-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $24.49
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- By: Christian Brose
- Narrated by: Christian Brose
- Length: 9 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network" - the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- By Tomas Singliar on 06-06-20
By: Christian Brose
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Eugene on 08-08-20
By: Richard A. Clarke, and others
-
Burn-In
- By: P. W. Singer, August Cole
- Narrated by: Mia Barron
- Length: 14 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
An FBI agent hunts a new kind of terrorist through a Washington, DC, of the future in this ground-breaking book - at once a gripping techno-thriller and a fact-based tour of tomorrow. America is on the brink of a revolution, one both technological and political. The science fiction of AI and robotics has finally come true, but millions are angry and fearful that the future has left them behind. After narrowly stopping a bombing at Washington’s Union Station, FBI Special Agent Lara Keegan receives a new assignment: To field-test an advanced police robot.
-
-
Liberal Slant in Plot
- By ThizGuy on 06-21-20
By: P. W. Singer, and others
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
BY FAR the best book to date on this topic!
- By aaron on 07-09-18
By: David E. Sanger
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- By: Christian Brose
- Narrated by: Christian Brose
- Length: 9 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network" - the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- By Tomas Singliar on 06-06-20
By: Christian Brose
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Eugene on 08-08-20
By: Richard A. Clarke, and others
-
Burn-In
- By: P. W. Singer, August Cole
- Narrated by: Mia Barron
- Length: 14 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
An FBI agent hunts a new kind of terrorist through a Washington, DC, of the future in this ground-breaking book - at once a gripping techno-thriller and a fact-based tour of tomorrow. America is on the brink of a revolution, one both technological and political. The science fiction of AI and robotics has finally come true, but millions are angry and fearful that the future has left them behind. After narrowly stopping a bombing at Washington’s Union Station, FBI Special Agent Lara Keegan receives a new assignment: To field-test an advanced police robot.
-
-
Liberal Slant in Plot
- By ThizGuy on 06-21-20
By: P. W. Singer, and others
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
BY FAR the best book to date on this topic!
- By aaron on 07-09-18
By: David E. Sanger
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
LikeWar
- The Weaponization of Social Media
- By: P. W. Singer, Emerson T. Brooking
- Narrated by: George Guidall
- Length: 11 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the Internet is changing war and politics, just as war and politics are changing the Internet. Terrorists livestream their attacks, “Twitter wars” produce real world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones.
-
-
Deep analysis of the Social Media revolution
- By Ross J. Patti on 10-29-18
By: P. W. Singer, and others
-
Wired for War
- The Robotics Revolution and Conflict in the 21st Century
- By: P. W. Singer
- Narrated by: William Hughes
- Length: 20 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
A military expert reveals how science fiction is fast becoming reality on the battlefield, changing not just how wars are fought, but also the politics, economics, laws, and ethics that surround war itself. Singer’s previous books foretold the rise of private military contractors and the advent of child soldiers - predictions that have proved all too accurate. Now he explores the greatest revolution in military affairs since the atom bomb: robotic warfare. We are now seeing a massive shift in military technology....
-
-
Target Audience Acquired
- By Doug on 04-08-11
By: P. W. Singer
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
-
-
Overzealous editing and lifeless reading
- By John Tangney on 03-01-20
By: Kim Zetter
-
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
- By: Paul Rosenzweig, The Great Courses
- Narrated by: Paul Rosenzweig
- Length: 9 hrs and 41 mins
- Original Recording
-
Overall
-
Performance
-
Story
Cyberspace is the 21st century’s greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.
-
-
Required if you use the internet!
- By Tommy D'Angelo on 11-29-15
By: Paul Rosenzweig, and others
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
The Master Algorithm
- How the Quest for the Ultimate Learning Machine Will Remake Our World
- By: Pedro Domingos
- Narrated by: Mel Foster
- Length: 13 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Under the aegis of machine learning in our data-driven machine age, computers are programming themselves and learning about - and solving - an extraordinary range of problems, from the mundane to the most daunting. Today it is machine learning programs that enable Amazon and Netflix to predict what users will like, Apple to power Siri's ability to understand voices, and Google to pilot cars.
-
-
Let the Data Speak for themselves
- By Gary on 10-16-15
By: Pedro Domingos
-
Cybersecurity Bible
- Security Threats, Frameworks, Cryptography & Network Security: 4 Books in 1
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 11 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Bible is a book bundle that includes four books: 25 Most Common Security Threats & How To Avoid Them, 21 Steps for Implementing the NIST Cybersecurity Framework, Cryptography Fundamentals & Network Security, and How to Get into Cybersecurity Without Technical Background.
-
-
This book is a waste of time and money
- By Richard Sikes on 04-04-21
By: Hugo Hoffman
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
One of the world's leading authorities on global security, Marc Goodman takes listeners deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you - and how this makes everyone more vulnerable than ever imagined.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
Publisher's Summary
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what we can do.
Along the way, they take listeners on a tour of the important (and entertaining) issues and characters of cybersecurity, from the Anonymous hacker group and the Stuxnet computer virus to the new cyberunits of the Chinese and US militaries. Cybersecurity and Cyberwar: What Everyone Needs to Know® is the definitive account of the subject for us all, which comes not a moment too soon.
Critic Reviews
More from the same
What listeners say about Cybersecurity and Cyberwar
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Pascal
- 03-04-17
A job application for some government job?
What disappointed you about Cybersecurity and Cyberwar?
I started this book and was quickly disappointed with its lack of content. The first part gives the reader some random facts about the history of the internet and cybersecurity, some generic technical information and that was about it. I was not impressed but I kept going.
The second part of the book got me puzzled. How could the authors display such a poor understanding (or such a poor confidence) in the power of distributed architecture, open source software and basically everything that makes the Internet. I wouldn’t say it’s perfect but it’s not Armageddon everyday either. At that stage I felt I was in a Bruce Willis movie “It’s a DDOS attack, we’ll all gonna die”…. I went from being not impressed to feeling I was wasting my time but I kept going.
Then came the part where the authors make recommendations. In short, their solution is lots of government supervision, hire lots of people and spend lots of money. There is nothing in the book about how to manage risk. It is all about avoiding risk at all cost. There is no practical recommendations that organizations concerned with their bottom line can implement…. Then I gave up. I must admit I did not finish the book.
My only rational explanation is that this book is a job application by the authors to some government job.
Pascal,
8 people found this helpful
-
Overall
-
Performance
-
Story
- Mark
- 02-27-17
Outstanding
Fascinating book, it provides a comprehensive overview of the current state of cyber security and the incredible challenges facing cyber security professionals. Very detailed, the authors go to great lengths to point out some very scary vulnerabilities and they also dispel some fears that are probably overblown. Very even handed in how they approache political perspectives for cyber strategies. The narrator does an excellent job. Highly recommended.
3 people found this helpful
-
Overall
-
Performance
-
Story
- LizzToon
- 11-12-16
Good overview
A thorough look at the complexities of the cyber domain from many different angles. A well documented history of how we got to where we are with technology as well.
2 people found this helpful
-
Overall
-
Performance
-
Story
- netusera
- 10-05-16
Everyone needs to know more.
This is the iceberg... forming and melting. A tip today gives rise to another tomorrow.
2 people found this helpful
-
Overall
-
Performance
-
Story
- alec1 xNavy
- 08-07-16
excellent overview of cyber security for us laymen
highly recommended for a birds eye view of personal cyber security. I recommend following the guidelines provided in the book to protect yourself. if you live on the internet, this is a great manual to use for protection guidance.
2 people found this helpful
-
Overall
-
Performance
-
Story
- Rob Gray
- 07-24-16
Lots of good background and context
Mr Singer and Mr Friedman are incredibly thoughtful and thought provoking writers. This book introduces a great many policy conversations. I appreciate that the commentary is unbiased or at least presents both sides (private industry and public/regulatory) of the subjects discussed herein. Thank you Peter and Allan.
2 people found this helpful
-
Overall
-
Performance
-
Story
- Thomas Hoye
- 05-04-16
Let's hope there is not a sequel
This is my least enjoyable book from audible even including those I returned. The author seems lost interest in the subject early in the book feeling the pages with poorly connecting data to the main theme and he uses metaphors that are disjointed bringing added confusion rather than clarity.
By the time the end of the book the pages run on with filler as if to make a page quota. Add to this is a narrator whose sing song delivery is more fitting narrating a book on the joy of kite flying than what is supposed to be a serious subject.
This book is not the concise and crisp covering of the subject matter I hoped it would be.
8 people found this helpful
-
Overall
-
Performance
-
Story
- Julie A Good
- 03-29-16
from a cyber immigrant
well done. q/a format useful. topical organization literally provides a response to what anyone connected to the Internet needs to know.
4 people found this helpful
-
Overall
-
Performance
-
Story
- Kiel Hunt
- 12-14-16
For those that don't know, that they don't know!!
if you are someone inclined in computer networking technology and understanding this book is actually pretty good as a reinforcement but not solely for you. This book is definitely designed for those people who if almost every chapter there's a point where they bring up something that you don't know then this book is definitely for you
3 people found this helpful
-
Overall
-
Performance
-
Story
- Matt L
- 08-27-16
Must read for all
This fills in the blanks for those seeking understanding of the cyber domain and cyber security.
1 person found this helpful
-
Overall
-
Performance
-
Story

