Virtual Terror: 21st Century Cyber Warfare
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $24.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
John N Gully
-
By:
-
Daniel Wagner
About this listen
Anyone who logs on to the internet can become a victim of virtual terrorism, whether via email, social media, a Google search, or simply by logging on to a computer. Anyone seeking to do harm to others online can be a virtual terrorist, and it is incredibly easy to become one. That is the era we live in now - someone sitting behind a laptop half a world away can interfere with, invade, or take over your life, business, or government. You may not even realize it, but you may already have become a victim; if you have not, you will become one eventually.
In this extremely timely, important, and compelling audiobook, Daniel Wagner redefines what terrorism has become in the 21st century. Unlike more conventional types of terrorism, in which the perpetrator seeks recognition and reveals his or her identity, with virtual terrorism, the identity of the person, group, or government responsible for acts of terror is deliberately hidden in an anonymous, borderless, and lawless world. Their motives and objectives may be unclear, and the length of an attack, or whether it will be repeated, are generally unknown.
What virtual terrorists have in common with more traditional terrorists is the use of coercion or intimidation to achieve their objectives - if they choose to reveal what those objectives are - but that is where the commonality ends. They can strike at any time, invisibly and silently. You may never know they are even there, and they may plant malware on your computer that steals your information for years without being discovered. Wagner takes us on a comprehensive tour of the Virtual Terrorism landscape - from cybercrime and bioterrorism to drones and artificial intelligence - to reveal the chilling reality that confronts us all.
After listening to this audiobook, you may not ever want to log on to your smartphone or the internet again. The audiobook is a clarion call for individuals, businesses, and governments to rise up against virtual terrorists, for if we fail to do so now, the battle may soon be lost.
©2017 Daniel Wagner (P)2017 Daniel WagnerListeners also enjoyed...
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
Blockchain Revolution
- How the Technology Behind Bitcoin and Other Cryptocurrencies Is Changing the World
- By: Don Tapscott, Alex Tapscott
- Narrated by: Jeff Cummings
- Length: 16 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The technology likely to have the greatest impact on the future of the world economy has arrived, and it's not self-driving cars, solar energy, or artificial intelligence. It's called the blockchain. The first generation of the digital revolution brought us the Internet of information. The second generation - powered by blockchain technology - is bringing us the Internet of value: a new, distributed platform that can help us reshape the world of business and transform the old order of human affairs for the better.
-
-
Should Have Been Called "101 Uses for Blockchain"
- By Adrian W. Rich on 05-24-16
By: Don Tapscott, and others
-
Machine Learning for Beginners
- Absolute Beginners Guide, Learn Machine Learning and Artificial Intelligence from Scratch (Python, Machine Learning, Book 2)
- By: Chris Sebastian
- Narrated by: Brian R. Scott
- Length: 3 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
Machine learning is changing the world. You use machine learning every day and probably don’t know it. In this audiobook, you will learn how ML grew from a desire to make computers able to learn.
-
-
GREAT BOOK!!!
- By Jonathan on 05-29-19
By: Chris Sebastian
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
Blockchain Revolution
- How the Technology Behind Bitcoin and Other Cryptocurrencies Is Changing the World
- By: Don Tapscott, Alex Tapscott
- Narrated by: Jeff Cummings
- Length: 16 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The technology likely to have the greatest impact on the future of the world economy has arrived, and it's not self-driving cars, solar energy, or artificial intelligence. It's called the blockchain. The first generation of the digital revolution brought us the Internet of information. The second generation - powered by blockchain technology - is bringing us the Internet of value: a new, distributed platform that can help us reshape the world of business and transform the old order of human affairs for the better.
-
-
Should Have Been Called "101 Uses for Blockchain"
- By Adrian W. Rich on 05-24-16
By: Don Tapscott, and others
-
Machine Learning for Beginners
- Absolute Beginners Guide, Learn Machine Learning and Artificial Intelligence from Scratch (Python, Machine Learning, Book 2)
- By: Chris Sebastian
- Narrated by: Brian R. Scott
- Length: 3 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
Machine learning is changing the world. You use machine learning every day and probably don’t know it. In this audiobook, you will learn how ML grew from a desire to make computers able to learn.
-
-
GREAT BOOK!!!
- By Jonathan on 05-29-19
By: Chris Sebastian
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Black Code
- Surveillance, Privacy, and the Dark Side of the Internet (Expanded Edition)
- By: Ronald J. Deibert
- Narrated by: Ronald J. Deibert
- Length: 9 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain. In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what's at stake for Internet users and citizens.
-
-
fine for the oughts, but dated
- By illequidam on 02-25-22
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- By: Murphy Rangel
- Narrated by: Luciano Marin
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
By: Murphy Rangel
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
-
Crime Dot Com
- From Viruses to Vote Rigging, How Hacking Went Global
- By: Geoff White
- Narrated by: Geoff White
- Length: 10 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Geoff White charts the astonishing development of hacking, from its birth among the ruins of the Eastern Bloc to its coming of age as the most pervasive threat to our connected world. He takes us inside the workings of real-life cybercrimes, revealing how the tactics of high-tech crooks are now being harnessed by nation states. From Ashley Madison to election rigging, Crime Dot Com is a thrilling account of hacking, past and present, and of what the future might hold.
-
-
amazing book !
- By thorhcm on 08-21-22
By: Geoff White
-
Cybersecurity
- A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to discover how to protect yourself, your family, and business against cyber attacks, then pay attention...Have you been curious about how hackers choose their victims or develop their attack plans? Have you been hacked before? Do you want to learn to protect your systems and networks from hackers? This audiobook serves as a launchpad for learning more about the Internet and cybersecurity. Throughout this audiobook, you will take a journey into the world of cybercrimes and cybersecurity.
-
-
Secure your information through this audiobook.
- By Roger Strong on 08-24-21
By: Quinn Kiser
-
Blockchain: A Guide to Understanding Blockchain
- The Cryptomasher Series, Book 3
- By: Sean Bennett
- Narrated by: John B. Leen
- Length: 1 hr and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Blockchain technology is in the news more and more these days, especially as Bitcoin prices continue to climb closer and closer to $20,000 per unit. Generating plenty of news for speculative investors to obsess over is only one of its many uses, however, and it is likely going to be those who put it to use solving problems in new and creative ways. If you want to make sure you are on the right side of the coming technological revolution, then Blockchain: A Guide to Understanding Blockchain is the audiobook you have been waiting for.
-
-
Just what i needed!!
- By patrick on 04-27-18
By: Sean Bennett
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Thomas Rose on 08-08-20
By: Richard A. Clarke, and others
-
The Darkening Web
- The War for Cyberspace
- By: Alexander Klimburg
- Narrated by: Kaleo Griffith
- Length: 15 hrs
- Unabridged
-
Overall
-
Performance
-
Story
No single invention of the last half century has changed the way we live now as much as the Internet. Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn't so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity.
-
-
Not for the Security it IT pro
- By Martin D. on 07-26-18
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- By: Adam Segal
- Narrated by: Don Hagen
- Length: 10 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
-
Wrong narrator for material
- By Locnar on 02-21-17
By: Adam Segal
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- By: Josephine Wolff
- Narrated by: Kate Reading
- Length: 14 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity incidents make the news with startling regularity. Each breach makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
-
-
Good primer
- By Amazon Customer on 02-13-21
By: Josephine Wolff
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
Critic reviews
"Daniel Wagner's Virtual Terror is a thought-provoking and comprehensive look into the world of cyber threats. With national security, economic prosperity, and societal institutions reliant on information technologies in a globally-connected world, we must have our eyes wide open to the risks that accompany the benefits to being 'always connected'. Cybersecurity is a risk management issue, not just a technology problem. Daniel superbly sets the table for readers to effectively identify and assess the risk associated with today's evolving cyberthreat landscape. Virtual Terror presents you with the information you need to better manage your cyber risk." (Gregory J. Touhill, CISSP, CISM brigadier general, USAF (ret) and US chief information security officer (2016-2017))
"An inspired and fluid exposé of the emerging risks of virtual terrorism in the context of the evolving and faltering global order. Wagner underwrites his analysis with empirical data, with the potential to trigger a call to arms for policy and regulatory wings of government the world over. That Wagner makes such a dry, pithy and often geek-centered subject so palatable is a triumph of storytelling and exposition. A page turner." (Peter J. Middlebrook, CEO of Geopolicity (Dubai))
Related to this topic
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- By: Adam Segal
- Narrated by: Don Hagen
- Length: 10 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
-
Wrong narrator for material
- By Locnar on 02-21-17
By: Adam Segal
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Cyber War
- The Next Threat to National Security and What to Do About It
- By: Robert K. Knake, Richard A. Clarke
- Narrated by: Pete Larkin
- Length: 10 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- By Britt Adams on 09-13-22
By: Robert K. Knake, and others
-
@War
- The Rise of the Military-Internet Complex
- By: Shane Harris
- Narrated by: Stephen R. Thorne
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- By Greg on 02-06-15
By: Shane Harris
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- By: Adam Segal
- Narrated by: Don Hagen
- Length: 10 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
-
Wrong narrator for material
- By Locnar on 02-21-17
By: Adam Segal
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Cyber War
- The Next Threat to National Security and What to Do About It
- By: Robert K. Knake, Richard A. Clarke
- Narrated by: Pete Larkin
- Length: 10 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- By Britt Adams on 09-13-22
By: Robert K. Knake, and others
-
@War
- The Rise of the Military-Internet Complex
- By: Shane Harris
- Narrated by: Stephen R. Thorne
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- By Greg on 02-06-15
By: Shane Harris
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Who Controls the Internet
- Illusions of a Borderless World
- By: Jack Goldsmith, Tim Wu
- Narrated by: Bob Loza
- Length: 6 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is the Internet erasing national borders? Who's really in control of what's happening on the Net--Internet engineers, rogue programmers, the United Nations, or powerful countries?In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world.
-
-
Mostly delves into questions of law
- By Amazon Customer on 05-07-11
By: Jack Goldsmith, and others
-
Big Data in Practice
- How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
- By: Bernard Marr
- Narrated by: Piers Hampton
- Length: 7 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data. Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This book fills the knowledge gap by showing how major companies are using big data every day, from an up-close, on-the-ground perspective.
-
-
Good book for managers
- By Capnbody on 01-08-18
By: Bernard Marr
-
The Digital Silk Road
- China's Quest to Wire the World and Win the Future
- By: Jonathan E. Hillman
- Narrated by: James Fouhey
- Length: 9 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
From the ocean floor to outer space, China’s Digital Silk Road aims to wire the world and rewrite the global order. Taking listeners on a journey inside China’s surveillance state, rural America, and Africa’s megacities, Jonathan Hillman reveals what China’s expanding digital footprint looks like on the ground and explores the economic and strategic consequences of a future in which all routers lead to Beijing.
-
-
THE RACE TO WIRE THE WORLD
- By jaga on 01-23-22
-
System Error
- Where Big Tech Went Wrong and How We Can Reboot
- By: Rob Reich, Mehran Sahami, Jeremy M. Weinstein
- Narrated by: Kaleo Griffith
- Length: 11 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In no more than the blink of an eye, a naïve optimism about technology’s liberating potential has given way to a dystopian obsession with biased algorithms, surveillance capitalism, and job-displacing robots. System Error exposes the root of our current predicament - how big tech’s relentless focus on optimization is driving a future that reinforces discrimination, erodes privacy, displaces workers, and pollutes the information we get- and outlines steps we can take to change course, renew our democracy, and save ourselves.
-
-
Excellent on tech. Weak on political speech.
- By Kindle Customer on 11-05-21
By: Rob Reich, and others
-
The Plot to Hack America
- How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election
- By: Malcolm Nance
- Narrated by: Gregory Itzin
- Length: 6 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization's computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation's top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.
-
-
Short and Terrifying
- By Teadrinker on 03-19-17
By: Malcolm Nance
-
Dark Territory
- The Secret History of Cyber War
- By: Fred Kaplan
- Narrated by: Malcolm Hillgartner
- Length: 9 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
-
-
Best narrator - Malcolm Hillgartner
- By Greg Davis on 07-20-16
By: Fred Kaplan
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
T-Minus AI
- Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power
- By: Michael Kanaan
- Narrated by: Braden Wright
- Length: 8 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented perspective that's easy to comprehend. A recognized national expert and the U.S. Air Force's first Chairperson for Artificial Intelligence, Kanaan weaves a compelling new view on our history of innovation and technology to masterfully explain what each of us should know about modern computing, AI, and machine learning.
-
-
Trivial Book Regarding AI
- By AstroMan on 10-30-20
By: Michael Kanaan
-
Digital Transformation
- Survive and Thrive in an Era of Mass Extinction
- By: Thomas M. Siebel
- Narrated by: Thomas M. Siebel
- Length: 9 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The confluence of four technologies - elastic cloud computing, big data, artificial intelligence, and the internet of things - writes Siebel, is fundamentally changing how business and government will operate in the 21st century. Siebel masterfully guides listeners through a fascinating discussion of the game-changing technologies driving digital transformation and provides a roadmap to seize them as a strategic opportunity.
-
-
The bible for your Digital Transformation projects
- By GR7381 on 07-19-19
By: Thomas M. Siebel
-
Artificial Intelligence: 101 Things You Must Know Today About Our Future
- By: Lasse Rouhiainen
- Narrated by: Rodger Paxton
- Length: 8 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence is changing our world faster than we can imagine, and it will impact every area of our lives. And this is happening whether we like it or not. You might have heard that many jobs will be replaced by automation and robots, but did you also know that at the same time a huge number of new jobs will be created by AI? This book covers many fascinating and timely topics related to artificial intelligence, including: self-driving cars, robots, chatbots, and how AI will impact the job market, business processes, and entire industries, just to name a few.
-
-
Completely useless
- By Joe V on 03-29-19
By: Lasse Rouhiainen
What listeners say about Virtual Terror: 21st Century Cyber Warfare
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- GoingGoingGone...
- 12-13-17
Frightening
This is a very detailed and frightening book. The creativity of criminals and cyberterrorists is mind boggling.
Though the book is quite detailed in everything that can go wrong - from our internet accounts and banking to disabling satellites and electrical devices for whole coastlines at a time, though, it also offers practical and simple advice for us and for our legislatures in how to move forward from here.
It's scary, but the point made is that it's best to face the issue head on and honestly. This book does that.
The reader was simply excellent, taking a well-written book and making it just right for audible listening.
This book was received by me at no cost on the condition that I write a non-biased review.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Striker
- 05-07-18
Great Information, But A Lot To Absorb
I thought this was a very informative book with a lot of very interesting information. Though I appreciated it, it was a little on the long side for those who don't like such lengthy listens. Also, while I can't really think of a way to avoid it considering the type of information being presented, I thought the book took on almost an alarmist tone about the possibilities of cybercrime and warfare (though not unfairly so).
I would like to see some kind of abridged version for those who want to get the information without the enormous time commitment.
The narrator did a good job with the book, especially considering its a non-fiction title.
In general terms, this was a great audiobook if you are willing to commit the time to listen all the way through.
I requested and received a free copy of this audiobook from the author, publisher, or narrator in exchange for an unbiased review. I was NOT required to write a positive review and this reflects my honest opinion of the work.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- TinkerMel
- 12-01-17
Virtual Terror scary but true!
this is a long book. but it is so full of excellent info! the writer really knows his stuff. and goes into great detail explaining things so anyone can understand.
I know a bit about hackers, and everything he said was spot on. i think anyone who reads this, will learn just how scary the net can be.
It was a pleasure to hear this great performance by John Gully. I would listen to him again.
I was given this free review copy audiobook at my request and have voluntarily left this review.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Eric
- 02-02-19
Appreciated, very informative.
