
Think Like a Hacker
A Sysadmin's Guide to Cybersecurity
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Mike Wood
Acerca de esta escucha
Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage.
Learn how advanced attackers break into networks. Understand how attackers use concepts of access and authorization to jump from one computer to the next. Dive into how and why attackers use custom implants and back doors inside an enterprise. Be introduced to the concept of service-centric design - and how it can help improve both security and usability.
To defend against hackers, you must first learn to think like a hacker.
©2017 Michael J. Melone (P)2018 Michael J. MeloneLos oyentes también disfrutaron...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
The Unplugged Alpha
- The No Bullsh*t Guide to Winning with Women & Life
- De: Richard Cooper
- Narrado por: Richard Cooper
- Duración: 4 h y 36 m
- Versión completa
-
General
-
Narración:
-
Historia
Men have been conditioned to be the quintessential "nice guy". They're trained to be overly humble, kind to a fault, and that just "being themselves" is enough to attract and keep the woman of their dreams. Men are told to believe that conventional masculinity is toxic and to put women ahead of their own interests, passions, and purpose. This book exposes the comforting lies you've been told throughout your life for what they really are, enabling you to become a truly authentic alpha who chases excellence and leads a successful passion-filled life.
-
-
Great content, unprofessional recording
- De Truth Seeker en 04-07-21
De: Richard Cooper
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Tools of Titans
- The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers
- De: Tim Ferriss
- Narrado por: Ray Porter, Kaleo Griffith, Tim Ferriss, y otros
- Duración: 22 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The latest groundbreaking tome from Tim Ferriss, the number-one New York Times best-selling author of The 4-Hour Workweek. For the last two years, I've interviewed more than 200 world-class performers for my podcast, The Tim Ferriss Show. The guests range from super celebs (Jamie Foxx, Arnold Schwarzenegger, etc.) and athletes (icons of powerlifting, gymnastics, surfing, etc.) to legendary Special Operations commanders and black-market biochemists. For most of my guests, it’s the first time they’ve agreed to a two-to-three-hour interview.
-
-
If I could sum it up: too much of a good thing
- De Brian Sachetta en 06-08-20
De: Tim Ferriss
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
The Unplugged Alpha
- The No Bullsh*t Guide to Winning with Women & Life
- De: Richard Cooper
- Narrado por: Richard Cooper
- Duración: 4 h y 36 m
- Versión completa
-
General
-
Narración:
-
Historia
Men have been conditioned to be the quintessential "nice guy". They're trained to be overly humble, kind to a fault, and that just "being themselves" is enough to attract and keep the woman of their dreams. Men are told to believe that conventional masculinity is toxic and to put women ahead of their own interests, passions, and purpose. This book exposes the comforting lies you've been told throughout your life for what they really are, enabling you to become a truly authentic alpha who chases excellence and leads a successful passion-filled life.
-
-
Great content, unprofessional recording
- De Truth Seeker en 04-07-21
De: Richard Cooper
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Tools of Titans
- The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers
- De: Tim Ferriss
- Narrado por: Ray Porter, Kaleo Griffith, Tim Ferriss, y otros
- Duración: 22 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The latest groundbreaking tome from Tim Ferriss, the number-one New York Times best-selling author of The 4-Hour Workweek. For the last two years, I've interviewed more than 200 world-class performers for my podcast, The Tim Ferriss Show. The guests range from super celebs (Jamie Foxx, Arnold Schwarzenegger, etc.) and athletes (icons of powerlifting, gymnastics, surfing, etc.) to legendary Special Operations commanders and black-market biochemists. For most of my guests, it’s the first time they’ve agreed to a two-to-three-hour interview.
-
-
If I could sum it up: too much of a good thing
- De Brian Sachetta en 06-08-20
De: Tim Ferriss
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
How I Rob Banks
- And Other Such Places
- De: FC
- Narrado por: Paul Brion
- Duración: 7 h y 5 m
- Versión completa
-
General
-
Narración:
-
Historia
In How I Rob Banks: And Other Such Places, renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. In the book, you'll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes.
-
-
total bum and misleading audio - dont waste your money or time
- De J. Chisholm en 07-03-24
De: FC
-
The Six Pillars of Self-Esteem
- De: Dr. Nathaniel Branden
- Narrado por: Dr. Nathaniel Branden
- Duración: 3 h y 23 m
- Versión resumida
-
General
-
Narración:
-
Historia
Immense in scope and vision and filled with brilliant insights into human nature, this program is the ultimate work on the psychology of self-esteem. Listen and find out the strength Dr. Branden's six pillars will award you.
-
-
Like listening to a psych professor but no help.
- De Leslie, children's author and teacher😊 en 02-14-15
-
Ultralearning
- Master Hard Skills, Outsmart the Competition, and Accelerate Your Career
- De: Scott H. Young
- Narrado por: Scott H. Young
- Duración: 7 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Future-proof your career and maximize your competitive advantage by learning the skill necessary to stay relevant, reinvent yourself, and adapt to whatever the workplace throws your way in this essential guide. Scott Young incorporates the latest research about the most effective learning methods and the stories of other ultralearners like himself - among them Ben Franklin, Judit Polgar, and Richard Feynman, as well as a host of others, such as little-known modern polymaths like Nigel Richards who won the World Championship of French Scrabble - without knowing French.
-
-
I Thought I Already Knew Something About Learning
- De Tyler L en 09-08-19
De: Scott H. Young
-
The Pragmatic Programmer: 20th Anniversary Edition, 2nd Edition
- Your Journey to Mastery
- De: David Thomas, Andrew Hunt
- Narrado por: Anna Katarina
- Duración: 9 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
Dave Thomas and Andy Hunt wrote the first edition of this influential book in 1999 to help their clients create better software and rediscover the joy of coding. These lessons have helped a generation of programmers examine the very essence of software development. Now, 20 years later, this new edition re-examines what it means to be a modern programmer. Topics range from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse.
-
-
An excellent and entertaining technical book
- De Amazon Customer en 01-21-20
De: David Thomas, y otros
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- De: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrado por: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Duración: 12 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- De Silvershopper en 01-18-23
De: Laurent Richard, y otros
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
The Art of Deception
- Controlling the Human Element of Security
- De: Kevin Mitnick
- Narrado por: Nick Sullivan
- Duración: 13 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- De James S. en 02-01-21
De: Kevin Mitnick
-
Cybersecurity for Beginners
- De: Raef Meeuwisse
- Narrado por: Danny Eastman
- Duración: 7 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- De keith en 03-25-18
De: Raef Meeuwisse
-
Cryptology for Beginners
- #1 Guide for Security, Encryption, Crypto, Algorithms and Python
- De: Jake T Mills
- Narrado por: Tom Brooks
- Duración: 3 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In a world where data flows freely and communication spans the globe, the need for secure and private communication has never been more critical. This book invites you on an illuminating journey into the captivating realm of secure communication, demystifying the intricate techniques that have protected secrets and guarded information for centuries.
-
-
Strongly recommend
- De Anonymous User en 09-05-23
De: Jake T Mills
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- De: Erick Stack
- Narrado por: Clay Bel le Fort
- Duración: 3 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
De: Erick Stack
Lo que los oyentes dicen sobre Think Like a Hacker
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Erica
- 09-03-18
what can expect from a text book?
typical text book might be more beneficial to read along.
also if this is optional why do I have to o have 15 words?
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Marco Rubio
- 03-21-19
Nicely exposed
An eye opener to new fields, truly insightful and educative to some of us avid learners
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Alejandro Hernandez
- 08-07-18
Short and to the point
Great listen, although short it gets to the main topics. Subject matter is mostly for new listeners on the subject. Experienced listeners won't find new topics that they have not covered elsewhere on the subject
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 3 personas
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 04-03-18
A strategic analysis on the digital age...
Cyber warfare is the new threat in a geopolitical environment of uncertainty... this book explains the concepts and mechanism of how and what hackers can do in cyber space.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 2 personas
-
Total
-
Ejecución
-
Historia
- Wiktor
- 12-23-19
academic handbook
this is one of those books which shouldn't be made as an audiobook. It's form and contents is not suitable for reading out loud. you must be really concentrated to follow. Making an audiobook out of a academic handbook which contains tones of lists, examples and definitions is not a simple task.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
- Andres G.
- 11-08-19
Like reading a vague book on IT Security
the author talks about many complex scenarios that are briefly explained. Seems like a terms and definitions audiobook, ok if this is the first time hearing this info, not at all what I expected.
blah blah blah...
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Matthew E
- 06-20-19
Very basic
I found the book to be very basic and not that helpful. A lot of super basic examples of what hackers use. If you never used a computer or an electronic device, this book will be good for you.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña