Ethical Hacking cover art

Ethical Hacking

The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering

Preview
Get this deal Try Premium Plus free
Offer ends 29 January 2026 at 11:59PM GMT.
Prime members: New to Audible? Get 2 free audiobooks during trial.
Just £0.99/mo for your first 3 months of Audible.
1 bestseller or new release per month—yours to keep.
Listen all you want to thousands of included audiobooks, podcasts, and Originals.
Auto-renews at £8.99/mo after 3 months. Cancel monthly.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£8.99/month after 30 days. Renews automatically.

Ethical Hacking

By: Lester Evans
Narrated by: Brian R. Scott
Get this deal Try Premium Plus free

£8.99/mo after 3 months. Cancel monthly. Offer ends 29 January 2026 at 11:59PM GMT.

£8.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £11.99

Buy Now for £11.99

LIMITED TIME OFFER | £0.99/mo for the first 3 months

Premium Plus auto-renews at £8.99/mo after 3 months. Terms apply.

About this listen

Ever feel like you don’t even own the hardware and software you paid dearly for?

Ever get the impression that you have to ask for permission before installing or changing a program on your device?

Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads?

You’re not alone.

Half-baked products and services that chip away at your sense of ownership, independence, and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers. None of it is intentional or meant to cause harm, which makes it all the more damning.

There’s a silver lining in all of this, and that is ethical hacking. This book will shine a light on how engineers think and show you how to discern their original intentions, helping you adopt their attitude and perfect their products despite managerial crud doing their worst to stop you.

In a world where everything is slowly becoming more managed and overbearing, this audiobook is an attempt to take back some of that original awesomeness envisioned by engineers and at least make your world a slightly better place.

Here’s just a tiny fraction of the topics covered in this audiobook:

  • Fighting against companies
  • Ethical hacking defined
  • War on the internet
  • Engineer’s mind
  • The almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • Julian Assange
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How an hacker could go about hacking your WiFi and much, much more!

If you want to learn more about ethical hacking, then scroll up and click “add to cart”!

©2019 Lester Evans (P)2019 Lester Evans
Computer Science History & Culture Security & Encryption Technology Computer Security Hacking Cybersecurity AI and Humanity Software Computer Engineering

Listeners also enjoyed...

Tor and the Dark Net cover art
Darknet cover art
Mindfulness cover art
Tor and the Deep Web cover art
SQL: From Beginner to Intermediate cover art
Ultimate Blockchain Technology: Mega Edition - Six Books cover art
Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming cover art
Machine Learning for Smart Learners cover art
How To Win With Your Data Visualizations cover art
Hacked Again cover art
Business Technology Development Strategy Bundle cover art
Technocreep cover art
Burners & Black Markets cover art
Social Media Mastery: Two Manuscripts cover art
Blockchain Technology Revolution in Business Explained cover art
Bitcoin: Ultimate Beginner’s Guide to Cryptocurrency Technologies - Mining, Investing and Trading in Digital Gold cover art
All stars
Most relevant
This book has nothing to do with penetration testing. Penetration testing is not mentioned once beyond the reading of the book name. There is nothing on improving cyber security. No tools are mentioned for pen testing, or for security management. Rather, such gems are offered as "Don't use Google calendar", "Copyright is evil" and "upload fake selfies to fool the social networks" - essentially this book is a collection of incorrect, vague and utterly one-sided musings on the world.

Terrible

Something went wrong. Please try again in a few minutes.