- History & Culture (1,177)
We're pleased to have you join us
30-day trial with Audible is available.
Best Sellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
A very engaging history of money and how it gets abused by authorities.
- By Howard Wright on 24-04-24
By: Lyn Alden
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
An OK book but you'll be glad when its finished
- By Ian Hemmings on 19-06-17
By: Kevin Mitnick, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Bad book
- By Dionysis Zindros on 07-12-19
By: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
By: Andy Greenberg
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
I can't tell you how bad this is
- By Paul Beyer on 20-11-23
By: Mike Chapple, and others
-
How I Rob Banks
- And Other Such Places
- By: FC
- Narrated by: Paul Brion
- Length: 7 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
Renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on....
-
-
A robot like (emotionless) American male voice
- By Deano on 09-11-23
By: FC
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
A very engaging history of money and how it gets abused by authorities.
- By Howard Wright on 24-04-24
By: Lyn Alden
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
An OK book but you'll be glad when its finished
- By Ian Hemmings on 19-06-17
By: Kevin Mitnick, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Bad book
- By Dionysis Zindros on 07-12-19
By: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
By: Andy Greenberg
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
I can't tell you how bad this is
- By Paul Beyer on 20-11-23
By: Mike Chapple, and others
-
How I Rob Banks
- And Other Such Places
- By: FC
- Narrated by: Paul Brion
- Length: 7 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
Renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on....
-
-
A robot like (emotionless) American male voice
- By Deano on 09-11-23
By: FC
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 9 hrs
- Unabridged
-
Overall
-
Performance
-
Story
This cat-and-mouse story of a vast FBI sting operation reveals how the criminal underworld has become a globalized economy in its own right—one that can't be policed without crossing complicated ethical boundaries....
By: Joseph Cox
-
The Hacker Crackdown
- Law and Disorder on the Electronic Frontier
- By: Bruce Sterling
- Narrated by: Tom Parks
- Length: 12 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bruce Sterling delves into the world of high-tech crime and punishment in one of the first books to explore the cyberspace breaches that threaten national security....
By: Bruce Sterling
-
Hacking with Kali Linux
- A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
- By: Peter Bradley
- Narrated by: Cliff Weldon
- Length: 1 hr and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you fascinated by the idea of hacking? Do you want to learn the secrets of ethical hackers? This practical, step-by-step guide audiobook will teach you all you need to know! Listen to find out more....
-
-
The reader reads out loud the links and the syntaxes of the programs absolutely not enjoyable
- By Viktor Rostas on 22-04-24
By: Peter Bradley
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Fascinating subject and an amazing story
- By Just little old me on 01-04-15
By: Kim Zetter
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- By: Taimur Ijlal
- Narrated by: Scott Mandeville
- Length: 4 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals.
By: Taimur Ijlal
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
By: Joseph Steinberg, and others
-
There's a War Going On but No One Can See It
- By: Huib Modderkolk
- Narrated by: Omar Baroud
- Length: 8 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late....
-
-
learned so much
- By Sandra pukite on 03-04-24
By: Huib Modderkolk
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- By: Keith Martin
- Narrated by: Matthew Waterson
- Length: 7 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies....
-
-
Crap narrator
- By jake john on 05-10-20
By: Keith Martin
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
-
-
Great content. Nice change in approach to technical content.
- By Jay on 08-02-24
By: George Finney, and others
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Interesting subject
- By Joe T on 06-01-24
By: Bruce Schneier
-
The Cyber Security Handbook
- Prepare for, Respond to and Recover from Cyber Attacks with the It Governance Cyber Resilience Framework (CRF)
- By: Alan Calder
- Narrated by: Stephen Perring
- Length: 7 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF)....
By: Alan Calder
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- By: Phil Champagne
- Narrated by: Stephanie Murphy
- Length: 7 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
The book of Satoshi, the collected writings of Satoshi Nakamoto....
-
-
Difficult listening
- By Amazon Customer on 18-07-17
By: Phil Champagne
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- By: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrated by: Mike Lenz
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
By: Brian Allen, and others
-
Cypherpunks
- Freedom and the Future of the Internet
- By: Julian Assange
- Narrated by: Tom Pile
- Length: 4 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s....
-
-
Paranoia or Prescience?
- By Jim Vaughan on 07-08-13
By: Julian Assange
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 17 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire study guide and breaks it into easy-to-absorb chapters....
-
-
Please add chapter titles, book suffers without.
- By Andrew on 15-04-19
By: Phil Martin
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are....
-
-
Ok for those with 0 knowledge but avoid if techie
- By Rob on 02-02-19
By: Charles Arthur
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality....
-
-
very good
- By CBD Flowers on 24-06-22
By: Maxie Reynolds
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
-
Excellent study guide, learn CISM anywhere
- By NP on 13-09-23
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
-
good book but might be better as a read
- By TvW on 24-07-15
By: Glenn Greenwald
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
By: Mike Chapple, and others
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
A very interesting read
- By LondonBubble on 28-02-23
By: Renee Dudley, and others
-
Dollars, Gold, and Bitcoin
- The Fed's Hidden Agenda and How to Profit from It
- By: John S. Pennington Jr.
- Narrated by: John S. Pennington Jr.
- Length: 6 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
There’s a secret war going on for the future of money. The United States government—as it has for generations—is winning. And you can too....
-
-
Great toolkit
- By Modris on 28-02-24
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- By: Steve Watkins
- Narrated by: Steve G Watkins
- Length: 1 hr
- Unabridged
-
Overall
-
Performance
-
Story
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022....
By: Steve Watkins
New Releases
-
Phone Phishing (Vishing) for Seniors
- Cyber Safety in 15 Minutes a Day for Seniors (Cyber Safety in 15-Min a Day for Seniors, Book 1)
- By: Dr. Feliks Kravets
- Narrated by: Barry Fike
- Length: 1 hr and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book is part of a series titled "CyberSafety in 15 Minutes a Day," aimed specifically at enhancing the awareness of social engineering threats among seniors. Given that seniors are often the primary targets of cyber attacks, the goal of this publication is to support the community by offering cyber safety coaching and enhancing awareness about social engineering tactics.
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- By: Dana Onyshko
- Narrated by: Gary Westphalen, Jon Bratton
- Length: 5 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management. Do you feel that cyber security is indispensable in todays digital-dependent world? Do you want to introduce yourself to the world of cyber security but are easily overwhelmed or not sure where to start? Are you concerned about your own digital devices and networks, do you suspect they may be hacked or reporting information about your daily habits to unknown databases?
By: Dana Onyshko
-
#Hacked
- 10 Practical Cybersecurity Tips to Help Protect Personal or Business Information
- By: Albert Whale
- Narrated by: Dana Lara Meecham
- Length: 2 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
The #HACKED book (2024 edition) is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity. Whether you're a business owner, student, or just someone who wants to stay safe online, The #HACKED book has everything you need to know.
By: Albert Whale
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments. From concepts to advanced techniques, this book offers a structured and accessible approach to understanding the nuances of cloud security.
By: Jamie Murphy
-
Zero Trust
- Navigating Cybersecurity Risks in Third-Party Environments
- By: Jafar Hasan
- Narrated by: Andrew Baldwin, Jafar Hasan
- Length: 6 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In today's digital age, where businesses operate in an interconnected and rapidly evolving technological landscape, cybersecurity has emerged as a critical concern. With the increasing reliance on digital systems, cloud services, and interconnected networks, organizations face many cybersecurity challenges that demand proactive and robust risk management strategies.
By: Jafar Hasan
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
By: Cindy Green-Ortiz, and others
-
Phone Phishing (Vishing) for Seniors
- Cyber Safety in 15 Minutes a Day for Seniors (Cyber Safety in 15-Min a Day for Seniors, Book 1)
- By: Dr. Feliks Kravets
- Narrated by: Barry Fike
- Length: 1 hr and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book is part of a series titled "CyberSafety in 15 Minutes a Day," aimed specifically at enhancing the awareness of social engineering threats among seniors. Given that seniors are often the primary targets of cyber attacks, the goal of this publication is to support the community by offering cyber safety coaching and enhancing awareness about social engineering tactics.
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- By: Dana Onyshko
- Narrated by: Gary Westphalen, Jon Bratton
- Length: 5 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management. Do you feel that cyber security is indispensable in todays digital-dependent world? Do you want to introduce yourself to the world of cyber security but are easily overwhelmed or not sure where to start? Are you concerned about your own digital devices and networks, do you suspect they may be hacked or reporting information about your daily habits to unknown databases?
By: Dana Onyshko
-
#Hacked
- 10 Practical Cybersecurity Tips to Help Protect Personal or Business Information
- By: Albert Whale
- Narrated by: Dana Lara Meecham
- Length: 2 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
The #HACKED book (2024 edition) is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity. Whether you're a business owner, student, or just someone who wants to stay safe online, The #HACKED book has everything you need to know.
By: Albert Whale
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments. From concepts to advanced techniques, this book offers a structured and accessible approach to understanding the nuances of cloud security.
By: Jamie Murphy
-
Zero Trust
- Navigating Cybersecurity Risks in Third-Party Environments
- By: Jafar Hasan
- Narrated by: Andrew Baldwin, Jafar Hasan
- Length: 6 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In today's digital age, where businesses operate in an interconnected and rapidly evolving technological landscape, cybersecurity has emerged as a critical concern. With the increasing reliance on digital systems, cloud services, and interconnected networks, organizations face many cybersecurity challenges that demand proactive and robust risk management strategies.
By: Jafar Hasan
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
By: Cindy Green-Ortiz, and others
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification. Navigating through fundamental concepts and advanced techniques, this book serves as a trusted companion for those seeking to master the intricate landscape of cybersecurity.
By: Jamie Murphy
-
51 Essential Cyber Terms Explained for Leaders
- A Non-Technical Guide. Each Term Defined, Explained and with a Practical Example to Increase Your Leadership Impact
- By: Marco Ryan, Andrew Fitzmaurice
- Narrated by: James Moors
- Length: 2 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Marco Ryan, a Cyber Leader in Residence at a leading UK Business School and with over 25 years of Digital and Cyber Senior Leadership experience with companies such as bp, specializes in making the world of Digital, AI, and Cyber simple, jargon-free and easy to understand for Leaders, even if they have no background in technology or IT. This book is like no other in Cybersecurity. Each term is arranged alphabetically making it easy to find, with a formal definition, then a simple jargon-free explanation and then a real-life example.
-
-
Highly recommend
- By WoodStoneBridge on 22-04-24
By: Marco Ryan, and others
-
The NIST Framework (CSF) 2.0
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 2 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization - regardless of its size, sector, or maturity - to better understand, assess, prioritize, and communicate its cybersecurity efforts.
-
#HACKED2
- Practical Guidance for Dealing with Threats to Your Business and Privacy
- By: Albert E. Whale, Thomas Albert, Chuck Brooks, and others
- Narrated by: David Roth
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
#HACKED2 is the follow-up to an award-winning book #HACKED, that was written with industry leaders in cybersecurity. It offers practical advice about what you can do if your business or privacy has been threatened, but it also provides multiple viewpoints on how these issues are being addressed across various fields around the globe - making this resource essential for anyone who wants better awareness of global threats faced today!
By: Albert E. Whale, and others
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- By: Ed Adams
- Narrated by: Rich Miller
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
By: Ed Adams
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- By: Roger A. Grimes
- Narrated by: Ray Greenley
- Length: 11 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.
By: Roger A. Grimes
-
Code Dependent
- Living in the Shadow of AI
- By: Madhumita Murgia
- Narrated by: Madhumita Murgia
- Length: 9 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Through the voices of ordinary people in places far removed from Silicon Valley, Code Dependent explores the impact of a set of powerful, flawed, and often exploitative technologies on individuals, communities, and our wider society. Madhumita Murgia, AI Editor at the FT, exposes how AI can strip away our collective and individual sense of agency – and shatter our illusion of free will.
By: Madhumita Murgia
-
Digital Fortress
- Navigating Cyber Threats: Mastering the Art of Online Security and Privacy
- By: David Goodin
- Narrated by: Siah Clark
- Length: 3 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide is crafted for those who find themselves intrigued by the origins of malware or seeking effective strategies to fend off online dangers. Whether your knowledge of computers is minimal or you possess a foundational understanding, this book stands as a beacon, illuminating the often intimidating realm of computer security.
By: David Goodin
-
Killer Tech and the Drive to Save Humanity
- By: Mark Stross
- Narrated by: Douglas Martin
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Killer Tech and the Drive to Save Humanity, Mark Stross presents a gripping exploration of our entanglement with technology in a world where digital platforms increasingly dictate our lives. With thought-provoking insights and real-life anecdotes, Mark unveils the hidden costs of our digital addiction and challenges listeners to reconsider their relationship with technology.
By: Mark Stross
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- By: L.D. Knowings
- Narrated by: KC Wayman
- Length: 3 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
-
Guardian's Book
- By Anonymous User on 16-03-24
By: L.D. Knowings
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
By: Jamie Murphy
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601
- By: A.E. Alvo
- Narrated by: Paul Anderson
- Length: 26 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
CompTIA Security+The "CompTIA Security+ All-in-One Exam Guide Exam SY0-601" is a comprehensive and expertly organized manual designed to prepare IT professionals for the CompTIA Security+ certification exam. This guide thoroughly addresses all the topics and objectives outlined in the SY0-601 exam, providing listeners with the knowledge and skills necessary to achieve certification. Key features of this guide include:
By: A.E. Alvo