- History & Culture (1,613)
Bestsellers
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
-
Overall very good, loses a bit focus, aprubt end
- By Jay Y. on 06-19-24
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
-
Overall very good, loses a bit focus, aprubt end
- By Jay Y. on 06-19-24
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Started great but ended up being mostly about Bitcoin
- By CARLOS MAD on 01-21-24
By: Lyn Alden
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
By: Joseph Steinberg, and others
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles....
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- By: Kimberly Burk Cordova
- Narrated by: Hannah Stone
- Length: 3 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Discover the powerful results that await you when you listen to "Cybersecurity for Entrepreneurs"! With this book, you will not only gain an advantage in the digital age but you will also protect your digital assets, maintain customer trust, and understand the latest cybersecurity technologies
-
-
A Must-Listen for Business Owners
- By Joyce Bui on 07-13-24
-
The Language of Deception
- Weaponizing Next Generation AI
- By: Justin Hutchens
- Narrated by: Mike Chamberlain
- Length: 10 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes....
By: Justin Hutchens
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Too Much Political Bias
- By Dreux on 02-18-23
By: Bruce Schneier
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- By: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
-
-
Wow. This book opened my eyes
- By Austin Frangoules on 06-04-24
By: Byron Tau
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills.
-
-
This needs a lot of work as for someone who is studying for this exam I learned nothing
- By Erik Krumholz on 05-15-24
By: Jake T Mills
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity....
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
Gray Day
- My Undercover Mission to Expose America's First Cyber Spy
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy....
-
-
A Real Spy Story
- By Darren Sapp on 04-06-19
By: Eric O'Neill
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing....
-
-
Question should be better
- By Jessica & Mark Rogan on 06-25-24
By: Jake T Mills
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
-
-
WHY read out entire URLs?!
- By pinkington on 05-30-24
By: Mike Chapple, and others
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- By: Taimur Ijlal
- Narrated by: Scott Mandeville
- Length: 4 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals.
By: Taimur Ijlal
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
CompTIA CASP+ Certification
- The Ultimate Study Guide to Master the Advanced Security Practitioner Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unravel the intricate layers of modern cybersecurity with the comprehensive guide to the CompTIA CASP+ Certification Advanced Security Practitioner. Dive into the depths of this dynamic field as this book becomes your companion in mastering the multifaceted world of digital defense....
-
-
Cheers to the creators of this audiobook! 🎉
- By Maverick Steel on 03-14-24
By: Jake T Mills
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- By: Jennifer Bleam
- Narrated by: Jennifer Bleam
- Length: 2 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
-
-
The insight and approach Jennifer provided on cybersecurity sales and marketing.
- By Amazon Customer on 02-10-24
By: Jennifer Bleam
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2....
-
-
Great supplement to the physical book
- By Andrea Christine on 06-08-24
By: Bruce Brown
New releases
-
Artificial Intelligence for Intrusion Detection Systems: Techniques and Applications
- By: Koffka Khan
- Narrated by: Virtual Voice
- Length: 6 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Welcome to "Artificial Intelligence for Intrusion Detection Systems: Techniques and Applications". In today's interconnected world, where cybersecurity threats continue to evolve rapidly, the role of Intrusion Detection Systems (IDS) has become more crucial than ever. Traditional methods often struggle to keep pace with the sophistication of modern cyber threats, prompting the integration of artificial intelligence (AI) to enhance detection capabilities. This textbook explores the intersection of AI and IDS, offering a comprehensive overview of the techniques and applications driving ...
By: Koffka Khan
-
AWS Certified Security - Specialty Study Guide
- By: SK Singh
- Narrated by: Virtual Voice
- Length: 19 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
"AWS Certified Security - Specialty Study Guide" is a comprehensive book for AWS Cloud practitioners seeking to build a secure AWS environment. The book empowers readers with the knowledge and skills to build a secure and resilient AWS cloud environment. Its content is geared toward AWS Certified Security -- Specialty exam. The last section has 130 high-quality exam-like practice questions with detailed answers. With exercises and guidance, this book empowers readers to navigate the intricacies of AWS cloud security and help secure their AWS infrastructure against modern threats. With a ...
By: SK Singh
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- By: Kimberly Burk Cordova
- Narrated by: Hannah Stone
- Length: 3 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Discover the powerful results that await you when you listen to "Cybersecurity for Entrepreneurs"! With this book, you will not only gain a strategic advantage in the digital age but you will also protect your digital assets, maintain customer trust, and understand the latest cybersecurity technologies to leverage for your business.
-
-
A Must-Listen for Business Owners
- By Joyce Bui on 07-13-24
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- By: Anthony Farrior
- Narrated by: Jennifer Workman
- Length: 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
By: Anthony Farrior
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- By: Jonathan Rigdon
- Narrated by: Kevin Brooker
- Length: 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
By: Jonathan Rigdon
-
Artificial Intelligence for Intrusion Detection Systems: Techniques and Applications
- By: Koffka Khan
- Narrated by: Virtual Voice
- Length: 6 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Welcome to "Artificial Intelligence for Intrusion Detection Systems: Techniques and Applications". In today's interconnected world, where cybersecurity threats continue to evolve rapidly, the role of Intrusion Detection Systems (IDS) has become more crucial than ever. Traditional methods often struggle to keep pace with the sophistication of modern cyber threats, prompting the integration of artificial intelligence (AI) to enhance detection capabilities. This textbook explores the intersection of AI and IDS, offering a comprehensive overview of the techniques and applications driving ...
By: Koffka Khan
-
AWS Certified Security - Specialty Study Guide
- By: SK Singh
- Narrated by: Virtual Voice
- Length: 19 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
"AWS Certified Security - Specialty Study Guide" is a comprehensive book for AWS Cloud practitioners seeking to build a secure AWS environment. The book empowers readers with the knowledge and skills to build a secure and resilient AWS cloud environment. Its content is geared toward AWS Certified Security -- Specialty exam. The last section has 130 high-quality exam-like practice questions with detailed answers. With exercises and guidance, this book empowers readers to navigate the intricacies of AWS cloud security and help secure their AWS infrastructure against modern threats. With a ...
By: SK Singh
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- By: Kimberly Burk Cordova
- Narrated by: Hannah Stone
- Length: 3 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Discover the powerful results that await you when you listen to "Cybersecurity for Entrepreneurs"! With this book, you will not only gain a strategic advantage in the digital age but you will also protect your digital assets, maintain customer trust, and understand the latest cybersecurity technologies to leverage for your business.
-
-
A Must-Listen for Business Owners
- By Joyce Bui on 07-13-24
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- By: Anthony Farrior
- Narrated by: Jennifer Workman
- Length: 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
By: Anthony Farrior
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- By: Jonathan Rigdon
- Narrated by: Kevin Brooker
- Length: 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
By: Jonathan Rigdon
-
Cybersecurity Governance
- A guide for executives who need to understand cybersecurity in plain, actionable language
- By: Darryl Carlton
- Narrated by: Virtual Voice
- Length: 6 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
Offering insights tailored for high-level decision-makers, this guide is an indispensable resource for any executive committed to enhancing their organization’s cybersecurity posture, ensuring a robust, informed response to the omnipresent threat of cyber intrusion. In today’s digital age, no business is immune to the relentless threat of cyberattacks that besiege organizations globally on a daily basis. The stark reality is that it’s not a matter of if but when your systems will become a target, potentially leading to significant data breaches and operational disruptions. As a leader...
By: Darryl Carlton
-
Conquer the CFCE Exam: Your Guide to Success as a Certified Forensic Computer Examiner
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the CFCE Exam: Your Guide to Success as a Certified Forensic Computer Examiner" is an essential resource for aspiring forensic examiners seeking to achieve CFCE certification. This comprehensive guide covers all aspects of digital forensics, including evidence acquisition, file system analysis, metadata extraction, and email forensics. Each chapter provides detailed explanations, practical techniques, and real-world case studies to help you develop the skills needed to conduct thorough and accurate forensic investigations. The book begins with an overview of the CFCE certification ...
-
Conquer the enCE Exam: Your Guide to Success as an EnCase Certified Examiner
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the enCE Exam: Your Guide to Success as an EnCase Certified Examiner" is an essential resource for anyone aspiring to become an EnCase Certified Examiner. This comprehensive guide covers every aspect of the enCE certification process, offering in-depth knowledge, practical insights, and step-by-step instructions to help you master the material and excel in both the written and practical phases of the exam. The book begins with an introduction to EnCase and the enCE certification, followed by detailed chapters on preparing for the exam, understanding digital forensics, and setting ...
-
Conquer the CISA Exam: Your Guide to Success as a Certified Information Systems Auditor
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the CISA Exam: Your Guide to Success as a Certified Information Systems Auditor" is an essential resource for anyone aiming to achieve the prestigious CISA certification. This comprehensive guide covers all the critical domains of the CISA exam, including Information Systems Auditing Process, Governance and Management of IT, Information Systems Acquisition, Development and Implementation, Information Systems Operations and Business Resilience, and Protection of Information Assets. The book begins with an overview of the CISA certification and its importance in the field of ...
-
Conquer the CISM Exam: Your Guide to Success as a Certified Information Systems Manager
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the CISM Exam: Your Guide to Success as a Certified Information Security Manager" is an essential resource for anyone aiming to achieve the prestigious CISM certification. This comprehensive guide covers all critical domains of the CISM exam, including Information Security Governance, Information Risk Management, Information Security Program Development and Management, and Information Security Incident Management. The book begins with an overview of the CISM certification and its importance in the field of information security management. It then delves into each domain in detail, ...
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- By: L.D. Knowings
- Narrated by: William Goldman
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
-
Comprehensive and Well-Structured
- By Tracy Covington on 06-23-24
By: L.D. Knowings
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- By: Omar Santos, Petar Radanliev
- Narrated by: Max Newland
- Length: 11 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
By: Omar Santos, and others
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- By: André Edmond
- Narrated by: Scotty Kwas
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you been struggling to find a guide that explains how to get started in cybersecurity? Does your lack of experience make it difficult to get your first job? The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points. The lack of a guiding hand leaves them stranded, not knowing which doors to knock on or which paths to tread.
By: André Edmond
-
Mastering Kali Purple
- For Vulnerability Assessment and Penetration Testing
- By: EL MOSTAFA OUCHEN
- Narrated by: Virtual Voice
- Length: 3 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Purple is a comprehensive security tool that combines offensive and defensive methodologies, providing a versatile platform for vulnerability assessment and penetration testing. Originating from Kali Linux, it combines aggressive tactics with vigilant defenses, embodying the purple teaming concept. This book aims to serve as a comprehensive guide for mastering Kali Purple, catering to both beginners and seasoned professionals. It covers various aspects of security, including application, database, wireless, and cloud security. Beyond technical aspects, it also discusses social ...
-
Conquer the GPEN Exam: Your Guide to Success as a GIAC Penetration Tester
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unlock your potential as a cybersecurity professional with "Conquer the GPEN Exam: Your Guide to Success as a GIAC Penetration Tester." This comprehensive study guide is your essential companion in mastering the GPEN certification, equipping you with the knowledge and skills needed to excel in penetration testing. Dive deep into the methodologies and techniques crucial for identifying and mitigating security vulnerabilities. Explore the entire penetration testing process, from planning and reconnaissance to scanning, exploitation, and post-exploitation. Learn effective information-gathering...
-
Conquer the CEH Exam: Your Guide to Success as a Certified Ethical Hacker
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
"Conquer the CEH Exam: Your Guide to Success as a Certified Ethical Hacker" is an essential resource for anyone preparing to become a Certified Ethical Hacker (CEH). This comprehensive study guide covers all critical topics needed to pass the CEH exam and excel in the field of ethical hacking. The book is meticulously structured to provide both theoretical knowledge and practical skills necessary for identifying and mitigating security threats. The guide begins with Footprinting and Reconnaissance Techniques, teaching methods to gather information about target systems and networks, a ...
-
Conquer the CHFI Exam: Your Guide to Success as a Computer Hacking Forensic Investigator
- By: Philip Martin McCaulay
- Narrated by: Virtual Voice
- Length: 2 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Prepare to excel in the Computer Hacking Forensic Investigator (CHFI) certification exam with "Conquer the CHFI Exam: Your Guide to Success as a Computer Hacking Forensic Investigator." This comprehensive study guide covers all critical topics to ensure you master the skills needed to succeed. Dive into the Computer Forensics Investigation Process, understanding the systematic approach to identifying, preserving, and analyzing digital evidence. Learn essential techniques for Digital Evidence Acquisition, ensuring the integrity and admissibility of evidence in legal proceedings. Explore the ...