Bestsellers
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
It’s the ledger stupid
- By Jessica Hopman on 03-14-24
By: Lyn Alden
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 24 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
-
-
minor flaw but great content
- By A L on 03-04-25
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
-
Amazing story
- By Katie W. on 06-08-24
By: Joseph Cox
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- By: Lyn Alden
- Narrated by: Guy Swann
- Length: 17 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
-
It’s the ledger stupid
- By Jessica Hopman on 03-14-24
By: Lyn Alden
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 24 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
-
-
minor flaw but great content
- By A L on 03-04-25
By: Mike Chapple, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- By: Joseph Cox
- Narrated by: Peter Ganim
- Length: 11 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
-
Amazing story
- By Katie W. on 06-08-24
By: Joseph Cox
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history....
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness....
-
-
Great book
- By KatieLynn on 10-08-24
By: Joseph Steinberg, and others
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
SIE Exam Mastery
- The Comprehensive Guide to Securities Fundamentals and First Try Success with Essential Strategies, Real-World Applications and Expert Tips
- By: Rory Gardner
- Narrated by: Laura Laiq
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Designed by industry experts, this essential learning tool breaks down complex securities concepts into easy-to-understand segments. Whether you're commuting, exercising, or multitasking, absorb crucial exam knowledge on your schedule.
-
-
needs a new narrator
- By Tammy Barringer on 04-18-25
By: Rory Gardner
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
-
Too Much Political Bias
- By Dreux on 02-18-23
By: Bruce Schneier
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover....
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- By: Byron Tau
- Narrated by: Sean Patrick Hopkins
- Length: 11 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
-
-
Political biased for absolutely no reason
- By Red on 09-28-24
By: Byron Tau
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist and how to identify, protect against, detect, and respond to them....
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- By: Mike Chapple, David Seidl
- Narrated by: Daniel Henning
- Length: 19 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam....
-
-
WHY NARRATE MASSIVE URLs?!?!!
- By pinkington on 05-30-24
By: Mike Chapple, and others
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- By: Renee Dudley, Daniel Golden
- Narrated by: BD Wong
- Length: 11 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time....
-
-
Ok Book but Lacks Cohesive Story
- By Rob Chavez on 01-18-23
By: Renee Dudley, and others
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity....
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
We Are Anonymous
- Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- By: Parmy Olson
- Narrated by: Abby Craden
- Length: 14 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
We Are Anonymous is a thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec....
-
-
Interesting book, AWFUL narration
- By Jen on 11-11-14
By: Parmy Olson
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected.
-
-
This book is AI nonsense
- By Mindy Isaacs on 08-21-24
By: Jamie Murphy
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- By: Phil Champagne
- Narrated by: Stephanie Murphy
- Length: 7 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
The book of Satoshi, the collected writings of Satoshi Nakamoto....
-
-
Great historic read that'll teach the blockchain
- By Peter Hanson on 05-19-16
By: Phil Champagne
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles....
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- By: Jake T. Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies....
-
-
Very basic, not helpful for testing
- By Michael R. Young on 03-02-24
By: Jake T. Mills
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
New releases
-
Beginners Guide to VPNs
- Your Secret Tunnel to Online Privacy
- By: Alsden Keir
- Narrated by: Michelle Peitz
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where every click is tracked, every search is analyzed, and every online move leaves a trace, digital privacy has never been more critical or vulnerable. Beginners Guide to VPNs: Your Secret Tunnel to Online Privacy by Alsden Keir is your essential roadmap to understanding, choosing, and using Virtual Private Networks (VPNs) confidently and clearly. Far from being a tool for tech experts or conspiracy theorists, a VPN is a simple, effective solution for anyone who values online privacy, security, and freedom.
-
-
Not Just for PCs Covers Mobile Too
- By Ryder Stewart on 06-17-25
By: Alsden Keir
-
Click with Caution
- 10 Online Red Flags That Scream ‘Scam!’ (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 2)
- By: Alsden Kier
- Narrated by: stephen plaushin
- Length: 1 hr and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The internet has transformed our world in amazing ways. With just a few clicks, we can talk to friends on the other side of the globe, discover new music, explore our favorite hobbies, shop for just about anything, and even take entire college courses from the comfort of our couch. It’s no exaggeration to say that the internet is one of the greatest tools ever invented. But just like in the real world, not everyone you meet online has good intentions. Hidden among the games, chats, and cute cat videos are people who spend their time trying to trick others.
