Meilleures ventes
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Auteur(s): Lyn Alden
- Narrateur(s): Guy Swann
- Durée: 17 h et 31 min
- Version intégrale
-
Au global37
-
Performance31
-
Histoire31
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Supremely educational
- Écrit par Utilisateur anonyme le 2025-02-08
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Auteur(s): Mike Chapple, David Seidl
- Narrateur(s): Ray Greenley
- Durée: 24 h et 52 min
- Version intégrale
-
Au global3
-
Performance2
-
Histoire2
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
-
-
great coverage of topics
- Écrit par Amazon Customer le 2025-04-07
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- Auteur(s): Renee Dudley, Daniel Golden
- Narrateur(s): BD Wong
- Durée: 11 h et 37 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
The Identity Security Imperative
- A Leader's Guide to Securing Every Identity
- Auteur(s): CyberArk
- Narrateur(s): Matt Haver
- Durée: 3 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Identity is the lifeblood of every organization and the top attack vector. Securing every identity - human and machine - is critical for mitigating risk and ensuring business resilience.
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global30
-
Performance25
-
Histoire25
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
-
-
Okay
- Écrit par AmazonShopper le 2024-03-04
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Auteur(s): Mike Chapple, James Michael Stewart, Darril Gibson
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Version intégrale
-
Au global4
-
Performance2
-
Histoire2
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline.
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Auteur(s): Lyn Alden
- Narrateur(s): Guy Swann
- Durée: 17 h et 31 min
- Version intégrale
-
Au global37
-
Performance31
-
Histoire31
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Supremely educational
- Écrit par Utilisateur anonyme le 2025-02-08
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Auteur(s): Mike Chapple, David Seidl
- Narrateur(s): Ray Greenley
- Durée: 24 h et 52 min
- Version intégrale
-
Au global3
-
Performance2
-
Histoire2
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
-
-
great coverage of topics
- Écrit par Amazon Customer le 2025-04-07
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- Auteur(s): Renee Dudley, Daniel Golden
- Narrateur(s): BD Wong
- Durée: 11 h et 37 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
The Identity Security Imperative
- A Leader's Guide to Securing Every Identity
- Auteur(s): CyberArk
- Narrateur(s): Matt Haver
- Durée: 3 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Identity is the lifeblood of every organization and the top attack vector. Securing every identity - human and machine - is critical for mitigating risk and ensuring business resilience.
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global30
-
Performance25
-
Histoire25
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
-
-
Okay
- Écrit par AmazonShopper le 2024-03-04
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Auteur(s): Mike Chapple, James Michael Stewart, Darril Gibson
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Version intégrale
-
Au global4
-
Performance2
-
Histoire2
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline.
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- Auteur(s): Bruce Schneier
- Narrateur(s): Dan John Miller
- Durée: 8 h et 3 min
- Version intégrale
-
Au global4
-
Performance3
-
Histoire3
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
A Must Read
- Écrit par Candace Sundbo le 2023-10-11
-
How to Survive the Digital Storm
- Avoid Trolls Fake Fame and the Moronic Social Media Culture
- Auteur(s): Vicente O. Rockwell
- Narrateur(s): Robyn Green
- Durée: 1 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In a world where likes determine value and viral moments pass for meaning, How to Survive the Digital Storm is your vital guide to staying sane amid the mayhem of the internet age.
-
Spies, Lies, and Cybercrime
- Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
- Auteur(s): Eric O'Neill
- Narrateur(s): Eric O'Neill
- Durée: 9 h et 10 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
National security strategist and former FBI counterintelligence operative Eric O’Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and wallet, and arms you with his proven tactics for spotting and neutralizing cyberthreats to protect yourself, your family, and...
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- Auteur(s): Eric Conrad, Seth Misenar, Joshua Feldman
- Narrateur(s): Matthew E. Kelly
- Durée: 10 h et 4 min
- Version intégrale
-
Au global4
-
Performance3
-
Histoire2
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Auteur(s): Roger A. Grimes
- Narrateur(s): Jonathan Todd Ross
- Durée: 10 h et 46 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Auteur(s): Kevin Mitnick, Robert Vamosi, Mikko Hypponen - introduction
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Version intégrale
-
Au global107
-
Performance90
-
Histoire89
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin...
-
-
Good book but
- Écrit par Mr. C le 2018-02-27
-
Guía de Ciberseguridad
- Descubre los Secretos para Detectar, Prevenir y Proteger tus Dispositivos de Amenazas, Estafas Cibernéticas y Hackers
- Auteur(s): Joseph Mendoza
- Narrateur(s): Keren Iturriago
- Durée: 4 h et 3 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Aquí tienes una verdad contundente: no necesitas ser un experto en tecnología para dominar los conceptos básicos de ciberseguridad. De hecho, solo estás a un libro de transformar tu vida digital y proteger tu información personal y profesional contra las fuerzas oscuras del mundo cibernético.
-
The Wires of War
- Technology and the Global Struggle for Power
- Auteur(s): Jacob Helberg
- Narrateur(s): Jesse Einstein
- Durée: 11 h et 32 min
- Version intégrale
-
Au global12
-
Performance10
-
Histoire9
From the former news policy lead at Google, an “informative and often harrowing wake-up call” (Publishers Weekly) that explains the high-stakes global cyberwar brewing between Western democracies and the authoritarian regimes of China and Russia that could potentially crush democracy. From...
-
-
The whole book is insane
- Écrit par Cody Zazulak le 2025-07-11
-
Cybersecurity Incident & Vulnerability Response Playbooks
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 23 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
These playbooks provide FCEB agencies with a standard set of procedures to identify, coordinate, remediate, recover, and track successful mitigations from incidents and vulnerabilities affecting FCEB systems, data, and networks....
-
Amazon Web Services in Action
- Auteur(s): Andreas Wittig, Michael Wittig
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability....
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Auteur(s): Kevin Poulsen
- Narrateur(s): Eric Michael Summerer
- Durée: 8 h et 8 min
- Version intégrale
-
Au global17
-
Performance15
-
Histoire15
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover....
-
OSCP Offensive Security Certified Professional
- Practice Tests with Answers to Pass the OSCP Ethical Hacking Certification Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Delve into a multifaceted exploration of offensive security practices, meticulously designed to equip enthusiasts and seasoned professionals alike with the prowess and acumen required to excel in the ever-evolving cybersecurity landscape....
-
Certified Information Security Manager CISM Study Guide
- Auteur(s): Mike Chapple PhD CISM
- Narrateur(s): Daniel Henning
- Durée: 19 h et 21 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Auteur(s): Cliff Stoll
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Version intégrale
-
Au global45
-
Performance39
-
Histoire39
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security....
-
-
so intriguing
- Écrit par Jesse le 2026-01-12
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- Auteur(s): Mike Chapple, David Seidl
- Narrateur(s): Daniel Henning
- Durée: 19 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
-
Surveillance Valley
- The Secret Military History of the Internet
- Auteur(s): Yasha Levine
- Narrateur(s): LJ Ganser
- Durée: 10 h et 42 min
- Version intégrale
-
Au global18
-
Performance16
-
Histoire16
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
A History Lesson Everyone Should Know
- Écrit par JJHicks le 2024-04-15
-
Chasing Shadows
- Cyber Espionage, Subversion, and the Global Fight for Democracy
- Auteur(s): Ronald J. Deibert
- Narrateur(s): Geoffrey Breton
- Durée: 12 h et 26 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Instant Bestseller Like a John Le Carré novel updated for the digital age, Chasing Shadows provides a gripping account of how the Citizen Lab, the world’s foremost digital watchdog, has uncovered dozens of cyber espionage cases and protects people in countries around the world. Called...
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global76
-
Performance59
-
Histoire59
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true...
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
-
The Art of Deception
- Controlling the Human Element of Security
- Auteur(s): Kevin Mitnick
- Narrateur(s): Nick Sullivan
- Durée: 13 h et 41 min
- Version intégrale
-
Au global6
-
Performance5
-
Histoire5
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security....
-
-
The Dark Side of Reviews
- Écrit par Daniel Pascoa le 2025-07-26
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Auteur(s): Joseph Menn
- Narrateur(s): Jonathan Davis, Joseph Menn
- Durée: 6 h et 35 min
- Version intégrale
-
Au global24
-
Performance24
-
Histoire24
The shocking untold story of the elite secret society of hackers fighting to protect our freedom, “a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age” (The New York Times Book Review) Cult of the Dead Cow is the tale of the oldest...
-
-
Hard to get into
- Écrit par Blair C. le 2019-11-06
-
Social Engineering
- The Art of Human Hacking
- Auteur(s): Paul Wilson - foreword, Christopher Hadnagy
- Narrateur(s): A. T. Chandler
- Durée: 14 h et 52 min
- Version intégrale
-
Au global6
-
Performance4
-
Histoire4
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides....
-
Investigating Cryptocurrencies
- Understanding, Extracting, and Analyzing Blockchain Evidence
- Auteur(s): Nick Furneaux
- Narrateur(s): Christopher Grove
- Durée: 10 h et 22 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market....
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Auteur(s): Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats....
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Auteur(s): Kevin Mitnick, William L. Simon
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Version intégrale
-
Au global166
-
Performance150
-
Histoire148
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
wow
- Écrit par jesse b le 2022-05-20