- History & Culture (1,219)
![Teste Audible 30 Tage kostenlos](https://m.media-amazon.com/images/G/08/AudibleFR/fr_FR/images/1235-soundwave-1000x200-2.gif)
We're pleased to have you join us
30-day trial with Audible is available.
New Releases
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- By: Anthony Farrior
- Narrated by: Jennifer Workman
- Length: 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
By: Anthony Farrior
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- By: Jonathan Rigdon
- Narrated by: Kevin Brooker
- Length: 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
By: Jonathan Rigdon
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- By: L.D. Knowings
- Narrated by: William Goldman
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
-
A Comprehensive Learning Tool
- By Isabelle Webb on 25-06-24
By: L.D. Knowings
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- By: Omar Santos, Petar Radanliev
- Narrated by: Max Newland
- Length: 11 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
By: Omar Santos, and others
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- By: André Edmond
- Narrated by: Scotty Kwas
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you been struggling to find a guide that explains how to get started in cybersecurity? Does your lack of experience make it difficult to get your first job? The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points. The lack of a guiding hand leaves them stranded, not knowing which doors to knock on or which paths to tread.
By: André Edmond
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- By: Anthony Farrior
- Narrated by: Jennifer Workman
- Length: 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
By: Anthony Farrior
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- By: George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrated by: Lyle Blaker
- Length: 7 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
By: George Galdorisi, and others
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- By: Jonathan Rigdon
- Narrated by: Kevin Brooker
- Length: 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
By: Jonathan Rigdon
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- By: L.D. Knowings
- Narrated by: William Goldman
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
-
A Comprehensive Learning Tool
- By Isabelle Webb on 25-06-24
By: L.D. Knowings
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- By: Omar Santos, Petar Radanliev
- Narrated by: Max Newland
- Length: 11 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
By: Omar Santos, and others
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- By: André Edmond
- Narrated by: Scotty Kwas
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you been struggling to find a guide that explains how to get started in cybersecurity? Does your lack of experience make it difficult to get your first job? The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points. The lack of a guiding hand leaves them stranded, not knowing which doors to knock on or which paths to tread.
By: André Edmond
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- By: L.D. Knowings
- Narrated by: David Van Der Molen
- Length: 3 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
You're not a tech wizard, and you don't need to be. This book speaks directly to you the concerned netizen, the proactive parent, the small business owner, or the budding entrepreneur. It's designed to break down the complexities of cybersecurity into something you can understand and apply.
-
-
A Dummy's Guide for Beginners
- By Timothy Gillian on 11-06-24
By: L.D. Knowings
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes--the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld.
By: Joseph Cox
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- By: Razi Rais, Christina Morillo, Evan Gilman, and others
- Narrated by: Mike Chamberlain
- Length: 12 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
By: Razi Rais, and others
-
World War ‘D’
- The Intersection of Cyber and Biological Pandemics
- By: Christopher Rence
- Narrated by: Liam Alan
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Life has never been easier thanks to the advancement of technology. However, with all new technological advancements also come new risks. The most drastically increasing issue in the world today is not biological warfare, but cyber warfare. Data has become the single most valuable commodity in today’s world, and, of course, there are always people lurking around the corner, trying to get their hands on it.
-
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
- By: Omar Santos, Samer Salam, Hazim Dahir
- Narrated by: Phil Schoen
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.
By: Omar Santos, and others
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- By: Robert L Cogmon, Robert L. Cogmon
- Narrated by: Dalan Decker
- Length: 2 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks. Characters such as Deja Digital serve as examples of the value of technical know-how and inventiveness in building defenses against cyberattacks.
By: Robert L Cogmon, and others
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- By: Bruce Brown
- Narrated by: Kim Pepper
- Length: 3 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
By: Bruce Brown
-
Securing the CI/CD Pipeline
- Best Practices for DevSecOps
- By: Sai Sravan Cherukuri
- Narrated by: Tyler Nissen
- Length: 4 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
"SECURING THE CI/CD PIPELINE: Best Practices for DevSecOps" is a comprehensive guide that integrates security into Continuous Integration and Continuous Deployment (CI/CD) pipelines. Essential for anyone in modern software development, it emphasizes balancing speed and security.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- By: Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrated by: Rebecca Lam
- Length: 13 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
By: Jon R. Lindsay - editor, and others
-
Cyberspace Guardians
- A Comprehensive Guide for Choosing the Right CISO
- By: Dr. Sylvester Cotton
- Narrated by: Chris Walsh
- Length: 2 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the intriguing world of digital defense with Dr. Sylvester “Sly” Cotton’s masterpiece, “Cyberspace Guardians.” In an era dominated by an intricate web of technology, Dr. Cotton unravels the mysteries of safeguarding the vast realm of cyberspace. This book is your guiding light in the quest to understand the role of a Chief Information Security Officer (CISO), the sentinel of our digital universes. The labyrinth of cyberspace is riddled with unseen dangers, lurking shadows, and unseen adversaries seeking to undermine our technological advancements.
-
The Art of the Steal
- How to Protect Yourself and Your Business from Fraud, America's #1 Crime
- By: Frank W. Abagnale
- Narrated by: Barrett Whitener
- Length: 8 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Catch Me if You Can, Frank W. Abagnale recounted his youthful career as a master imposter and forger. In The Art of the Steal, Abagnale tells the remarkable story of how he parlayed his knowledge of cons and scams into a successful career as a consultant on preventing financial foul play—while showing you how to identify and outsmart perpetrators of fraud.
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- By: L.D. Knowings
- Narrated by: Barry Fike
- Length: 3 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
-
Essential
- By Jose Griffin on 17-05-24
By: L.D. Knowings