Meilleures ventes
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Auteur(s): Lyn Alden
- Narrateur(s): Guy Swann
- Durée: 17 h et 31 min
- Version intégrale
-
Au global37
-
Performance31
-
Histoire31
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Supremely educational
- Écrit par Utilisateur anonyme le 2025-02-08
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global32
-
Performance26
-
Histoire26
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
-
-
best book ever
- Écrit par Sr.Yura le 2026-05-03
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Auteur(s): Joseph Cox
- Narrateur(s): Peter Ganim
- Durée: 11 h et 40 min
- Version intégrale
-
Au global17
-
Performance13
-
Histoire13
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone. In 2018, a powerful app for secure...
-
-
not worth it
- Écrit par A le 2025-06-25
-
Blockchain Basics
- A Non-Technical Introduction in 25 Steps
- Auteur(s): Daniel Drescher
- Narrateur(s): Matthew Boston
- Durée: 7 h et 6 min
- Version intégrale
-
Au global3
-
Performance2
-
Histoire2
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through analogies and...
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the...
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- Auteur(s): Bruce Schneier
- Narrateur(s): Dan John Miller
- Durée: 8 h et 3 min
- Version intégrale
-
Au global4
-
Performance3
-
Histoire3
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world. A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a...
-
-
A Must Read
- Écrit par Candace Sundbo le 2023-10-11
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- Auteur(s): Lyn Alden
- Narrateur(s): Guy Swann
- Durée: 17 h et 31 min
- Version intégrale
-
Au global37
-
Performance31
-
Histoire31
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
Supremely educational
- Écrit par Utilisateur anonyme le 2025-02-08
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global32
-
Performance26
-
Histoire26
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
-
-
best book ever
- Écrit par Sr.Yura le 2026-05-03
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Auteur(s): Joseph Cox
- Narrateur(s): Peter Ganim
- Durée: 11 h et 40 min
- Version intégrale
-
Au global17
-
Performance13
-
Histoire13
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone. In 2018, a powerful app for secure...
-
-
not worth it
- Écrit par A le 2025-06-25
-
Blockchain Basics
- A Non-Technical Introduction in 25 Steps
- Auteur(s): Daniel Drescher
- Narrateur(s): Matthew Boston
- Durée: 7 h et 6 min
- Version intégrale
-
Au global3
-
Performance2
-
Histoire2
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through analogies and...
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the...
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- Auteur(s): Bruce Schneier
- Narrateur(s): Dan John Miller
- Durée: 8 h et 3 min
- Version intégrale
-
Au global4
-
Performance3
-
Histoire3
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world. A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a...
-
-
A Must Read
- Écrit par Candace Sundbo le 2023-10-11
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Auteur(s): Mike Chapple, James Michael Stewart, Darril Gibson
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Version intégrale
-
Au global4
-
Performance2
-
Histoire2
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with...
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- Auteur(s): Taimur Ijlal
- Narrateur(s): Sean Oblak
- Durée: 1 h et 40 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced....
-
-
Love this!!
- Écrit par Cleopatra le 2025-06-25
-
Certified Information Security Manager CISM Study Guide
- Auteur(s): Mike Chapple PhD CISM
- Narrateur(s): Daniel Henning
- Durée: 19 h et 21 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security...
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- Auteur(s): John P. Carlin, Garrett M. Graff
- Narrateur(s): Kevin Stillwell
- Durée: 16 h et 59 min
- Version intégrale
-
Au global9
-
Performance7
-
Histoire7
The inside story of how America's enemies launched a cyber war against us-and how we've learned to fight back With each passing year, the internet-linked attacks on America's interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran...
-
-
Eye-opening!
- Écrit par Bradley Banks le 2019-02-01
-
How to Start a Cybersecurity Consulting Business
- Your Guide to Launching, Managing, and Growing a Cybersecurity Consultancy
- Auteur(s): VentureNest Books
- Narrateur(s): Andy David Jones
- Durée: 2 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In an era where digital threats are ever-present, the need for cybersecurity solutions is at an all-time high. How to Start a Cybersecurity Consulting Business is a crucial resource for those who want to establish a successful consulting firm in this booming industry.
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Auteur(s): Mike Chapple, David Seidl
- Narrateur(s): Ray Greenley
- Durée: 24 h et 52 min
- Version intégrale
-
Au global3
-
Performance2
-
Histoire2
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You'll explore general...
-
-
great coverage of topics
- Écrit par Amazon Customer le 2025-04-07
-
Enshittification
- Wie Tech-Konzerne uns ausbeuten und was wir dagegen tun können
- Auteur(s): Cory Doctorow
- Narrateur(s): Oliver Kube
- Durée: 11 h et 48 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Das Internet wird immer schlimmer, und das ist nicht nur ein Gefühl, sondern eine gezielte Strategie der Konzerne: Cory Doctorow zeigt, wie Plattformen wie Facebook, Amazon oder Uber ihre Nutzer und Geschäftspartner schädigen – vom Gesundheitswesen über Bildung bis zur Infrastruktur.
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Auteur(s): Kevin Mitnick
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Version intégrale
-
Au global167
-
Performance151
-
Histoire149
Kevin Mitnick, the world’s most wanted computer hacker, managed to hack into some of the country’s most powerful—and seemingly impenetrable—agencies and companies. By conning employees into giving him private information and maneuvering through layers of security, he gained access to...
-
-
wow
- Écrit par jesse b le 2022-05-20
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- Auteur(s): Mike Chapple, David Seidl
- Narrateur(s): Daniel Henning
- Durée: 19 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test...
-
The Practical CISSP Study Guide
- Master the CISSP Exam in Just 30 Days with Step-by-Step Real-World Scenarios and Expert Tips (CISSP Success Series, Book 1)
- Auteur(s): Taimur Ijlal
- Narrateur(s): Brendan Reese
- Durée: 6 h et 36 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Master the CISSP domains not just for exam day but for lasting success in your cybersecurity career. Learn complex topics easily with practical examples and proven strategies to help you pass the CISSP exam on your first try.
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- Auteur(s): Glenn Greenwald
- Narrateur(s): L. J. Ganser
- Durée: 9 h et 49 min
- Version intégrale
-
Au global23
-
Performance17
-
Histoire18
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global76
-
Performance59
-
Histoire59
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true...
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
-
NIST Cybersecurity Framework (CSF) for Information Systems Security
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 8 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security....
-
Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 3 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
All organizations face a broad array of risks, including cybersecurity risk. For federal agencies, the Office of Management and Budget (OMB) Circular A-11 defines risk as “the effect of uncertainty on objectives”. An organization’s mission and business objectives can be impacted....
-
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide
- NIST 800 Cybersecurity, Book 3
- Auteur(s): Bruce Brown
- Narrateur(s): Layne Ihde
- Durée: 3 h et 44 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Whether you're a seasoned professional looking to expand your knowledge or a newcomer seeking to kickstart your cybersecurity career, RMF Security Control Assessor by Bruce Brown, CISSP, is the ultimate guide to mastering the art of cybersecurity assessments....
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Auteur(s): Cliff Stoll
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Version intégrale
-
Au global46
-
Performance40
-
Histoire40
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would...
-
-
so intriguing
- Écrit par Jesse le 2026-01-12
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Auteur(s): Kevin Mitnick, Robert Vamosi, Mikko Hypponen - introduction
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Version intégrale
-
Au global107
-
Performance90
-
Histoire89
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin...
-
-
Information everyone should know
- Écrit par Blythe le 2018-04-14
-
Cybersecurity Risk Management
- Mastering the Fundamentals Using the NIST Cybersecurity Framework
- Auteur(s): Cynthia Brumfield, Brian Haugli - contributor
- Narrateur(s): Ulf Bjorklund
- Durée: 5 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers an up-to-date exploration of the fundamentals of cybersecurity risk planning and...
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global53
-
Performance45
-
Histoire45
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 31 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills.
-
El enemigo conoce el sistema [The Enemy Knows the System]
- Manipulación de ideas, personas e influencias después de la economía de la atención [Manipulation of Ideas, People and Influences After the Attention Economy]
- Auteur(s): Marta Peirano
- Narrateur(s): Martha Wood
- Durée: 13 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Todo lo que no quieres pero necesitas saber sobre el poder, la economía, la sociedad y las telecomunicaciones en la era de la información....
-
You CAN Stop Stupid
- Stopping Losses from Accidental and Malicious Actions
- Auteur(s): Ira Winkler, Dr. Tracy Celaya Brown
- Narrateur(s): Chris Sorensen
- Durée: 14 h et 44 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe that there is some deficiency in the users. In response, organizations believe that they have to improve their awareness efforts and make more secure users. This is like saying...
-
The Art of Deception
- Controlling the Human Element of Security
- Auteur(s): Kevin D. Mitnick, William L. Simon, Steve Wozniak
- Narrateur(s): Nick Sullivan
- Durée: 13 h et 41 min
- Version intégrale
-
Au global6
-
Performance5
-
Histoire5
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since...
-
-
The Dark Side of Reviews
- Écrit par Daniel Pascoa le 2025-07-26
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Auteur(s): Joseph Menn
- Narrateur(s): Jonathan Davis, Joseph Menn
- Durée: 6 h et 35 min
- Version intégrale
-
Au global24
-
Performance24
-
Histoire24
The shocking untold story of the elite secret society of hackers fighting to protect our freedom, “a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age” (The New York Times Book Review) Cult of the Dead Cow is the tale of the oldest...
-
-
Hard to get into
- Écrit par Blair C. le 2019-11-06