Gratuit avec l'essai de 30 jours
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Narrateur(s): Robertson Dean
- Durée: 12 h et 53 min
Échec de l'ajout au panier.
Échec de l'ajout à la liste d'envies.
Échec de la suppression de la liste d’envies.
Échec du suivi du balado
Ne plus suivre le balado a échoué
Acheter pour 26,22$
Aucun mode de paiement valide enregistré.
Nous sommes désolés. Nous ne pouvons vendre ce titre avec ce mode de paiement
Vous pourriez aussi aimer...
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Auteur(s): Nicole Perlroth
- Narrateur(s): Allyson Ryan
- Durée: 18 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- Écrit par Utilisateur anonyme le 2021-10-15
Auteur(s): Nicole Perlroth
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
Auteur(s): Kim Zetter
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- Auteur(s): Scott J. Shapiro
- Narrateur(s): Jonathan Todd Ross
- Durée: 15 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
Auteur(s): Scott J. Shapiro
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Auteur(s): Kevin Mitnick
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- Écrit par Mr. C le 2018-02-27
Auteur(s): Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
Auteur(s): Andy Greenberg
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Auteur(s): Andy Greenberg
- Narrateur(s): Ari Fliakos
- Durée: 10 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Loved this
- Écrit par janie g le 2023-04-22
Auteur(s): Andy Greenberg
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Auteur(s): Nicole Perlroth
- Narrateur(s): Allyson Ryan
- Durée: 18 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- Écrit par Utilisateur anonyme le 2021-10-15
Auteur(s): Nicole Perlroth
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
Auteur(s): Kim Zetter
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- Auteur(s): Scott J. Shapiro
- Narrateur(s): Jonathan Todd Ross
- Durée: 15 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
Auteur(s): Scott J. Shapiro
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Auteur(s): Kevin Mitnick
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- Écrit par Mr. C le 2018-02-27
Auteur(s): Kevin Mitnick
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
Auteur(s): Andy Greenberg
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Auteur(s): Andy Greenberg
- Narrateur(s): Ari Fliakos
- Durée: 10 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Loved this
- Écrit par janie g le 2023-04-22
Auteur(s): Andy Greenberg
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- Écrit par AmazonShopper le 2024-03-04
Auteur(s): Christopher Hadnagy
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- Auteur(s): Geoff White
- Narrateur(s): Geoff White
- Durée: 8 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
If you love the podcast, buy this.
- Écrit par Amazon Customer le 2023-04-26
Auteur(s): Geoff White
-
Nuclear War
- A Scenario
- Auteur(s): Annie Jacobsen
- Narrateur(s): Annie Jacobsen
- Durée: 11 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every generation, a journalist has looked deep into the heart of the nuclear military establishment: the technologies, the safeguards, the plans, and the risks. These investigations are vital to how we understand the world we really live in—where one nuclear missile will beget one in return, and where the choreography of the world’s end requires massive decisions made on seconds’ notice with information that is only as good as the intelligence we have.
-
-
I wish I hadn't read it
- Écrit par WindsorSean le 2024-04-15
Auteur(s): Annie Jacobsen
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Auteur(s): Cliff Stoll
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Engaging, thrilling
- Écrit par Chris Burchett le 2023-01-20
Auteur(s): Cliff Stoll
-
Rise and Kill First
- The Secret History of Israel's Targeted Assassinations
- Auteur(s): Ronen Bergman
- Narrateur(s): Rob Shapiro
- Durée: 25 h et 58 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Talmud says: “If someone comes to kill you, rise up and kill him first.” This instinct to take every measure, even the most aggressive, to defend the Jewish people is hardwired into Israel’s DNA. From the very beginning of its statehood in 1948, protecting the nation from harm has been the responsibility of its intelligence community and armed services, and there is one weapon in their vast arsenal that they have relied upon to thwart the most serious threats: Targeted assassinations have been used countless times, on enemies large and small....
-
-
Great
- Écrit par Kindle Customer le 2019-01-02
Auteur(s): Ronen Bergman
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- Auteur(s): Richard A. Clarke, Robert K. Knake
- Narrateur(s): Marc Cashman
- Durée: 12 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
Auteur(s): Richard A. Clarke, Autres
Description
Soon to be an HBO® documentary from award-winning director John Maggio
“An important - and deeply sobering - new book about cyberwarfare.” (Nicholas Kristof, New York Times)
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era of cyberwar, he would end it struggling unsuccessfully to defend against Russia’s broad attack on the 2016 US election.
Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger reveals a world coming face-to-face with the perils of technological revolution, where everyone is a target.
“Timely and bracing.... With the deep knowledge and bright clarity that have long characterized his work, Sanger recounts the cunning and dangerous development of cyberspace into the global battlefield of the 21st century.” (Washington Post)
Ce que les critiques en disent
"[Sanger's] description of the cyber portion of Russia's interference in the 2016 presidential election is thorough and convincing. It ought to be required reading for anyone who doubts the extent and seriousness of the Russian effort.... The great value of The Perfect Weapon is less in its specific policy prescriptions than in its being the most comprehensive, readable source of information and insight about the policy quandaries that modern information technology and its destructive potential have spawned." (The New York Times)
"In his new book, The Perfect Weapon, Sanger offers a panoramic view of the rapidly evolving world of cyber-conflict. He covers incidents from the covert US cyber-campaign to sabotage Iran’s nuclear program (a story we know about largely because of Sanger’s diligent reporting) to Edward Snowden’s epic heist of National Security Agency data. And yes, there’s also plenty of background on Russia’s active measures during the 2016 campaign. But there’s also a wealth of gripping material on stories that have probably been missed by the broader public.... It all adds up to a persuasive argument for the truth of the book’s title." (Christian Caryl, The Washington Post)
"[The Perfect Weapon] reads like a thriller spy novel, except the stories are true, which makes the book more terrifying.... Sanger shows the political, military, and economic impacts of actual hacks, moves made by governments and industry to counter moves and protect against future attacks, and the counter to the counter to the counter, all told at a breathtaking pace. But this is more than just a real-life drama; it also is a cautionary tale of the policy of information power.... This book at turns was both fascinating in its detail and access and terrifying in its implications." (Proceedings)
D'autres livres audio du même...
auteur:
Ce que les auditeurs disent de The Perfect Weapon
Moyenne des évaluations de clientsÉvaluations – Cliquez sur les onglets pour changer la source des évaluations.
-
Au global
-
Performance
-
Histoire
- Alek Luopa
- 2018-09-14
Great deep dive into cyberweapons
Truly fascinating book. Sheds new light on current and future cyber threats and the efforts governments take to keep their digital arsenals secret. Great listen! #Audible1
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
1 personne a trouvé cela utile
-
Au global
-
Performance
-
Histoire
- Amazon Customer
- 2018-09-13
Excellent Book and Great Narrator
#Audible1
Love this book. Very relevant in this day and age.
Everyone should listen to this book.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
1 personne a trouvé cela utile