- A. Jackson
- 02-23-16
A bit of backstory for the larger "cyber stories"
Would you recommend this audiobook to a friend? If so, why?
I would only recommend this to someone looking for the backstory on alot of the larger "cyber" stories that have hit the headlines over the past few years
What did you like best about this story?
Told in a very competent manner, never too technically heavy, and only sometimes too light.
Any additional comments?
Overall, don't listen to this book expecting to come out with l33t hacking skills. They barely skim over the technical "how to" in passing. If you're looking for a technical manual, look else where.
But this does give you some of the back story, and elaborates further on matters such as StuxNet, and other headline grabbing cyber stories. If you're already well versed in InfoSec, you may not gain too much from this audiobook, but it acts as a good introduction.
I enjoyed it, and would recommend it with these caveats.
2 people found this helpful
-
Overall
-
Performance
-
Story

- Laura
- 09-11-18
Informative and Relaxing
I really enjoyed this, I used to put it on at night before sleep or when on the bus.
1 person found this helpful
-
Overall
-
Performance
-
Story

- JGS
- 05-14-17
Great Cyber Summary
A couple of years old, but still a thorough summary of the cyber threat landscape. Great start point for anyone wanting to learn about the evolution of the internet and cyberspace, better understand the current issues and what we can expect in the near future.
1 person found this helpful
-
Overall
-
Performance
-
Story

- Andrew
- 04-29-16
Useful guide for the non-technical reader
Any additional comments?
A general, but fairly comprehensive, guide to the subject as implied by the title. Good narration.
1 person found this helpful
-
Overall
-
Performance
-
Story

- Amazon Customer
- 11-30-16
broad overview rather than techniques.
good historical perspective related to global issue and personal and corporate responsibility driven by national regulations.