Gratuit avec l'essai de 30 jours
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
Échec de l'ajout au panier.
Échec de l'ajout à la liste d'envies.
Échec de la suppression de la liste d’envies.
Échec du suivi du balado
Ne plus suivre le balado a échoué
Acheter pour 27,01$
Aucun mode de paiement valide enregistré.
Nous sommes désolés. Nous ne pouvons vendre ce titre avec ce mode de paiement
Vous pourriez aussi aimer...
-
The Art of Deception
- Controlling the Human Element of Security
- Auteur(s): Kevin Mitnick
- Narrateur(s): Nick Sullivan
- Durée: 13 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
Auteur(s): Kevin Mitnick
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Auteur(s): Kevin Mitnick, William L. Simon
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- Écrit par jesse b le 2022-05-20
Auteur(s): Kevin Mitnick, Autres
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
Auteur(s): Kim Zetter
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
Auteur(s): Andy Greenberg
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Auteur(s): David E. Sanger
- Narrateur(s): Robertson Dean
- Durée: 12 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
Great deep dive into cyberweapons
- Écrit par Alek Luopa le 2018-09-14
Auteur(s): David E. Sanger
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- Écrit par AmazonShopper le 2024-03-04
Auteur(s): Christopher Hadnagy
-
The Art of Deception
- Controlling the Human Element of Security
- Auteur(s): Kevin Mitnick
- Narrateur(s): Nick Sullivan
- Durée: 13 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
Auteur(s): Kevin Mitnick
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Auteur(s): Kevin Mitnick, William L. Simon
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- Écrit par jesse b le 2022-05-20
Auteur(s): Kevin Mitnick, Autres
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
Auteur(s): Kim Zetter
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
Auteur(s): Andy Greenberg
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Auteur(s): David E. Sanger
- Narrateur(s): Robertson Dean
- Durée: 12 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
Great deep dive into cyberweapons
- Écrit par Alek Luopa le 2018-09-14
Auteur(s): David E. Sanger
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- Écrit par AmazonShopper le 2024-03-04
Auteur(s): Christopher Hadnagy
-
Life 3.0
- Being Human in the Age of Artificial Intelligence
- Auteur(s): Max Tegmark
- Narrateur(s): Rob Shapiro
- Durée: 13 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
How will artificial intelligence affect crime, war, justice, jobs, society, and our very sense of being human? The rise of AI has the potential to transform our future more than any other technology - and there's nobody better qualified or situated to explore that future than Max Tegmark, an MIT professor who's helped mainstream research on how to keep AI beneficial.
-
-
This performance bit is driving me crazy
- Écrit par Dan Thomson le 2018-02-05
Auteur(s): Max Tegmark
-
Irresistible
- The Rise of Addictive Technology and the Business of Keeping Us Hooked
- Auteur(s): Adam Alter
- Narrateur(s): Adam Alter
- Durée: 8 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Welcome to the age of behavioral addiction - an age in which half of the American population is addicted to at least one behavior. We obsess over our emails, Instagram likes, and Facebook feeds; we binge on TV episodes and YouTube videos; we work longer hours each year; and we spend an average of three hours each day using our smartphones. Half of us would rather suffer a broken bone than a broken phone, and Millennial kids spend so much time in front of screens that they struggle to interact with real, live humans.
-
-
Liked the Message
- Écrit par Konstantin Chesnokov le 2020-06-01
Auteur(s): Adam Alter
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Auteur(s): Cliff Stoll
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Engaging, thrilling
- Écrit par Chris Burchett le 2023-01-20
Auteur(s): Cliff Stoll
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- Auteur(s): Christopher Hadnagy, Seth Schulman
- Narrateur(s): Christopher Hadnagy
- Durée: 8 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
Auteur(s): Christopher Hadnagy, Autres
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves
- Durée: 3 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Do you automatically click all links and download all email attachments coming from your friends? This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.
-
-
Absolutely Amazing for my first audiobook
- Écrit par Kelly H le 2021-10-28
Auteur(s): Lester Evans
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- Auteur(s): Bruce Schneier
- Narrateur(s): Dan John Miller
- Durée: 8 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.
-
-
A Must Read
- Écrit par Candace Sundbo le 2023-10-11
Auteur(s): Bruce Schneier
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- Auteur(s): Bruce Schneier
- Narrateur(s): Roger Wayne
- Durée: 8 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
My favourite of last ten books from Audible
- Écrit par Hermes le 2019-08-06
Auteur(s): Bruce Schneier
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Auteur(s): Joseph Menn
- Narrateur(s): Jonathan Davis
- Durée: 8 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Hard to get into
- Écrit par Blair C. le 2019-11-06
Auteur(s): Joseph Menn
-
The Age of Surveillance Capitalism
- The Fight for a Human Future at the New Frontier of Power
- Auteur(s): Shoshana Zuboff
- Narrateur(s): Nicol Zanzarella
- Durée: 24 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Age of Surveillance Capitalism is neither a hand-wringing narrative of danger and decline nor a digital fairy tale. Rather, it offers a deeply reasoned and evocative examination of the contests over the next chapter of capitalism that will decide the meaning of information civilization in the 21st century. The stark issue at hand is whether we will be the masters of information and machines or its slaves.
-
-
Excellent message but very hard to consume
- Écrit par Jason Thompson le 2020-02-13
Auteur(s): Shoshana Zuboff
-
Permanent Record
- Auteur(s): Edward Snowden
- Narrateur(s): Holter Graham
- Durée: 11 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Just Magnificent
- Écrit par Nate le 2019-09-27
Auteur(s): Edward Snowden
-
Quantum Supremacy
- How the Quantum Computer Revolution Will Change Everything
- Auteur(s): Michio Kaku
- Narrateur(s): Feodor Chin
- Durée: 10 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The runaway success of the microchip processor may be reaching its end. Running up against the physical constraints of smaller and smaller sizes, traditional silicon chips are not likely to prove useful in solving humanity’s greatest challenges, from climate change, to global starvation, to incurable diseases. But the quantum computer, which harnesses the power and complexity of the atomic realm, already promises to be every bit as revolutionary as the transistor and microchip once were.
-
-
Yet another science history book
- Écrit par Niqomi le 2024-02-27
Auteur(s): Michio Kaku
-
Physics of the Future
- How Science Will Shape Human Destiny and Our Daily Lives by the Year 2100
- Auteur(s): Michio Kaku
- Narrateur(s): Feodor Chin
- Durée: 15 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Physics of the Future, Michio Kaku - the New York Times best-selling author of Physics of the Impossible - gives us a stunning, provocative, and exhilarating vision of the coming century based on interviews with over 300 of the world’s top scientists who are already inventing the future in their labs. The result is the most authoritative and scientifically accurate description of revolutionary developments taking place....
-
-
Super douper
- Écrit par Ploúto le 2020-07-19
Auteur(s): Michio Kaku
Description
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data.
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility". Mitnick is the world's most famous - and formerly the most wanted - computer hacker. He has hacked in to some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.
In The Art of Invisibility Mitnick provides both online and real-life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes - privacy is a power you deserve and need in this modern age.
D'autres livres audio du même...
Ce que les auditeurs disent de The Art of Invisibility
Moyenne des évaluations de clientsÉvaluations – Cliquez sur les onglets pour changer la source des évaluations.
-
Au global
-
Performance
-
Histoire
- Mr. C
- 2018-02-27
Good book but
If you have some knowledge of privacy tools it may be redundant. I learned some new things but was expecting better stories and technology.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
3 les gens ont trouvé cela utile
-
Au global
-
Performance
-
Histoire
- Blythe
- 2018-04-14
Information everyone should know
Kevin Mitnick, in case you aren’t familiar with the name, is a former hacker and convicted criminal now turned white-hat penetration tester - and author of several books about it. And as you can judge from the subtitle, not at all modest about it either. But undeniably a font of knowledge on the matter.
You may be aware that your actions online aren’t totally anonymous, but in the past few years changes to technology and to laws have made that drastically even less true, likely without you realizing. This book is a very useful eye-opener for everyone, whether you think you need it or not. Do you have “smart appliances” or tv in your home? Did you know you can go to jail for deleting your browser history even if you’ve done nothing wrong? Do you want to know how to minimize your risk online? This is a good overview and summary of all these and more.
Mitnick goes all the way to showing you how to be completely invisible online, which is a very difficult thing these days, but you can take away as much or as little of that as you need. Still, as he points out there are legitimate reasons why you might need to know this stuff. For example, escaping an abusive relationship (or talking to a friend who is). Going through a bitter divorce. Living in or travelling to a country with very restrictive internet rules. Need to travel overseas with a laptop or other device containing confidential data that you’re professionally obliged to protect (doctor/lawyer confidentiality for example, or company research secrets). This book will help you become aware of issues you may not even know about, and how to deal with them to whatever level you need.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
2 les gens ont trouvé cela utile
-
Au global
-
Performance
-
Histoire
- Infinity0
- 2021-03-25
Good for its time
This would have been good....4 years ago. Its mostly pretty obvious and outdated information now.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
1 personne a trouvé cela utile
-
Au global
-
Performance
-
Histoire
- Sascha Uncia
- 2023-01-13
Mixed Feelings.
I have mixed feelings about the book, and it wasn't quite what I was expecting. I'll rate it four stars because I think it's good content but probably just not for me.
The first thing I noticed is that the advice given either seems to fall into two categories. The very basic, such as password strength guides and tips, how passwords are broken, password managers, drive encryption, browser cache and private browsing, recommended addons, etc. These are great for someone who is new to computer security, but ultimately I didn't learn much from it.
The second category is the very advanced, specific, and involved. Things like getting burner phones, separate devices to separate your anonymous presence from your real world identity, bribing strangers to purchase gift cards on your behalf, TOR onion routing, laundering bitcoin, plausible deniability, etc. All of these things are rather extreme steps, probably only useful to a foreign affairs reporter or whistleblower, not greatly useful to the average person trying to minimize their online footprint. Worse is that a lot of it is presented as "this is what this infamous criminal did wrong and got him caught, and here's what he should have done", this could be Mitnick leaning into the romanticized hacker archetype or his 'badboy' reputation, but it gives the book a certain... Shady vibe? Like saying that it's useful to reporters for plausible deniability while sounding like the advice was intended for an audience with more questionable intent. Idk, pet peeve maybe, but nonetheless I doubt most people would benefit from or understand this half of the books advice.
There are a couple of chapters in the middle that have more useful general advice; For example, how sites track you, example cases, and what to do about it. These are more just case studies highlighting how electronic tracking in the modern world has spiraled out of control and why you should care about privacy.
Lastly, although the book is only a few years old it's already starting to show its age. As rapidly evolving and ever-changing technology marches on, I expect that in a few more years a good portion of the specific advice will be outdated.
So if you've done any IT-Sec before you probably won't learn much new, and the more extreme steps / advice are unlikely to be beneficial for most people. Take these things into consideration and decide whether this book is right for you.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
-
Au global
-
Performance
-
Histoire
- Roberta W
- 2022-10-05
Good but not his best
Not nearly as Mitnick’s Ghost in the Wires (it was FANTASTIC and full of real life suspense), but still interesting. Lots of practical information.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
-
Au global
-
Performance
-
Histoire
- KenP
- 2022-02-26
Excellent information to protect your privacy.
Excellent information on the many ways you are vulnerable to data, privacy and sensitive information attacks.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
-
Au global
-
Performance
-
Histoire
- David S Lugg
- 2018-09-19
Good content, good narration.
Very good content from Kevin in this book. Even though I'll probably never get to the point where I need to exercise this information, it's good to have it as a resource. #Audible1
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.