-
-
. Great Gift for the Less Tech-Savvy
- By Princess T. Cooper on 06-10-25
By: Alsden Kier
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- By: Alsden Keir
- Narrated by: Darren Guido
- Length: 1 hr and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends. Communicating through screens has become so common that most of us don’t even think twice before opening a message, clicking a link, or responding to a notification. But in that sea of normal communication lies something much more dangerous: messages designed to trick you, to make you give away your passwords, financial details, or other private information. These scams often come hidden in the very tools we trust most—email and text.
-
-
A Digital Survival Guide
- By Gracie Stewart on 06-03-25
By: Alsden Keir
-
Cyber Citizens
- Saving Democracy with Digital Literacy
- By: Heidi Boghosian
- Narrated by: Kristen Kallen-Keck
- Length: 9 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
The electronic age compels us to confront the delicate balance between the convenience of constant connectivity and the protection of personal privacy, security, and democracy itself. Presented as a two-fold concern of digital and civic literacy, surveillance and privacy expert Heidi Boghosian argues that our fight to uphold democracy must extend to the online world. As “smart” citizens, our best chance of thriving in the digital era lies in taking care of our “smart” selves as diligently as we maintain our smart devices.
By: Heidi Boghosian
-
Supervivencia
- Afrontar los riesgos no mitigados and Amenazas jamás vistas de la actual guerra geopolítica y cibernética para sobrevivir y prosperar competitivamente en el siglo XXI
- By: Khaled Fattal
- Narrated by: Keymer Luca
- Length: 22 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Enfrentando los riesgos no mitigados y las amenazas sin precedentes de los ataques y la guerra Geo-Poli-Cyber™ de hoy para sobrevivir y prosperar competitivamente en la actualidad y en el siglo XXI.
By: Khaled Fattal
-
Transforming Information Security
- Optimizing Five Concurrent Trends to Reduce Resource Drain
- By: Kathleen M. Moriarty
- Narrated by: Kathleen M. Moriarty
- Length: 7 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.
-
-
Change is needed in the security industry
- By Amazon Customer on 06-19-25
-
Beginners Guide to VPNs
- Your Secret Tunnel to Online Privacy
- By: Alsden Keir
- Narrated by: Michelle Peitz
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where every click is tracked, every search is analyzed, and every online move leaves a trace, digital privacy has never been more critical or vulnerable. Beginners Guide to VPNs: Your Secret Tunnel to Online Privacy by Alsden Keir is your essential roadmap to understanding, choosing, and using Virtual Private Networks (VPNs) confidently and clearly. Far from being a tool for tech experts or conspiracy theorists, a VPN is a simple, effective solution for anyone who values online privacy, security, and freedom.
-
-
Not Just for PCs Covers Mobile Too
- By Ryder Stewart on 06-17-25
By: Alsden Keir
-
Click with Caution
- 10 Online Red Flags That Scream ‘Scam!’ (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 2)
- By: Alsden Kier
- Narrated by: stephen plaushin
- Length: 1 hr and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The internet has transformed our world in amazing ways. With just a few clicks, we can talk to friends on the other side of the globe, discover new music, explore our favorite hobbies, shop for just about anything, and even take entire college courses from the comfort of our couch. It’s no exaggeration to say that the internet is one of the greatest tools ever invented. But just like in the real world, not everyone you meet online has good intentions. Hidden among the games, chats, and cute cat videos are people who spend their time trying to trick others.
-
-
. Great Gift for the Less Tech-Savvy
- By Princess T. Cooper on 06-10-25
By: Alsden Kier
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- By: Alsden Keir
- Narrated by: Darren Guido
- Length: 1 hr and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends. Communicating through screens has become so common that most of us don’t even think twice before opening a message, clicking a link, or responding to a notification. But in that sea of normal communication lies something much more dangerous: messages designed to trick you, to make you give away your passwords, financial details, or other private information. These scams often come hidden in the very tools we trust most—email and text.
-
-
A Digital Survival Guide
- By Gracie Stewart on 06-03-25
By: Alsden Keir
-
Cyber Citizens
- Saving Democracy with Digital Literacy
- By: Heidi Boghosian
- Narrated by: Kristen Kallen-Keck
- Length: 9 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
The electronic age compels us to confront the delicate balance between the convenience of constant connectivity and the protection of personal privacy, security, and democracy itself. Presented as a two-fold concern of digital and civic literacy, surveillance and privacy expert Heidi Boghosian argues that our fight to uphold democracy must extend to the online world. As “smart” citizens, our best chance of thriving in the digital era lies in taking care of our “smart” selves as diligently as we maintain our smart devices.
By: Heidi Boghosian
-
Supervivencia
- Afrontar los riesgos no mitigados and Amenazas jamás vistas de la actual guerra geopolítica y cibernética para sobrevivir y prosperar competitivamente en el siglo XXI
- By: Khaled Fattal
- Narrated by: Keymer Luca
- Length: 22 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Enfrentando los riesgos no mitigados y las amenazas sin precedentes de los ataques y la guerra Geo-Poli-Cyber™ de hoy para sobrevivir y prosperar competitivamente en la actualidad y en el siglo XXI.
By: Khaled Fattal
-
Transforming Information Security
- Optimizing Five Concurrent Trends to Reduce Resource Drain
- By: Kathleen M. Moriarty
- Narrated by: Kathleen M. Moriarty
- Length: 7 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.
-
-
Change is needed in the security industry
- By Amazon Customer on 06-19-25
-
Drone Wars
- The Future of Conflict
- By: Donald Elton
- Narrated by: Virtual Voice
- Length: 10 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Drone Wars: The Future of Conflict is a groundbreaking exploration of how unmanned systems are transforming the battlefield, shifting global power, and redefining the rules of war. From the Bronze Age to the nuclear era, history has demonstrated that revolutions in military technology have reshaped societies. Today, the rapid rise of drones—affordable, autonomous, and increasingly lethal—is the next evolution. Once the domain of superpowers, drone warfare has been democratized. Now, insurgents, terrorists, criminal cartels, and lone actors can wield capabilities once reserved for the ...
By: Donald Elton
-
HACK HAPPENS
- Cybersecurity for Beginners Who Don’t Want to Be Next
- By: Tolga Tavlas
- Narrated by: Virtual Voice
- Length: 15 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
LEARN TO STOP IDENTITY THEFT, FRAUD, SCAMS, AND AI TRICKS BEFORE THEY HAPPEN! You were never supposed to figure this out on your own. No one taught you how to spot a fake delivery text. No class explained that scanning a QR code could hijack your phone. No official warned you your smart TV might be listening. But when it all goes wrong, they say you should’ve known better. Hack Happens is the answer to that betrayal. This isn’t a book filled with jargon or vague advice. It’s a real-world survival guide for people with something to lose—parents, teenagers, small business owners, ...
By: Tolga Tavlas
-
The Ultimate Cyber Security Guide for TikTok Everyday Users, Influencers and Content Creators
- The First Ever Guide Dedicated to Protecting Your Presence and Privacy on TikTok
- By: WeCyberYou!
- Narrated by: AJ Collins
- Length: 1 hr and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is for you. It has been narrated specially for all TikTok Everyday Users, Influencers and Content Creators around the world. We’ll show you how you can make the most of TikTok – safely and securely! You’ll find the knowledge and guidance you need to protect your TikTok account effectively.
By: WeCyberYou!
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- By: Andrew Pattison
- Narrated by: Kerry Hutchinson
- Length: 2 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remain up to date, Version 2.0 states that “The CSF is designed to be used by organizations of all sizes and sectors, including industry, government, academia, and nonprofit organizations, regardless of the maturity level of their cybersecurity programs.”
By: Andrew Pattison
-
Der Cyber Blueprint (German Edition)
- By: Andre Edmond
- Narrated by: Maya Lichtadler
- Length: 6 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Entfalten Sie Ihr Potenzial: Wechseln Sie mit Zuversicht vom IT-Support zur Cybersicherheit! Sind Sie ein IT-Experte oder Helpdesk-Techniker, der den Sprung in die Cybersicherheit wagen möchte? Dieses Buch ist Ihr Fahrplan für einen erfolgreichen Übergang. Viele IT-Fachkräfte stehen vor Herausforderungen wie begrenzter Erfahrung, Unsicherheit über Zertifizierungen und fehlendem Praxiswissen, wodurch die erste Stelle im Bereich Cybersicherheit unerreichbar scheint. Doch mit der richtigen Anleitung können Sie Ihre IT-Kenntnisse gezielt nutzen, um Ihre Karriere zu beschleunigen.
