-
Zero Day
- The Threat in Cyberspace
- Narrated by: Tom Pile
- Length: 2 hrs and 33 mins
- Unabridged Audiobook
- Categories: Computers & Technology, History & Culture
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
The Afghanistan Papers
- A Secret History of the War
- By: Craig Whitlock, The Washington Post
- Narrated by: Dan Bittner
- Length: 9 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unlike the wars in Vietnam and Iraq, the US invasion of Afghanistan in 2001 had near-unanimous public support. At first, the goals were straightforward and clear: Defeat al-Qaeda and prevent a repeat of 9/11. Yet soon after the United States and its allies removed the Taliban from power, the mission veered off-course and US officials lost sight of their original objectives.
-
-
Eye-Opening Book
- By David J Ray on 09-01-21
By: Craig Whitlock, and others
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
-
-
Overzealous editing and lifeless reading
- By John Tangney on 03-01-20
By: Kim Zetter
-
Cyber War
- The Next Threat to National Security and What to Do About It
- By: Robert K. Knake, Richard A. Clarke
- Narrated by: Pete Larkin
- Length: 10 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
griping description boring book
- By aj on 04-26-22
By: Robert K. Knake, and others
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
One of the world's leading authorities on global security, Marc Goodman takes listeners deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you - and how this makes everyone more vulnerable than ever imagined.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
In the Plex
- How Google Thinks, Works, and Shapes Our Lives
- By: Steven Levy
- Narrated by: L. J. Ganser
- Length: 19 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Few companies in history have ever been as successful and as admired as Google, the company that has transformed the Internet and become an indispensable part of our lives. How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes listeners inside Google headquarters - the Googleplex - to explain how Google works.
-
-
Just ok for me
- By Everyday Mom on 04-23-11
By: Steven Levy
-
The Afghanistan Papers
- A Secret History of the War
- By: Craig Whitlock, The Washington Post
- Narrated by: Dan Bittner
- Length: 9 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unlike the wars in Vietnam and Iraq, the US invasion of Afghanistan in 2001 had near-unanimous public support. At first, the goals were straightforward and clear: Defeat al-Qaeda and prevent a repeat of 9/11. Yet soon after the United States and its allies removed the Taliban from power, the mission veered off-course and US officials lost sight of their original objectives.
-
-
Eye-Opening Book
- By David J Ray on 09-01-21
By: Craig Whitlock, and others
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.
-
-
Overzealous editing and lifeless reading
- By John Tangney on 03-01-20
By: Kim Zetter
-
Cyber War
- The Next Threat to National Security and What to Do About It
- By: Robert K. Knake, Richard A. Clarke
- Narrated by: Pete Larkin
- Length: 10 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
griping description boring book
- By aj on 04-26-22
By: Robert K. Knake, and others
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
One of the world's leading authorities on global security, Marc Goodman takes listeners deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you - and how this makes everyone more vulnerable than ever imagined.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
In the Plex
- How Google Thinks, Works, and Shapes Our Lives
- By: Steven Levy
- Narrated by: L. J. Ganser
- Length: 19 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Few companies in history have ever been as successful and as admired as Google, the company that has transformed the Internet and become an indispensable part of our lives. How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes listeners inside Google headquarters - the Googleplex - to explain how Google works.
-
-
Just ok for me
- By Everyday Mom on 04-23-11
By: Steven Levy
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it. In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Ethical Hacking
- Best Tips and Tricks of Ethical Hacking
- By: Elijah Lewis
- Narrated by: Ben Herold
- Length: 3 hrs
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is for those of you looking to adding more skills to your arsenal. It touches upon all topics that an ethical hacker should know about and how to implement the skills of a professional hacker. The book will provide a brief history of ethical hacking. You will learn what ethical hacking means and how this term is different from general hacking.
-
-
Helpful guide
- By Suresh on 11-10-20
By: Elijah Lewis
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
BY FAR the best book to date on this topic!
- By aaron on 07-09-18
By: David E. Sanger
-
Hacking: Denial of Service Attacks
- By: Alex Wagner
- Narrated by: Jack Bellows
- Length: 3 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. This audiobook will focus on some of the most dangerous hacker tools that are favorite of both, White Hat and Black Hat hackers. The focus of this audiobook will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every section you will find demonstrated examples step-by-step.
By: Alex Wagner
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- By: Murphy Rangel
- Narrated by: Luciano Marin
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
By: Murphy Rangel
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- By: David James Carmack
- Narrated by: Ivan Busenius
- Length: 3 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Hacking with Kali Linux
- A Step by Step Guide to Ethical Hacking, Tools for Computer, and Protect Your Family and Business from Cyber Attacks Using the Basics of Cybersecurity
- By: Jeremy Hack
- Narrated by: Dino Nuhija
- Length: 3 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is a beginner’s guide to learn Kali Linux. Armed with the information given in this book, you can use Kali Linux quite easily and become an expert in it within no time. If you want to learn about all this, then this book is your go-to option. Now, all that’s left for you to do is buy the audiobook today and start learning!
By: Jeremy Hack
-
Ethical Hacking and Cybersecurity
- A Beginner’s Guide to Understand Cyber Security and Ethical Hacking. Protect Your Business and Your Family from Cybercrime
- By: ITC Academy
- Narrated by: Jason Belvill
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dоеѕ thе word “hacking” ѕсаrе уоu? Do you know if your personal information was stolen from your account? Have you always wanted to learn how to protect your system from such attacks? Do you want to learn the secrets of ethical hackers? If you answered yes to all these questions, you’ve come to the right place. This audiobook bundle is perfect for beginners, a comprehensive guide that will show you the easy way to overcoming cybersecurity, computer hacking , wireless network, and penetration testing.
By: ITC Academy
-
Cyber Security
- A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk Management, Social Engineering, and Information Security.
- By: Kevin Kali
- Narrated by: Tom Brooks
- Length: 3 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you want to protect yourself from Cyber Security attacks? If so then keep reading. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations. To avoid cybercrime from evolving, and to not become better at infiltration and such, cyber security needs to stay a practice that adapts to growing problems, thus far, the hackers/attackers are outpacing defenders.
-
-
Great overall high-level
- By Autumn P Corea on 02-29-20
By: Kevin Kali
-
Hacking with Kali Linux
- A Beginner’s Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security
- By: Zach Codings
- Narrated by: Donald Cuddington
- Length: 5 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Have you always been fascinated by the hackers on TV? Do you want to introduce yourself to the world of hacking? Do you know penetration testing is one of the fastest growing fields? If your answer to these questions is yes then keep reading...Luckily for you, this audiobook tackles that issue, and it comes to a simple conclusion: Kali Linux. Kali Linux was made by hackers, for hackers, so there’s no doubt that it is a must-have piece of equipment for those just starting out and those who have been around the block a few times.
-
-
Step By Step Hacking Guide
- By William on 07-27-20
By: Zach Codings
Publisher's Summary
Will the world's next war be fought in cyberspace?
"It's going to happen," said former National Defense University Professor Dan Kuehl. So much of the world's activity takes place on the Internet now - including commerce, banking, and communications - that the Pentagon has declared war in cyberspace an inevitability.
For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This audiobook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers, and corporate executives, this book will help regular people, lawmakers, and businesses better understand the mind-bending challenge of keeping the Internet safe from hackers and security breaches - and all-out war.
More from the same
What listeners say about Zero Day
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Betty Von Schnuuglestein
- 10-27-15
Nothing new here....
For some reason the same information was several times. Compared to similar books on the same subject matter, this attempt sorely lacked.
Recently read the phenomenal 'Future Crimes' twice -a 20 hour book - and it blew this out of the water. No real answers or solutions, just felt like it was reading headlines, by and large.
Not really 'crap' as much as ho-hum.
1 person found this helpful
-
Overall
-
Performance
-
Story
- Niki Morris
- 05-20-16
Great book!
Worth the download. Short yet full of very intriguing information for the IT novice and experts alike.