This is what people should aware of, however some topics might have exceeded background knowledge of mean person, or people not in the infosec field. The wordings are little bit emotional overwhelming, but it’s okay since this book use story telling approach, as long as the information didn’t distorted. Worthy to spend your time with this book. A lots of truth in cyberspace threats, and some of basic self protection were given. Recommend.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Joe
- 12-17-17
Ton of Information
This was a great book with a ton of information that covers a vast amount of areas. It talks about different type of hacks, viruses and techniques that have been used in the last few years. It also talks about the companies that have been hacked and some of the outcomes for them. It goes in depth about how cyber terrorism has been used, what countries are doing it and the future of how it and the internet will affect our world. This was not an opinion piece, it was facts and data. I appreciated the information, rather then someone's opinion on the topic. Narration was great, never got boring and speed was good. This is a good read for someone wanting to learn about the subject for the first time or someone who is looking for more information on the subject.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Susan Patterson
- 08-16-18
Thought-provoking!
Virtual terrorism is in a constant state of evolution. As soon as a new technology is developed to counteract hacking and malware, new adaptations are developed by the bad guys to defile them! Our company suffered from a ransomware attack. We didn't pay and lost a lot of programs!!!
Google, amazon and Facebook have a God's eye view of our activities!
John N. Gully did an excellent job of narrating! His cadence and inflection was very easy to listen to.
I was given a free review copy of this audiobook at my request and have voluntarily left this review.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Philo
- 07-24-18
AMAZING tour of the whole illicit cyber world
This is one of the best audiobooks I've heard. The word "terrorism" doesn't begin to cover the scope of this book -- it covers all sorts of crime as well as things as commonplace as use of social media by and against parties in divorce cases. The book is encyclopedic on all sorts of actors and activities worldwide. It shows sophistication (yet gives listenable explanations) in technical, legal, governmental, and cultural matters, as well as clear expositions of methods used by all players -- criminals, vigilantes, government agencies, etc. It is very current. It also shows a thoughtfulness on all sorts of themes above and beyond what I expected. If a chain is as strong as its weakest link, imagine living in a world littered everywhere with weak links, or as the wince-inducing phrase has it, "attack surfaces." Many statistics are eye-rolling: 600,000 facebook accounts per day compromised? Yikes. One thing is apparent: there is lots of work to be done, I suppose that also means, money to be made (legitimately of course).
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Kingsley
- 01-02-18
Fear mongering or fair warning
It's hard to write about the dangers of technology without coming across as a wowser, an anti-technology fear monger. It's hard to find that balance between acknowledging all the good technology does and can do, while giving a realistic view of the dangers. This is made even harder when the dangers are something that is so underappreciated like cyber security. Maybe this book is too much on the fear-mongering side, or maybe it is just right: to put a little fear in us to take things a little more seriously.
As I write this, less than a day ago $79 million in Bitcoin was stolen. And there was recently (yet another) fappening release. Plus the "did Russia steal an election" discussions. And Prism. And the Sony hacks. And this, and that.... there is no end of horror stories with hacking and cyber warfare problems. It is something that needs to be taken seriously
Daniel Wagner has put together a detailed, well researched book that looks at many of the current dangers, the uses by Governments and non-government entities for espionage, and the many ways that people, companies and Governments can reduce their risks. The book is full of real examples, and statistics relating to the topic. While much of the book is focused on what others are doing against the US, it does not shy away from talking about how the US Government also engages in these practices. It’s just that the exact details and examples are a little more sparse. And as this book point out, that probably doesn’t mean the US does it less, they are just a little better at hiding it.
It's an eye opening book but it also gives great, practical advice for reducing risk. The problem may be that those who most need to read this may be those least likely to.
Narration by John Gully was great. Well-paced and clear. He engaged with the topic and was able to keep even the dryer parts interesting. Another enjoyable listen from him.
I was voluntarily provided this free review copy audiobook by the author, narrator, or publisher.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Tom Anderson
- 11-30-17
Couldn't Finish It
This is a first for me: I couldn't finish this audiobook. I had high hopes but they were soon lost in an academic haze of fact upon fact with no sizzle to enliven the experience. This audiobook verges on the tediousness of a textbook. If you want dry facts, source citings and tons of acronym definitions this is the audiobook for you. But take along a gallon of water because it is very dry.
I was given this free review copy audiobook at my request and have voluntarily left this review.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful