Logo Audible
audible, une société amazon Aide
English Français
S'identifier Livres audio Balados Originaux Audible Catalogue Plus Voir toutes les catégories Romans policiers et suspense Science-fiction et fantastique Histoire Romans Humour Affaires Meilleures ventes Nouveautés À paraître bientôt Blogue Boutique cadeaux Aide
Ordinateurs et technologie

Sécurité et chiffrement

733 titres
Voir tous les titres Sécurité et chiffrement
  • Histoire et culture (1 815)
  • Programmation et développement de logiciels (1 065)
  • Science des données (259)
  • Sécurité et chiffrement (733)
  • Informatique (2 315)
  • Réseaux sociaux et création de contenu (789)

Meilleures ventes

Page de couverture de Broken Money
  • Broken Money

  • Why Our Financial System Is Failing Us and How We Can Make It Better
  • Auteur(s): Lyn Alden
  • Narrateur(s): Guy Swann
  • Durée: 17 h et 31 min
  • Version intégrale
  • Au global
    37
  • Performance
    31
  • Histoire
    31

Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....

  • Supremely educational

  • Écrit par Utilisateur anonyme le 2025-02-08
Page de couverture de Social Engineering, Second Edition
  • Social Engineering, Second Edition

  • The Science of Human Hacking
  • Auteur(s): Christopher Hadnagy
  • Narrateur(s): Christopher Hadnagy
  • Durée: 9 h et 28 min
  • Version intégrale
  • Au global
    32
  • Performance
    26
  • Histoire
    26

Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...

  • best book ever

  • Écrit par Sr.Yura le 2026-05-03
Page de couverture de Dark Wire
  • Dark Wire

  • The Incredible True Story of the Largest Sting Operation Ever
  • Auteur(s): Joseph Cox
  • Narrateur(s): Peter Ganim
  • Durée: 11 h et 40 min
  • Version intégrale
  • Au global
    17
  • Performance
    13
  • Histoire
    13

The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone. In 2018, a powerful app for secure...

  • not worth it

  • Écrit par A le 2025-06-25
Page de couverture de Blockchain Basics
  • Blockchain Basics

  • A Non-Technical Introduction in 25 Steps
  • Auteur(s): Daniel Drescher
  • Narrateur(s): Matthew Boston
  • Durée: 7 h et 6 min
  • Version intégrale
  • Au global
    3
  • Performance
    2
  • Histoire
    2

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through analogies and...

Page de couverture de Phishing Dark Waters
  • Phishing Dark Waters

  • The Offensive and Defensive Sides of Malicious Emails
  • Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
  • Narrateur(s): Christopher Hadnagy, Michele Fincher
  • Durée: 5 h et 25 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the...

Page de couverture de A Hacker's Mind
  • A Hacker's Mind

  • How the Powerful Bend Society's Rules, and How to Bend Them Back
  • Auteur(s): Bruce Schneier
  • Narrateur(s): Dan John Miller
  • Durée: 8 h et 3 min
  • Version intégrale
  • Au global
    4
  • Performance
    3
  • Histoire
    3

Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world. A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a...

  • A Must Read

  • Écrit par Candace Sundbo le 2023-10-11
Page de couverture de Broken Money
  • Broken Money

  • Why Our Financial System Is Failing Us and How We Can Make It Better
  • Auteur(s): Lyn Alden
  • Narrateur(s): Guy Swann
  • Durée: 17 h et 31 min
  • Version intégrale
  • Au global
    37
  • Performance
    31
  • Histoire
    31

Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....

  • Supremely educational

  • Écrit par Utilisateur anonyme le 2025-02-08
Page de couverture de Social Engineering, Second Edition
  • Social Engineering, Second Edition

  • The Science of Human Hacking
  • Auteur(s): Christopher Hadnagy
  • Narrateur(s): Christopher Hadnagy
  • Durée: 9 h et 28 min
  • Version intégrale
  • Au global
    32
  • Performance
    26
  • Histoire
    26

Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...

  • best book ever

  • Écrit par Sr.Yura le 2026-05-03
Page de couverture de Dark Wire
  • Dark Wire

  • The Incredible True Story of the Largest Sting Operation Ever
  • Auteur(s): Joseph Cox
  • Narrateur(s): Peter Ganim
  • Durée: 11 h et 40 min
  • Version intégrale
  • Au global
    17
  • Performance
    13
  • Histoire
    13

The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone. In 2018, a powerful app for secure...

  • not worth it

  • Écrit par A le 2025-06-25
Page de couverture de Blockchain Basics
  • Blockchain Basics

  • A Non-Technical Introduction in 25 Steps
  • Auteur(s): Daniel Drescher
  • Narrateur(s): Matthew Boston
  • Durée: 7 h et 6 min
  • Version intégrale
  • Au global
    3
  • Performance
    2
  • Histoire
    2

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through analogies and...

Page de couverture de Phishing Dark Waters
  • Phishing Dark Waters

  • The Offensive and Defensive Sides of Malicious Emails
  • Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
  • Narrateur(s): Christopher Hadnagy, Michele Fincher
  • Durée: 5 h et 25 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the...

Page de couverture de A Hacker's Mind
  • A Hacker's Mind

  • How the Powerful Bend Society's Rules, and How to Bend Them Back
  • Auteur(s): Bruce Schneier
  • Narrateur(s): Dan John Miller
  • Durée: 8 h et 3 min
  • Version intégrale
  • Au global
    4
  • Performance
    3
  • Histoire
    3

Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world. A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a...

  • A Must Read

  • Écrit par Candace Sundbo le 2023-10-11
Page de couverture de (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
  • (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition

  • Auteur(s): Mike Chapple, James Michael Stewart, Darril Gibson
  • Narrateur(s): Tom Parks
  • Durée: 65 h et 38 min
  • Version intégrale
  • Au global
    4
  • Performance
    2
  • Histoire
    2

(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with...

Page de couverture de Artificial Intelligence (AI) Governance and Cyber-Security
  • Artificial Intelligence (AI) Governance and Cyber-Security

  • A Beginner’s Handbook on Securing and Governing AI Systems
  • Auteur(s): Taimur Ijlal
  • Narrateur(s): Sean Oblak
  • Durée: 1 h et 40 min
  • Version intégrale
  • Au global
    1
  • Performance
    1
  • Histoire
    1

Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced....

  • Love this!!

  • Écrit par Cleopatra le 2025-06-25
Page de couverture de Certified Information Security Manager CISM Study Guide
  • Certified Information Security Manager CISM Study Guide

  • Auteur(s): Mike Chapple PhD CISM
  • Narrateur(s): Daniel Henning
  • Durée: 19 h et 21 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security...

Page de couverture de Dawn of the Code War
  • Dawn of the Code War

  • America's Battle Against Russia, China, and the Rising Global Cyber Threat
  • Auteur(s): John P. Carlin, Garrett M. Graff
  • Narrateur(s): Kevin Stillwell
  • Durée: 16 h et 59 min
  • Version intégrale
  • Au global
    9
  • Performance
    7
  • Histoire
    7

The inside story of how America's enemies launched a cyber war against us-and how we've learned to fight back With each passing year, the internet-linked attacks on America's interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran...

  • Eye-opening!

  • Écrit par Bradley Banks le 2019-02-01
Page de couverture de How to Start a Cybersecurity Consulting Business
  • How to Start a Cybersecurity Consulting Business

  • Your Guide to Launching, Managing, and Growing a Cybersecurity Consultancy
  • Auteur(s): VentureNest Books
  • Narrateur(s): Andy David Jones
  • Durée: 2 h et 59 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

In an era where digital threats are ever-present, the need for cybersecurity solutions is at an all-time high. How to Start a Cybersecurity Consulting Business is a crucial resource for those who want to establish a successful consulting firm in this booming industry.

Page de couverture de CompTIA Security+ Study Guide with over 500 Practice Test Questions
  • CompTIA Security+ Study Guide with over 500 Practice Test Questions

  • Exam SY0-701 (9th Edition)
  • Auteur(s): Mike Chapple, David Seidl
  • Narrateur(s): Ray Greenley
  • Durée: 24 h et 52 min
  • Version intégrale
  • Au global
    3
  • Performance
    2
  • Histoire
    2

In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You'll explore general...

  • great coverage of topics

  • Écrit par Amazon Customer le 2025-04-07
Page de couverture de Enshittification
  • Enshittification

  • Wie Tech-Konzerne uns ausbeuten und was wir dagegen tun können
  • Auteur(s): Cory Doctorow
  • Narrateur(s): Oliver Kube
  • Durée: 11 h et 48 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

Das Internet wird immer schlimmer, und das ist nicht nur ein Gefühl, sondern eine gezielte Strategie der Konzerne: Cory Doctorow zeigt, wie Plattformen wie Facebook, Amazon oder Uber ihre Nutzer und Geschäftspartner schädigen – vom Gesundheitswesen über Bildung bis zur Infrastruktur.

Page de couverture de Ghost in the Wires
  • Ghost in the Wires

  • My Adventures as the World’s Most Wanted Hacker
  • Auteur(s): Kevin Mitnick
  • Narrateur(s): Ray Porter
  • Durée: 13 h et 59 min
  • Version intégrale
  • Au global
    167
  • Performance
    151
  • Histoire
    149

Kevin Mitnick, the world’s most wanted computer hacker, managed to hack into some of the country’s most powerful—and seemingly impenetrable—agencies and companies. By conning employees into giving him private information and maneuvering through layers of security, he gained access to...

  • wow

  • Écrit par jesse b le 2022-05-20
Page de couverture de (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
  • (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)

  • Auteur(s): Mike Chapple, David Seidl
  • Narrateur(s): Daniel Henning
  • Durée: 19 h et 40 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test...

Page de couverture de The Practical CISSP Study Guide
  • The Practical CISSP Study Guide

  • Master the CISSP Exam in Just 30 Days with Step-by-Step Real-World Scenarios and Expert Tips (CISSP Success Series, Book 1)
  • Auteur(s): Taimur Ijlal
  • Narrateur(s): Brendan Reese
  • Durée: 6 h et 36 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

Master the CISSP domains not just for exam day but for lasting success in your cybersecurity career. Learn complex topics easily with practical examples and proven strategies to help you pass the CISSP exam on your first try.

Page de couverture de No Place to Hide
  • No Place to Hide

  • Edward Snowden, the NSA, and the U.S. Surveillance State
  • Auteur(s): Glenn Greenwald
  • Narrateur(s): L. J. Ganser
  • Durée: 9 h et 49 min
  • Version intégrale
  • Au global
    23
  • Performance
    17
  • Histoire
    18

Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....

Page de couverture de Sandworm
  • Sandworm

  • A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
  • Auteur(s): Andy Greenberg
  • Narrateur(s): Mark Bramhall
  • Durée: 12 h et 2 min
  • Version intégrale
  • Au global
    76
  • Performance
    59
  • Histoire
    59

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true...

  • Surprisingly more boring than I thought.

  • Écrit par Jake L.S. le 2020-01-18
Page de couverture de NIST Cybersecurity Framework (CSF) for Information Systems Security
  • NIST Cybersecurity Framework (CSF) for Information Systems Security

  • Auteur(s): Bruce Brown
  • Narrateur(s): Kim Pepper
  • Durée: 8 h et 25 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security....

Page de couverture de Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management
  • Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management

  • Auteur(s): National Institute of Standards and Technology
  • Narrateur(s): Tom Brooks
  • Durée: 3 h et 29 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

All organizations face a broad array of risks, including cybersecurity risk. For federal agencies, the Office of Management and Budget (OMB) Circular A-11 defines risk as “the effect of uncertainty on objectives”. An organization’s mission and business objectives can be impacted....

Page de couverture de RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide
  • RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide

  • NIST 800 Cybersecurity, Book 3
  • Auteur(s): Bruce Brown
  • Narrateur(s): Layne Ihde
  • Durée: 3 h et 44 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

Whether you're a seasoned professional looking to expand your knowledge or a newcomer seeking to kickstart your cybersecurity career, RMF Security Control Assessor by Bruce Brown, CISSP, is the ultimate guide to mastering the art of cybersecurity assessments....

Page de couverture de The Cuckoo's Egg
  • The Cuckoo's Egg

  • Tracking a Spy Through the Maze of Computer Espionage
  • Auteur(s): Cliff Stoll
  • Narrateur(s): Will Damron
  • Durée: 12 h et 46 min
  • Version intégrale
  • Au global
    46
  • Performance
    40
  • Histoire
    40

Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would...

