
We're pleased to have you join us
30-day trial with Audible is available.
New Releases
-
Click with Caution
- 10 Online Red Flags That Scream ‘Scam!’ (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 2)
- By: Alsden Kier
- Narrated by: stephen plaushin
- Length: 1 hr and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The internet has transformed our world in amazing ways. With just a few clicks, we can talk to friends on the other side of the globe, discover new music, explore our favorite hobbies, shop for just about anything, and even take entire college courses from the comfort of our couch. It’s no exaggeration to say that the internet is one of the greatest tools ever invented. But just like in the real world, not everyone you meet online has good intentions. Hidden among the games, chats, and cute cat videos are people who spend their time trying to trick others.
-
-
Teachers Should Use This Book
- By Isabella Owen on 16-06-25
By: Alsden Kier
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- By: Alsden Keir
- Narrated by: Darren Guido
- Length: 1 hr and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends. Communicating through screens has become so common that most of us don’t even think twice before opening a message, clicking a link, or responding to a notification. But in that sea of normal communication lies something much more dangerous: messages designed to trick you, to make you give away your passwords, financial details, or other private information. These scams often come hidden in the very tools we trust most—email and text.
-
-
Essential Knowledge for the Digital Age
- By Libby Matthews on 31-05-25
By: Alsden Keir
-
Beginners Guide to VPNs
- Your Secret Tunnel to Online Privacy
- By: Alsden Keir
- Narrated by: Michelle Peitz
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where every click is tracked, every search is analyzed, and every online move leaves a trace, digital privacy has never been more critical or vulnerable. Beginners Guide to VPNs: Your Secret Tunnel to Online Privacy by Alsden Keir is your essential roadmap to understanding, choosing, and using Virtual Private Networks (VPNs) confidently and clearly. Far from being a tool for tech experts or conspiracy theorists, a VPN is a simple, effective solution for anyone who values online privacy, security, and freedom.
-
-
Opened My Eyes to Online Surveillance
- By David Parker on 15-06-25
By: Alsden Keir
-
Beyond the Firewall
- Enhancing SCADA Security in the Age of Cyber Threats
- By: Chukwudi Abalogu
- Narrated by: B Fike
- Length: 4 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
The background noise of power grids working alongside water pipelines carrying liquid and trains moving along tracks represent the hidden heartbeat of modern civilization which supports our global connectedness. The vital systems supporting our economies and societies remain hidden from everyday view while they sustain both the simple and complex aspects of daily life. At the heart of this critical infrastructure lies a network of sophisticated control systems: SCADA–Supervisory Control and Data Acquisition.
-
-
Way more interesting than I thought It’d be
- By Victor on 16-06-25
By: Chukwudi Abalogu
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- By: Taimur Ijlal
- Narrated by: Shawn Elliott
- Length: 2 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
By: Taimur Ijlal
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- By: Andrew Pattison
- Narrated by: Kerry Hutchinson
- Length: 2 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remain up to date, Version 2.0 states that “The CSF is designed to be used by organizations of all sizes and sectors, including industry, government, academia, and nonprofit organizations, regardless of the maturity level of their cybersecurity programs.”
By: Andrew Pattison
-
Click with Caution
- 10 Online Red Flags That Scream ‘Scam!’ (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 2)
- By: Alsden Kier
- Narrated by: stephen plaushin
- Length: 1 hr and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The internet has transformed our world in amazing ways. With just a few clicks, we can talk to friends on the other side of the globe, discover new music, explore our favorite hobbies, shop for just about anything, and even take entire college courses from the comfort of our couch. It’s no exaggeration to say that the internet is one of the greatest tools ever invented. But just like in the real world, not everyone you meet online has good intentions. Hidden among the games, chats, and cute cat videos are people who spend their time trying to trick others.
-
-
Teachers Should Use This Book
- By Isabella Owen on 16-06-25
By: Alsden Kier
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- By: Alsden Keir
- Narrated by: Darren Guido
- Length: 1 hr and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends. Communicating through screens has become so common that most of us don’t even think twice before opening a message, clicking a link, or responding to a notification. But in that sea of normal communication lies something much more dangerous: messages designed to trick you, to make you give away your passwords, financial details, or other private information. These scams often come hidden in the very tools we trust most—email and text.
-
-
Essential Knowledge for the Digital Age
- By Libby Matthews on 31-05-25
By: Alsden Keir
-
Beginners Guide to VPNs
- Your Secret Tunnel to Online Privacy
- By: Alsden Keir
- Narrated by: Michelle Peitz
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where every click is tracked, every search is analyzed, and every online move leaves a trace, digital privacy has never been more critical or vulnerable. Beginners Guide to VPNs: Your Secret Tunnel to Online Privacy by Alsden Keir is your essential roadmap to understanding, choosing, and using Virtual Private Networks (VPNs) confidently and clearly. Far from being a tool for tech experts or conspiracy theorists, a VPN is a simple, effective solution for anyone who values online privacy, security, and freedom.
-
-
Opened My Eyes to Online Surveillance
- By David Parker on 15-06-25
By: Alsden Keir
-
Beyond the Firewall
- Enhancing SCADA Security in the Age of Cyber Threats
- By: Chukwudi Abalogu
- Narrated by: B Fike
- Length: 4 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
The background noise of power grids working alongside water pipelines carrying liquid and trains moving along tracks represent the hidden heartbeat of modern civilization which supports our global connectedness. The vital systems supporting our economies and societies remain hidden from everyday view while they sustain both the simple and complex aspects of daily life. At the heart of this critical infrastructure lies a network of sophisticated control systems: SCADA–Supervisory Control and Data Acquisition.
-
-
Way more interesting than I thought It’d be
- By Victor on 16-06-25
By: Chukwudi Abalogu
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- By: Taimur Ijlal
- Narrated by: Shawn Elliott
- Length: 2 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
By: Taimur Ijlal
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- By: Andrew Pattison
- Narrated by: Kerry Hutchinson
- Length: 2 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remain up to date, Version 2.0 states that “The CSF is designed to be used by organizations of all sizes and sectors, including industry, government, academia, and nonprofit organizations, regardless of the maturity level of their cybersecurity programs.”
By: Andrew Pattison
-
The Identity Security Imperative
- A Leader's Guide to Securing Every Identity
- By: CyberArk
- Narrated by: Matt Haver
- Length: 3 hrs and 12 mins
- Unabridged
-
Overall
-
Performance
-
Story
Identity is the lifeblood of every organization and the top attack vector. Securing every identity - human and machine - is critical for mitigating risk and ensuring business resilience. In The Identity Security Imperative, security leaders finally have a clear guide to understanding and implementing identity security. This book equips you with the insights you need to master the fundamentals, align your security and business goals, and build a resilient, secure tomorrow.
By: CyberArk
-
Der Cyber Blueprint (German Edition)
- By: Andre Edmond
- Narrated by: Maya Lichtadler
- Length: 6 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Entfalten Sie Ihr Potenzial: Wechseln Sie mit Zuversicht vom IT-Support zur Cybersicherheit! Sind Sie ein IT-Experte oder Helpdesk-Techniker, der den Sprung in die Cybersicherheit wagen möchte? Dieses Buch ist Ihr Fahrplan für einen erfolgreichen Übergang. Viele IT-Fachkräfte stehen vor Herausforderungen wie begrenzter Erfahrung, Unsicherheit über Zertifizierungen und fehlendem Praxiswissen, wodurch die erste Stelle im Bereich Cybersicherheit unerreichbar scheint. Doch mit der richtigen Anleitung können Sie Ihre IT-Kenntnisse gezielt nutzen, um Ihre Karriere zu beschleunigen.
By: Andre Edmond
-
Le plan d'action cybernétique
- By: Andre Edmond
- Narrated by: Cole Mercer
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
Libérez votre potentiel : Faites le saut vers la cybersécurité avec confiance ! Vous êtes un professionnel de l'informatique ou un technicien du service d'assistance cherchant à entrer dans le domaine de la cybersécurité mais vous ne savez pas par où commencer ? Ce guide est votre feuille de route pour réussir cette transition. Passer de l'assistance informatique à la cybersécurité peut sembler intimidant. Un manque d'expérience pratique, des incertitudes sur les certifications et des lacunes en cybersécurité peuvent rendre l'accès au premier poste difficile.
By: Andre Edmond
-
Transforming Information Security
- Optimizing Five Concurrent Trends to Reduce Resource Drain
- By: Kathleen M. Moriarty
- Narrated by: Kathleen M. Moriarty
- Length: 7 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.
-
The Ultimate Cyber Security Guide for TikTok Everyday Users, Influencers and Content Creators
- The First Ever Guide Dedicated to Protecting Your Presence and Privacy on TikTok
- By: WeCyberYou!
- Narrated by: AJ Collins
- Length: 1 hr and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is for you. It has been narrated specially for all TikTok Everyday Users, Influencers and Content Creators around the world. We’ll show you how you can make the most of TikTok – safely and securely! You’ll find the knowledge and guidance you need to protect your TikTok account effectively.
By: WeCyberYou!
-
Supervivencia
- Afrontar los riesgos no mitigados and Amenazas jamás vistas de la actual guerra geopolítica y cibernética para sobrevivir y prosperar competitivamente en el siglo XXI
- By: Khaled Fattal
- Narrated by: Keymer Luca
- Length: 22 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Enfrentando los riesgos no mitigados y las amenazas sin precedentes de los ataques y la guerra Geo-Poli-Cyber™ de hoy para sobrevivir y prosperar competitivamente en la actualidad y en el siglo XXI.
By: Khaled Fattal