-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Narrado por: Jonathan Todd Ross
- Duración: 10 h y 46 m
Failed to add items
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Compra ahora por US$17.19
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Los oyentes también disfrutaron...
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- De: Renee Dudley, Daniel Golden
- Narrado por: BD Wong
- Duración: 11 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- De Rob Chavez en 01-18-23
De: Renee Dudley, y otros
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- De: Steven Levy
- Narrado por: Mike Chamberlain
- Duración: 20 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- De Dan Collins en 07-01-16
De: Steven Levy
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- De: Renee Dudley, Daniel Golden
- Narrado por: BD Wong
- Duración: 11 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- De Rob Chavez en 01-18-23
De: Renee Dudley, y otros
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- De: Steven Levy
- Narrado por: Mike Chamberlain
- Duración: 20 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- De Dan Collins en 07-01-16
De: Steven Levy
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
The Art of Deception
- Controlling the Human Element of Security
- De: Kevin Mitnick
- Narrado por: Nick Sullivan
- Duración: 13 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- De James S. en 02-01-21
De: Kevin Mitnick
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- De: Andy Greenberg
- Narrado por: Ari Fliakos
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- De Mike Reaves en 01-28-23
De: Andy Greenberg
-
The Like Switch
- An Ex-FBI Agent's Guide to Influencing, Attracting, and Winning People Over
- De: Jack Schafer PhD, Ph.D. Marvin Karlins Ph.D.
- Narrado por: George Newbern
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
The Like Switch is packed with all the tools you need for turning strangers into friends, whether you are on a sales call, a first date, or a job interview. As a Special Agent for the FBI's National Security Division's Behavioral Analysis Program, Dr. Jack Schafer developed dynamic and breakthrough strategies for profiling terrorists and detecting deception. Now, Dr. Schafer has evolved his proven-on-the-battlefield tactics for the day-to-day, but no less critical battle of getting people to like you.
-
-
Very informative , PDF on audible website....
- De Michael Jones en 11-30-15
De: Jack Schafer PhD, y otros
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- De: Phillip L. Wylie, Kim Crawley
- Narrado por: Matthew Josdal
- Duración: 6 h y 22 m
- Versión completa
-
General
-
Narración:
-
Historia
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- De Jennifer Langford en 08-27-21
De: Phillip L. Wylie, y otros
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- De: Joseph Menn
- Narrado por: Jonathan Davis
- Duración: 8 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- De Sam Kopp en 12-18-19
De: Joseph Menn
-
Hacking for Beginners
- A Step-by-Step Guide to Learn How to Hack Websites, Smartphones, Wireless Networks, Work with Social Engineering, Complete a Penetration Test, and Keep Your Computer Safe
- De: Julian James McKinnon
- Narrado por: Ivan Busenius
- Duración: 3 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This guidebook is going to spend some time taking a look at the world of hacking and some of the great techniques that come with this type of process as well. Whether you are an unethical or ethical hacker, you will use a lot of the same techniques, and this guidebook is going to explore them in more detail along the way, turning you from a novice to a professional in no time.
-
-
Insights are unique and turn me perceive deeply
- De Chasidy en 12-30-19
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- De: Brian Krebs
- Narrado por: Christopher Lane
- Duración: 8 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Risky topic, but Br. Krebs hits it out of the park
- De RRiley en 12-21-14
De: Brian Krebs
-
How I Rob Banks
- And Other Such Places
- De: FC
- Narrado por: Paul Brion
- Duración: 7 h y 5 m
- Versión completa
-
General
-
Narración:
-
Historia
In How I Rob Banks: And Other Such Places, renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. In the book, you'll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes.
De: FC
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- De: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrado por: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Duración: 12 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- De Silvershopper en 01-18-23
De: Laurent Richard, y otros
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Algorithms to Live By
- The Computer Science of Human Decisions
- De: Brian Christian, Tom Griffiths
- Narrado por: Brian Christian
- Duración: 11 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
From finding a spouse to finding a parking spot, from organizing one's inbox to understanding the workings of human memory, Algorithms to Live By transforms the wisdom of computer science into strategies for human living.
-
-
Great listen, just don't expect tips!
- De Adam Hosman en 08-07-17
De: Brian Christian, y otros
Resumen del Editor
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.
- Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
- Listen to the stories of some of the world's most renowned computer security experts
- Delve into social engineering, cryptography, penetration testing, network attacks, and more
As a field, cybersecurity is large and multi-faceted - yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.
Más títulos del mismo
Related to this topic
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Title is the best part of the book
- De Ener Systems en 06-16-19
De: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- De: Steven Levy
- Narrado por: Rich Miller
- Duración: 14 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- De Chip L. en 05-22-21
De: Steven Levy
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- De: John P. Carlin, Garrett M. Graff
- Narrado por: Kevin Stillwell
- Duración: 16 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- De Raz en 01-08-19
De: John P. Carlin, y otros
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Title is the best part of the book
- De Ener Systems en 06-16-19
De: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- De: Steven Levy
- Narrado por: Rich Miller
- Duración: 14 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- De Chip L. en 05-22-21
De: Steven Levy
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- De: John P. Carlin, Garrett M. Graff
- Narrado por: Kevin Stillwell
- Duración: 16 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- De Raz en 01-08-19
De: John P. Carlin, y otros
Las personas que vieron esto también vieron...
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- De: Phillip L. Wylie, Kim Crawley
- Narrado por: Matthew Josdal
- Duración: 6 h y 22 m
- Versión completa
-
General
-
Narración:
-
Historia
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- De Jennifer Langford en 08-27-21
De: Phillip L. Wylie, y otros
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- De: P. W. Singer, Allan Friedman
- Narrado por: Sean Pratt
- Duración: 11 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- De Pascal en 03-04-17
De: P. W. Singer, y otros
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Dark Territory
- The Secret History of Cyber War
- De: Fred Kaplan
- Narrado por: Malcolm Hillgartner
- Duración: 9 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
-
-
Best narrator - Malcolm Hillgartner
- De Greg Davis en 07-20-16
De: Fred Kaplan
-
The Art of Deception
- Controlling the Human Element of Security
- De: Kevin Mitnick
- Narrado por: Nick Sullivan
- Duración: 13 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- De James S. en 02-01-21
De: Kevin Mitnick
-
The Dark Net
- Inside the Digital Underworld
- De: Jamie Bartlett
- Narrado por: Matt Bates
- Duración: 7 h y 21 m
- Versión completa
-
General
-
Narración:
-
Historia
In this important and revealing book, Jamie Bartlett takes us deep into the digital underworld and presents an extraordinary look at the Internet we don't know. Beginning with the rise of the Internet and the conflicts and battles that defined its early years, Bartlett reports on trolls, pornographers, drug dealers, hackers, political extremists, Bitcoin programmers, and vigilantes - and puts a human face on those who have many reasons to stay anonymous.
-
-
Good, but incomplete
- De Peter en 05-03-17
De: Jamie Bartlett
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- De: Phillip L. Wylie, Kim Crawley
- Narrado por: Matthew Josdal
- Duración: 6 h y 22 m
- Versión completa
-
General
-
Narración:
-
Historia
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- De Jennifer Langford en 08-27-21
De: Phillip L. Wylie, y otros
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- De: P. W. Singer, Allan Friedman
- Narrado por: Sean Pratt
- Duración: 11 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- De Pascal en 03-04-17
De: P. W. Singer, y otros
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Dark Territory
- The Secret History of Cyber War
- De: Fred Kaplan
- Narrado por: Malcolm Hillgartner
- Duración: 9 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
-
-
Best narrator - Malcolm Hillgartner
- De Greg Davis en 07-20-16
De: Fred Kaplan
-
The Art of Deception
- Controlling the Human Element of Security
- De: Kevin Mitnick
- Narrado por: Nick Sullivan
- Duración: 13 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- De James S. en 02-01-21
De: Kevin Mitnick
-
The Dark Net
- Inside the Digital Underworld
- De: Jamie Bartlett
- Narrado por: Matt Bates
- Duración: 7 h y 21 m
- Versión completa
-
General
-
Narración:
-
Historia
In this important and revealing book, Jamie Bartlett takes us deep into the digital underworld and presents an extraordinary look at the Internet we don't know. Beginning with the rise of the Internet and the conflicts and battles that defined its early years, Bartlett reports on trolls, pornographers, drug dealers, hackers, political extremists, Bitcoin programmers, and vigilantes - and puts a human face on those who have many reasons to stay anonymous.
-
-
Good, but incomplete
- De Peter en 05-03-17
De: Jamie Bartlett
-
Data and Goliath
- The Hidden Battles to Capture Your Data and Control Your World
- De: Bruce Schneier
- Narrado por: Dan John Miller
- Duración: 9 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- De Jeremy en 06-12-15
De: Bruce Schneier
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
Cybersecurity for Dummies
- De: Joseph Steinberg
- Narrado por: BJ Harrison
- Duración: 13 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- De Anonymous User en 07-09-21
De: Joseph Steinberg
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- De: Ben Malisow
- Narrado por: Daniel Henning
- Duración: 16 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- De Customer en 04-22-22
De: Ben Malisow
-
Unmasking the Social Engineer
- The Human Element of Security
- De: Christopher Hadnagy, Paul F. Kelly, Paul Ekman
- Narrado por: Christopher Hadnagy
- Duración: 5 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding nonverbal communications with the knowledge of how social engineers, scam artists, and con men use these skills to build feelings of trust and rapport in their targets. The author helps listeners understand how to identify and detect social engineers and scammers by analyzing their nonverbal behavior. Unmasking the Social Engineer shows how attacks work.
-
-
Loved
- De vrukav6 en 07-24-23
De: Christopher Hadnagy, y otros
-
A Vulnerable System
- The History of Information Security in the Computer Age
- De: Andrew J. Stewart
- Narrado por: Rick Adamson
- Duración: 10 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
-
Interesting overview but incredulous adoption of U.S. official propaganda
- De Kindle Customer FB en 04-24-24
-
The Cybersecurity Playbook
- How Every Leader and Employee Can Contribute to a Culture of Security
- De: Allison Cerra
- Narrado por: Chloe Cannon
- Duración: 4 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This audiobook provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization's security is only as strong as its weakest link, this audiobook offers specific strategies for employees at every level.
-
-
good for non technical, a bit too much filler
- De Carolinian en 12-16-20
De: Allison Cerra
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- De: Lance Henderson
- Narrado por: James C. Lewis
- Duración: 12 h y 57 m
- Versión completa
-
General
-
Narración:
-
Historia
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- De Byzantine Technologies LLC en 07-16-19
De: Lance Henderson
-
Cybersecurity
- The Insights You Need from Harvard Business Review
- De: Harvard Business Review, Alex Blau, Andrew Burt, y otros
- Narrado por: Jonathan Todd Ross
- Duración: 2 h y 56 m
- Versión completa
-
General
-
Narración:
-
Historia
No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone's responsibility, from the boardroom to the break room.
De: Harvard Business Review, y otros
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- De: Gabriella Coleman
- Narrado por: Tavia Gilbert
- Duración: 13 h y 39 m
- Versión completa
-
General
-
Narración:
-
Historia
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
-
A Bit like Listening to a Police Scanner
- De J. E. JORDAN en 05-11-17
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- De: Roger A. Grimes
- Narrado por: Ray Greenley
- Duración: 11 h y 43 m
- Versión completa
-
General
-
Narración:
-
Historia
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.
De: Roger A. Grimes
Lo que los oyentes dicen sobre Hacking the Hacker
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- lego
- 05-22-23
Worth the read - depending on what you're seeking
My biggest issue with this book is that I found the title misleading. Based on that I thought the book would spend more time talking about offensive tactics used to actively take down hackers. It really didn't talk about that at all. It was entirely focused on defensive tactics like detection or honeypots. In fact, the author took a pretty hard line stance on not doing anything illegal ever, which seems to encompass hacking into a hacker's machine. Because of this I think the book is pretty poorly named, but maybe I took the title too literally.
With that said, I think this book does a nice job of profiling influential people in the security industry, many of which I had never heard of before. I found these chapters of the book the most interesting, and taught me a bunch of history that I didn't previously know about. It also gave a bunch of references for other books that I am interested in reading.
Pros:
- It has interesting interviews and profiles of notable figures in computer security.
- It has lots of references to other potentially interesting reading material.
Cons:
- It barely mentions anything about actually "Hacking the hacker"
- The non-profile chapters cover topics at a pretty surface level, so if you already have basic computer security knowledge these chapters may be a bit dull or arduous.
Conclusion:
If you're looking for an interesting history book on computer security, I think it's certainly worth the read. If you're just looking for applicable computer security knowledge beyond general philosophy behind computer security, skip this one and look elsewhere.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Joann
- 11-18-23
We don’t need to read out every single url in detail
Book would be amazing, but listening to him literally read out every single complete url including &$?/ etc… gets very tedious. We get it, one single link read out that leads us to all the links would suffice
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Mr. H
- 11-04-20
Tribe of Hackers Meets Security/Tutorial Book
I saw this book in the store several times but never picked it up due to the title making me think it was trying to make you literally hack the hacker (which I thought was cringey). I clicked on the sample and was happily surprised as a lot of cybersecurity books don't have great 'listen-ability". The performance was great and kept my attention.
The book was nice talking about some fun stories and information about cybersecurity while going through interviews similar to Tribe of Hackers. I thought it was a great book overall and great listen.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Jonathan
- 11-16-19
Please stop reading the urls
There's gotta be a better way to advertise for your friends books than having the reader pronounce double u double u dot ... Every single minute
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 2 personas
-
Total
-
Ejecución
-
Historia
- jonathon sweeney
- 12-24-19
A Great Beginners Book
An interesting perspective that profiles a lot of security professionals and the industry in general. I really appreciated all of the resources in this book and took plenty of "clips." As someone who already works in cyber intel I still had plenty to learn from this book.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 10-10-22
For begginers
This book has good references, but an advanced reader will find these resources very basic.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Thomas
- 11-20-19
This is a great book!
I really enjoyed this books mix of details and positive motivation. As someone who sits around 30 books a year, this is in my top 5 of all time and top cyber security book.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Canewbill
- 09-05-23
Reading of lengthy URLs
This book would have been much more enjoyable in print format. There was a poor choice made to have the narrator read lengthy URLs like a robot that made listening fairly unenjoyable. No one would have been listening and copying down the obscure URLs mentioned in order to type them in a browser. it felt inauthentic and impractical. A list of URLs could have been provided somewhere and it could have been mentioned that proper URLs could be found at that list otherwise I would have given it 5 stars.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- C. Brauer
- 01-11-23
No real information here
This book is basically some guy pimping people he knows and their websites and books. There is no real insight into anything.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Dombrowski
- 08-05-23
Urls for recommended books
Whoever decided it was a great idea to read aloud the amazon URLs of book titles with the full URL (that can become obsolete) is a complete moron and makes this otherwise informative book highly irritating.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña