Bestsellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Written by: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall37
-
Performance31
-
Story31
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Supremely educational
- By Anonymous on 2025-02-08
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Written by: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 24 hrs and 52 mins
- Unabridged
-
Overall3
-
Performance2
-
Story2
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
-
-
great coverage of topics
- By Amazon Customer on 2025-04-07
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Written by: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall16
-
Performance12
-
Story12
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone. In 2018, a powerful app for secure...
-
-
not worth it
- By A on 2025-06-25
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Written by: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall166
-
Performance150
-
Story148
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
wow
- By jesse b on 2022-05-20
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Written by: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall53
-
Performance45
-
Story45
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
-
-
Very interesting, technical but easy enough to understand.
- By Jon on 2023-12-07
-
How to Survive the Digital Storm
- Avoid Trolls Fake Fame and the Moronic Social Media Culture
- Written by: Vicente O. Rockwell
- Narrated by: Robyn Green
- Length: 1 hr
- Unabridged
-
Overall0
-
Performance0
-
Story0
In a world where likes determine value and viral moments pass for meaning, How to Survive the Digital Storm is your vital guide to staying sane amid the mayhem of the internet age.
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Written by: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall37
-
Performance31
-
Story31
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Supremely educational
- By Anonymous on 2025-02-08
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Written by: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 24 hrs and 52 mins
- Unabridged
-
Overall3
-
Performance2
-
Story2
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
-
-
great coverage of topics
- By Amazon Customer on 2025-04-07
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Written by: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall16
-
Performance12
-
Story12
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone. In 2018, a powerful app for secure...
-
-
not worth it
- By A on 2025-06-25
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Written by: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall166
-
Performance150
-
Story148
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
wow
- By jesse b on 2022-05-20
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Written by: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall53
-
Performance45
-
Story45
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
-
-
Very interesting, technical but easy enough to understand.
- By Jon on 2023-12-07
-
How to Survive the Digital Storm
- Avoid Trolls Fake Fame and the Moronic Social Media Culture
- Written by: Vicente O. Rockwell
- Narrated by: Robyn Green
- Length: 1 hr
- Unabridged
-
Overall0
-
Performance0
-
Story0
In a world where likes determine value and viral moments pass for meaning, How to Survive the Digital Storm is your vital guide to staying sane amid the mayhem of the internet age.
-
Cybersecurity All-in-One for Dummies
- Written by: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
-
-
Slapped together not well thought out,
- By PoisonedPackets on 2024-07-12
-
Surveillance Valley
- The Secret Military History of the Internet
- Written by: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall18
-
Performance16
-
Story16
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
A History Lesson Everyone Should Know
- By JJHicks on 2024-04-15
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- Written by: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- Written by: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall3
-
Performance1
-
Story0
Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications....
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- Written by: Anthony Hack
- Narrated by: Jordan Gunner
- Length: 3 hrs and 18 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook....
-
The Art of Attack
- Attacker Mindset for Security Professionals
- Written by: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality....
-
Hacke-moi si tu peux
- Mémoires d’un cyberpirate repenti
- Written by: Florent Curtet, Sophie Garcin
- Narrated by: Cédric Dumond
- Length: 4 hrs and 36 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
Mémoires d'un cyberpirate repenti. Enfant génial et hyperactif, Florent voit dans l'ordinateur le complice d'une vie. Cette machine qui grandira en même temps que...
-
Cybersecurity for Dummies
- Written by: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall1
-
Performance0
-
Story0
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist and how to identify, protect against, detect, and respond to them....
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Written by: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall4
-
Performance2
-
Story2
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Written by: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
-
Alice and Bob Learn Secure Coding
- Written by: Tanya Janca
- Narrated by: Tanya Janca
- Length: 16 hrs and 10 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
Discover a game-changing resource that caters to developers of all levels with Alice and Bob Learn Secure Coding.
-
-
A Must-Have for Anyone Interested in Securing Software
- By Audiobook-Enthusiast on 2025-12-04
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- Written by: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
-
Breaking and Entering
- The Extraordinary Story of a Hacker Called "Alien"
- Written by: Jeremy N. Smith
- Narrated by: Jonathan Todd Ross
- Length: 12 hrs and 4 mins
- Unabridged
-
Overall3
-
Performance3
-
Story3
This taut, true thriller takes a deep dive into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien....