  • so intriguing

  • Écrit par Jesse le 2026-01-12
Page de couverture de The Art of Invisibility
  • The Art of Invisibility

  • The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
  • Auteur(s): Kevin Mitnick, Robert Vamosi, Mikko Hypponen - introduction
  • Narrateur(s): Ray Porter
  • Durée: 9 h et 17 min
  • Version intégrale
  • Au global
    107
  • Performance
    90
  • Histoire
    89

Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin...

  • Information everyone should know

  • Écrit par Blythe le 2018-04-14
Page de couverture de Cybersecurity Risk Management
  • Cybersecurity Risk Management

  • Mastering the Fundamentals Using the NIST Cybersecurity Framework
  • Auteur(s): Cynthia Brumfield, Brian Haugli - contributor
  • Narrateur(s): Ulf Bjorklund
  • Durée: 5 h et 55 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers an up-to-date exploration of the fundamentals of cybersecurity risk planning and...

Page de couverture de Countdown to Zero Day
  • Countdown to Zero Day

  • Stuxnet and the Launch of the World's First Digital Weapon
  • Auteur(s): Kim Zetter
  • Narrateur(s): Joe Ochman
  • Durée: 13 h
  • Version intégrale
  • Au global
    53
  • Performance
    45
  • Histoire
    45

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...

  • Very interesting, technical but easy enough to understand.

  • Écrit par Jon le 2023-12-07
Page de couverture de CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
  • CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam

  • Auteur(s): Jake T Mills
  • Narrateur(s): Tom Brooks
  • Durée: 5 h et 31 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills.

Page de couverture de El enemigo conoce el sistema [The Enemy Knows the System]
  • El enemigo conoce el sistema [The Enemy Knows the System]

  • Manipulación de ideas, personas e influencias después de la economía de la atención [Manipulation of Ideas, People and Influences After the Attention Economy]
  • Auteur(s): Marta Peirano
  • Narrateur(s): Martha Wood
  • Durée: 13 h et 12 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

Todo lo que no quieres pero necesitas saber sobre el poder, la economía, la sociedad y las telecomunicaciones en la era de la información....

Page de couverture de You CAN Stop Stupid
  • You CAN Stop Stupid

  • Stopping Losses from Accidental and Malicious Actions
  • Auteur(s): Ira Winkler, Dr. Tracy Celaya Brown
  • Narrateur(s): Chris Sorensen
  • Durée: 14 h et 44 min
  • Version intégrale
  • Au global
    0
  • Performance
    0
  • Histoire
    0

Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe that there is some deficiency in the users. In response, organizations believe that they have to improve their awareness efforts and make more secure users. This is like saying...

Page de couverture de The Art of Deception
  • The Art of Deception

  • Controlling the Human Element of Security
  • Auteur(s): Kevin D. Mitnick, William L. Simon, Steve Wozniak
  • Narrateur(s): Nick Sullivan
  • Durée: 13 h et 41 min
  • Version intégrale
  • Au global
    6
  • Performance
    5
  • Histoire
    5

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since...

  • The Dark Side of Reviews

  • Écrit par Daniel Pascoa le 2025-07-26
Page de couverture de Cult of the Dead Cow
  • Cult of the Dead Cow

  • How the Original Hacking Supergroup Might Just Save the World
  • Auteur(s): Joseph Menn
  • Narrateur(s): Jonathan Davis, Joseph Menn
  • Durée: 6 h et 35 min
  • Version intégrale
  • Au global
    24
  • Performance
    24
  • Histoire
    24

The shocking untold story of the elite secret society of hackers fighting to protect our freedom, “a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age” (The New York Times Book Review) Cult of the Dead Cow is the tale of the oldest...

  • Hard to get into

  • Écrit par Blair C. le 2019-11-06
© Copyright 1997 - 2026 Audible, Inc Conditions générales de vente Déclaration de confidentialité Publicité reposant sur les centres d'intérêt Canada (Français)

Audible, Inc. | 1 Washington Park, Newark, NJ 07102 | 1-888-283-1191