- History & Culture (1,163)
We're pleased to have you join us
30-day trial with Audible is available.
Best Sellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
The machinics of global finance, present and historic explained simply
- By lukman on 18-03-24
By: Lyn Alden
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
By: Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
An OK book but you'll be glad when its finished
- By Ian Hemmings on 19-06-17
By: Kevin Mitnick, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Bad book
- By Dionysis Zindros on 07-12-19
By: Kevin Mitnick
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
-
Excellent study guide, learn CISM anywhere
- By NP on 13-09-23
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
By: Glen D. Singh
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
The machinics of global finance, present and historic explained simply
- By lukman on 18-03-24
By: Lyn Alden
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
By: Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
An OK book but you'll be glad when its finished
- By Ian Hemmings on 19-06-17
By: Kevin Mitnick, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Bad book
- By Dionysis Zindros on 07-12-19
By: Kevin Mitnick
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
-
Excellent study guide, learn CISM anywhere
- By NP on 13-09-23
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
By: Glen D. Singh
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Fascinating subject and an amazing story
- By Just little old me on 01-04-15
By: Kim Zetter
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Interesting subject
- By Joe T on 06-01-24
By: Bruce Schneier
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
Real-World Cryptography
- By: David Wong
- Narrated by: Derek Dysart
- Length: 13 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging....
By: David Wong
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
I can't tell you how bad this is
- By Paul Beyer on 20-11-23
By: Mike Chapple, and others
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- By: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrated by: Mike Lenz
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
By: Brian Allen, and others
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs....
-
CISA Strategic Plan 2023-2025
- By: Cybersecurity and Infrastructure Security Agency
- Narrated by: Tom Brooks
- Length: 2 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
I am proud to share the 2023–2025 CISA Strategic Plan, the first comprehensive Strategic Plan since CISA was established as an agency in 2018....
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
a good book poorly translated into an audio book
- By JimmyJimbo on 01-02-22
By: Eric Conrad, and others
-
NFT, Metaverse & Cryptocurrency Trading
- The Complete Guide To Investing In Crypto, Non-Fungible Tokens, Blockchain Technology, Metaverse, And Digital Artwork | Achieve Financial Freedom.
- By: James Holm
- Narrated by: Darren Stephen Ferguson
- Length: 30 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Master options trading and harness its potential for exponential gains. Learn the fundamental principles of cryptocurrency investing. Unlock the secrets of cryptocurrency trading....
By: James Holm
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Fascinating History of Hacking
- By James on 19-07-19
By: Joseph Menn
-
CompTIA Networking
- By: John Wilbert
- Narrated by: Lee Goettl
- Length: 1 hr and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
CompTIA is one of the few reliable and trusted information technology supportive resources that enable fledgling professionals to achieve professional success within the industry without necessarily requiring a degree....
By: John Wilbert
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 9 hrs
- Unabridged
-
Overall
-
Performance
-
Story
This cat-and-mouse story of a vast FBI sting operation reveals how the criminal underworld has become a globalized economy in its own right—one that can't be policed without crossing complicated ethical boundaries....
By: Joseph Cox
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them....
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform security, and more....
-
-
Worthless.
- By Dermot on 28-06-22
By: Ben Malisow
-
Introduction to Cyber Security: Fundamentals
- By: Ugo Ekpo MBCS CITP
- Narrated by: Bruce Enrietto
- Length: 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introduction to Cyber Security is a book for all ages, irrespective of gender, but without the common technical jargon....
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
A very interesting read
- By LondonBubble on 28-02-23
By: Renee Dudley, and others
-
The Cyber Risk Handbook
- Creating and Measuring Effective Cybersecurity Capabilities
- By: Domenic Antonucci
- Narrated by: Mark Schectman
- Length: 10 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Actionable guidance and expert perspective for real-world cybersecurity....
-
-
No pdf
- By Alex.cardiff on 30-01-19
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
By: Joseph Steinberg, and others
-
The Hacker Crackdown
- Law and Disorder on the Electronic Frontier
- By: Bruce Sterling
- Narrated by: Tom Parks
- Length: 12 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bruce Sterling delves into the world of high-tech crime and punishment in one of the first books to explore the cyberspace breaches that threaten national security....
By: Bruce Sterling
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
By: Mike Chapple, and others
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- By: L.D. Knowings
- Narrated by: KC Wayman
- Length: 3 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets.
-
-
Guardian's Book
- By Anonymous User on 16-03-24
By: L.D. Knowings
-
CompTIA Security+
- Study Guide for the CompTIA Security+ Certification (Exam SY0-501)
- By: Samuel Foster
- Narrated by: Eli Brennan
- Length: 3 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
You are about to learn how to ace CompTIA Security+ (SY0-501) exams - the easy way to grow your IT career....
-
-
This is absolutely diabolical
- By Sashikant Parmar on 15-05-22
By: Samuel Foster
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- By: Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrated by: Shawn K. Jain
- Length: 7 hrs
- Unabridged
-
Overall
-
Performance
-
Story
A team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats....
By: Ram Shankar Siva Kumar, and others
New Releases
-
#HACKED2
- Practical Guidance for Dealing with Threats to Your Business and Privacy
- By: Albert E. Whale, Thomas Albert, Chuck Brooks, and others
- Narrated by: David Roth
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
#HACKED2 is the follow-up to an award-winning book #HACKED, that was written with industry leaders in cybersecurity. It offers practical advice about what you can do if your business or privacy has been threatened, but it also provides multiple viewpoints on how these issues are being addressed across various fields around the globe - making this resource essential for anyone who wants better awareness of global threats faced today!
By: Albert E. Whale, and others
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- By: Roger A. Grimes
- Narrated by: Ray Greenley
- Length: 11 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.
By: Roger A. Grimes
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- By: Ed Adams
- Narrated by: Rich Miller
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
By: Ed Adams
-
Code Dependent
- Living in the Shadow of AI
- By: Madhumita Murgia
- Narrated by: Madhumita Murgia
- Length: 9 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
A British poet, an UberEats courier in Pittsburgh, an Indian doctor, and a Chinese activist in exile apparently have nothing in common. Yet their lives are linked by their unexpected encounters with artificial intelligence. In the human stories she tells in Code Dependent, Murgia shows how automated systems are reshaping our lives all over the world, from technology that marks children as future criminals to an app that is helping to give diagnoses to a remote tribal community.
By: Madhumita Murgia
-
Digital Fortress
- Navigating Cyber Threats: Mastering the Art of Online Security and Privacy
- By: David Goodin
- Narrated by: Siah Clark
- Length: 3 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide is crafted for those who find themselves intrigued by the origins of malware or seeking effective strategies to fend off online dangers. Whether your knowledge of computers is minimal or you possess a foundational understanding, this book stands as a beacon, illuminating the often intimidating realm of computer security.
By: David Goodin
-
Killer Tech and the Drive to Save Humanity
- By: Mark Stross
- Narrated by: Douglas Martin
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Killer Tech and the Drive to Save Humanity, Mark Stross presents a gripping exploration of our entanglement with technology in a world where digital platforms increasingly dictate our lives. With thought-provoking insights and real-life anecdotes, Mark unveils the hidden costs of our digital addiction and challenges listeners to reconsider their relationship with technology.
By: Mark Stross
-
#HACKED2
- Practical Guidance for Dealing with Threats to Your Business and Privacy
- By: Albert E. Whale, Thomas Albert, Chuck Brooks, and others
- Narrated by: David Roth
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
#HACKED2 is the follow-up to an award-winning book #HACKED, that was written with industry leaders in cybersecurity. It offers practical advice about what you can do if your business or privacy has been threatened, but it also provides multiple viewpoints on how these issues are being addressed across various fields around the globe - making this resource essential for anyone who wants better awareness of global threats faced today!
By: Albert E. Whale, and others
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- By: Roger A. Grimes
- Narrated by: Ray Greenley
- Length: 11 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.
By: Roger A. Grimes
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- By: Ed Adams
- Narrated by: Rich Miller
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
By: Ed Adams
-
Code Dependent
- Living in the Shadow of AI
- By: Madhumita Murgia
- Narrated by: Madhumita Murgia
- Length: 9 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
A British poet, an UberEats courier in Pittsburgh, an Indian doctor, and a Chinese activist in exile apparently have nothing in common. Yet their lives are linked by their unexpected encounters with artificial intelligence. In the human stories she tells in Code Dependent, Murgia shows how automated systems are reshaping our lives all over the world, from technology that marks children as future criminals to an app that is helping to give diagnoses to a remote tribal community.
By: Madhumita Murgia
-
Digital Fortress
- Navigating Cyber Threats: Mastering the Art of Online Security and Privacy
- By: David Goodin
- Narrated by: Siah Clark
- Length: 3 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide is crafted for those who find themselves intrigued by the origins of malware or seeking effective strategies to fend off online dangers. Whether your knowledge of computers is minimal or you possess a foundational understanding, this book stands as a beacon, illuminating the often intimidating realm of computer security.
By: David Goodin
-
Killer Tech and the Drive to Save Humanity
- By: Mark Stross
- Narrated by: Douglas Martin
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Killer Tech and the Drive to Save Humanity, Mark Stross presents a gripping exploration of our entanglement with technology in a world where digital platforms increasingly dictate our lives. With thought-provoking insights and real-life anecdotes, Mark unveils the hidden costs of our digital addiction and challenges listeners to reconsider their relationship with technology.
By: Mark Stross
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- By: L.D. Knowings
- Narrated by: KC Wayman
- Length: 3 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
-
Guardian's Book
- By Anonymous User on 16-03-24
By: L.D. Knowings
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
By: Jamie Murphy
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601
- By: A.E. Alvo
- Narrated by: Paul Anderson
- Length: 26 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
CompTIA Security+The "CompTIA Security+ All-in-One Exam Guide Exam SY0-601" is a comprehensive and expertly organized manual designed to prepare IT professionals for the CompTIA Security+ certification exam. This guide thoroughly addresses all the topics and objectives outlined in the SY0-601 exam, providing listeners with the knowledge and skills necessary to achieve certification. Key features of this guide include:
By: A.E. Alvo
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- By: Taimur Ijlal
- Narrated by: Scott Mandeville
- Length: 4 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the dynamic world of cybersecurity with the 'CompTIA Security+ Revision Guide'. This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals. Learn about the unique risks in the digital realm, develop a robust security framework, and understand the intricacies of cybersecurity in various systems. This book is crafted for easy comprehension, requiring no prior expertise in cybersecurity or programming.
By: Taimur Ijlal
-
Cybersecurity and Privacy Law Introduction
- By: Convocourses
- Narrated by: Kim Pepper
- Length: 3 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice.
By: Convocourses
-
The Digital Armor: Business Cyber Defense Strategies
- Defending the Digital Frontline: Cybersecurity Tactics for Businesses
- By: Tom Brooks
- Narrated by: Tom Brooks
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the rapidly evolving digital age, cybersecurity has emerged as a cornerstone of business resilience and continuity. "The Digital Armor: Business Cyber Defense Strategies - Defending the Digital Frontline: Cybersecurity Tactics for Businesses" by Tom Brooks is a comprehensive guide designed to navigate the complex cybersecurity landscape facing today's organizations. This book offers a multi-faceted approach to fortify defenses, emphasizing the integration of technology, policy, and education to safeguard against the myriad cyber threats that businesses encounter.
By: Tom Brooks
-
Keanu Reeves Is Not in Love with You
- The Murky World of Online Romance Fraud
- By: Becky Holmes
- Narrated by: Becky Holmes
- Length: 6 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
No other woman has had so many online romances–from Keanu Reeves to Brad Pitt to Prince William–and Becky Holmes is a favorite among peacekeeping soldiers and oil rig workers who desperately need iTunes vouchers. By winding up scammers and investigating the truth behind their profiles, Becky shines a revealing, revolting and hilarious light on a very shady corner of the internet.
-
-
Interesting
- By bangandthedirtisgone on 18-03-24
By: Becky Holmes
-
CompTIA CySA+ Study Guide: Exam CS0-003
- By: A.E. Alvo
- Narrated by: Paul Anderson
- Length: 32 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
This study-guide is an expertly crafted guide designed to assist candidates in preparing for the CompTIA Cybersecurity Analyst (CySA+) certification, specifically targeting the CS0-003 exam. This all-encompassing guide covers essential cybersecurity concepts and skills, presented in a clear, structured format for easy understanding.
By: A.E. Alvo
-
The Language of Deception
- Weaponizing Next Generation AI
- By: Justin Hutchens
- Narrated by: Mike Chamberlain
- Length: 10 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes. In the book, you will explore the history of social engineering and social robotics, the psychology of deception, considerations of machine sentience and consciousness, and the history of how technology has been weaponized in the past.
By: Justin Hutchens
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- By: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrated by: Mike Lenz
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
By: Brian Allen, and others
-
Cyber Wargaming
- Research and Education for Security in a Dangerous Digital World
- By: Frank L. Smith III - Editor, Nina A. Kollars - Editor, Benjamin H. Schechter - Editor
- Narrated by: Kyle Tait
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Government, industry, and academia need better tools to explore threats, opportunities, and human interactions in cyberspace. The interactive exercises called cyber wargames are a powerful way to solve complex problems in a digital environment that involves both cooperation and conflict.
-
-
interesting content
- By Jay on 19-02-24
By: Frank L. Smith III - Editor, and others
-
33 Ways Not to Screw Up Being a Woman in Tech
- By: Marcia Dempster
- Narrated by: Marcia Dempster
- Length: 4 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
How can a woman navigate the male-dominated tech world while staying true to herself? In this book, Marcia Dempster, a global sales leader in the cybersecurity space, will teach you how to find your allies, both male and female.
By: Marcia Dempster