Meilleures ventes
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Auteur(s): Lyn Alden
- Narrateur(s): Guy Swann
- Durée: 17 h et 31 min
- Version intégrale
-
Au global37
-
Performance31
-
Histoire31
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Supremely educational
- Écrit par Utilisateur anonyme le 2025-02-08
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- Auteur(s): Mike Chapple, David Seidl
- Narrateur(s): Ray Greenley
- Durée: 17 h et 20 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You'll find clear and concise information on critical...
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- Auteur(s): Glen D. Singh
- Narrateur(s): Alex Freeman
- Durée: 13 h et 47 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 31 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills.
-
Cloudmoney
- Cash, Cards, Crypto, and the War for Our Wallets
- Auteur(s): Brett Scott
- Narrateur(s): Coleman Pedigo
- Durée: 8 h et 51 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
The reach of Corporations into our lives via cards and apps has never been greater; many of us rarely use cash these days. But what we’re told is a natural and inevitable move is actually the work of powerful interests. And the great battle of our time is the battle for ownership of the...
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Auteur(s): Joseph Cox
- Narrateur(s): Peter Ganim
- Durée: 11 h et 40 min
- Version intégrale
-
Au global17
-
Performance13
-
Histoire13
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone. In 2018, a powerful app for secure...
-
-
Could have been great
- Écrit par el le 2026-03-31
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Auteur(s): Lyn Alden
- Narrateur(s): Guy Swann
- Durée: 17 h et 31 min
- Version intégrale
-
Au global37
-
Performance31
-
Histoire31
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Supremely educational
- Écrit par Utilisateur anonyme le 2025-02-08
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- Auteur(s): Mike Chapple, David Seidl
- Narrateur(s): Ray Greenley
- Durée: 17 h et 20 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You'll find clear and concise information on critical...
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- Auteur(s): Glen D. Singh
- Narrateur(s): Alex Freeman
- Durée: 13 h et 47 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities....
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 31 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills.
-
Cloudmoney
- Cash, Cards, Crypto, and the War for Our Wallets
- Auteur(s): Brett Scott
- Narrateur(s): Coleman Pedigo
- Durée: 8 h et 51 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
The reach of Corporations into our lives via cards and apps has never been greater; many of us rarely use cash these days. But what we’re told is a natural and inevitable move is actually the work of powerful interests. And the great battle of our time is the battle for ownership of the...
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Auteur(s): Joseph Cox
- Narrateur(s): Peter Ganim
- Durée: 11 h et 40 min
- Version intégrale
-
Au global17
-
Performance13
-
Histoire13
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone. In 2018, a powerful app for secure...
-
-
Could have been great
- Écrit par el le 2026-03-31
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Auteur(s): Mike Chapple, James Michael Stewart, Darril Gibson
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Version intégrale
-
Au global4
-
Performance2
-
Histoire2
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with...
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global32
-
Performance26
-
Histoire26
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
-
-
best book ever
- Écrit par Sr.Yura le 2026-05-03
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Auteur(s): Joseph Menn
- Narrateur(s): Jonathan Davis, Joseph Menn
- Durée: 6 h et 35 min
- Version intégrale
-
Au global24
-
Performance24
-
Histoire24
The shocking untold story of the elite secret society of hackers fighting to protect our freedom, “a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age” (The New York Times Book Review) Cult of the Dead Cow is the tale of the oldest...
-
-
Hard to get into
- Écrit par Blair C. le 2019-11-06
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- Auteur(s): Byron Tau
- Narrateur(s): Sean Patrick Hopkins
- Durée: 11 h et 6 min
- Version intégrale
-
Au global5
-
Performance3
-
Histoire3
You are being surveilled right now. This sweeping exposé reveals how the U.S. government allied with data brokers, tech companies, and advertisers to monitor us through the phones we carry and the devices in our home. “A revealing . . . startling . . . timely . . . fascinating, sometimes...
-
-
Not objective
- Écrit par Julie le 2025-11-26
-
The Practical CISSP Study Guide
- Master the CISSP Exam in Just 30 Days with Step-by-Step Real-World Scenarios and Expert Tips (CISSP Success Series, Book 1)
- Auteur(s): Taimur Ijlal
- Narrateur(s): Brendan Reese
- Durée: 6 h et 36 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Master the CISSP domains not just for exam day but for lasting success in your cybersecurity career. Learn complex topics easily with practical examples and proven strategies to help you pass the CISSP exam on your first try.
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global53
-
Performance45
-
Histoire45
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
-
The Truth Machine
- The Blockchain and the Future of Everything
- Auteur(s): Michael J Casey, Paul Vigna
- Narrateur(s): Sean Runnette
- Durée: 10 h et 24 min
- Version intégrale
-
Au global55
-
Performance45
-
Histoire44
"Views differ on bitcoin, but few doubt the transformative potential of Blockchain technology. The Truth Machine is the best book so far on what has happened and what may come along. It demands the attention of anyone concerned with our economic future." (Lawrence H. Summers, Charles W. Eliot...
-
-
The best book on blockchain use cases so far...
- Écrit par Ben West le 2018-10-18
-
Identity Security for Software Development
- Best Practices That Every Developer Must Know
- Auteur(s): John Walsh, Uzi Ailon, Matt Barker
- Narrateur(s): Tom Perkins
- Durée: 7 h et 47 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control...
