
The Hidden Corporation
A Data Management Security Novel
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
$0.99/mo for the first 3 months

Buy for $19.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Bobby Hundley
About this listen
If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss.
Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information, yet discovers hidden data security gaps in her corporation while investigating a data theft.
The world's first data security business novel is an accessible way to illuminate hidden data dangers while explaining some of the cybersecurity challenges of today.
Called into her boss's office early one morning, Nancy MacBaron is given dual assignments: one, to help locate the person who is holding their data for ransom, and two, investigate how their information management process allowed such a huge amount of sensitive information to be stolen. Amidst the rivalry among departments, and the pressure of financial disaster for the company, Nancy begins a journey of discovery that shows her a landscape of data process activity that nobody is coordinating or even really aware exists.
Nancy confers with a number of people, some helpful, some resentful of outsiders, all adding more pieces to the puzzle. Amidst the new ideas, old work habits, and personal conflicts Nancy begins to recognize hidden and ungoverned gaps within the corporation along with following clues to find the criminal before the company's data is auctioned off to the highest bidder.
Follow Nancy as she gathers different perspectives from developers, data architects, managers, attorneys, cybersecurity specialists, data governance groups, law enforcement, and members of her own family to formulate a method to protect sensitive information that coordinates the expertise of many business groups to eliminate gaps in The Hidden Corporation.
©2011 David Schlesinger (P)2016 Technics PublicationsListeners also enjoyed...
-
The Pragmatic Programmer: 20th Anniversary Edition, 2nd Edition
- Your Journey to Mastery
- By: David Thomas, Andrew Hunt
- Narrated by: Anna Katarina
- Length: 9 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dave Thomas and Andy Hunt wrote the first edition of this influential book in 1999 to help their clients create better software and rediscover the joy of coding. These lessons have helped a generation of programmers examine the very essence of software development. Now, 20 years later, this new edition re-examines what it means to be a modern programmer. Topics range from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse.
-
-
An excellent and entertaining technical book
- By Amazon Customer on 01-21-20
By: David Thomas, and others
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- By Peter on 11-23-15
By: Gene Kim, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
In the Plex
- How Google Thinks, Works, and Shapes Our Lives
- By: Steven Levy
- Narrated by: L. J. Ganser
- Length: 19 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Few companies in history have ever been as successful and as admired as Google, the company that has transformed the Internet and become an indispensable part of our lives. How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes listeners inside Google headquarters - the Googleplex - to explain how Google works.
-
-
Just ok for me
- By Everyday Mom on 04-23-11
By: Steven Levy
-
The Unicorn Project
- A Novel About Developers, Digital Disruption, and Thriving in the Age of Data
- By: Gene Kim
- Narrated by: Frankie Corzo
- Length: 12 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Unicorn Project, we follow Maxine, a senior lead developer and architect, as she is exiled to the Phoenix Project, to the horror of her friends and colleagues, as punishment for contributing to a payroll outage. She tries to survive in what feels like a heartless and uncaring bureaucracy and to work within a system where no one can get anything done without endless committees, paperwork, and approvals. One day, she is approached by a ragtag bunch of misfits who say they want to overthrow the existing order, to liberate developers, to bring joy back to technology work.
-
-
This is no Phoenix Project
- By SaintHax on 01-10-20
By: Gene Kim
-
Digital Gold
- Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money
- By: Nathaniel Popper
- Narrated by: Robert Fass
- Length: 10 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
A New York Times technology and business reporter charts the dramatic rise of Bitcoin and the fascinating personalities who are striving to create a new global money for the Internet age.
-
-
Informative, but dry
- By Tomer on 05-10-16
By: Nathaniel Popper
-
The Pragmatic Programmer: 20th Anniversary Edition, 2nd Edition
- Your Journey to Mastery
- By: David Thomas, Andrew Hunt
- Narrated by: Anna Katarina
- Length: 9 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dave Thomas and Andy Hunt wrote the first edition of this influential book in 1999 to help their clients create better software and rediscover the joy of coding. These lessons have helped a generation of programmers examine the very essence of software development. Now, 20 years later, this new edition re-examines what it means to be a modern programmer. Topics range from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse.
-
-
An excellent and entertaining technical book
- By Amazon Customer on 01-21-20
By: David Thomas, and others
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- By Peter on 11-23-15
By: Gene Kim, and others
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
In the Plex
- How Google Thinks, Works, and Shapes Our Lives
- By: Steven Levy
- Narrated by: L. J. Ganser
- Length: 19 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Few companies in history have ever been as successful and as admired as Google, the company that has transformed the Internet and become an indispensable part of our lives. How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes listeners inside Google headquarters - the Googleplex - to explain how Google works.
-
-
Just ok for me
- By Everyday Mom on 04-23-11
By: Steven Levy
-
The Unicorn Project
- A Novel About Developers, Digital Disruption, and Thriving in the Age of Data
- By: Gene Kim
- Narrated by: Frankie Corzo
- Length: 12 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Unicorn Project, we follow Maxine, a senior lead developer and architect, as she is exiled to the Phoenix Project, to the horror of her friends and colleagues, as punishment for contributing to a payroll outage. She tries to survive in what feels like a heartless and uncaring bureaucracy and to work within a system where no one can get anything done without endless committees, paperwork, and approvals. One day, she is approached by a ragtag bunch of misfits who say they want to overthrow the existing order, to liberate developers, to bring joy back to technology work.
-
-
This is no Phoenix Project
- By SaintHax on 01-10-20
By: Gene Kim
-
Digital Gold
- Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money
- By: Nathaniel Popper
- Narrated by: Robert Fass
- Length: 10 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
A New York Times technology and business reporter charts the dramatic rise of Bitcoin and the fascinating personalities who are striving to create a new global money for the Internet age.
-
-
Informative, but dry
- By Tomer on 05-10-16
By: Nathaniel Popper
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Recoding America
- Why Government Is Failing in the Digital Age and How We Can Do Better
- By: Jennifer Pahlka
- Narrated by: Jennifer Pahlka
- Length: 9 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A bold call to reexamine how our government operates—and sometimes fails to—from President Obama’s former deputy chief technology officer and the founder of Code for America.
-
-
Very good, minimally partisan.
- By 95Rb35 on 11-25-23
By: Jennifer Pahlka
-
The Dream Machine
- By: M. Mitchell Waldrop
- Narrated by: Jamie Renell
- Length: 27 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Behind every great revolution is a vision, and behind perhaps the greatest revolution of our time, personal computing, is the vision of J.C.R. Licklider. In a simultaneously compelling personal narrative and comprehensive historical exposition, Waldrop tells the story of the man who not only instigated the work that led to the internet, but also shifted our understanding of what computers were and could be.
-
-
Biographies, not technical
- By D. Garber on 01-16-20
-
The Founders
- The Story of Paypal and the Entrepreneurs Who Shaped Silicon Valley
- By: Jimmy Soni
- Narrated by: Jonathan Todd Ross
- Length: 18 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today, PayPal’s founders and earliest employees are considered the technology industry’s most powerful network. Since leaving PayPal, they have formed, funded, and advised the leading companies of our era, including Tesla, Facebook, YouTube, SpaceX, Yelp, Palantir, and LinkedIn, among many others. As a group, they have driven 21st-century innovation and entrepreneurship. Their names stir passions; they’re as controversial as they are admired.
-
-
Wonderful, Engaging & Insightful
- By Ismael Becerra on 02-26-22
By: Jimmy Soni
-
Investments Unlimited
- A Novel About DevOps, Security, Audit Compliance, and Thriving in the Digital Age
- By: Helen Beal, Bill Bensing, Jason Cox, and others
- Narrated by: Rachel Fulginiti
- Length: 5 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's all hands on deck for a cross-functional team of executives and engineers to develop a modern automated governance process that satisfies regulators without slowing the company's ability to meet customer demands and compete in the market. In the vein of bestselling titles The Phoenix Project and The Unicorn Project, Investments Unlimited helps organizations radically rethink how they handle audit, compliance, and security for their software systems.
-
-
Relatable and relevant
- By Lee-Roy Ashworth on 09-21-22
By: Helen Beal, and others
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
The Adventures of an IT Leader, Updated Edition
- By: Robert D. Austin, Richard L. Nolan, Shannon O'Donnell
- Narrated by: Teri Schnaubelt
- Length: 10 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Becoming an effective IT manager presents a host of challenges - from anticipating emerging technology to managing relationships with vendors, employees, and other managers. A good IT manager must also be a strong business leader. This book invites you to accompany new CIO Jim Barton to better understand the role of IT in your organization. You'll see Jim struggle through a challenging first year, handling (and fumbling) situations that, although fictional, are based on true events.
-
-
Navigating Leadership in Tech: A Mixed Experience
- By Flukyspore on 12-04-23
By: Robert D. Austin, and others
-
Worm
- The First Digital World War
- By: Mark Bowden
- Narrated by: Christopher Lane
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide. When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks.
-
-
Important Insight into the Next 10 Years
- By Kenneth on 11-13-11
By: Mark Bowden
-
I'm Feeling Lucky
- The Confessions of Google Employee Number 59
- By: Douglas Edwards
- Narrated by: Douglas Edwards
- Length: 16 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
Comparing Google to an ordinary business is like comparing a rocket to an Edsel. No academic analysis or bystanders account can capture it. Now Doug Edwards, Employee Number 59, offers the first inside view of Google, giving readers a chance to fully experience the bizarre mix of camaraderie and competition at this phenomenal company. I'm Feeling Lucky captures for the first time the unique, self-invented, yet profoundly important culture of the world's most transformative corporation.
-
-
Definitely worth a credit
- By Stephen on 07-20-11
By: Douglas Edwards
-
Avogadro Corp
- The Singularity Is Closer Than It Appears
- By: William Hertling
- Narrated by: Rob Granniss
- Length: 6 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
David Ryan is the designer of ELOPe, an email language optimization program, that if successful, will make his career. But when the project is suddenly in danger of being canceled, David embeds a hidden directive in the software accidentally creating a runaway artificial intelligence. David and his team are initially thrilled when the project is allocated extra servers and programmers.
-
-
I spent a week in Kansas the other day
- By Jim "The Impatient" on 08-29-13
By: William Hertling
-
The Devil Inside the Beltway
- The Shocking Expose of the US Government's Surveillance and Overreach Into Cybersecurity, Medicine and Small Business
- By: Michael J. Daugherty
- Narrated by: Clay Teunis
- Length: 15 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Small business owner Michael J. Daugherty is fighting back against US Government's sinister surveillance tactics in his audiobook, The Devil Inside the Beltway: The Shocking Expose of the US Government's Surveillance and Overreach into Cybersecurity, Medicine, and Small Business. During the past decade the US Government has teamed with private enterprise and academia to attack American small business by surveilling networks and picking up Americans' files they considered to be "shared" and "vulnerable."
-
-
One of the most frustrating books I have heard
- By Theresa on 04-18-15
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
What listeners say about The Hidden Corporation
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Robert
- 10-14-16
Amateurishly written and performed
Imagine how an information security professional might write fiction and you've pretty much nailed this book. It reads alternately like a CISSP study guide and bad Internet fan fiction.
The "heroine" of the book (who is supposed to be an accomplished CISSP and security professional) often seems perplexed by concepts she would have had to know simply to pass the CISSP exam. While the text does contain a great deal of good factual information, I feel like it's lost on the target audience (current and aspiring CISSPs.)
The performance of the voice artist is worse. He presents caricatures of various nationalities when trying to use distinct voices for each character.
I would recommend this book to those InfoSec professionals who have just begun prep work for the CISSP exam and who can disregard the bad voice acting and 11th grade writing style.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!