Ceiling
- De Dt en 03-03-24
De: Treefort Media
-
The Box
- How the Shipping Container Made the World Smaller and the World Economy Bigger
- De: Marc Levinson
- Narrado por: Adam Lofbomm
- Duración: 12 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
In April 1956, a refitted oil tanker carried 58 shipping containers from Newark to Houston. From that modest beginning, container shipping developed into a huge industry that made the boom in global trade possible. The Box tells the dramatic story of the container's creation, the decade of struggle before it was widely adopted, and the sweeping economic consequences of the sharp fall in transportation costs that containerization brought about.
-
-
Fascinating Topic sometimes lost in minutiae
- De zombie64 en 07-15-14
De: Marc Levinson
-
Prediction Machines
- The Simple Economics of Artificial Intelligence
- De: Ajay Agrawal, Joshua Gans, Avi Goldfarb
- Narrado por: LJ Ganser
- Duración: 7 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Artificial intelligence does the seemingly impossible - driving cars, trading stocks, and teaching children. But facing the sea change that AI will bring can be paralyzing. How should companies set strategies, governments design policies, and people plan their lives for a world so different from what we know? In Prediction Machines, three eminent economists recast the rise of AI as a drop in the cost of prediction. With this single, masterful stroke, they lift the curtain on the AI-is-magic hype and show how basic tools from economics provide clarity about the AI revolution and a basis for action by CEOs, managers, policy makers, investors, and entrepreneurs.
-
-
Not sure what I was expecting, but underwhelmed
- De William J Brown en 09-27-18
De: Ajay Agrawal, y otros
-
Tesla
- Inventor of the Electrical Age
- De: W. Bernard Carlson
- Narrado por: Allan Robertson
- Duración: 16 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Nikola Tesla was a major contributor to the electrical revolution that transformed daily life at the turn of the 20th century. His inventions, patents, and theoretical work formed the basis of modern AC electricity, and contributed to the development of radio and television. Like his competitor Thomas Edison, Tesla was one of America's first celebrity scientists, enjoying the company of New York high society and dazzling the likes of Mark Twain with his electrical demonstrations. An astute self-promoter and gifted showman, he cultivated a public image of the eccentric genius.
-
-
A detailed examination of Tesla's work
- De Jean en 02-01-14
Lo que los oyentes dicen sobre Cybersecurity Incident & Vulnerability Response Playbooks
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Chria
- 09-15-22
Basic and to the point high level
Very basic and short. Good overview for beginners but those experiences will be an overview.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña