2 Months for ₹5/month
LIMITED TIME OFFERBest Sellers
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Written by: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall3
-
Performance2
-
Story2
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with...
-
-
UNABLE TO FIND BONUS MATERIAL
- By Sudhakar on 17-03-24
Written by: Mike Chapple,
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Written by: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall37
-
Performance30
-
Story30
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
Amazing Story
- By Tushar on 01-01-26
Written by: Kevin Mitnick,
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Written by: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall9
-
Performance8
-
Story8
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Great read
- By Zeeshan on 26-05-25
Written by: Lyn Alden
-
Certified Information Security Manager CISM Study Guide
- Written by: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall3
-
Performance3
-
Story3
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security...
-
-
Good narration
- By Amazon Customer on 14-08-24
Written by: Mike Chapple PhD CISM
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- Written by: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall2
-
Performance0
-
Story0
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
Written by: Mike Chapple,
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Written by: Kevin Mitnick, Robert Vamosi, Mikko Hypponen - introduction
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall21
-
Performance18
-
Story18
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin...
-
-
an entire paragraph is missing
- By Rahul kumar on 05-03-22
Written by: Kevin Mitnick,
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Written by: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall3
-
Performance2
-
Story2
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with...
-
-
UNABLE TO FIND BONUS MATERIAL
- By Sudhakar on 17-03-24
Written by: Mike Chapple,
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Written by: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall37
-
Performance30
-
Story30
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
Amazing Story
- By Tushar on 01-01-26
Written by: Kevin Mitnick,
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Written by: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall9
-
Performance8
-
Story8
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Great read
- By Zeeshan on 26-05-25
Written by: Lyn Alden
-
Certified Information Security Manager CISM Study Guide
- Written by: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall3
-
Performance3
-
Story3
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security...
-
-
Good narration
- By Amazon Customer on 14-08-24
Written by: Mike Chapple PhD CISM
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- Written by: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall2
-
Performance0
-
Story0
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
Written by: Mike Chapple,
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Written by: Kevin Mitnick, Robert Vamosi, Mikko Hypponen - introduction
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall21
-
Performance18
-
Story18
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin...
-
-
an entire paragraph is missing
- By Rahul kumar on 05-03-22
Written by: Kevin Mitnick,
-
Cybersecurity All-in-One for Dummies
- Written by: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP,
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall1
-
Performance0
-
Story0
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness...
Written by: Joseph Steinberg,
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- Written by: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall7
-
Performance5
-
Story5
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
I listened at 1.4 speed
- By Chopsticks on 24-04-22
Written by: Eric Conrad,
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Written by: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall3
-
Performance3
-
Story3
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone. In 2018, a powerful app for secure...
Written by: Joseph Cox
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Written by: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall12
-
Performance9
-
Story9
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
Written by: Kim Zetter
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Written by: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 24 hrs and 52 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You'll explore general...
Written by: Mike Chapple,
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- Written by: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall2
-
Performance2
-
Story2
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world. A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a...
-
-
A bit insipid
- By Karn on 30-11-23
Written by: Bruce Schneier
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Written by: Sean D. Mack
- Narrated by: William Sarris
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall1
-
Performance0
-
Story0
An essential and up-to-date guide to DevSecOps....
Written by: Sean D. Mack
-
The Developer's Playbook for Large Language Model Security
- Building Secure AI Applications
- Written by: Steve Wilson
- Narrated by: Jonathan Yen
- Length: 8 hrs and 27 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing...
Written by: Steve Wilson
-
Practical Fraud Prevention
- Fraud and AML Analytics for Fintech and eCommerce, Using SQL and Python
- Written by: Gilit Saporta, Shoshana Maraney
- Narrated by: Kate Zane
- Length: 14 hrs and 58 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Data scientists, data analysts, and fraud analysts will learn how to identify and quickly respond to attacks. You'll get a comprehensive view of typical incursions as well as recommended detection methods....
Written by: Gilit Saporta,
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Written by: Razi Rais, Christina Morillo, Evan Gilman,
- Narrated by: Mike Chamberlain
- Length: 12 hrs and 5 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a...
Written by: Razi Rais,
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- Written by: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
Written by: Mike Chapple,
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Written by: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall4
-
Performance3
-
Story3
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
Written by: Roger A. Grimes
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- Written by: Gregory C. Rasner
- Narrated by: Mike Lenz
- Length: 6 hrs and 49 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Dramatically lower the cyber risk posed by third-party software and vendors in your organization....
Written by: Gregory C. Rasner
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- Written by: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors...
-
-
Outstanding
- By Azaan Khuraishi on 17-05-24
Written by: Douglas W. Hubbard,
-
Step-by-Step Cyber Security for Beginners
- A Practical Guide to Understanding Threats. Protecting Yourself and Your Devices in the Digital Age
- Written by: Ethan Ward
- Narrated by: Aaron Sinn
- Length: 4 hrs and 34 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In simple and easy-to-understand language, this book provides you with the knowledge and tools to recognize and counteract cyber threats, helping you navigate the digital world with confidence and security.
Written by: Ethan Ward
-
Social Engineering
- The Art of Human Hacking
- Written by: Paul Wilson - foreword, Christopher Hadnagy
- Narrated by: A. T. Chandler
- Length: 14 hrs and 52 mins
- Unabridged
-
Overall11
-
Performance9
-
Story9
The first guide to reveal and dissect the technical aspect of many social engineering maneuvers.... From elicitation, pretexting, influence, and manipulation, all aspects of social engineering are picked apart, discussed, and explained by using real-world examples, personal experience, and the...
-
-
The case study of hacking a hacker is nice.
- By Jeevan H R on 25-01-23
Written by: Paul Wilson - foreword,
-
The New World Economy: A Beginner's Guide
- Written by: Randy Charles Epping
- Narrated by: George Newbern
- Length: 6 hrs and 49 mins
- Unabridged
-
Overall4
-
Performance2
-
Story2
What is blockchain? What is Bitcoin? How can central banks be instrumental in guiding a nation's economy? What are the underlying causes of trade deficits? Do trade wars actually help the domestic economy? How has the behavior of millennials and Generation Z affected the global economy? Find out...
Written by: Randy Charles Epping
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- Written by: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles....
Written by: Rick Howard
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- Written by: Phil Martin
- Narrated by: Phil Martin
- Length: 17 hrs
- Unabridged
-
Overall8
-
Performance5
-
Story5
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire study guide and breaks it into easy-to-absorb chapters....
-
-
very satisfied
- By Anonymous User on 09-04-21
Written by: Phil Martin
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- Written by: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall3
-
Performance2
-
Story2
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform security, and more....
Written by: Ben Malisow
-
Surveillance Valley
- The Secret Military History of the Internet
- Written by: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
Written by: Yasha Levine
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Written by: Kelly Shortridge, Aaron Rinehart - contributor
- Narrated by: April Doty
- Length: 18 hrs and 36 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering....
Written by: Kelly Shortridge,
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Written by: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrated by: Mike Lenz
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives...
Written by: Brian Allen,
-
Learning DevSecOps
- A Practical Guide to Processes and Tools
- Written by: Steve Suehring
- Narrated by: Chris Sorensen
- Length: 6 hrs and 19 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
You'll learn how DevOps and DevSecOps can eliminate the walls that stand between development, operations, and security so that you can tackle the needs of other teams.
Written by: Steve Suehring
New Releases
-
We Know You Can Pay a Million
- Inside the Dark Economy of Hacking and Ransomware
- Written by: Anja Shortland
- Narrated by: Deborah Balm
- Length: 7 hrs and 36 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
You know it's coming: a frozen computer, an office filled with blank screens, a printed message. The clock is ticking. Your colleagues have hours to strike a deal. Cybercrime is everywhere. From governments to airlines, hospitals to banks, institutions of every kind have paid out millions to...
Written by: Anja Shortland
-
The Privacy Leader Compass
- A Comprehensive Business-Oriented Roadmap for Building and Leading Practical Privacy Programs
- Written by: Dr. Valerie Lyons, Todd Fitzgerald, Dr. Ann Covoukian (Foreword By) - introduction
- Narrated by: Rachel Yong
- Length: 15 hrs and 39 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Congratulations! Perhaps you have been appointed as the Chief Privacy Officer (CPO) or the Data Protection Officer (DPO) for your company. Maybe you are an experienced CPO/DPO, and you wonder—"what can I learn from other successful privacy experts to be even more effective?" Or perhaps you are...
