Hacking the Hacker cover art

Hacking the Hacker

Learn From the Experts Who Take Down Hackers

Preview
Get this deal Try Premium Plus free
Offer ends 29 January 2026 at 11:59PM GMT.
Prime members: New to Audible? Get 2 free audiobooks during trial.
Just £0.99/mo for your first 3 months of Audible.
1 bestseller or new release per month—yours to keep.
Listen all you want to thousands of included audiobooks, podcasts, and Originals.
Auto-renews at £8.99/mo after 3 months. Cancel monthly.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£8.99/month after 30 days. Renews automatically.

Hacking the Hacker

By: Roger A. Grimes
Narrated by: Jonathan Todd Ross
Get this deal Try Premium Plus free

£8.99/mo after 3 months. Cancel monthly. Offer ends 29 January 2026 at 11:59PM GMT.

£8.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £12.99

Buy Now for £12.99

LIMITED TIME OFFER | £0.99/mo for the first 3 months

Premium Plus auto-renews at £8.99/mo after 3 months. Terms apply.

About this listen

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

  • Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
  • Listen to the stories of some of the world's most renowned computer security experts
  • Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted - yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

©2017 John Wiley & Sons, Inc. (P)2019 Tantor
Security & Encryption Technology Computer Security Encryption Hacking Cybersecurity

Listeners also enjoyed...

Ransomware Protection Playbook cover art
The Art of Invisibility cover art
Algorithms to Live By cover art
Ghost in the Wires cover art
The Pentester BluePrint cover art
8 Steps to Better Security cover art
Social Engineering, Second Edition cover art
Cybersecurity Program Development for Business cover art
Cult of the Dead Cow cover art
The Cuckoo's Egg cover art
A Vulnerable System cover art
Cybersecurity cover art
Countdown to Zero Day cover art
The Like Switch cover art
The Ransomware Hunting Team cover art
Basic Music Theory, 4th Edition cover art
All stars
Most relevant
I was conflicted with this. I didn't feel the title represented the content as well as it could have, it was more a 'little black book' of contacts the author met sprinkled with anecdotes. I have to address one huge issue for me though, the narration, the chap providing the narration had a great voice but it needed some editorial/production smack-down. There's simply no way that every URL should have been delivered verbally in the format in which it was. It led to long chunks of grating tedium or fumbling for the phone to skip forward. Next time please put them in an appendix (audible supports attaching downloads with audiobooks because I have others that do this well), or maybe frame as searchable terms. It was enough of an annoyance that I would suggest re-recording or editing-out these portions and referring elsewhere and then reissuing the audiobook.

The anecdotes were positive and inspiring, and the author gives you the distinct impression that they've mastered the art of 'not having to know everything, only to know where to look and how to find it' with an impressive diary of industry contacts. It was good to hear the background story's of so many varied infosec careers.

It wasn't what I expected, but it I came away from it knowing more than when I started along with a renewed feeling of positivity towards infosec as a career and feeling that I had something of a shared mindset with several people who opened up on their motivations.

Conflicted

Something went wrong. Please try again in a few minutes.

Although there is some great and valid content, the flow of the book makes it challenging to keep engaged. The most used word is ‘slash’ from the numerous hyperlinks, social media pages and references which are stated in full. I estimate an hour could have been shaved off the length by removing the padding.

Difficult listen. Ruined by the flow. Some good content.

Something went wrong. Please try again in a few minutes.

I’m only a few hours into this and am finding it interesting BUT I’m also on the verge of abandoning it and getting a refund. Why? It seems like every five minutes the narrator reads out a web address. I’m not talk go to “John doe.com” but go to “John doe.com forward slash h t d c 3 ampersand forward slash v543 equals question mark “. It’s really tedious to hear!

url’s are off putting

Something went wrong. Please try again in a few minutes.

Title of this book is frankly misleading and content very much outdated. No technicals, just mostly author's interaction with some known people in the industry. The worst part of this audiobook was probably listening to the author reading links to resources which was quite frankly painful to hear and useless, since don't think anybody is there writing it down to begin with. I was hoping to hear at the very least some valuable experience

These bloody links...

Something went wrong. Please try again in a few minutes.

Whilst I find the subject matter interesting and could follow much of the technical aspect. The narrator constantly referring to their sources or references by the long url string was just too much to overcome. For example "...Jon Doe is still studying encryption and published his work at www.jon.doe at jondoe.com. His research on the subject can be found at www.jon.doe@jondoe.com forward slash notes, research amphisand two one nine forward slash percent percent 1 2 5 5."
And this is every five minutes.

Pedantic narration

Something went wrong. Please try again in a few minutes.

See more reviews