- History & Culture (1,237)
Best sellers
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it....Â
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security....
-
-
My favorite non-fiction book!
- By Philip Lowe on 08-28-20
By: Cliff Stoll
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist and how to identify, protect against, detect, and respond to them....
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
-
-
Eye opening listen
- By RM on 04-10-19
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security....Â
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it....Â
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security....
-
-
My favorite non-fiction book!
- By Philip Lowe on 08-28-20
By: Cliff Stoll
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist and how to identify, protect against, detect, and respond to them....
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
-
-
Eye opening listen
- By RM on 04-10-19
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security....Â
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare....
-
-
Overzealous editing and lifeless reading
- By John Tangney on 03-01-20
By: Kim Zetter
-
The Complete Kali Linux Course: Beginner to Advanced!
- A Guide to Ethical Hacking with Practical Examples to Test Infrastructure Security with Kali Linux Learning and Basics of Cybersecurity
- By: Charles Berry
- Narrated by: Albert Gonzalez, Kevin James, Jose Larson
- Length: 19 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's no secret that computers are insecure. Stories like the recent Facebook hack and government agencies' hacking are just the tip of the iceberg because hacking is taking over the world....
-
-
This course is a must for aspiring Ethical Hackers
- By Kim Hanson on 12-27-21
By: Charles Berry
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
Great listen for tech fans
- By Mikeyxote on 06-01-12
By: Kevin Mitnick, and others
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
-
-
BY FAR the best book to date on this topic!
- By aaron on 07-09-18
By: David E. Sanger
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Computer Networking
- This Book Includes: Computer Networking for Beginners and Beginners Guide (All in One)
- By: Russell Scott
- Narrated by: Benjamin Williams
- Length: 10 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Computers and the internet have changed this world and our lifestyle forever. We just need to touch a small button, and within a fraction of a second, we can do almost anything! The major factor that lies behind this advanced technology is none other than computer networks....
-
-
Good book for beginners
- By Anonymous User on 06-12-20
By: Russell Scott
-
The Truth Machine
- The Blockchain and the Future of Everything
- By: Michael J Casey, Paul Vigna
- Narrated by: Sean Runnette
- Length: 10 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
Michael J. Casey and Paul Vigna demystify the blockchain and explain why it can restore personal control over our data, assets, and identities....
-
-
Decent blockchain book
- By Michael DC on 05-02-18
By: Michael J Casey, and others
-
Cybersecurity Bible
- Security Threats, Frameworks, Cryptography & Network Security: 4 Books in 1
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 11 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Bible is a book bundle that includes four books that will cover topics like common security threats, steps to avoid them, cybersecurity framework, basics of cryptography, network security, and much more...
-
-
This book is a waste of time and money
- By Richard Sikes on 04-04-21
By: Hugo Hoffman
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
How to Measure Anything in Cybersecurity Risk
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Patrick Cronin
- Length: 10 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection....
-
-
better know math and statistics before diving in
- By Andy on 03-28-17
By: Douglas W. Hubbard, and others
-
DeFi and the Future of Finance
- By: Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
- Narrated by: David de Vries
- Length: 3 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
During the Global Financial Crisis in 2008, our financial infrastructure failed. Governments bailed out the very institutions that let the economy down. This episode spurred a serious rethink of our financial system....
-
-
This is a textbook and not for entry level.
- By Steve A. on 02-10-22
By: Campbell R. Harvey, and others
-
Computer Programming: The Bible
- Learn from the basics to advanced of Python, C, C++, C#, HTML Coding, and Black Hat Hacking Step-by-Step in No Time!
- By: CyberPunk Architects
- Narrated by: Adam Johnson
- Length: 3 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world of technology is changing and those who know how to handle it and who have the most knowledge about it are the ones who will get ahead....
-
-
I am really happy to have this book
- By Karolin Luft on 01-07-19
-
Social Engineering
- The Art of Human Hacking
- By: Paul Wilson - foreword, Christopher Hadnagy
- Narrated by: A. T. Chandler
- Length: 14 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
 Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides....
-
-
Pass on this or read it yourself
- By Michael Brand on 06-09-21
By: Paul Wilson - foreword, and others
-
CompTIA Security+
- Study Guide for the CompTIA Security+ Certification (Exam SY0-501)
- By: Samuel Foster
- Narrated by: Eli Brennan
- Length: 3 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
You are about to learn how to ace CompTIA Security+ (SY0-501) exams - the easy way to grow your IT career....
-
-
Better title.. Almost zero help with SY0-501
- By Pat Sagers on 09-26-21
By: Samuel Foster
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform security, and more....
-
-
Disruptive reading of URLs
- By Customer on 04-22-22
By: Ben Malisow
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications....
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age....
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Gray Day
- My Undercover Mission to Expose America's First Cyber Spy
- By: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy....
-
-
A Real Spy Story
- By Darren Sapp on 04-06-19
By: Eric O'Neill
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Hacking for Beginners
- A Step-by-Step Guide to Learn How to Hack Websites, Smartphones, Wireless Networks, Work with Social Engineering, Complete a Penetration Test, and Keep Your Computer Safe
- By: Julian James McKinnon
- Narrated by: Ivan Busenius
- Length: 3 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This guidebook is going to spend some time taking a look at the world of hacking and some of the great techniques that come with this type of process as well....
-
-
Insights are unique and turn me perceive deeply
- By Chasidy on 12-30-19
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2....
By: Bruce Brown
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn to effectively deliver business aligned cybersecurity outcomes....
By: Matthew K. Sharp, and others
-
Mastering Bitcoin
- Programming the Open Blockchain
- By: Andreas M. Antonopoulos
- Narrated by: Rick Font
- Length: 5 hrs and 22 mins
- Abridged
-
Overall
-
Performance
-
Story
Join the technological revolution that's taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money....
-
-
I want a refund, and preferably NOT in bitcoin..
- By rozzo on 11-20-21
-
Scam Me If You Can
- Simple Strategies to Outsmart Today's Rip-off Artists
- By: Frank Abagnale
- Narrated by: Jason Culp
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you at risk of being scammed? Former con artist and best-selling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks....
-
-
Very basic, full with scary stories, but little actionable information
- By EI on 10-18-19
By: Frank Abagnale
New releases
-
How to Build a Cyber-Resilient Organization
- By: Dan Shoemaker, Anne Kohnke, Ken Sigler
- Narrated by: Kate Harper
- Length: 16 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book presents a standard methodology approach to cyber-resilience. Listeners will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Listeners will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment.Â
By: Dan Shoemaker, and others
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
By: Bruce Brown
-
PHP
- PHP Security and Session Management
- By: Andy Vickler
- Narrated by: Helpful Matthew
- Length: 4 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Â
Imagine not worrying about getting your site hijacked, having abundant knowledge about the threat you’ve just faced. Imagine being able to help a fellow or junior programmer. Imagine your site fully secure and not having to worry about getting robbed while you sleep. With this book, you can gain vital information on these issues and get their solutions as well.
By: Andy Vickler
-
Security Awareness for Dummies
- By: Ira Winkler CISSP
- Narrated by: Tristan Morris
- Length: 9 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Â
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness for Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization.
-
NFT for Beginners
- An Essential Guide to Understanding and Investing in Non-fungible Tokens and Crypto Art
- By: Donn Newman
- Narrated by: Eric Burr
- Length: 3 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you’re confused about the recent surge of crypto art and want to learn more about NFTs and their market, look no further! Have you ever wondered what the deal is with crypto art? Ever heard the term NFT and wondered what that could possibly mean? Do you feel intimidated by this new technology, more so because you’re barely struggling to understand Bitcoin and Ethereum? Are you a creative person looking to get into the crypto art scene? Then this audiobook is just what you need.
By: Donn Newman
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- By: Peter Aiken, Todd Harbour
- Narrated by: Susan Hanfield
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance. Our Digital Civics Framework presents a guide to increasing the data literacy of billions of citizens. We outline the data knowledge that society needs and propose exercises that will help citizens interact productively within a data-driven society.
By: Peter Aiken, and others
-
How to Build a Cyber-Resilient Organization
- By: Dan Shoemaker, Anne Kohnke, Ken Sigler
- Narrated by: Kate Harper
- Length: 16 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book presents a standard methodology approach to cyber-resilience. Listeners will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Listeners will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment.Â
By: Dan Shoemaker, and others
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
By: Bruce Brown
-
PHP
- PHP Security and Session Management
- By: Andy Vickler
- Narrated by: Helpful Matthew
- Length: 4 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Â
Imagine not worrying about getting your site hijacked, having abundant knowledge about the threat you’ve just faced. Imagine being able to help a fellow or junior programmer. Imagine your site fully secure and not having to worry about getting robbed while you sleep. With this book, you can gain vital information on these issues and get their solutions as well.
By: Andy Vickler
-
Security Awareness for Dummies
- By: Ira Winkler CISSP
- Narrated by: Tristan Morris
- Length: 9 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Â
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness for Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization.
-
NFT for Beginners
- An Essential Guide to Understanding and Investing in Non-fungible Tokens and Crypto Art
- By: Donn Newman
- Narrated by: Eric Burr
- Length: 3 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you’re confused about the recent surge of crypto art and want to learn more about NFTs and their market, look no further! Have you ever wondered what the deal is with crypto art? Ever heard the term NFT and wondered what that could possibly mean? Do you feel intimidated by this new technology, more so because you’re barely struggling to understand Bitcoin and Ethereum? Are you a creative person looking to get into the crypto art scene? Then this audiobook is just what you need.
By: Donn Newman
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- By: Peter Aiken, Todd Harbour
- Narrated by: Susan Hanfield
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance. Our Digital Civics Framework presents a guide to increasing the data literacy of billions of citizens. We outline the data knowledge that society needs and propose exercises that will help citizens interact productively within a data-driven society.
By: Peter Aiken, and others
-
Bitcoin and Cryptocurrency Trading 2022
- Discover the Secrets to Start Investing and Create a Passive Income with Cryptocurrencies Without Going Crazy with Boring Charts
- By: Maxwell Bowman
- Narrated by: Robert Plank
- Length: 5 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
We bought our first Bitcoin in 2017, and we have been studying the world of blockchain ever since. We wrote this audiobook to help beginners just like you navigate this complicated sector of finance. Combining straightforward instructions and beginner advice with advanced trading strategies and wisdom, Bitcoin and Cryptocurrency Trading 2022 will take you by the hand and show you how even a complete novice can begin investing in cryptocurrency and seeing results.Â
-
-
Bitcoin and Cryptocurrency Trading
- By Jake Compone on 05-19-22
By: Maxwell Bowman
-
Hacking Artificial Intelligence
- A Leader's Guide from Deepfakes to Breaking Deep Learning
- By: Davey Gibian
- Narrated by: Tom Parks
- Length: 5 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. Hacking Artificial Intelligence sheds light on these hacking risks, explaining them to those who can make a difference. This book is the first-ever layman's guide to the new world of hacking AI and introduces the field to thousands of people who should be aware of these risks. From a security perspective, AI is today where the internet was thirty years ago. It is wide open and can be exploited.
By: Davey Gibian
-
Because You Can: Your Cybersecurity Career
- A Simple and Practical Handbook with Actionable Insights for Success
- By: Ali Khan, Gaurav Kumar, Arlene Worsley
- Narrated by: Skye Alley
- Length: 9 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities. With the organic move to the cloud, digital-first initiatives, and the socioeconomic pressures from the pandemic, the cybersecurity talent demand is unprecedented.
By: Ali Khan, and others
-
Your Data, Their Billions
- Unraveling and Simplifying Big Tech
- By: Jane S. Hoffman
- Narrated by: Natalie Duke
- Length: 10 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
This eye-opening book provides vital information that has been out of reach to those who need it most—the millions of Facebook, Google, Amazon, Apple, and Microsoft users who have come to love and depend upon these digital products. Veteran consumer advocate Jane Hoffman makes the complex world of Big Tech simple to grasp as she reveals exactly how Big Tech uses—and abuses—your personal information. And she proposes a bold blueprint for reforming these corporate behemoths.
By: Jane S. Hoffman
-
2021 NSA Cybersecurity Year in Review
- By: National Security Agency
- Narrated by: Tom Brooks
- Length: 2 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
The National Security Agency (NSA) formed a Cybersecurity Directorate in 2019 with the charge to prevent and eradicate threats to the United States’ National Security Systems and critical infrastructure, with an initial focus on the Defense Industrial Base and its service providers. Drawing on the NSA’s rich information assurance legacy, the Cybersecurity Directorate refocused to meet the demands of the present and the future. It integrated key parts of the NSA’s cybersecurity mission into a more public-facing organization determined to raise the cybersecurity bar.
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- By: United States Government Accountability Office
- Narrated by: Tom Brooks
- Length: 2 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet. A global, multistakeholder community made up of many organizations shapes internet policy, operations, and security. But the ongoing and increasing reliance on the internet underscores the need to understand the risks to its underlying architecture.