-
5 Habits of the Tech-Ready Family
- Raising Wise Kids in a Wild Digital World
- Written by: Chris McKenna
- Narrated by: Chris McKenna
- Length: 7 hrs
- Unabridged
-
Overall0
-
Performance0
-
Story0
With just five simple habits, you can shape an environment where your kids grow confident, resilient, and ready to face the challenges, dangers, and opportunities of an ever-changing online world. Childhood today looks very different than it used to. Smartphones, AI, and social media shape how...
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Written by: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall76
-
Performance59
-
Story59
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true...
-
-
Surprisingly more boring than I thought.
- By Jake L.S. on 2020-01-18
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Written by: Solis Tech
- Narrated by: Millian Quinteros
- Length: 2 hrs and 21 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover....
-
Defend Your Data: Cybersecurity Essentials for Everyone
- Practical Steps to Protect Your Digital Life and Safeguard Your Data
- Written by: Ousmane Barry
- Narrated by: Snake Porter
- Length: 3 hrs and 59 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Defend Your Data is a practical guide for anyone who wants to feel more confident and secure in the digital world. It walks you through the threats most people face today, why they work, and how to defend yourself with simple habits that make a real difference.
-
Alice and Bob Learn Application Security
- Written by: Tanya Janca
- Narrated by: Tanya Janca
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall2
-
Performance1
-
Story1
Learn application security from the very start with this comprehensive and approachable guide. Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate the best security practices in software development.....
-
-
Changing the way we build software
- By Audiobook-Enthusiast on 2025-11-20
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- Written by: Taimur Ijlal
- Narrated by: Sean Oblak
- Length: 1 hr and 40 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced....
-
-
Love this!!
- By Cleopatra on 2025-06-25
-
The New World Economy: A Beginner's Guide
- Written by: Randy Charles Epping
- Narrated by: George Newbern
- Length: 6 hrs and 49 mins
- Unabridged
-
Overall2
-
Performance2
-
Story2
What is blockchain? What is Bitcoin? How can central banks be instrumental in guiding a nation's economy? What are the underlying causes of trade deficits? Do trade wars actually help the domestic economy? How has the behavior of millennials and Generation Z affected the global economy? Find out...
-
Certified Information Security Manager CISM Study Guide
- Written by: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Written by: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall30
-
Performance25
-
Story25
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
-
-
Okay
- By AmazonShopper on 2024-03-04
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Written by: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall45
-
Performance39
-
Story39
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security....
-
-
so intriguing
- By Jesse on 2026-01-12
-
There's No Such Thing as Crypto Crime
- An Investigative Handbook
- Written by: Nick Furneaux
- Narrated by: Mitch Crawford
- Length: 20 hrs and 29 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains.
New Releases
-
Democracy in Danger
- How Hackers and Activists Exposed Fatal Flaws in the Election System
- Written by: Jake Braun
- Narrated by: James Lurie
- Length: 6 hrs and 53 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In Democracy In Danger, Braun, a veteran of 3 presidential campaigns and former White House Liaison to the Department of Homeland Security, reveals what the national security apparatus, local election administrators, and political parties have gotten wrong about election security and what America needs to do to protect the ballot box in 2020 and beyond.
Written by: Jake Braun
-
Signals in the Noise
- Security, Technology, and the Hidden Patterns of Modern Risk
- Written by: Timothy E. Reed
- Narrated by: Luke Oldham
- Length: 4 hrs and 47 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Signals in the Noise: Security, Technology, and the Hidden Patterns of Modern Risk examines how clarity, judgment, and human discernment can survive in an age dominated by algorithms and information overload. Drawing on lessons from intelligence tradecraft, behavioral science, and crisis management, Reed explores how modern organizations can recover the habits of mind that once defined strategic thinking.
Written by: Timothy E. Reed
-
Big Brother’s Algorithm
- From Telescreens to Smartphones: How 1984's Surveillance State Became Reality
- Written by: James G. Edwards II
- Narrated by: MsKMT
- Length: 8 hrs and 51 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In Big Brother’s Algorithm: From Telescreens to Smartphones, James G. Edwards II confronts the haunting transformation of surveillance—from Orwell’s telescreens to the algorithms now embedded in every device we own. Through vivid storytelling and incisive analysis, Edwards reveals how governments and corporations quietly collect, analyze, and deploy our personal data.
Written by: James G. Edwards II
-
Strong Passwords
- 10 Golden Rules for Online Security (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 7)
- Written by: Sabian Gralden
- Narrated by: George D Cummings
- Length: 2 hrs and 16 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In the ever-expanding digital world, your password is more than just a string of characters—it’s the front door to your online life. Every email, social media post, financial transaction, and cloud-stored file is protected (or not) by the strength of your passwords. Yet despite their vital role, most people still treat passwords as a nuisance rather than the keystones of personal security.
Written by: Sabian Gralden
-
Seguridad humana
- Controla el factor humano en las redes
- Written by: Deaver Brown
- Narrated by: Andrea Sienra
- Length: 23 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Seguridad humana describe los pasos que las organizaciones deben tomar para proteger su red de intrusos, enfatizando lo que los empleados pueden hacer para defender su red. Los puntos son concisos, simples y perfectamente realizables con el apoyo del director ejecutivo o del presidente del consejo directivo. Una lectura obligatoria para el departamento de TI y los líderes de la organización.
Written by: Deaver Brown
-
Scams Are the World’s Fastest-Growing Crime
- Will You Be the Next Victim?
- Written by: Ken Ray
- Narrated by: Christopher C. Odom
- Length: 4 hrs and 9 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Scams Are the World’s Fastest-Growing Crime pulls back the curtain on the shadowy, fast-evolving world of fraud. Written by Scam Watchdogs LLC, a Florida-based consumer protection group, this book is both a warning and a practical roadmap for anyone who uses a phone, computer, or mailbox. As scams now touch nearly every household, the book explains why these crimes spread so rapidly, how criminals target and manipulate victims, and what you can do to fight back.
Written by: Ken Ray
-
Democracy in Danger
- How Hackers and Activists Exposed Fatal Flaws in the Election System
- Written by: Jake Braun
- Narrated by: James Lurie
- Length: 6 hrs and 53 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In Democracy In Danger, Braun, a veteran of 3 presidential campaigns and former White House Liaison to the Department of Homeland Security, reveals what the national security apparatus, local election administrators, and political parties have gotten wrong about election security and what America needs to do to protect the ballot box in 2020 and beyond.
Written by: Jake Braun
-
Signals in the Noise
- Security, Technology, and the Hidden Patterns of Modern Risk
- Written by: Timothy E. Reed
- Narrated by: Luke Oldham
- Length: 4 hrs and 47 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Signals in the Noise: Security, Technology, and the Hidden Patterns of Modern Risk examines how clarity, judgment, and human discernment can survive in an age dominated by algorithms and information overload. Drawing on lessons from intelligence tradecraft, behavioral science, and crisis management, Reed explores how modern organizations can recover the habits of mind that once defined strategic thinking.
Written by: Timothy E. Reed
-
Big Brother’s Algorithm
- From Telescreens to Smartphones: How 1984's Surveillance State Became Reality
- Written by: James G. Edwards II
- Narrated by: MsKMT
- Length: 8 hrs and 51 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In Big Brother’s Algorithm: From Telescreens to Smartphones, James G. Edwards II confronts the haunting transformation of surveillance—from Orwell’s telescreens to the algorithms now embedded in every device we own. Through vivid storytelling and incisive analysis, Edwards reveals how governments and corporations quietly collect, analyze, and deploy our personal data.
Written by: James G. Edwards II
-
Strong Passwords
- 10 Golden Rules for Online Security (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 7)
- Written by: Sabian Gralden
- Narrated by: George D Cummings
- Length: 2 hrs and 16 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In the ever-expanding digital world, your password is more than just a string of characters—it’s the front door to your online life. Every email, social media post, financial transaction, and cloud-stored file is protected (or not) by the strength of your passwords. Yet despite their vital role, most people still treat passwords as a nuisance rather than the keystones of personal security.
Written by: Sabian Gralden
-
Seguridad humana
- Controla el factor humano en las redes
- Written by: Deaver Brown
- Narrated by: Andrea Sienra
- Length: 23 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Seguridad humana describe los pasos que las organizaciones deben tomar para proteger su red de intrusos, enfatizando lo que los empleados pueden hacer para defender su red. Los puntos son concisos, simples y perfectamente realizables con el apoyo del director ejecutivo o del presidente del consejo directivo. Una lectura obligatoria para el departamento de TI y los líderes de la organización.
Written by: Deaver Brown
-
Scams Are the World’s Fastest-Growing Crime
- Will You Be the Next Victim?
- Written by: Ken Ray
- Narrated by: Christopher C. Odom
- Length: 4 hrs and 9 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Scams Are the World’s Fastest-Growing Crime pulls back the curtain on the shadowy, fast-evolving world of fraud. Written by Scam Watchdogs LLC, a Florida-based consumer protection group, this book is both a warning and a practical roadmap for anyone who uses a phone, computer, or mailbox. As scams now touch nearly every household, the book explains why these crimes spread so rapidly, how criminals target and manipulate victims, and what you can do to fight back.
Written by: Ken Ray
-
The AI Imperative When Shadowstalker Hunts
- A Leader's Guide to AI Security, Ethics, and Red Teaming
- Written by: René Clayton, Ellis B. Cole
- Narrated by: Hayden Coward
- Length: 3 hrs and 14 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In a fast-paced, gripping style, a leading voice in Agentic AI exposes the hidden war inside modern intelligent systems and why traditional security remains dangerously blind to the threats targeting your AI right now. Right now, unseen adversaries are probing your defenses, mapping vulnerabilities, and waiting for the perfect moment to strike. You built AI to win. You didn’t realize you were also building the perfect target. If you lead with technology, innovation, or trust, this is the book you can’t afford to skip. Shadowstalker hunts differently. It doesn’t crash servers or trip alarms.
Written by: René Clayton, and others
-
Das Ende der Wahrheit?
- Wie Lügen, Fake News und Framing unsere Gesellschaft bedrohen – und was wir dagegen tun müssen
- Written by: Elisa Hoven
- Narrated by: Silke Buchholz
- Length: 8 hrs and 57 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Wege aus dem Zeitalter der Lüge. Wem oder was können wir noch glauben? Digitale Neuheiten wie Social Bots oder Deepfakes, aber auch Täuschungen durch Medien und Politik erschüttern zunehmend unser Vertrauen in die demokratischen Institutionen. Die Verfassungsrichterin Elisa Hoven zeigt, worin die größten Gefahren dieser Entwicklung liegen und was wir tun müssen, um den gesellschaftlichen Frieden zu retten.
Written by: Elisa Hoven
-
Sécurité humaine: Maîtriser le facteur humain dans les réseaux
- Written by: Deaver Brown
- Narrated by: Stéphane Marais
- Length: 21 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
La Sécurité Humaine décrit les mesures que les organisations devraient prendre pour protéger leur réseau contre les intrus, en mettant l'accent sur ce que les employés peuvent faire pour défendre leur réseau. Les points sont précis, simples et parfaitement réalisables avec le soutien du PDG ou du Président du conseil d'administration. Une lecture incontournable pour les responsables informatiques et les dirigeants d'organisation.
Written by: Deaver Brown
-
Darknet, Deep Web and Digital Shadow Worlds
- The Dark Side of the Internet
- Written by: Benno Winther
- Narrated by: Rich Brennan
- Length: 4 hrs and 26 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
The internet we use every day is just the surface. Beneath it lies a vast, hidden structure filled with secrets, risks, and power plays. In this concealed world, hacker groups, secret markets, and encrypted networks operate in the shadows, where legal and illegal forces collide in complex and often dangerous ways. This audiobook takes you deep into the digital underworld and unlocks doors that are rarely opened. It explores how the Darknet came into existence, how cryptocurrencies fuel its ecosystem, and why anonymity is essential for activists, criminals, and even government entities.
Written by: Benno Winther
-
Defend Your Data: Cybersecurity Essentials for Everyone
- Practical Steps to Protect Your Digital Life and Safeguard Your Data
- Written by: Ousmane Barry
- Narrated by: Snake Porter
- Length: 3 hrs and 59 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Defend Your Data is a practical guide for anyone who wants to feel more confident and secure in the digital world. It walks you through the threats most people face today, why they work, and how to defend yourself with simple habits that make a real difference. You’ll learn how phishing, malware, ransomware, and social-engineering attacks actually unfold, and what steps you can take to protect your devices, accounts, home network, and personal information. The book breaks down complex ideas in a way that feels approachable, even if you don’t work in technology.
Written by: Ousmane Barry
-
Field Manual for Cyber Incident Handling and Response
- Prevent. Respond. Recover: A Tactical Guide to Leading Through Cyber Incidents
- Written by: Austin Weedor, Jacob Ideji
- Narrated by: Nene Nwoko
- Length: 5 hrs and 7 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Cybersecurity incidents aren't just technical events — they are high-stakes leadership challenges. From ransomware attacks that paralyze city governments to data breaches that cripple global enterprises, leaders today must be prepared to act decisively when every second counts. Field Manual for Cyber Incident Handling and Response is a hands-on, executive-ready guide designed to help organizations respond to cyber crises with clarity, precision, and confidence.
Written by: Austin Weedor, and others