Ethical Hacking
The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
Failed to add items
Add to basket failed.
Add to wishlist failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
£0.00 for first 30 days
Buy Now for £11.99
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Brian R. Scott
-
By:
-
Lester Evans
About this listen
Ever feel like you don’t even own the hardware and software you paid dearly for?
Ever get the impression that you have to ask for permission before installing or changing a program on your device?
Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads?
You’re not alone.
Half-baked products and services that chip away at your sense of ownership, independence, and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers. None of it is intentional or meant to cause harm, which makes it all the more damning.
There’s a silver lining in all of this, and that is ethical hacking. This book will shine a light on how engineers think and show you how to discern their original intentions, helping you adopt their attitude and perfect their products despite managerial crud doing their worst to stop you.
In a world where everything is slowly becoming more managed and overbearing, this audiobook is an attempt to take back some of that original awesomeness envisioned by engineers and at least make your world a slightly better place.
Here’s just a tiny fraction of the topics covered in this audiobook:
- Fighting against companies
- Ethical hacking defined
- War on the internet
- Engineer’s mind
- The almighty EULA
- The danger of defaults
- John Deere
- Copyright
- YouTube ContentID
- Tracking users
- DRM
- GEMA, the copyright police
- Torrents
- Sports channels
- Megaupload and Anonymous
- Julian Assange
- Patents
- Penetration testing
- Jailbreaking Android/iPhone
- Shut up Cortana
- How an hacker could go about hacking your WiFi and much, much more!
If you want to learn more about ethical hacking, then scroll up and click “add to cart”!
©2019 Lester Evans (P)2019 Lester EvansWhat listeners say about Ethical Hacking
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
- Andrew
- 02-09-19
Terrible
This book has nothing to do with penetration testing. Penetration testing is not mentioned once beyond the reading of the book name. There is nothing on improving cyber security. No tools are mentioned for pen testing, or for security management. Rather, such gems are offered as "Don't use Google calendar", "Copyright is evil" and "upload fake selfies to fool the social networks" - essentially this book is a collection of incorrect, vague and utterly one-sided musings on the world.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- J
- 13-03-19
Weird
I wanted a technical guide to ethical hacking not this bizarre libertarian manifesto. Don't waste your time with this.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful