-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Narrated by: Stephen Bowlby
- Length: 7 hrs and 15 mins
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $19.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Publisher's summary
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now, joined by his brother Craig, the two have set their sights on the biggest target of all: small businesses.
There are 30 million small businesses currently operating in the United States. Some of them are single-owner operations while others collectively employ hundreds of millions. This book is for all of them and anyone who makes it their business to stay safe from phishing attacks, malware spying, ransomware, identity theft, major breaches, and hackers who would compromise their security. We are all in this together, which is why cybersecurity is everybody’s business.
Scott and Craig Schober examine a multitude of cybersecurity issues affecting all of us, including:
- Cyber insurance
- Internet of things
- State sponsored hacking and spying
- Card skimmers and identity theft
- Social engineering
- Ransomware
- Phishing attacks
- Vital password creation
- Robocalls
- Cryptocurrency
- Virtual private networks (VPN)
Scott and Craig Schober delve into the details of the latest cyber breaches that made headlines and continue to affect your small business and all consumers, such as:
- Ashley Madison hack
- Yahoo hack
- Marriott Hotel hack
- Anthem hack
- Equifax hack
- Uber hack
Throughout Cybersecurity Is Everybody's Business, Scott and Craig not only contextualize the impact of these cyber attacks on your small business and daily lives but also provide expert insight and a plan of attack for fending off future security breaches. Through tips and advice gained since his last book, Scott offers hope in the ever-changing world of cybersecurity.
Listeners also enjoyed...
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- By: Christopher Hadnagy, Seth Schulman
- Narrated by: Christopher Hadnagy
- Length: 8 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
-
-
Instead of this, buy “Social Engineering, Second Edition”.
- By Jessica on 11-30-21
By: Christopher Hadnagy, and others
-
Hacked Again
- By: Scott N. Schober
- Narrated by: John Pruden
- Length: 3 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
-
-
Very good book
- By Jay Grey on 08-19-23
By: Scott N. Schober
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- By: Perry Carpenter, Kevin Mitnick - foreword
- Narrated by: Stephen Bel Davies
- Length: 12 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good information between nonsense
- By Anonymous User on 03-04-24
By: Perry Carpenter, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- By: Christopher Hadnagy, Seth Schulman
- Narrated by: Christopher Hadnagy
- Length: 8 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
-
-
Instead of this, buy “Social Engineering, Second Edition”.
- By Jessica on 11-30-21
By: Christopher Hadnagy, and others
-
Hacked Again
- By: Scott N. Schober
- Narrated by: John Pruden
- Length: 3 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
-
-
Very good book
- By Jay Grey on 08-19-23
By: Scott N. Schober
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- By: Perry Carpenter, Kevin Mitnick - foreword
- Narrated by: Stephen Bel Davies
- Length: 12 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good information between nonsense
- By Anonymous User on 03-04-24
By: Perry Carpenter, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- By: Perry Carpenter, Kai Roer
- Narrated by: Perry Carpenter
- Length: 6 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Cybersecurity Culture
- By Amazon Customer on 01-16-23
By: Perry Carpenter, and others
-
Social Media Scams: Protect Yourself from Scams
- By: Susan Zeppieri, Francis Zeppieri
- Narrated by: David Van Der Molen
- Length: 1 hr and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you ever come across something online that looks a little bit too good to be true? It might be a competition you’ve won that you didn’t know you’d entered or a new cryptocurrency with a low buy-in price and promised high returns.
By: Susan Zeppieri, and others
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Blockchain Blueprint & Technology Ultimate Guide
- Learn Everything You Need To
- By: Raymond Kazuya
- Narrated by: Lukas Arnold
- Length: 1 hr and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Blockchain Technology innovation is the next technological advancement and revolution that has some serious far reaching implications worldwide. World business/commerce as we know today will become more secure, efficient, fluid and reliable due to Blockchain Technology. Don't get left behind on this next big trend and ride the wave of technological advancement! Learn everything you need to know about Blockchain Technology and join the revolution! You do not want to miss out!
