Network Infrastructure Security Guidance
National Security Agency Cybersecurity Technical Report
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Tom Brooks
About this listen
Introduction
Guidance for securing networks continues to evolve as new vulnerabilities are exploited by adversaries, new security features are implemented, and new methods of securing devices are identified. Improper configuration, incorrect handling of configurations, and weak encryption keys can expose vulnerabilities in the entire network. All networks are at risk of compromise, especially if devices are not properly configured and maintained. An administrator’s role is critical to securing the network against adversarial techniques and requires dedicated people to secure the devices, applications, and information on the network.
This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network. While the guidance presented here is generic and can be applied to many types of network devices, sample commands for Cisco Internetwork Operating System (IOS) devices are provided which can be executed to implement the recommendations.
1.1 Regarding Zero Trust
Zero Trust is a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy based on an acknowledgement that threats exist both inside and outside traditional network boundaries. The National Security Agency (NSA) fully supports the Zero Trust security model, and much of the guidance in this report can be applied at different boundaries as recommended in Zero Trust guidance. However, this report is focused on providing guidance to mitigate common vulnerabilities and weaknesses on existing networks. As system owners introduce new network designs intended to achieve more mature Zero Trust principles, this guidance may need to be modified.
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
©2022 Tom Brooks (P)2022 Tom BrooksListeners also enjoyed...
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 3 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Read by AI
- By Luke on 06-22-24
By: Jamie Murphy
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 1 hr and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- By Cristen Mini on 01-15-24
By: Matthew K. Sharp, and others
-
Programming for Beginners: 2 Book in 1
- Linux for Beginners, SQL for Beginners
- By: Matthew Python
- Narrated by: Charles Young
- Length: 6 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
Linux is quite synonymous with the cloud. If you intend to work on cloud-based projects, it is always good to learn Linux, especially the essentials. SQL is one of the most famous database query languages that have taken over almost three-fourths of the internet. Learning SQL is a must for any developer nowadays, and with the help of a good book, one can understand the basics very well.
By: Matthew Python
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 3 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Read by AI
- By Luke on 06-22-24
By: Jamie Murphy
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 1 hr and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- By Cristen Mini on 01-15-24
By: Matthew K. Sharp, and others
-
Programming for Beginners: 2 Book in 1
- Linux for Beginners, SQL for Beginners
- By: Matthew Python
- Narrated by: Charles Young
- Length: 6 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
Linux is quite synonymous with the cloud. If you intend to work on cloud-based projects, it is always good to learn Linux, especially the essentials. SQL is one of the most famous database query languages that have taken over almost three-fourths of the internet. Learning SQL is a must for any developer nowadays, and with the help of a good book, one can understand the basics very well.
By: Matthew Python
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great supplement to the physical book
- By Andrea Christine on 06-08-24
By: Bruce Brown
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- By Customer on 04-22-22
By: Ben Malisow
-
Linux for Beginners: The Ultimate Crash Course
- Computer Programming, Book 1
- By: Mark Solomon Brown
- Narrated by: Kevin Liang
- Length: 3 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you need a hands-on crash course in Linux programming? Look no further! You have found your audiobook! Everything you need is within the covers of Linux for Beginners: The Ultimate Crash Course! Linux programming is an advanced skill, but building on your foundations, you will learn more from Linux for Beginners: The Ultimate Crash Course in one day than you can anywhere else. Whether you are a self-taught programmer or you are working your way through school for a degree in information technology, leaning Linux and learning it well is essential.
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- By: Murphy Rangel
- Narrated by: Luciano Marin
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
By: Murphy Rangel
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- By: Erick Stack
- Narrated by: Clay Bel le Fort
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
By: Erick Stack
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- By: Anthony Hack
- Narrated by: Robert Plank
- Length: 3 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking. You don't hear about the ethical hacking in the news, but there are people out there with the same job description fighting the malicious hackers daily, and they get the bad rep.
By: Anthony Hack
-
Computer Networking First Step
- The Essential Guide to Networking to Introduce Yourself to The Computer Network Through a Top-Down Approach and Various Infrastructures (Programming)
- By: Tim Wired
- Narrated by: Jacob McNatt
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
While you may have never thought of networking in detail, this book will introduce you to the basics of networking, the different types of networks available, the types of network topologies that you will encounter, the concept of server virtualization, and details of how to handle network breaches.
-
-
If you don't have a text copy of the book, beware
- By A Consumer on 04-08-20
By: Tim Wired
-
Kali Linux: Secure Your Network
- How to Prevent Cyber Terrorism and Defend Your Network with Kali Linux
- By: Frank Eltrinos
- Narrated by: Rudy Norman
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
Increasingly, technology is becoming more advanced. A secure network can be a great tool, allowing you to store vast amounts of information. However, this has given more power to those with hacking skills, who can exploit poor cybersecurity. Thankfully, you can protect yourself. This audiobook will show you the techniques required to build a secure network in Kali Linux.
-
-
Useful book
- By Dee H. Williams on 05-17-20
By: Frank Eltrinos
-
AWS
- The Complete Beginner's Guide to Mastering Amazon Web Services
- By: Stephen Baron
- Narrated by: Alex Riley
- Length: 4 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The company's revenue figures have hit the billion mark, emerging itself as one of the successful companies that have put its competitors behind. Amazon Web Services is indeed the company's most powerful weapon that paves the road for endless possibilities by catering to the needs of renowned organizations. This comprehensive guide book has all the answers to your mind-boggling questions and will help you in making an informed decision about whether you should choose AWS for your business or not.
By: Stephen Baron
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- By: Anthony Hack
- Narrated by: Jordan Gunner
- Length: 3 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook...Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn. Hopefully, this audiobook will give you the most basic information so that you will be able to do this properly.
By: Anthony Hack
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- By: David James Carmack
- Narrated by: Ivan Busenius
- Length: 3 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Computer Networking Beginners Guide
- Ultimate Guide to Master Communication System Including Cisco and Ccna, Wireless, and Cloud Technology, System...and IP Subnetting (Computer Networking Easy)
- By: Ramon Base
- Narrated by: Chris Lynch
- Length: 3 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you a student or a professional who is keen to learn about computer networks? Are you fascinated by the world of computers and every other system that is responsible for the efficient operation of such a wonderful human invention? When you deal with computers on a daily basis, you should be aware of the backbone which supports this incredible invention. The truth is: Computers and technology rule the world today, and most of us are not aware of the network that is responsible for their efficient operation
-
-
Thankful to author for this audiobook
- By Joseph C. Gates on 10-29-19
By: Ramon Base
Related to this topic
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- By: Sean Cannell, Benji Travis
- Narrated by: Sean Cannell, Benji Travis
- Length: 5 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- By Scott on 08-04-19
By: Sean Cannell, and others
-
Slenderman
- Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls
- By: Kathleen Hale
- Narrated by: Therese Plummer
- Length: 9 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
On May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two 12-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier’s violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called “Slenderman”. Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.
-
-
Excellent narration
- By Pink Amy on 08-21-22
By: Kathleen Hale
-
Doom Guy
- Life in First Person
- By: John Romero
- Narrated by: John Romero
- Length: 17 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Doom Guy: Life in First Person is the long-awaited autobiography of gaming’s original rock star and the cocreator of DOOM, Quake, and Wolfenstein—some of the most recognizable and important titles in video game history. Credited with the invention of the first-person shooter, a genre that continues to dominate the market today, he is gaming royalty. Told in remarkable detail, a byproduct of his hyperthymesia, Romero recounts his storied career.
-
-
Intimate stories of gaming history in First Person
- By Emyli on 07-28-23
By: John Romero
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- By: Gretchen Bakke
- Narrated by: Emily Caudwell
- Length: 11 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- By Ronald on 09-24-16
By: Gretchen Bakke
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- By: Sean Cannell, Benji Travis
- Narrated by: Sean Cannell, Benji Travis
- Length: 5 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- By Scott on 08-04-19
By: Sean Cannell, and others
-
Slenderman
- Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls
- By: Kathleen Hale
- Narrated by: Therese Plummer
- Length: 9 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
On May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two 12-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier’s violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called “Slenderman”. Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.
-
-
Excellent narration
- By Pink Amy on 08-21-22
By: Kathleen Hale
-
Doom Guy
- Life in First Person
- By: John Romero
- Narrated by: John Romero
- Length: 17 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Doom Guy: Life in First Person is the long-awaited autobiography of gaming’s original rock star and the cocreator of DOOM, Quake, and Wolfenstein—some of the most recognizable and important titles in video game history. Credited with the invention of the first-person shooter, a genre that continues to dominate the market today, he is gaming royalty. Told in remarkable detail, a byproduct of his hyperthymesia, Romero recounts his storied career.
-
-
Intimate stories of gaming history in First Person
- By Emyli on 07-28-23
By: John Romero
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- By: Gretchen Bakke
- Narrated by: Emily Caudwell
- Length: 11 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- By Ronald on 09-24-16
By: Gretchen Bakke
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
Glow Kids
- How Screen Addiction Is Hijacking Our Kids - and How to Break the Trance
- By: Nicholas Kardaras PhD
- Narrated by: Jonathan Davis
- Length: 11 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Glow Kids, Dr. Nicholas Kardaras will examine how technology - more specifically, age-inappropriate screen tech, with all of its glowing ubiquity - has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis.
-
-
Fear Mongering - a modern day Mazes and Monsters
- By Veronica on 11-03-20
-
Prediction Machines
- The Simple Economics of Artificial Intelligence
- By: Ajay Agrawal, Joshua Gans, Avi Goldfarb
- Narrated by: LJ Ganser
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence does the seemingly impossible - driving cars, trading stocks, and teaching children. But facing the sea change that AI will bring can be paralyzing. How should companies set strategies, governments design policies, and people plan their lives for a world so different from what we know? In Prediction Machines, three eminent economists recast the rise of AI as a drop in the cost of prediction. With this single, masterful stroke, they lift the curtain on the AI-is-magic hype and show how basic tools from economics provide clarity about the AI revolution and a basis for action by CEOs, managers, policy makers, investors, and entrepreneurs.
-
-
Not sure what I was expecting, but underwhelmed
- By William J Brown on 09-27-18
By: Ajay Agrawal, and others
-
The Complete Software Developer's Career Guide
- How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job
- By: John Sonmez
- Narrated by: John Sonmez
- Length: 20 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technical knowledge alone isn't enough - increase your software development income by leveling up your soft skills Early in his software developer career, John Sonmez discovered that technical knowledge alone isn't enough to break through to the next income level - developers need "soft skills" like the ability to learn new technologies just in time, communicate clearly with management and consulting clients, negotiate a fair hourly rate, and unite teammates and coworkers in working toward a common goal.
-
-
The Complete Bro-grammer's Career Guide
- By Leels on 09-18-19
By: John Sonmez
-
Super Pumped
- The Battle for Uber
- By: Mike Isaac
- Narrated by: Holter Graham, Mike Isaac
- Length: 12 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
A New York Times technology correspondent presents the dramatic rise and fall of Uber, set against the rapid upheaval in Silicon Valley during the mobile era. Based on hundreds of interviews with current and former Uber employees, along with previously unpublished documents, Super Pumped is a pause-resisting story of ambition and deception, obscene wealth, and bad behavior, that explores how blistering technological and financial innovation culminated in one of the most catastrophic 12-month periods in American corporate history.
-
-
A forced narrative and a bad version of Bad Blood
- By Benji on 09-09-19
By: Mike Isaac
-
Tesla
- Inventor of the Electrical Age
- By: W. Bernard Carlson
- Narrated by: Allan Robertson
- Length: 16 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Nikola Tesla was a major contributor to the electrical revolution that transformed daily life at the turn of the 20th century. His inventions, patents, and theoretical work formed the basis of modern AC electricity, and contributed to the development of radio and television. Like his competitor Thomas Edison, Tesla was one of America's first celebrity scientists, enjoying the company of New York high society and dazzling the likes of Mark Twain with his electrical demonstrations. An astute self-promoter and gifted showman, he cultivated a public image of the eccentric genius.
-
-
A detailed examination of Tesla's work
- By Jean on 02-01-14
-
Algorithms of Oppression
- How Search Engines Reinforce Racism
- By: Safiya Umoja Noble
- Narrated by: Shayna Small
- Length: 6 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Run a Google search for “black girls” - what will you find? “Big Booty” and other sexually explicit terms are likely to come up as top search terms. But, if you type in “white girls”, the results are radically different. The suggested porn sites and un-moderated discussions about “why black women are so sassy” or “why black women are so angry” presents a disturbing portrait of black womanhood in modern society. In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search engines like Google offer an equal playing field for all forms of ideas, identities, and activities.
-
-
Read this book. Tell everyone you know about it.
- By Joshua Daniel-Wariya on 06-06-19
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- By: Phil Champagne
- Narrated by: Stephanie Murphy
- Length: 7 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Book of Satoshi, the collected writings of Satoshi Nakamoto, creator of the bitcoin. The foreword was written by Jeff Berwick.
-
-
Great historic read that'll teach the blockchain
- By Peter Hanson on 05-19-16
By: Phil Champagne
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Social Media Marketing Workbook: 2024 Edition - How to Use Social Media for Business
- By: Jason McDonald PhD
- Narrated by: Michael Goodrick
- Length: 14 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn social media marketing in plain English—step by step! Buy the workbook used at Stanford Continuing Studies to teach social media marketing for business. The 2023 updated edition—all info verified and a new chapter on TikTok, plus revisions on LinkedIn, Facebook, and other major platforms....
-
-
Great SM Reference
- By Anne on 12-31-18
-
The Box
- How the Shipping Container Made the World Smaller and the World Economy Bigger
- By: Marc Levinson
- Narrated by: Adam Lofbomm
- Length: 12 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In April 1956, a refitted oil tanker carried 58 shipping containers from Newark to Houston. From that modest beginning, container shipping developed into a huge industry that made the boom in global trade possible. The Box tells the dramatic story of the container's creation, the decade of struggle before it was widely adopted, and the sweeping economic consequences of the sharp fall in transportation costs that containerization brought about.
-
-
Fascinating Topic sometimes lost in minutiae
- By zombie64 on 07-15-14
By: Marc Levinson
-
Millennium
- From Religion to Revolution: How Civilization Has Changed over a Thousand Years
- By: Ian Mortimer
- Narrated by: John Lee
- Length: 15 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Millennium, best-selling historian Ian Mortimer takes the listener on a whirlwind tour of the last 10 centuries of Western history. It is a journey into a past vividly brought to life and bursting with ideas, that pits one century against another in his quest to measure which century saw the greatest change. We journey from a time when there was a fair chance of your village being burned to the ground by invaders - and dried human dung was a recommended cure for cancer - to a world in which explorers sailed into the unknown and civilizations came into conflict.
-
-
Bad ending - literally
- By John Gordon on 12-14-16
By: Ian Mortimer