-
Hackable
- How to Do Application Security Right
- Narrated by: Arthur Rowan
- Length: 5 hrs and 49 mins
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $19.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Cyber Crisis
- Protecting Your Business from Real Threats in the Virtual World
- By: Eric Cole
- Narrated by: Michael Butler Murray
- Length: 6 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.
-
-
Great insightful resource
- By elitegunslinger on 04-27-22
By: Eric Cole
-
How to Take Smart Notes
- One Simple Technique to Boost Writing, Learning and Thinking - for Students, Academics and Nonfiction Book Writers
- By: Sonke Ahrens
- Narrated by: Nigel Fyfe
- Length: 5 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The key to good and efficient writing lies in the intelligent organization of ideas and notes. This book helps students, academics, and nonfiction writers to get more done, write intelligent texts, and learn for the long run. It teaches you how to take smart notes and ensure they bring you and your projects forward.
-
-
Highly lacking in practical examples
- By David F on 03-17-22
By: Sonke Ahrens
-
Alice and Bob Learn Application Security
- By: Tanya Janca
- Narrated by: Tanya Janca
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn application security from the very start with this comprehensive and approachable guide. Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures.
-
-
Amazing Secure Coding Resource!
- By Maria on 08-25-21
By: Tanya Janca
-
Beyond the Phoenix Project
- The Origins and Evolution of DevOps
- By: Gene Kim, John Willis
- Narrated by: Gene Kim, John Willis
- Length: 7 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
Gene Kim and John Willis present this nine-part series that includes an oral history of the DevOps movement, as well as discussion around pivotal figures and philosophies that DevOps draws upon, from Goldratt to Deming; from Lean to Safety Culture to Learning Organizations.The audiobook is a great way for listeners to take an even deeper dive into topics relevant to DevOps and leading technology organizations.
-
-
From Darwin to DevOps
- By Ethan Klitzke on 03-09-18
By: Gene Kim, and others
-
Storytelling with Data
- A Data Visualization Guide for Business Professionals
- By: Cole Nussbaumer Knaflic
- Narrated by: Cole Nussbaumer Knaflic
- Length: 5 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Storytelling with Data teaches you the fundamentals of data visualization and how to communicate effectively with data. You'll discover the power of storytelling and the way to make data a pivotal point in your story. The lessons in this illuminative text are grounded in theory but made accessible through numerous real-world examples - ready for immediate application to your next graph or presentation.
-
-
Very insightful and actionable
- By Amazon Customer on 04-27-18
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Cyber Crisis
- Protecting Your Business from Real Threats in the Virtual World
- By: Eric Cole
- Narrated by: Michael Butler Murray
- Length: 6 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.
-
-
Great insightful resource
- By elitegunslinger on 04-27-22
By: Eric Cole
-
How to Take Smart Notes
- One Simple Technique to Boost Writing, Learning and Thinking - for Students, Academics and Nonfiction Book Writers
- By: Sonke Ahrens
- Narrated by: Nigel Fyfe
- Length: 5 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The key to good and efficient writing lies in the intelligent organization of ideas and notes. This book helps students, academics, and nonfiction writers to get more done, write intelligent texts, and learn for the long run. It teaches you how to take smart notes and ensure they bring you and your projects forward.
-
-
Highly lacking in practical examples
- By David F on 03-17-22
By: Sonke Ahrens
-
Alice and Bob Learn Application Security
- By: Tanya Janca
- Narrated by: Tanya Janca
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn application security from the very start with this comprehensive and approachable guide. Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures.
-
-
Amazing Secure Coding Resource!
- By Maria on 08-25-21
By: Tanya Janca
-
Beyond the Phoenix Project
- The Origins and Evolution of DevOps
- By: Gene Kim, John Willis
- Narrated by: Gene Kim, John Willis
- Length: 7 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
Gene Kim and John Willis present this nine-part series that includes an oral history of the DevOps movement, as well as discussion around pivotal figures and philosophies that DevOps draws upon, from Goldratt to Deming; from Lean to Safety Culture to Learning Organizations.The audiobook is a great way for listeners to take an even deeper dive into topics relevant to DevOps and leading technology organizations.
-
-
From Darwin to DevOps
- By Ethan Klitzke on 03-09-18
By: Gene Kim, and others
-
Storytelling with Data
- A Data Visualization Guide for Business Professionals
- By: Cole Nussbaumer Knaflic
- Narrated by: Cole Nussbaumer Knaflic
- Length: 5 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Storytelling with Data teaches you the fundamentals of data visualization and how to communicate effectively with data. You'll discover the power of storytelling and the way to make data a pivotal point in your story. The lessons in this illuminative text are grounded in theory but made accessible through numerous real-world examples - ready for immediate application to your next graph or presentation.
-
-
Very insightful and actionable
- By Amazon Customer on 04-27-18
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- By: Amy B. Zegart
- Narrated by: Amy B. Zegart
- Length: 11 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- By Cameron on 02-01-22
By: Amy B. Zegart
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
My favorite non-fiction book!
- By Philip Lowe on 08-28-20
By: Cliff Stoll
-
The Cold Start Problem
- How to Start and Scale Network Effects
- By: Andrew Chen
- Narrated by: Andrew Chen
- Length: 10 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Although software has become easier to build, launching and scaling new products and services remains difficult. Start-ups face daunting challenges entering the technology ecosystem, including stiff competition, copycats, and ineffective marketing channels. Teams launching new products must consider the advantages of “the network effect”, where a product or service’s value increases as more users engage with it. Apple, Google, Microsoft, and other tech giants utilize network effects, and most tech products incorporate them.
-
-
Great high level summary. More unique insights wanted.
- By Roman on 12-09-21
By: Andrew Chen
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- By: Christian Brose
- Narrated by: Christian Brose
- Length: 9 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network" - the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- By Tomas Singliar on 06-06-20
By: Christian Brose
-
The Lean Startup
- How Today's Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses
- By: Eric Ries
- Narrated by: Eric Ries
- Length: 8 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most startups fail. But many of those failures are preventable. The Lean Startup is a new approach being adopted across the globe, changing the way companies are built and new products are launched.
-
-
Good content but really dry naration
- By Mukul Rao on 01-30-18
By: Eric Ries
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 17 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. Many books have tried to simplify this but fail to leave behind the $100 words and run-on sentences. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire official study guide and breaks it down into easy-to-absorb chapters with simple language. Tons of examples are included to drive the points home in a way that makes it effortless to remember.
-
-
Great descriptions of somewhat dry content
- By Chelsi P. on 08-27-19
By: Phil Martin
-
Inspired
- How to Create Tech Products Customers Love, Second Edition
- By: Marty Cagan
- Narrated by: Marty Cagan
- Length: 7 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
How do today's most successful tech companies - Amazon, Google, Facebook, Netflix, Tesla - design, develop, and deploy the products that have earned the love of literally billions of people around the world? Perhaps surprisingly, they do it very differently from the vast majority of tech companies. In Inspired, technology product management thought leader Marty Cagan provides listeners with a master class in how to structure and staff a vibrant and successful product organization and how to discover and deliver technology products that your customers will love.
-
-
Great book, terrible audio wanted to ask a refund
- By Srikanth Ramanujam on 11-15-18
By: Marty Cagan
-
Crossing the Chasm
- Marketing and Selling Technology Projects to Mainstream Customers
- By: Geoffrey A. Moore
- Narrated by: Mike Chamberlain
- Length: 9 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Here is the best-selling guide that created a new game plan for marketing in high-tech industries. Crossing the Chasm has become the bible for bringing cutting-edge products to progressively larger markets. This edition provides new insights into the realities of high-tech marketing, with special emphasis on the Internet. It's essential reading for anyone with a stake in the world's most exciting marketplace.
-
-
Incredible insight
- By Holly Fischer on 02-27-16
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
Publisher's Summary
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too.
Whether you're a technology executive, developer, or security professional, you are responsible for securing your application. However, you may be uncertain about what works, what doesn't, how hackers exploit applications, or how much to spend. Or maybe you think you do know, but don't realize what you're doing wrong.
To defend against attackers, you must think like them. As a leader of ethical hackers, Ted Harrington helps the world's foremost companies secure their technology. Hackable teaches you exactly how. You'll learn how to eradicate security vulnerabilities, establish a threat model, and build security into the development process. You'll build better, more secure products. You'll gain a competitive edge, earn trust, and win sales.
More from the same
What listeners say about Hackable
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Person
- 09-19-21
5 hour advertisement, not a real book
This book is a 5 and half hour advertisement for his companies services, not a book to learn how to do appsec well. While it starts out strong. It's just the same sales pitch that goes for 5 hours long. Constantly repeats himself the same thing over and over. Buy his (or someone else's) services. Even if this book was free, I would not recommend it.
Is there nuggets of truth in the book. Sure. Even a blind squirrel finds a nut once and awhile.
-
Overall
-
Performance
-
Story

- CorinGL
- 09-05-21
Excellent
I’m studying a Master of Cyber Security and this book was highly relevant to my current unit and really quite enjoyable. Really enjoyed the case studies included, unfortunately some just didn’t want to accept your advice and unemployment queue ensued.