-
The Tao of Open Source Intelligence
- Narrated by: Peter Silverleaf
- Length: 3 hrs and 23 mins
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $13.00
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
Introduction to Conducting Private Investigations
- Private Investigator Entry Level (02E)
- By: Philip A. Becnel IV
- Narrated by: Bill Burrows
- Length: 8 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introduction to Conducting Private Investigations provides the essential tools you need to become a successful private investigator. From conducting straightforward background investigations to more complicated cases involving accidents and fraud, you will learn the critical skills needed to conduct all types of investigations and build a thriving business. Specifically tailored to meet the requirements established by the Department of Criminal Justice Services, this easy-to-use resource offers an excellent balance between theory and practice.
-
-
Good Stuff!
- By P DET. Billock on 11-16-18
-
Psychology of Intelligence Analysis
- By: Richards J. Heuer Jr.
- Narrated by: Scott R. Pollak
- Length: 7 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Psychology of Intelligence Analysis has been required reading for intelligence officers studying the art and science of intelligence analysis for decades. Richards Heuer, Jr. discusses in the audiobook how fundamental limitations in human mental processes can prompt people to jump to conclusions and employ other simplifying strategies that lead to predictably faulty judgments known as cognitive biases.
-
-
The author
- By ronco on 03-04-23
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
100 Deadly Skills
- The SEAL Operative's Guide to Eluding Pursuers, Evading Capture, and Surviving Any Dangerous Situation
- By: Clint Emerson
- Narrated by: Pete Simonelli
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
100 Deadly Skills contains proven self-defense skills, evasion tactics, and immobilizing maneuvers - modified from the world of black ops - to help you take action in numerous "worst case" scenarios from escaping a locked trunk to making an improvised Taser to tricking facial recognition software. With easy-to-understand instructions, Emerson outlines in detail many life-saving strategies and teaches you how to think and act like a member of the special forces.
-
-
Only a small fraction of the information is useful
- By Mike Kirby on 11-18-15
By: Clint Emerson
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Stories of deception and how to prevent them
- By Anonymous User on 12-27-20
By: Kevin Mitnick
-
Introduction to Conducting Private Investigations
- Private Investigator Entry Level (02E)
- By: Philip A. Becnel IV
- Narrated by: Bill Burrows
- Length: 8 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introduction to Conducting Private Investigations provides the essential tools you need to become a successful private investigator. From conducting straightforward background investigations to more complicated cases involving accidents and fraud, you will learn the critical skills needed to conduct all types of investigations and build a thriving business. Specifically tailored to meet the requirements established by the Department of Criminal Justice Services, this easy-to-use resource offers an excellent balance between theory and practice.
-
-
Good Stuff!
- By P DET. Billock on 11-16-18
-
Psychology of Intelligence Analysis
- By: Richards J. Heuer Jr.
- Narrated by: Scott R. Pollak
- Length: 7 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Psychology of Intelligence Analysis has been required reading for intelligence officers studying the art and science of intelligence analysis for decades. Richards Heuer, Jr. discusses in the audiobook how fundamental limitations in human mental processes can prompt people to jump to conclusions and employ other simplifying strategies that lead to predictably faulty judgments known as cognitive biases.
-
-
The author
- By ronco on 03-04-23
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
100 Deadly Skills
- The SEAL Operative's Guide to Eluding Pursuers, Evading Capture, and Surviving Any Dangerous Situation
- By: Clint Emerson
- Narrated by: Pete Simonelli
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
100 Deadly Skills contains proven self-defense skills, evasion tactics, and immobilizing maneuvers - modified from the world of black ops - to help you take action in numerous "worst case" scenarios from escaping a locked trunk to making an improvised Taser to tricking facial recognition software. With easy-to-understand instructions, Emerson outlines in detail many life-saving strategies and teaches you how to think and act like a member of the special forces.
-
-
Only a small fraction of the information is useful
- By Mike Kirby on 11-18-15
By: Clint Emerson
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Stories of deception and how to prevent them
- By Anonymous User on 12-27-20
By: Kevin Mitnick
-
Becoming Bulletproof
- Protect Yourself, Read People, Influence Situations, and Live Fearlessly
- By: Evy Poumpouras
- Narrated by: Evy Poumpouras
- Length: 10 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Becoming Bulletproof means transforming yourself into a stronger, more confident, and more powerful person. Evy Poumpouras - former Secret Service agent to three presidents and one of only five women to receive the Medal of Valor - demonstrates how we can overcome our everyday fears, have difficult conversations, know who to trust and who might not have our best interests at heart, influence situations, and prepare for the unexpected. When you have become bulletproof, you are your best, most courageous, and most powerful version of you.
-
-
Not what I had Anticipated, Much Much Better
- By Terry Goodlad on 05-02-20
By: Evy Poumpouras
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Hacking for Beginners
- Step by Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools on How to Ethical Hack and Grow
- By: Erickson Karnel
- Narrated by: Nikola Muckajev
- Length: 3 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking for anyone to understand! Hacking for Beginners will teach you the basics of hacking as well as the different types of hacking and how hackers think. By listening to it, you will not only discover why they are attacking your computers, but you will also be able to understand how they can scan your system and gain access to your computer.
-
-
Love it
- By Bonny Czajkowski on 04-08-20
By: Erickson Karnel
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- By: Amy B. Zegart
- Narrated by: Amy B. Zegart
- Length: 11 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- By Cameron on 02-01-22
By: Amy B. Zegart
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- By: Christopher Hadnagy, Seth Schulman
- Narrated by: Christopher Hadnagy
- Length: 8 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
-
-
Instead of this, buy “Social Engineering, Second Edition”.
- By Jessica on 11-30-21
By: Christopher Hadnagy, and others
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Fascinating
- By Terri L Bowen on 01-06-23
By: Andy Greenberg
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- By: Jeremiah Talamantes
- Narrated by: Joe Smith
- Length: 4 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration. Learn how to conduct a Physical Red Team Operation with precision, confidence, and value. Whether the listener will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this audiobook is essential.
-
-
Good content, but
- By Shawn M. on 04-12-20
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
UX
- 3 Books in 1: User Experience Basics for Beginners + Planning and Analyzing Data in a UX Project + Optimizing User Experience
- By: Andy Vickler
- Narrated by: Helpful Matthew
- Length: 11 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
UX books are a category of design books that focus on the usability and user interface of products, mobile apps, and websites. They help designers understand how their product looks and functions from their perspective as users. This audiobook is for anyone who needs to create interfaces for companies or individuals in order to make them more usable, engaging, or beautiful.
By: Andy Vickler
-
UX: Optimizing User Experience
- By: Andy Vickler
- Narrated by: Helpful Matthew
- Length: 4 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
User experience, or UX, can be defined as any interaction with a service or a product. How the user feels, navigates, and completes the desired task are considered. UX design considers every component of the interaction. This principle can be applied to anything. The purpose of UX Design is to provide users with experiences that are simple, relevant, efficient, and enjoyable.
By: Andy Vickler
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
Publisher's Summary
The Internet has become the defining medium for information exchange in the modern world, and the unprecedented success of new web publishing platforms, such as those associated with social media, has confirmed its dominance as the main information exchange platform for the foreseeable future. But how do you conduct an online investigation when so much of the Internet isn't even indexed by search engines?
Accessing and using the information that's freely available online is about more than just relying on the first page of Google results. Open source intelligence (OSINT) is intelligence gathered from publically available sources and is the key to unlocking this domain for the purposes of investigation.
The Tao of Open Source Intelligence provides a comprehensive guide to OSINT techniques for the investigator.
- It catalogs and explains the tools and investigative approaches that are required when conducting research within the surface, deep, and dark webs.
- It explains how to scrutinize criminal activity without compromising your anonymity - and your investigation.
- It examines the relevance of cyber geography and how to get around its limitations.
- It describes useful add-ons for common search engines, as well as considering metasearch engines (including Dogpile, Zuula, PolyMeta, iSeek, Cluuz, and Carrot2) that collate search data from single-source intelligence platforms such as Google.
- It considers deep-web social media platforms and platform-specific search tools, detailing such concepts as concept mapping, entity extraction tools, and specialist search syntax (Google kung fu).
- It gives comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use, and functionality, giving tips on counterintelligence, safe practices, and debunking myths about online privacy.
OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community. The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability.
About the author: Stewart K. Bertram is a career intelligence analyst, who has spent over a decade working across the fields of counterterrorism, cyber security , corporate investigations, and geopolitical analysis. The holder of a master's degree in computing and a master of letters in terrorism studies, Stewart is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart fuses his academic knowledge with significant professional experience.
More from the same
What listeners say about The Tao of Open Source Intelligence
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Techdice
- 02-13-22
Very informative
Thou some of the techniques described are a little be out dated, most of the information given is essential in the world of OSINT investigations, the pace and tone of the narrator are perfect
-
Overall
-
Performance
-
Story
- Jack Frasier
- 08-27-20
short with good info
has some essential ideas about the landscape of OSINT technologies and frameworks that can be used by invesigators
-
Overall
-
Performance
- Internet Rando
- 05-06-20
It's a decent introduction to OSINT
The narrator is good, the content is interesting, and it serves as a good introduction to OSINT topics and methods.
Related to this topic
-
Hacking for Beginners
- Step by Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools on How to Ethical Hack and Grow
- By: Erickson Karnel
- Narrated by: Nikola Muckajev
- Length: 3 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking for anyone to understand! Hacking for Beginners will teach you the basics of hacking as well as the different types of hacking and how hackers think. By listening to it, you will not only discover why they are attacking your computers, but you will also be able to understand how they can scan your system and gain access to your computer.
-
-
Love it
- By Bonny Czajkowski on 04-08-20
By: Erickson Karnel
-
Cybersecurity: 3 Books in 1: Beginners, Intermediate and Advance Guide in Cybersecurity Measures Effectively
- By: Zach Webber
- Narrated by: William Bahl
- Length: 4 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Find easy ways to identify potential security threats at a glance, top cyber threats and how to stop them in their tracks, ways to put the world’s crippling shortage of cybersecurity professional to work for you, tips for ensuring your personal cybersecurity is up to snuff, special considerations to keep in mind when keeping your smart devices secure, and more in this three-book bundle on cybersecurity.
-
-
Statistics brings a lot of value
- By Wilma on 06-19-20
By: Zach Webber
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- By: Abraham K White
- Narrated by: Dalan E Decker
- Length: 5 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking.
-
-
Good
- By Mrs. Beautiful on 07-24-19
By: Abraham K White
-
The Principles of Cybersecurity and Hacking: 5 Books in 1
- Cybersecurity and Hacking Series
- By: Zach Webber
- Narrated by: William Bahl
- Length: 7 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Principles of Cybersecurity and Hacking series aims to provide you exactly with that knowledge, and with that power. This comprehensive, in-depth guide on the fundamentals, concepts, and strategies of cybersecurity and hacking will take you to another level of protection in this digital world. It provides you with everything you need to know starting from beginner to advanced through five books.
-
-
Tips for online safety!
- By Dollie Ring on 08-16-20
By: Zach Webber
-
Artificial Intelligence
- This Book Includes: Machine Learning for Beginners, Artificial Intelligence for Business and Computer Networking for Beginners: A Complete AI and Deep Learning Guide
- By: David Brown
- Narrated by: Jason Belvill
- Length: 12 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s no doubt that machine learning, artificial intelligence, and deep learning have created a lot of buzz in the tech world. However, unlike many other buzz words that we forget about quickly, technological advancements have made AI, ML, and deep learning a part of our daily lives. Furthermore, AI is here to stay, which is why if you are looking to learn about it, you need to make the most out of your learning. What better way to do this than with a three-in-one book bundle that takes you from zero to a future proof AI genius?
By: David Brown
-
Hacking: 4 Books in 1
- Hacking for Beginners, Hacker Basic Security, Networking Hacking, Kali Linux for Hackers
- By: Erickson Karnel, Coding Hood
- Narrated by: Nikola Muckajev
- Length: 12 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you always been interested and fascinated by the world of hacking? Do you wish to learn more about networking? Do you want to know how to protect your system from being compromised and learn about advanced security protocols? If you want to understand how to hack from basic level to advanced, Hacking: 4 Books in 1 is for you.
-
-
Wonderful
- By Jesse on 02-23-21
By: Erickson Karnel, and others
-
Hacking for Beginners
- Step by Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools on How to Ethical Hack and Grow
- By: Erickson Karnel
- Narrated by: Nikola Muckajev
- Length: 3 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking for anyone to understand! Hacking for Beginners will teach you the basics of hacking as well as the different types of hacking and how hackers think. By listening to it, you will not only discover why they are attacking your computers, but you will also be able to understand how they can scan your system and gain access to your computer.
