Bestsellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Written by: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall37
-
Performance31
-
Story31
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Supremely educational
- By Anonymous on 2025-02-08
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- Written by: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test...
-
CompTIA A+ 220-1201 & 220-1202 Exam Test Prep Computing Technology Industry Association - Audio Study Guide
- Perfect for Commuting, Exercising, and Doing Chores!
- Written by: Samuel Davidson, Rebecca Davidson
- Narrated by: Brennan Koenigsreuter
- Length: 31 hrs and 27 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Technology moves fast, and so should your learning. This comprehensive audiobook study guide is designed for modern learners who want to prepare effectively for the CompTIA A+ Core 1 (220-1201) and Core 2 (220-1202) exams without putting life on hold.
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Written by: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall31
-
Performance25
-
Story25
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
-
-
Okay
- By AmazonShopper on 2024-03-04
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- Written by: Gregory C. Rasner
- Narrated by: Mike Lenz
- Length: 6 hrs and 49 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy...
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Written by: Solis Tech
- Narrated by: Millian Quinteros
- Length: 2 hrs and 21 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover....
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Written by: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall37
-
Performance31
-
Story31
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Supremely educational
- By Anonymous on 2025-02-08
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- Written by: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test...
-
CompTIA A+ 220-1201 & 220-1202 Exam Test Prep Computing Technology Industry Association - Audio Study Guide
- Perfect for Commuting, Exercising, and Doing Chores!
- Written by: Samuel Davidson, Rebecca Davidson
- Narrated by: Brennan Koenigsreuter
- Length: 31 hrs and 27 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Technology moves fast, and so should your learning. This comprehensive audiobook study guide is designed for modern learners who want to prepare effectively for the CompTIA A+ Core 1 (220-1201) and Core 2 (220-1202) exams without putting life on hold.
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Written by: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall31
-
Performance25
-
Story25
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
-
-
Okay
- By AmazonShopper on 2024-03-04
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- Written by: Gregory C. Rasner
- Narrated by: Mike Lenz
- Length: 6 hrs and 49 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy...
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Written by: Solis Tech
- Narrated by: Millian Quinteros
- Length: 2 hrs and 21 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover....
-
The Augmented Learning Revolution
- How Augmented Reality Transforms Education Through Immersive Interactive and Inventive Experiences
- Written by: Brad Cavalier
- Narrated by: Myriam Berger
- Length: 1 hr and 14 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
The Augmented Learning Revolution explores how augmented reality (AR) is reshaping education by turning passive learning into immersive, interactive, and inventive experiences.
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Written by: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 24 hrs and 52 mins
- Unabridged
-
Overall3
-
Performance2
-
Story2
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You'll explore general...
-
-
great coverage of topics
- By Amazon Customer on 2025-04-07
-
Mastering OSINT and Dark Web Investigations
- Techniques for the Modern Investigator
- Written by: Eric Waldrep
- Narrated by: Dave LaCosse
- Length: 5 hrs and 6 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Mastering OSINT and Dark Web Investigations: by Eric Waldrep is an advanced guide for professionals navigating the complex worlds of Open Source Intelligence (OSINT) and the Dark Web.
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Written by: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall167
-
Performance151
-
Story149
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
wow
- By jesse b on 2022-05-20
-
5 Habits of the Tech-Ready Family
- Raising Wise Kids in a Wild Digital World
- Written by: Chris McKenna
- Narrated by: Chris McKenna
- Length: 7 hrs
- Unabridged
-
Overall0
-
Performance0
-
Story0
Read by the author. With just five simple habits, you can shape an environment where your kids grow confident, resilient, and ready to face the challenges, dangers, and opportunities of an ever-changing online world. Childhood today looks very different than it used to. Smartphones, AI, and...
-
Certified Information Security Manager CISM Study Guide
- Written by: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security...
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- Written by: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall5
-
Performance3
-
Story3
You are being surveilled right now. This sweeping exposé reveals how the U.S. government allied with data brokers, tech companies, and advertisers to monitor us through the phones we carry and the devices in our home. “A revealing . . . startling . . . timely . . . fascinating, sometimes...
-
-
Not objective
- By Julie on 2025-11-26
-
The Art of Deception
- Controlling the Human Element of Security
- Written by: Kevin D. Mitnick, William L. Simon, Steve Wozniak
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall6
-
Performance5
-
Story5
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since...
-
-
The Dark Side of Reviews
- By Daniel Pascoa on 2025-07-26
-
Social Engineering
- The Art of Human Hacking
- Written by: Paul Wilson - foreword, Christopher Hadnagy
- Narrated by: A. T. Chandler
- Length: 14 hrs and 52 mins
- Unabridged
-
Overall6
-
Performance4
-
Story4
The first guide to reveal and dissect the technical aspect of many social engineering maneuvers.... From elicitation, pretexting, influence, and manipulation, all aspects of social engineering are picked apart, discussed, and explained by using real-world examples, personal experience, and the...
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- Written by: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall23
-
Performance17
-
Story18
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
Spies, Lies, and Cybercrime
- Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
- Written by: Eric O'Neill
- Narrated by: Eric O'Neill
- Length: 9 hrs and 10 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
**Narrated by the Author** National security strategist and former FBI counterintelligence operative Eric O’Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and wallet, and arms you with his proven tactics for spotting and neutralizing cyberthreats to protect...
-
Alice and Bob Learn Application Security
- Written by: Tanya Janca
- Narrated by: Tanya Janca
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall2
-
Performance1
-
Story1
Learn application security from the very start with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in...
-
-
Changing the way we build software
- By Audiobook-Enthusiast on 2025-11-20
-
Dark Screens
- Hackers and Heroes in the Shadowy World of Ransomware
- Written by: Anja Shortland
- Narrated by: Deborah Balm
- Length: 7 hrs and 39 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
A riveting account of major ransomware attacks and their devastating consequences, revealing how exposed we really are—and how we can protect ourselves. Imagine opening your computer only to find every document and every program locked. All you can see is a red screen with a countdown timer...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Written by: Kevin Mitnick, Robert Vamosi, Mikko Hypponen - introduction
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall107
-
Performance90
-
Story89
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin...
-
-
Information everyone should know
- By Blythe on 2018-04-14
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Written by: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall4
-
Performance2
-
Story2
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with...
-
The Practical CISSP Study Guide
- Master the CISSP Exam in Just 30 Days with Step-by-Step Real-World Scenarios and Expert Tips (CISSP Success Series, Book 1)
- Written by: Taimur Ijlal
- Narrated by: Brendan Reese
- Length: 6 hrs and 36 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Master the CISSP domains not just for exam day but for lasting success in your cybersecurity career. Learn complex topics easily with practical examples and proven strategies to help you pass the CISSP exam on your first try.
-
Project Zero Trust
- A Story about a Strategy for Aligning Security and the Business
- Written by: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust...
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Written by: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall76
-
Performance59
-
Story59
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true...
-
-
Surprisingly more boring than I thought.
- By Jake L.S. on 2020-01-18
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- Written by: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You'll find clear and concise information on critical...
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Written by: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall17
-
Performance13
-
Story13
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone. In 2018, a powerful app for secure...
-
-
Could have been great
- By el on 2026-03-31
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- Written by: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 19 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments.
-
Surveillance Valley
- The Secret Military History of the Internet
- Written by: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall18
-
Performance16
-
Story16
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
-
-
A History Lesson Everyone Should Know
- By JJHicks on 2024-04-15
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- Written by: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall4
-
Performance3
-
Story2
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Written by: Joseph Menn
- Narrated by: Jonathan Davis, Joseph Menn
- Length: 6 hrs and 35 mins
- Unabridged
-
Overall24
-
Performance24
-
Story24
The shocking untold story of the elite secret society of hackers fighting to protect our freedom, “a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age” (The New York Times Book Review) Cult of the Dead Cow is the tale of the oldest...
-
-
Hard to get into
- By Blair C. on 2019-11-06
New Releases
-
Dark Screens
- Hackers and Heroes in the Shadowy World of Ransomware
- Written by: Anja Shortland
- Narrated by: Deborah Balm
- Length: 7 hrs and 39 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
A riveting account of major ransomware attacks and their devastating consequences, revealing how exposed we really are—and how we can protect ourselves. Imagine opening your computer only to find every document and every program locked. All you can see is a red screen with a countdown timer...
Written by: Anja Shortland
-
Learning Ransomware Response & Recovery
- Stopping Ransomware One Restore at a Time
- Written by: W. Curtis Preston, Michael Saylor
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 33 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Ransomware attacks are no longer a question of if—it's a matter of when. With hackers increasingly targeting backup and disaster recovery (DR) systems, organizations need more than prevention strategies; they need a battle-tested plan for minimizing damage, forensically determining what's...
Written by: W. Curtis Preston, and others
-
Moving Target
- The Art of Online Camouflage (The Moving Target Trilogy, Book 1)
- Written by: Dean Mauro
- Narrated by: Dean Mauro
- Length: 6 hrs and 17 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Stevie Parker did everything right. Good career. Growing company. A private equity deal on the horizon that would change her life. She was smart, capable, and completely unaware that she had already been selected. Not hacked. Selected. Moving Target follows Stevie through twelve mistakes across twelve chapters—the same mistakes most people made this week. Password reuse. A text from her bank that was not her bank. A link in a work email that looked exactly right.
Written by: Dean Mauro
-
The Confidence Advantage
- Optimizing Privacy, Cybersecurity and AI Governance for Growth
- Written by: Amy Reeder Worley
- Narrated by: Amy Reeder Worley
- Length: 5 hrs and 10 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In a world where digital risk is no longer a technical issue but a strategic imperative, The Confidence Advantage introduces a unique framework for leaders who want to do more than just comply—they want to lead with trust. Grounded in real-world case studies and boardroom-tested insights, Amy Worley presents 11 principles that align privacy, security, and AI ethics to drive both compliance and growth.
Written by: Amy Reeder Worley
-
Code War
- How Nations Hack, Spy, and Shape the Digital Battlefield
- Written by: Allie Mellen
- Narrated by: Frances Anderson
- Length: 13 hrs and 40 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Cyberattacks are the ultimate geopolitical weapon of the twenty-first century. They are used to damage presidential campaigns, shut down electric grids, sway public sentiment, and cost businesses and governments alike billions of dollars. Popular culture portrays cyberattacks as unstoppable and...
Written by: Allie Mellen
-
Cognitive Attack Surface
- The Mind's Vulnerabilities and How to Build Resilience Against Manipulation, Exploitation, and Delusion
- Written by: Krinken Rohleder
- Narrated by: Douglas Wayne Ricketts
- Length: 4 hrs and 14 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
You can lock the door, but still be tricked into letting a criminal freely enter your home. This is where the security of the mind becomes essential. In an era where misinformation spreads faster than truth, scams empty bank accounts in minutes, and propaganda divides societies, the real battlefield isn’t online—it’s in your head.
Written by: Krinken Rohleder
-
Dark Screens
- Hackers and Heroes in the Shadowy World of Ransomware
- Written by: Anja Shortland
- Narrated by: Deborah Balm
- Length: 7 hrs and 39 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
A riveting account of major ransomware attacks and their devastating consequences, revealing how exposed we really are—and how we can protect ourselves. Imagine opening your computer only to find every document and every program locked. All you can see is a red screen with a countdown timer...
Written by: Anja Shortland
-
Learning Ransomware Response & Recovery
- Stopping Ransomware One Restore at a Time
- Written by: W. Curtis Preston, Michael Saylor
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 33 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Ransomware attacks are no longer a question of if—it's a matter of when. With hackers increasingly targeting backup and disaster recovery (DR) systems, organizations need more than prevention strategies; they need a battle-tested plan for minimizing damage, forensically determining what's...
Written by: W. Curtis Preston, and others
-
Moving Target
- The Art of Online Camouflage (The Moving Target Trilogy, Book 1)
- Written by: Dean Mauro
- Narrated by: Dean Mauro
- Length: 6 hrs and 17 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Stevie Parker did everything right. Good career. Growing company. A private equity deal on the horizon that would change her life. She was smart, capable, and completely unaware that she had already been selected. Not hacked. Selected. Moving Target follows Stevie through twelve mistakes across twelve chapters—the same mistakes most people made this week. Password reuse. A text from her bank that was not her bank. A link in a work email that looked exactly right.
Written by: Dean Mauro
-
The Confidence Advantage
- Optimizing Privacy, Cybersecurity and AI Governance for Growth
- Written by: Amy Reeder Worley
- Narrated by: Amy Reeder Worley
- Length: 5 hrs and 10 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
In a world where digital risk is no longer a technical issue but a strategic imperative, The Confidence Advantage introduces a unique framework for leaders who want to do more than just comply—they want to lead with trust. Grounded in real-world case studies and boardroom-tested insights, Amy Worley presents 11 principles that align privacy, security, and AI ethics to drive both compliance and growth.
Written by: Amy Reeder Worley
-
Code War
- How Nations Hack, Spy, and Shape the Digital Battlefield
- Written by: Allie Mellen
- Narrated by: Frances Anderson
- Length: 13 hrs and 40 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Cyberattacks are the ultimate geopolitical weapon of the twenty-first century. They are used to damage presidential campaigns, shut down electric grids, sway public sentiment, and cost businesses and governments alike billions of dollars. Popular culture portrays cyberattacks as unstoppable and...
Written by: Allie Mellen
-
Cognitive Attack Surface
- The Mind's Vulnerabilities and How to Build Resilience Against Manipulation, Exploitation, and Delusion
- Written by: Krinken Rohleder
- Narrated by: Douglas Wayne Ricketts
- Length: 4 hrs and 14 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
You can lock the door, but still be tricked into letting a criminal freely enter your home. This is where the security of the mind becomes essential. In an era where misinformation spreads faster than truth, scams empty bank accounts in minutes, and propaganda divides societies, the real battlefield isn’t online—it’s in your head.
Written by: Krinken Rohleder