Written by: Dr. Valerie Lyons,
-
Privacy's Defender
- My Thirty-Year Fight Against Digital Surveillance
- Written by: Cindy Cohn
- Narrated by: Cindy Cohn
- Length: 8 hrs and 36 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Throughout her career, Cindy Cohn has been driven by a fundamental question: Can we still have private conversations if we live our lives online? Privacy’s Defender chronicles her thirty-year battle to protect our right to digital privacy and shows just how central this right is to all our other rights, including our ability to organize and make change in the world.
Written by: Cindy Cohn
-
Sécurité humaine : Maîtriser le facteur humain dans les réseaux
- Written by: Deaver Brown
- Narrated by: Voix virtuelle
- Length: 17 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
La Sécurité Humaine décrit les mesures que les organisations devraient prendre pour protéger leur réseau contre les intrus, en mettant l'accent sur ce que les employés peuvent faire pour défendre leur réseau. Les points sont précis, simples et parfaitement réalisables avec le soutien...
Written by: Deaver Brown
-
Seguridad humana: controla el factor humano en las redes
- Written by: Deaver Brown
- Narrated by: Voz Virtual
- Length: 19 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Seguridad humana describe los pasos que las organizaciones deben tomar para proteger su red de intrusos, enfatizando lo que los empleados pueden hacer para defender su red. Los puntos son concisos, simples y perfectamente realizables con el apoyo del director ejecutivo o del presidente del...
Written by: Deaver Brown
-
Human-Centered Security
- How to Design Systems That Are Both Safe and Usable
- Written by: Heidi Trost, Adam Shostack - foreword
- Narrated by: Simran Singh
- Length: 4 hrs and 6 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching consequences. Threats to digital infrastructure often impact critical physical systems, potentially causing real-world harm. With AI agents set to handle extensive personal information, data security and privacy are more crucial than ever.
Written by: Heidi Trost,
-
We Know You Can Pay a Million
- Inside the Dark Economy of Hacking and Ransomware
- Written by: Anja Shortland
- Narrated by: Deborah Balm
- Length: 7 hrs and 36 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
You know it's coming: a frozen computer, an office filled with blank screens, a printed message. The clock is ticking. Your colleagues have hours to strike a deal. Cybercrime is everywhere. From governments to airlines, hospitals to banks, institutions of every kind have paid out millions to...
Written by: Anja Shortland
-
The Privacy Leader Compass
- A Comprehensive Business-Oriented Roadmap for Building and Leading Practical Privacy Programs
- Written by: Dr. Valerie Lyons, Todd Fitzgerald, Dr. Ann Covoukian (Foreword By) - introduction
- Narrated by: Rachel Yong
- Length: 15 hrs and 39 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Congratulations! Perhaps you have been appointed as the Chief Privacy Officer (CPO) or the Data Protection Officer (DPO) for your company. Maybe you are an experienced CPO/DPO, and you wonder—"what can I learn from other successful privacy experts to be even more effective?" Or perhaps you are...
Written by: Dr. Valerie Lyons,
-
Privacy's Defender
- My Thirty-Year Fight Against Digital Surveillance
- Written by: Cindy Cohn
- Narrated by: Cindy Cohn
- Length: 8 hrs and 36 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Throughout her career, Cindy Cohn has been driven by a fundamental question: Can we still have private conversations if we live our lives online? Privacy’s Defender chronicles her thirty-year battle to protect our right to digital privacy and shows just how central this right is to all our other rights, including our ability to organize and make change in the world.
Written by: Cindy Cohn
-
Sécurité humaine : Maîtriser le facteur humain dans les réseaux
- Written by: Deaver Brown
- Narrated by: Voix virtuelle
- Length: 17 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
La Sécurité Humaine décrit les mesures que les organisations devraient prendre pour protéger leur réseau contre les intrus, en mettant l'accent sur ce que les employés peuvent faire pour défendre leur réseau. Les points sont précis, simples et parfaitement réalisables avec le soutien...