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- Auteur(s): Bruce Schneier
- Narrateur(s): Dan John Miller
- Durée: 9 h et 27 min
- Version intégrale
-
Au global10
-
Performance10
-
Histoire10
Data is everywhere. We create it every time we go online, turn our phones on (or off), and pay with credit cards. The data is stored, studied, and bought and sold by corporations and governments for surveillance and for control. "Foremost security expert" (Wired) and best-selling author Bruce...
-
-
Info overload
- Écrit par David Gloyn-cox le 2018-09-19
-
Hacking ISIS
- How to Destroy the Cyber Jihad
- Auteur(s): Malcolm Nance, Christopher Sampson
- Narrateur(s): Neil Shah
- Durée: 7 h et 47 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Hacking ISIS will explain in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world....
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Auteur(s): Kevin Mitnick
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Version intégrale
-
Au global167
-
Performance151
-
Histoire149
Kevin Mitnick, the world’s most wanted computer hacker, managed to hack into some of the country’s most powerful—and seemingly impenetrable—agencies and companies. By conning employees into giving him private information and maneuvering through layers of security, he gained access to...
-
-
wow
- Écrit par jesse b le 2022-05-20
-
Unmasking the Social Engineer
- The Human Element of Security
- Auteur(s): Christopher Hadnagy, Paul F. Kelly, Paul Ekman
- Narrateur(s): Christopher Hadnagy
- Durée: 5 h et 20 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Learn to identify the social engineer by nonverbal behavior. Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding nonverbal communications with the knowledge of how social engineers, scam artists, and con men use these skills to build...
-
-
you're awesome
- Écrit par NARUTO le 2025-08-06
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Auteur(s): Cliff Stoll
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Version intégrale
-
Au global46
-
Performance40
-
Histoire40
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would...
-
-
so intriguing
- Écrit par Jesse le 2026-01-12
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Auteur(s): Kelly Shortridge, Aaron Rinehart - contributor
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we...
-
-
Great content but horribly annoying computer voice
- Écrit par Utilisateur anonyme le 2024-04-08
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Auteur(s): Mark Sangster
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals....
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- Auteur(s): Bruce Schneier
- Narrateur(s): Dan John Miller
- Durée: 8 h et 3 min
- Version intégrale
-
Au global4
-
Performance3
-
Histoire3
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world. A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a...
-
-
A Must Read
- Écrit par Candace Sundbo le 2023-10-11
-
The Opt-Out Family
- How to Give Your Kids What Technology Can't
- Auteur(s): Erin Loechner
- Narrateur(s): Lisa Larsen
- Durée: 10 h et 26 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Discover a new and hopeful path forward as you consider your family's approach to social media, screen time, and technology. We've all heard the mind-boggling statistics about technology and social media use. The numbers don't lie; our obsession with smartphones and social media is slowly...
-
Read Write Own
- Building the Next Era of the Internet
- Auteur(s): Chris Dixon
- Narrateur(s): Robert Petkoff, Chris Dixon
- Durée: 8 h et 9 min
- Version intégrale
-
Au global4
-
Performance2
-
Histoire2
A potent exploration of the power of blockchains to reshape the future of the internet—and how that affects us all—from influential technology entrepreneur and startup investor Chris Dixon “A must for anyone who wants to better understand the real potential of blockchains and web3...
-
Networking All-in-One for Dummies (9th Edition)
- Auteur(s): Doug Lowe
- Narrateur(s): David Stifel
- Durée: 27 h et 39 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Every network administrator needs Networking All-in-One for Dummies, the comprehensive learning resource and reliable desk reference.
-
Code War
- How Nations Hack, Spy, and Shape the Digital Battlefield
- Auteur(s): Allie Mellen
- Narrateur(s): Frances Anderson
- Durée: 13 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyberattacks are the ultimate geopolitical weapon of the twenty-first century. They are used to damage presidential campaigns, shut down electric grids, sway public sentiment, and cost businesses and governments alike billions of dollars. Popular culture portrays cyberattacks as unstoppable and...
-
The Augmented Learning Revolution
- How Augmented Reality Transforms Education Through Immersive Interactive and Inventive Experiences
- Auteur(s): Brad Cavalier
- Narrateur(s): Myriam Berger
- Durée: 1 h et 14 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Augmented Learning Revolution explores how augmented reality (AR) is reshaping education by turning passive learning into immersive, interactive, and inventive experiences.
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Auteur(s): Kevin Poulsen
- Narrateur(s): Eric Michael Summerer
- Durée: 8 h et 8 min
- Version intégrale
-
Au global17
-
Performance15
-
Histoire15
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover...
-
Privacy's Defender
- My Thirty-Year Fight Against Digital Surveillance
- Auteur(s): Cindy Cohn
- Narrateur(s): Cindy Cohn
- Durée: 8 h et 36 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A personal chronicle of three key legal privacy battles that have defined the digital age and shaped the internet as we know it.
-
Breaking and Entering
- The Extraordinary Story of a Hacker Called "Alien"
- Auteur(s): Jeremy N. Smith
- Narrateur(s): Jonathan Todd Ross
- Durée: 12 h et 4 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
This taut, true thriller takes a deep dive into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien. When she arrived at MIT in the 1990s, Alien wanted to study aerospace engineering, but she was soon...