-
-
Basics of Blockchain
- By Keith on 02-02-18
By: Raymond Kazuya
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- By: David James Carmack
- Narrated by: Ivan Busenius
- Length: 3 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Computer Networking Beginners Guide
- Ultimate Guide to Master Communication System Including Cisco and Ccna, Wireless, and Cloud Technology, System...and IP Subnetting (Computer Networking Easy)
- By: Ramon Base
- Narrated by: Chris Lynch
- Length: 3 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you a student or a professional who is keen to learn about computer networks? Are you fascinated by the world of computers and every other system that is responsible for the efficient operation of such a wonderful human invention? When you deal with computers on a daily basis, you should be aware of the backbone which supports this incredible invention. The truth is: Computers and technology rule the world today, and most of us are not aware of the network that is responsible for their efficient operation
-
-
Thankful to author for this audiobook
- By Joseph C. Gates on 10-29-19
By: Ramon Base
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- By: Brian Krebs
- Narrated by: Christopher Lane
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Risky topic, but Br. Krebs hits it out of the park
- By RRiley on 12-21-14
By: Brian Krebs
-
Artificial Intelligence
- A Comprehensive Guide to AI, Machine Learning, Internet of Things, Robotics, Deep Learning, Predictive Analytics, Neural Networks, Reinforcement Learning, and Our Future
- By: Neil Wilkins
- Narrated by: Brian R. Scott
- Length: 6 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to learn key AI concepts to get you quickly up to speed with all things AI, then pay attention...This audiobook covers everything from machine learning to robotics and the internet of things. By the time you finish listening, you will be aware of what artificial neural networks are, how gradient descent and back propagation work, and what deep learning is. You will also learn a comprehensive history of AI, from the first invention of automations in antiquity to the driver-less cars of today.
-
-
Superb and most accommodating information
- By Billie Austin on 02-08-20
By: Neil Wilkins
-
Cybersecurity
- A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to discover how to protect yourself, your family, and business against cyber attacks, then pay attention...Have you been curious about how hackers choose their victims or develop their attack plans? Have you been hacked before? Do you want to learn to protect your systems and networks from hackers? This audiobook serves as a launchpad for learning more about the Internet and cybersecurity. Throughout this audiobook, you will take a journey into the world of cybercrimes and cybersecurity.
-
-
Secure your information through this audiobook.
- By Roger Strong on 08-24-21
By: Quinn Kiser
Related to this topic
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Who Controls the Internet
- Illusions of a Borderless World
- By: Jack Goldsmith, Tim Wu
- Narrated by: Bob Loza
- Length: 6 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is the Internet erasing national borders? Who's really in control of what's happening on the Net--Internet engineers, rogue programmers, the United Nations, or powerful countries?In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world.
-
-
Mostly delves into questions of law
- By Amazon Customer on 05-07-11
By: Jack Goldsmith, and others
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Who Controls the Internet
- Illusions of a Borderless World
- By: Jack Goldsmith, Tim Wu
- Narrated by: Bob Loza
- Length: 6 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is the Internet erasing national borders? Who's really in control of what's happening on the Net--Internet engineers, rogue programmers, the United Nations, or powerful countries?In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world.
-
-
Mostly delves into questions of law
- By Amazon Customer on 05-07-11
By: Jack Goldsmith, and others
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff
-
@War
- The Rise of the Military-Internet Complex
- By: Shane Harris
- Narrated by: Stephen R. Thorne
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- By Greg on 02-06-15
By: Shane Harris
-
Big Data in Practice
- How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
- By: Bernard Marr
- Narrated by: Piers Hampton
- Length: 7 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data. Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This book fills the knowledge gap by showing how major companies are using big data every day, from an up-close, on-the-ground perspective.
-
-
Good book for managers
- By Capnbody on 01-08-18
By: Bernard Marr
-
The Mobile Wave
- How Mobile Intelligence Will Change Everything
- By: Michael Saylor
- Narrated by: LJ Ganser
- Length: 8 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Mobile Wave argues that the changes brought by mobile computing are so big and widespread that it’s impossible for us to see it all, even though we are all immersed in it. Saylor explains that the current generation of mobile smart phones and tablet computers has set the stage to become the universal computing platform for the world. In the hands of billions of people and accessible anywhere and anytime, mobile computers are poised to become an appendage of the human being and an essential tool for modern life.
-
-
Commonplace knowledge peppered with buzzwords
- By Amazon Customer on 10-22-13
By: Michael Saylor
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- By: Frank W. Abagnale
- Narrated by: Raymond Todd
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- By Sheila on 06-05-07
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- By: Steven Levy
- Narrated by: Rich Miller
- Length: 14 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- By Chip L. on 05-22-21
By: Steven Levy