-
NIST Cybersecurity & Privacy Program and Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More than Ever Before, It's Essential to Keep Your Data Safe from Hackers.
- Narrado por: Tom Brooks
- Duración: 2 h y 30 m
Failed to add items
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Compra ahora por US$6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Los oyentes también disfrutaron...
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- De: Bruce Brown
- Narrado por: Frank Block
- Duración: 1 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great
- De josh en 02-13-24
De: Bruce Brown
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- De: National Institute of Standards and Technology
- Narrado por: Tom Brooks
- Duración: 1 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Blockchain: Two Books
- The Complete Edition on the Blockchain Basics, Technology and Its Application in Cryptocurrency and Other Industries That Are Happening Now
- De: Lee Sebastian
- Narrado por: John Flemming
- Duración: 3 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Need to learn blockchain quickly? This crash course will get you up to speed on the basics quickly. This two-in-one audiobook bundle covers all important aspects of blockchain and its applications, especially in cryptocurrency.
De: Lee Sebastian
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- De: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrado por: Gwen Bettwy
- Duración: 5 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- De SMB en 09-21-21
De: Gwen Bettwy, y otros
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- De: Bruce Brown
- Narrado por: Frank Block
- Duración: 1 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great
- De josh en 02-13-24
De: Bruce Brown
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- De: National Institute of Standards and Technology
- Narrado por: Tom Brooks
- Duración: 1 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Blockchain: Two Books
- The Complete Edition on the Blockchain Basics, Technology and Its Application in Cryptocurrency and Other Industries That Are Happening Now
- De: Lee Sebastian
- Narrado por: John Flemming
- Duración: 3 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Need to learn blockchain quickly? This crash course will get you up to speed on the basics quickly. This two-in-one audiobook bundle covers all important aspects of blockchain and its applications, especially in cryptocurrency.
De: Lee Sebastian
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- De: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrado por: Gwen Bettwy
- Duración: 5 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- De SMB en 09-21-21
De: Gwen Bettwy, y otros
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- De Cristen Mini en 01-15-24
De: Matthew K. Sharp, y otros
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- De: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrado por: Matthew E. Kelly
- Duración: 10 h y 4 m
- Versión completa
-
General
-
Narración:
-
Historia
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- De Amazon Customer en 08-24-21
De: Eric Conrad, y otros
-
Cybersecurity for Dummies
- De: Joseph Steinberg
- Narrado por: BJ Harrison
- Duración: 13 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- De Anonymous User en 07-09-21
De: Joseph Steinberg
-
How to Measure Anything in Cybersecurity Risk
- De: Douglas W. Hubbard, Richard Seiersen
- Narrado por: Patrick Cronin
- Duración: 10 h y 21 m
- Versión completa
-
General
-
Narración:
-
Historia
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
-
Not appropriate for audio, buy a hard copy instead
- De Wanderer en 01-20-17
De: Douglas W. Hubbard, y otros
-
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
- De: Paul Rosenzweig, The Great Courses
- Narrado por: Paul Rosenzweig
- Duración: 9 h y 41 m
- Grabación Original
-
General
-
Narración:
-
Historia
Cyberspace is the 21st century’s greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.
-
-
A well-packaged set of zero surprises.
- De Todd Algren en 04-24-14
De: Paul Rosenzweig, y otros
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
CISSP All-in-One Exam Guide, Ninth Edition
- De: Fernando Maymi, Shon Harris
- Narrado por: Teri Schnaubelt
- Duración: 51 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2®. CISSP All-in-One Exam Guide, Ninth Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations.
-
-
I passed and so can you
- De jim weigle en 01-31-24
De: Fernando Maymi, y otros
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- De: Ben Malisow
- Narrado por: Daniel Henning
- Duración: 16 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- De Customer en 04-22-22
De: Ben Malisow
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- De: Murphy Rangel
- Narrado por: Luciano Marin
- Duración: 3 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
De: Murphy Rangel
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- De: David James Carmack
- Narrado por: Ivan Busenius
- Duración: 3 h y 58 m
- Versión completa
-
General
-
Narración:
-
Historia
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Cybersecurity for Beginners
- De: Raef Meeuwisse
- Narrado por: Danny Eastman
- Duración: 7 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- De keith en 03-25-18
De: Raef Meeuwisse
Resumen del Editor
More than ever, organizations must balance a rapidly evolving cybersecurity threat landscape against the need to fulfill business requirements on an enterprise level. To help them measure and manage their cybersecurity risk in this larger context, NIST has convened stakeholders to develop the NIST cybersecurity framework (CSF), which helps organizations understand their cybersecurity risks (threats, vulnerabilities, and impacts) and how to reduce those risks with customized measures.
Initially intended for US private-sector owners and operators of critical infrastructure, the voluntary framework’s user base has grown dramatically across the nation and globe. The framework integrates industry standards and best practices. It provides a common language that allows staff at all levels within an organization—and at all points in a supply chain—to develop a shared understanding of their cybersecurity risks.
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades.
Cybersecurity experts agree: no one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls, in addition to the usual cybersecurity best practices.
Más títulos del mismo
Relacionado con este tema
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Title is the best part of the book
- De Ener Systems en 06-16-19
De: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Big Data in Practice
- How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
- De: Bernard Marr
- Narrado por: Piers Hampton
- Duración: 7 h y 25 m
- Versión completa
-
General
-
Narración:
-
Historia
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data. Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This book fills the knowledge gap by showing how major companies are using big data every day, from an up-close, on-the-ground perspective.
-
-
Good book for managers
- De Capnbody en 01-08-18
De: Bernard Marr
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
Funny Story
- De: Emily Henry
- Narrado por: Julia Whelan
- Duración: 11 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Daphne always loved the way her fiancé Peter told their story. How they met (on a blustery day), fell in love (over an errant hat), and moved back to his lakeside hometown to begin their life together. He really was good at telling it…right up until the moment he realized he was actually in love with his childhood best friend Petra.
-
-
Funny Story is a Wonderful Read
- De Cathy Sykora en 04-24-24
De: Emily Henry
-
The Mountain Is You
- Transforming Self-Sabotage into Self-Mastery
- De: Brianna Wiest
- Narrado por: Stacey Glemboski
- Duración: 5 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
Coexisting but conflicting needs create self-sabotaging behaviors. This is why we resist efforts to change, often until they feel completely futile. But by extracting crucial insight from our most damaging habits, building emotional intelligence by better understanding our brains and bodies, releasing past experiences at a cellular level, and learning to act as our highest potential future selves, we can step out of our own way and into our potential.
-
-
Underwelming
- De Erin en 04-20-22
De: Brianna Wiest
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Title is the best part of the book
- De Ener Systems en 06-16-19
De: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Big Data in Practice
- How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
- De: Bernard Marr
- Narrado por: Piers Hampton
- Duración: 7 h y 25 m
- Versión completa
-
General
-
Narración:
-
Historia
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data. Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This book fills the knowledge gap by showing how major companies are using big data every day, from an up-close, on-the-ground perspective.
-
-
Good book for managers
- De Capnbody en 01-08-18
De: Bernard Marr
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
Funny Story
- De: Emily Henry
- Narrado por: Julia Whelan
- Duración: 11 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Daphne always loved the way her fiancé Peter told their story. How they met (on a blustery day), fell in love (over an errant hat), and moved back to his lakeside hometown to begin their life together. He really was good at telling it…right up until the moment he realized he was actually in love with his childhood best friend Petra.
-
-
Funny Story is a Wonderful Read
- De Cathy Sykora en 04-24-24
De: Emily Henry
-
The Mountain Is You
- Transforming Self-Sabotage into Self-Mastery
- De: Brianna Wiest
- Narrado por: Stacey Glemboski
- Duración: 5 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
Coexisting but conflicting needs create self-sabotaging behaviors. This is why we resist efforts to change, often until they feel completely futile. But by extracting crucial insight from our most damaging habits, building emotional intelligence by better understanding our brains and bodies, releasing past experiences at a cellular level, and learning to act as our highest potential future selves, we can step out of our own way and into our potential.
-
-
Underwelming
- De Erin en 04-20-22
De: Brianna Wiest
-
The Women
- A Novel
- De: Kristin Hannah
- Narrado por: Julia Whelan, Kristin Hannah
- Duración: 14 h y 57 m
- Versión completa
-
General
-
Narración:
-
Historia
Women can be heroes. When twenty-year-old nursing student Frances “Frankie” McGrath hears these words, it is a revelation. Raised in the sun-drenched, idyllic world of Southern California and sheltered by her conservative parents, she has always prided herself on doing the right thing. But in 1965, the world is changing, and she suddenly dares to imagine a different future for herself. When her brother ships out to serve in Vietnam, she joins the Army Nurse Corps and follows his path.
-
-
WOW. Just Wow
- De Joanne DeVuono en 02-08-24
De: Kristin Hannah
-
You Like It Darker
- Stories
- De: Stephen King
- Narrado por: Will Patton, Stephen King
- Duración: 20 h y 12 m
- Versión completa
-
General
-
Narración:
-
Historia
“You like it darker? Fine, so do I,” writes Stephen King in the afterword to this magnificent new collection of twelve stories that delve into the darker part of life—both metaphorical and literal. King has, for half a century, been a master of the form, and these stories, about fate, mortality, luck, and the folds in reality where anything can happen, are as rich and riveting as his novels, both weighty in theme and a huge pleasure to digest.
-
-
What happened to the chapter titles
- De MztCB en 05-25-24
De: Stephen King
-
First Lie Wins
- A Novel
- De: Ashley Elston
- Narrado por: Saskia Maarleveld
- Duración: 9 h y 16 m
- Versión completa
-
General
-
Narración:
-
Historia
The identity comes first: Evie Porter. Once she’s given a name and location by her mysterious boss Mr. Smith, she learns everything there is to know about the town and the people in it. Then the mark: Ryan Sumner. The last piece of the puzzle is the job. Evie isn’t privy to Mr. Smith’s real identity, but she knows this job will be different. Ryan has gotten under her skin, and she’s starting to envision a different sort of life for herself. But Evie can’t make any mistakes—especially after what happened last time.
-
-
What’s The lie?
- De Luke Schafer en 01-13-24
De: Ashley Elston
-
Atomic Habits
- An Easy & Proven Way to Build Good Habits & Break Bad Ones
- De: James Clear
- Narrado por: James Clear
- Duración: 5 h y 35 m
- Versión completa
-
General
-
Narración:
-
Historia
No matter your goals, Atomic Habits offers a proven framework for improving - every day. James Clear, one of the world's leading experts on habit formation, reveals practical strategies that will teach you exactly how to form good habits, break bad ones, and master the tiny behaviors that lead to remarkable results. If you're having trouble changing your habits, the problem isn't you. The problem is your system. Bad habits repeat themselves again and again not because you don't want to change, but because you have the wrong system for change.
-
-
Author went overboard hawking his site
- De CHughes en 06-25-19
De: James Clear
-
Mad Love
- De: Wendy Walker
- Narrado por: Julia Whelan, Alexis Bledel, Renée Elise Goldsberry, y otros
- Duración: 4 h y 11 m
- Grabación Original
-
General
-
Narración:
-
Historia
They were madly in love. The perfect couple. That was the story everyone in South River believed...until Gin Talcott and Adam Archer are found shot in their bed. Adam is dead at the scene. Gin is fighting for her life. Detectives Greta Jessup and Finn Pate are assigned to the case. Greta has a long history with Gin’s first husband, Eddie, and is determined to protect his 18-year-old twins. Piper discovered the bodies. Daniel is missing—and so is Adam’s gun.
-
-
Surprised
- De marcie en 05-25-24
De: Wendy Walker
-
48 Laws of Power
- De: Robert Greene
- Narrado por: Richard Poe
- Duración: 23 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Amoral, cunning, ruthless, and instructive, this piercing work distills 3,000 years of the history of power into 48 well-explicated laws. This bold volume outlines the laws of power in their unvarnished essence, synthesizing the philosophies of Machiavelli, Sun Tzu, Carl von Clausewitz, and other infamous strategists. The 48 Laws of Power will fascinate any listener interested in gaining, observing, or defending against ultimate control.
-
-
You don't have to be a psychopath to like this.
- De Gaggleframpf en 02-25-16
De: Robert Greene
¿Te gustan los libros? Te encantará Audible.
Transforma tu día
Cambia el scrolling interminable por la escucha interminable. Los quehaceres pueden ser divertidos.
Escucha en dónde sea
No puedes darle vuelta a la página mientras conduces, pero puedes escuchar
Lleva toda tu biblioteca contigo
Tus historias van a donde tú vayas. Los audiolibros viajan ligero.
Escucha y aprende
Descubre historias que pueden renovar tu mente, tu bienestar y tu vida.
Alcanza tus objetivos de lectura
Descarga títulos para escucharlos sin conexión, en cualquier parte del mundo.
Encuentra tu nicho
Con miles de títulos para explorar, hay algo para todos.