Written by: Deaver Brown
-
Seguridad humana: controla el factor humano en las redes
- Written by: Deaver Brown
- Narrated by: Voz Virtual
- Length: 19 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Seguridad humana describe los pasos que las organizaciones deben tomar para proteger su red de intrusos, enfatizando lo que los empleados pueden hacer para defender su red. Los puntos son concisos, simples y perfectamente realizables con el apoyo del director ejecutivo o del presidente del...
Written by: Deaver Brown
-
Human-Centered Security
- How to Design Systems That Are Both Safe and Usable
- Written by: Heidi Trost, Adam Shostack - foreword
- Narrated by: Simran Singh
- Length: 4 hrs and 6 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching consequences. Threats to digital infrastructure often impact critical physical systems, potentially causing real-world harm. With AI agents set to handle extensive personal information, data security and privacy are more crucial than ever.
Written by: Heidi Trost,
-
Scamlands
- Written by: Snigdha Poonam
- Narrated by: Mala Mangla
- Length: 10 hrs and 26 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
Snigdha Poonam’s Scamlands takes you to parts of the world where a scamster is born every minute. Beginning from the rural heartland of eastern India, where she grew up and ending in a shining city by the South China Sea, Poonam follows the networks of deceit across an invisible empire that...
-
-
Research, writing and the depth in the story
- By Amazon Customer on 22-03-26
Written by: Snigdha Poonam
-
Инфоцыгане [Fake Gurus]
- Как распознать мошенника и не дать себя обмануть [How to Spot a Scammer and Avoid Being Deceived]
- Written by: Angelina Andreeva
- Narrated by: Daniil Teplov
- Length: 2 hrs and 12 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Здесь ты получишь простые правила защиты: как не попадаться на рекламные ловушки, как распознавать манипуляции и «красные флаги», как проверять «специалиста» по делу, а не по красивым словам. Всё — человеческим языком, шаг за шагом, чтобы сберечь деньги, нервы и уважение к себе.
Written by: Angelina Andreeva
-
Locked Up
- Cybersecurity Threat Mitigation Lessons from a Real-World LockBit Ransomware Response
- Written by: Zachary Lewis
- Narrated by: Walter Dixon
- Length: 8 hrs and 42 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In Locked Up, veteran IT and cybersecurity executive Zachary Lewis, delivers a gripping, first-person account of how a major university squared off against one of the world's most infamous ransomware groups: LockBit. He walks you through his personal experience battling—and negotiating with—LockBit, as well as the strategies, tools, and approaches he used in resolving the crisis.
Written by: Zachary Lewis
-
The Next-Gen Information Security Professional
- Written by: Vincent van Dijk
- Narrated by: Christopher del Camino
- Length: 3 hrs and 7 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
The Next-Gen Information Security Professional flips the script on what it means to succeed in this field. This isn’t a manual for the latest tools or another dry checklist of compliance standards. It’s a playbook for the human side of security: how to influence, persuade, and lead when the stakes couldn’t be higher.
Written by: Vincent van Dijk
-
The Crucial Role of IT Governance and Compliance in Healthcare
- Written by: Tony R. Hutton
- Narrated by: Jimmy Alli
- Length: 2 hrs and 49 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In our digital age, where threats can come from any corner of the globe and impact businesses of all sizes, I believe in a proactive, multi-layered approach. I am passionate about empowering businesses and individuals to understand cyber risks. Effective IT governance establishes frameworks that guide decision-making, risk management, and resource allocation to support high-quality care while safeguarding patient data. Compliance helps mitigate threats, enhance operational efficiency, and maintain the integrity and confidentiality of healthcare data.
Written by: Tony R. Hutton
-
Democracy in Danger
- How Hackers and Activists Exposed Fatal Flaws in the Election System
- Written by: Jake Braun
- Narrated by: James Lurie
- Length: 6 hrs and 53 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In Democracy In Danger, Braun, a veteran of 3 presidential campaigns and former White House Liaison to the Department of Homeland Security, reveals what the national security apparatus, local election administrators, and political parties have gotten wrong about election security and what America needs to do to protect the ballot box in 2020 and beyond.
Written by: Jake Braun