By: Andre Edmond
-
Le plan d'action cybernétique
- By: Andre Edmond
- Narrated by: Cole Mercer
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
Libérez votre potentiel : Faites le saut vers la cybersécurité avec confiance ! Vous êtes un professionnel de l'informatique ou un technicien du service d'assistance cherchant à entrer dans le domaine de la cybersécurité mais vous ne savez pas par où commencer ? Ce guide est votre feuille de route pour réussir cette transition. Passer de l'assistance informatique à la cybersécurité peut sembler intimidant. Un manque d'expérience pratique, des incertitudes sur les certifications et des lacunes en cybersécurité peuvent rendre l'accès au premier poste difficile.
By: Andre Edmond
-
Guerras de Drones
- El Futuro de Los Conflictos
- By: Donald Elton
- Narrated by: Virtual Voice
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Guerras de Drones: El Futuro de los Conflictos es una exploración innovadora sobre cómo los sistemas no tripulados están transformando el campo de batalla, alterando el equilibrio del poder global y redefiniendo las reglas de la guerra. Desde la Edad de Bronce hasta la era nuclear, la historia ha demostrado que las revoluciones en tecnología militar han reconfigurado sociedades enteras. Hoy, el rápido auge de los drones—accesibles, autónomos y cada vez más letales—representa la siguiente evolución. Lo que antes era exclusivo de las superpotencias, ahora ha sido democratizado. ...
By: Donald Elton
-
The Big Book of Cybersecurity for Activists
- Infosec for the Resistance
- By: Cybersecurity Condor, JD Everhard
- Narrated by: Virtual Voice
- Length: 8 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity for Activists: A Field Manual from A to Z Defend yourself. Defend your data. Defend your movement. From burner phones to browser hardening, from metadata leaks to mass surveillance, this no-nonsense guide gives you the tools to stay secure in an insecure world. Whether you’re organizing protests, supporting whistleblowers, researching sensitive topics, or just trying to opt out of corporate spyware, Cybersecurity for Activists walks you through how to protect yourself—and your community. Written in plain language but packed with expert-level detail, this field manual ...
By: Cybersecurity Condor, and others
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- By: Taimur Ijlal
- Narrated by: Shawn Elliott
- Length: 2 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
By: Taimur Ijlal
-
Cybersecurity for Activists: Books III & IV
- Mobile OS Hardening to Zoom Bombers
- By: Cybersecurity Condor, JD Everhard
- Narrated by: Virtual Voice
- Length: 4 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Vol. 3 & 4: Mobile, Metadata, and the Machines Watching You Because it’s not paranoia if they really are listening, tracking, and triangulating your location. Welcome to the part of the fight where things get uncomfortable: mobile spyware, Stingrays disguised as friendly cell towers, rogue QR codes, AI-powered OSINT engines scraping your every move. This volume goes deeper: mobile OS lockdown, open-source tools that don’t betray you, quiet ways to communicate when the rest of the internet is on fire. We hit nodes, ransomware, privilege escalation, and Pegasus. We dissect Onion routing ...
By: Cybersecurity Condor, and others
-
Cybersecurity for Activists: Book Two
- Countering Surveillance in the Age of AI
- By: Cybersecurity Condor, JD Everhard
- Narrated by: Virtual Voice
- Length: 1 hr and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity for Activists is the essential handbook for today’s social change warriors. Are you prepared for the advent of authoritarianism that is sweeping the globe? As mass surveillance expands and censorship escalates, your data—and your voice—are under threat. Whether you're an activist, organizer, or outspoken citizen, you’re already a target in today’s digital crackdown. A field-tested cybersecurity guide for those who refuse to be silenced. Built on the real-world tactics in the crucible of human rights defense and frontline activism, it gives you the tools to protect ...
By: Cybersecurity Condor, and others
-
Beyond the Firewall
- Enhancing SCADA Security in the Age of Cyber Threats
- By: Chukwudi Abalogu
- Narrated by: B Fike
- Length: 4 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
The background noise of power grids working alongside water pipelines carrying liquid and trains moving along tracks represent the hidden heartbeat of modern civilization which supports our global connectedness. The vital systems supporting our economies and societies remain hidden from everyday view while they sustain both the simple and complex aspects of daily life. At the heart of this critical infrastructure lies a network of sophisticated control systems: SCADA–Supervisory Control and Data Acquisition.
By: Chukwudi Abalogu