-
-
Love it
- By Bonny Czajkowski on 04-08-20
By: Erickson Karnel
-
Cybersecurity: 3 Books in 1: Beginners, Intermediate and Advance Guide in Cybersecurity Measures Effectively
- By: Zach Webber
- Narrated by: William Bahl
- Length: 4 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Find easy ways to identify potential security threats at a glance, top cyber threats and how to stop them in their tracks, ways to put the world’s crippling shortage of cybersecurity professional to work for you, tips for ensuring your personal cybersecurity is up to snuff, special considerations to keep in mind when keeping your smart devices secure, and more in this three-book bundle on cybersecurity.
-
-
Statistics brings a lot of value
- By Wilma on 06-19-20
By: Zach Webber
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- By: Abraham K White
- Narrated by: Dalan E Decker
- Length: 5 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking.
-
-
Good
- By Mrs. Beautiful on 07-24-19
By: Abraham K White
-
The Principles of Cybersecurity and Hacking: 5 Books in 1
- Cybersecurity and Hacking Series
- By: Zach Webber
- Narrated by: William Bahl
- Length: 7 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Principles of Cybersecurity and Hacking series aims to provide you exactly with that knowledge, and with that power. This comprehensive, in-depth guide on the fundamentals, concepts, and strategies of cybersecurity and hacking will take you to another level of protection in this digital world. It provides you with everything you need to know starting from beginner to advanced through five books.
-
-
Tips for online safety!
- By Dollie Ring on 08-16-20
By: Zach Webber
-
Artificial Intelligence
- This Book Includes: Machine Learning for Beginners, Artificial Intelligence for Business and Computer Networking for Beginners: A Complete AI and Deep Learning Guide
- By: David Brown
- Narrated by: Jason Belvill
- Length: 12 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s no doubt that machine learning, artificial intelligence, and deep learning have created a lot of buzz in the tech world. However, unlike many other buzz words that we forget about quickly, technological advancements have made AI, ML, and deep learning a part of our daily lives. Furthermore, AI is here to stay, which is why if you are looking to learn about it, you need to make the most out of your learning. What better way to do this than with a three-in-one book bundle that takes you from zero to a future proof AI genius?
By: David Brown
-
Hacking: 4 Books in 1
- Hacking for Beginners, Hacker Basic Security, Networking Hacking, Kali Linux for Hackers
- By: Erickson Karnel, Coding Hood
- Narrated by: Nikola Muckajev
- Length: 12 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you always been interested and fascinated by the world of hacking? Do you wish to learn more about networking? Do you want to know how to protect your system from being compromised and learn about advanced security protocols? If you want to understand how to hack from basic level to advanced, Hacking: 4 Books in 1 is for you.
-
-
Wonderful
- By Jesse on 02-23-21
By: Erickson Karnel, and others
-
Machine Learning for Beginners
- A Step-by-Step Guide to Understand Deep Learning, Data Science and Analysis, Basic Software and Algorithms for Artificial Intelligence
- By: David Brown
- Narrated by: Jason Belvill
- Length: 4 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book explains machine learning, in simple English, for beginners of all levels. In this book, you will learn how machines are able to use data to learn on their own, discover how you can create sophisticated programs without the need for complex programming, and see daily applications of machine learning in action!
-
-
Excellent and amazing audiobook.
- By Anonymous User on 01-24-20
By: David Brown
-
AWS: A Comprehensive Guide to Mastering Amazon Web Services
- By: Aaron Hudson
- Narrated by: Mat Clista
- Length: 4 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
You are about to learn the limitless power of Amazon Web Services (AWS) to decide whether it is the perfect cloud computing solution for your business! Efficient, high performing, and profitable companies around the world have realized that cloud computing is the secret to massive growth and efficiency in service delivery on a global scale especially because it (cloud computing) allows data access from anywhere in the world.
-
-
One of the best book!
- By Russell Kish on 01-05-20
By: Aaron Hudson
-
Machine Learning: 2 Book in 1
- The Ultimate Guide to Artificial Intelligence, Data Science and Deep Learning with Python
- By: Gabriel Baker
- Narrated by: J.M. Debord
- Length: 7 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Master Python machine learning even if you don’t have a tech background! Are you interested in starting a career in the IT industry, but worry that the market is overly saturated with programmers, engineers, and various specialists? Machine learning is currently the fastest growing IT sector. It’s an artificial intelligence branch and deals with building machines that can imitate humans and even adapt.
-
-
too basic
- By Iggy on 08-29-21
By: Gabriel Baker
-
Ethical Hacking: Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking
- By: Brian Walker
- Narrated by: Sam Slydell
- Length: 3 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ethical Hacking: A Comprehensive Beginner’s Guide to Learn and Understand the Realms of Ethical Hacking is an introduction to performing a penetration test, or an ethical hack from beginning to end. Hacking can feel daunting at times and even intimidating to beginners, because of the stigma it still carries in society, but this book teaches students how to use hacking tools and techniques properly and ethically. It provides a clear explanation of every step of the way, so that any aspiring hacker can understand all concepts and practice what they learn.
-
-
Best Narration Ever
- By StevenShane on 09-16-21
By: Brian Walker
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- By: Norman Laurence
- Narrated by: Cole Niblett
- Length: 14 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
-
Almost unlistenable
- By Kelly A. Ohlert on 12-31-21
By: Norman Laurence
-
Python, Hacking & Advanced Hacking: 3 Books in 1: The Blueprint
- Everything You Need to Know for Python Programming and Hacking!
- By: CyberPunk Architects
- Narrated by: Scott Clem
- Length: 3 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
The Cyberpunk Architects believe that we have the ability to teach computer programming and the like to anybody by providing them with the blueprint, the basics, in order to build the strongest foundation. We know how tricky it is to learn and become a master of any area of computer programming, especially hacking. Our team is comprised of professionals who have been in the industry of information technology for decades, and our experience made us able to create information products such as this step-by-step guide.
-
-
Gives fundamental ideas!
- By Sonya Upchurch on 08-22-19
-
Networking Hacking
- Complete Guide Tools for Computer Wireless Network Technology, Connections and Communications System. Practical Penetration of a Network via Services and Hardware.
- By: Karnel Erickson
- Narrated by: Nikola Muckajev
- Length: 3 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook will teach you the basics of a computer network, countermeasures that you can use to prevent a social engineering and physical attack, and the steps to assess the physical vulnerabilities within your organization. By listening it, you will learn of all the possible dangers that your network is facing.
-
-
Basic hacking tips and techniques
- By Natalie Francis on 05-16-20
By: Karnel Erickson
-
Machine Learning
- 4 Books in 1: Basic Concepts + Artificial Intelligence + Python Programming + Python Machine Learning. A Comprehensive Guide to Build Intelligent Systems Using Python Libraries
- By: Ethem Mining
- Narrated by: Russell Newton
- Length: 14 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
The term machine learning refers to the capability of a machine to learn something without any pre-existing program. Automatic learning is a way to educate an algorithm to learn from various environmental situations. Machine learning involves the usage of enormous quantities of data and an efficient algorithm enabled to adapt and enhance its capabilities according to recurring situations. From banking operations to online shopping and also on social media, we daily use machine learning data algorithms to make our experience more efficient, simple and secure.
By: Ethem Mining
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- By: Erick Stack
- Narrated by: Clay Bel le Fort
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
By: Erick Stack
-
Cyber Security: This Book Includes: Kali Linux for Hackers and Hacker Basic Security
- By: Karnel Erikson
- Narrated by: Jason Wright
- Length: 6 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you've always been interested and fascinated by the world of hacking and wanted to learn more about networking, then this set is for you. Learn how to protect your system from being compromised and discover advanced security protocols.
By: Karnel Erikson
-
Python Machine Learning
- The Ultimate Beginners Guide from Basics to Master Advanced Concepts of Machine Learning, AI, Neural Networks, Data Science and Future Developments
- By: Arthur Ike Smith
- Narrated by: Ashton Haugen
- Length: 3 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
Python Machine Learning is a guide to provide you with all the information required to master machine learning using Python. It will give you deep insight into methods of machine learning, deep learning, big data, data science, and more. Furthermore, it will also teach you concepts of Python and how combining machine learning with Python can result in practical solutions. The audiobook touches upon how these solutions can be applied in various fields including governance, technology, business, cybersecurity, and more.
By: Arthur Ike Smith
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse