- History & Culture (1,171)
We're pleased to have you join us
30-day trial with Audible is available.
Best Sellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Must Read
- By Daz C on 18-04-24
By: Lyn Alden
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
An OK book but you'll be glad when its finished
- By Ian Hemmings on 19-06-17
By: Kevin Mitnick, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
By: Andy Greenberg
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 9 hrs
- Unabridged
-
Overall
-
Performance
-
Story
This cat-and-mouse story of a vast FBI sting operation reveals how the criminal underworld has become a globalized economy in its own right—one that can't be policed without crossing complicated ethical boundaries....
By: Joseph Cox
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Bad book
- By Dionysis Zindros on 07-12-19
By: Kevin Mitnick
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Must Read
- By Daz C on 18-04-24
By: Lyn Alden
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
An OK book but you'll be glad when its finished
- By Ian Hemmings on 19-06-17
By: Kevin Mitnick, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Everyone should listen to this. It's exceptional.
- By IanRobinson on 07-12-19
By: Andy Greenberg
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 9 hrs
- Unabridged
-
Overall
-
Performance
-
Story
This cat-and-mouse story of a vast FBI sting operation reveals how the criminal underworld has become a globalized economy in its own right—one that can't be policed without crossing complicated ethical boundaries....
By: Joseph Cox
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Bad book
- By Dionysis Zindros on 07-12-19
By: Kevin Mitnick
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
By: Douglas W. Hubbard, and others
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform security, and more....
-
-
Worthless.
- By Dermot on 28-06-22
By: Ben Malisow
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- By: Phil Champagne
- Narrated by: Stephanie Murphy
- Length: 7 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
The book of Satoshi, the collected writings of Satoshi Nakamoto....
-
-
Difficult listening
- By Amazon Customer on 18-07-17
By: Phil Champagne
-
Hacker Culture A to Z
- A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World
- By: Kim Crawley
- Narrated by: Jen Jayden
- Length: 11 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking....
By: Kim Crawley
-
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide
- NIST 800 Cybersecurity, Book 3
- By: Bruce Brown
- Narrated by: Layne Ihde
- Length: 3 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether you're a seasoned professional looking to expand your knowledge or a newcomer seeking to kickstart your cybersecurity career, RMF Security Control Assessor by Bruce Brown, CISSP, is the ultimate guide to mastering the art of cybersecurity assessments....
By: Bruce Brown
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- By: Scott N. Schober, Craig W. Schober
- Narrated by: Stephen Bowlby
- Length: 7 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes....
By: Scott N. Schober, and others
-
PRINCE2 Agile: An Implementation Pocket Guide
- Step-by-Step Advice for Every Project Type
- By: Jamie Lynn Cooke
- Narrated by: Kate Rose Martin
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The hands-on guide you need to successfully deliver your projects within the PRINCE2 Agile framework....
-
-
Awful - content and reading
- By Walter on 28-08-19
By: Jamie Lynn Cooke
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
By: Joseph Steinberg, and others
-
51 Essential Cyber Terms Explained for Leaders
- A Non-Technical Guide. Each Term Defined, Explained and with a Practical Example to Increase Your Leadership Impact
- By: Marco Ryan, Andrew Fitzmaurice
- Narrated by: James Moors
- Length: 2 hrs
- Unabridged
-
Overall
-
Performance
-
Story
This book is like no other in Cybersecurity. Each term is arranged alphabetically making it easy to find, with a formal definition, then a simple jargon-free explanation and then a real-life example.
-
-
best book for understanding of cybersecurity,
- By Anonymous on 18-04-24
By: Marco Ryan, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Fascinating subject and an amazing story
- By Just little old me on 01-04-15
By: Kim Zetter
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
-
-
Great content. Nice change in approach to technical content.
- By Jay on 08-02-24
By: George Finney, and others
-
The Cyber Security Handbook
- Prepare for, Respond to and Recover from Cyber Attacks with the It Governance Cyber Resilience Framework (CRF)
- By: Alan Calder
- Narrated by: Stephen Perring
- Length: 7 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF)....
By: Alan Calder
-
There's a War Going On but No One Can See It
- By: Huib Modderkolk
- Narrated by: Omar Baroud
- Length: 8 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late....
-
-
learned so much
- By Sandra pukite on 03-04-24
By: Huib Modderkolk
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn to effectively deliver business aligned cybersecurity outcomes....
By: Matthew K. Sharp, and others
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
I can't tell you how bad this is
- By Paul Beyer on 20-11-23
By: Mike Chapple, and others
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- By: Steve Watkins
- Narrated by: Steve G Watkins
- Length: 1 hr
- Unabridged
-
Overall
-
Performance
-
Story
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022....
By: Steve Watkins
-
If It's Smart, It's Vulnerable
- By: Mikko Hypponen
- Narrated by: Rich Miller
- Length: 7 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing....
-
-
more history than prophecy
- By jut1972 on 16-06-23
By: Mikko Hypponen
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Interesting subject
- By Joe T on 06-01-24
By: Bruce Schneier
-
How I Rob Banks
- And Other Such Places
- By: FC
- Narrated by: Paul Brion
- Length: 7 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
Renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on....
-
-
A robot like (emotionless) American male voice
- By Deano on 09-11-23
By: FC
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality....
-
-
Reminiscing of his other work.
- By Ervinas on 19-05-19
By: Bruce Schneier
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
-
Excellent study guide, learn CISM anywhere
- By NP on 13-09-23
-
Safe
- How to Stay Safe in a Dangerous World
- By: Chris Ryan
- Narrated by: Michael Fenner
- Length: 7 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
How to keep you and yours safe from the perils of the modern world....
-
-
brilliant
- By Afterhours on 24-02-22
By: Chris Ryan
-
How to Measure Anything in Cybersecurity Risk
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Patrick Cronin
- Length: 10 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection....
-
-
Blatant money grab from D Hubbard
- By S. Taylor on 30-01-23
By: Douglas W. Hubbard, and others
-
The Wires of War
- Technology and the Global Struggle for Power
- By: Jacob Helberg
- Narrated by: Jesse Einstein
- Length: 11 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
From 2016 to 2020, Jacob Helberg led Google’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war....
By: Jacob Helberg
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
A very interesting read
- By LondonBubble on 28-02-23
By: Renee Dudley, and others
New Releases
-
#Hacked
- 10 Practical Cybersecurity Tips to Help Protect Personal or Business Information
- By: Albert Whale
- Narrated by: Dana Lara Meecham
- Length: 2 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
The #HACKED book (2024 edition) is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity. Whether you're a business owner, student, or just someone who wants to stay safe online, The #HACKED book has everything you need to know.
By: Albert Whale
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments. From concepts to advanced techniques, this book offers a structured and accessible approach to understanding the nuances of cloud security.
By: Jamie Murphy
-
Zero Trust
- Navigating Cybersecurity Risks in Third-Party Environments
- By: Jafar Hasan
- Narrated by: Andrew Baldwin, Jafar Hasan
- Length: 6 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In today's digital age, where businesses operate in an interconnected and rapidly evolving technological landscape, cybersecurity has emerged as a critical concern. With the increasing reliance on digital systems, cloud services, and interconnected networks, organizations face many cybersecurity challenges that demand proactive and robust risk management strategies.
By: Jafar Hasan
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
By: Cindy Green-Ortiz, and others
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification. Navigating through fundamental concepts and advanced techniques, this book serves as a trusted companion for those seeking to master the intricate landscape of cybersecurity.
By: Jamie Murphy
-
51 Essential Cyber Terms Explained for Leaders
- A Non-Technical Guide. Each Term Defined, Explained and with a Practical Example to Increase Your Leadership Impact
- By: Marco Ryan, Andrew Fitzmaurice
- Narrated by: James Moors
- Length: 2 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Marco Ryan, a Cyber Leader in Residence at a leading UK Business School and with over 25 years of Digital and Cyber Senior Leadership experience with companies such as bp, specializes in making the world of Digital, AI, and Cyber simple, jargon-free and easy to understand for Leaders, even if they have no background in technology or IT. This book is like no other in Cybersecurity. Each term is arranged alphabetically making it easy to find, with a formal definition, then a simple jargon-free explanation and then a real-life example.
-
-
best book for understanding of cybersecurity,
- By Anonymous on 18-04-24
By: Marco Ryan, and others
-
#Hacked
- 10 Practical Cybersecurity Tips to Help Protect Personal or Business Information
- By: Albert Whale
- Narrated by: Dana Lara Meecham
- Length: 2 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
The #HACKED book (2024 edition) is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity. Whether you're a business owner, student, or just someone who wants to stay safe online, The #HACKED book has everything you need to know.
By: Albert Whale
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments. From concepts to advanced techniques, this book offers a structured and accessible approach to understanding the nuances of cloud security.
By: Jamie Murphy
-
Zero Trust
- Navigating Cybersecurity Risks in Third-Party Environments
- By: Jafar Hasan
- Narrated by: Andrew Baldwin, Jafar Hasan
- Length: 6 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In today's digital age, where businesses operate in an interconnected and rapidly evolving technological landscape, cybersecurity has emerged as a critical concern. With the increasing reliance on digital systems, cloud services, and interconnected networks, organizations face many cybersecurity challenges that demand proactive and robust risk management strategies.
By: Jafar Hasan
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
By: Cindy Green-Ortiz, and others
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification. Navigating through fundamental concepts and advanced techniques, this book serves as a trusted companion for those seeking to master the intricate landscape of cybersecurity.
By: Jamie Murphy
-
51 Essential Cyber Terms Explained for Leaders
- A Non-Technical Guide. Each Term Defined, Explained and with a Practical Example to Increase Your Leadership Impact
- By: Marco Ryan, Andrew Fitzmaurice
- Narrated by: James Moors
- Length: 2 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Marco Ryan, a Cyber Leader in Residence at a leading UK Business School and with over 25 years of Digital and Cyber Senior Leadership experience with companies such as bp, specializes in making the world of Digital, AI, and Cyber simple, jargon-free and easy to understand for Leaders, even if they have no background in technology or IT. This book is like no other in Cybersecurity. Each term is arranged alphabetically making it easy to find, with a formal definition, then a simple jargon-free explanation and then a real-life example.
-
-
best book for understanding of cybersecurity,
- By Anonymous on 18-04-24
By: Marco Ryan, and others
-
The NIST Framework (CSF) 2.0
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 2 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization - regardless of its size, sector, or maturity - to better understand, assess, prioritize, and communicate its cybersecurity efforts.
-
#HACKED2
- Practical Guidance for Dealing with Threats to Your Business and Privacy
- By: Albert E. Whale, Thomas Albert, Chuck Brooks, and others
- Narrated by: David Roth
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
#HACKED2 is the follow-up to an award-winning book #HACKED, that was written with industry leaders in cybersecurity. It offers practical advice about what you can do if your business or privacy has been threatened, but it also provides multiple viewpoints on how these issues are being addressed across various fields around the globe - making this resource essential for anyone who wants better awareness of global threats faced today!
By: Albert E. Whale, and others
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- By: Roger A. Grimes
- Narrated by: Ray Greenley
- Length: 11 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.
By: Roger A. Grimes
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- By: Ed Adams
- Narrated by: Rich Miller
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
By: Ed Adams
-
Code Dependent
- Living in the Shadow of AI
- By: Madhumita Murgia
- Narrated by: Madhumita Murgia
- Length: 9 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Through the voices of ordinary people in places far removed from Silicon Valley, Code Dependent explores the impact of a set of powerful, flawed, and often exploitative technologies on individuals, communities, and our wider society. Madhumita Murgia, AI Editor at the FT, exposes how AI can strip away our collective and individual sense of agency – and shatter our illusion of free will.
By: Madhumita Murgia
-
Digital Fortress
- Navigating Cyber Threats: Mastering the Art of Online Security and Privacy
- By: David Goodin
- Narrated by: Siah Clark
- Length: 3 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide is crafted for those who find themselves intrigued by the origins of malware or seeking effective strategies to fend off online dangers. Whether your knowledge of computers is minimal or you possess a foundational understanding, this book stands as a beacon, illuminating the often intimidating realm of computer security.
By: David Goodin
-
Killer Tech and the Drive to Save Humanity
- By: Mark Stross
- Narrated by: Douglas Martin
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Killer Tech and the Drive to Save Humanity, Mark Stross presents a gripping exploration of our entanglement with technology in a world where digital platforms increasingly dictate our lives. With thought-provoking insights and real-life anecdotes, Mark unveils the hidden costs of our digital addiction and challenges listeners to reconsider their relationship with technology.
By: Mark Stross
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- By: L.D. Knowings
- Narrated by: KC Wayman
- Length: 3 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
-
Guardian's Book
- By Anonymous User on 16-03-24
By: L.D. Knowings
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
By: Jamie Murphy
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601
- By: A.E. Alvo
- Narrated by: Paul Anderson
- Length: 26 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
CompTIA Security+The "CompTIA Security+ All-in-One Exam Guide Exam SY0-601" is a comprehensive and expertly organized manual designed to prepare IT professionals for the CompTIA Security+ certification exam. This guide thoroughly addresses all the topics and objectives outlined in the SY0-601 exam, providing listeners with the knowledge and skills necessary to achieve certification. Key features of this guide include:
By: A.E. Alvo
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- By: Taimur Ijlal
- Narrated by: Scott Mandeville
- Length: 4 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the dynamic world of cybersecurity with the 'CompTIA Security+ Revision Guide'. This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals. Learn about the unique risks in the digital realm, develop a robust security framework, and understand the intricacies of cybersecurity in various systems. This book is crafted for easy comprehension, requiring no prior expertise in cybersecurity or programming.
By: Taimur Ijlal
-
Cybersecurity and Privacy Law Introduction
- By: Convocourses
- Narrated by: Kim Pepper
- Length: 3 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice.
By: Convocourses