Security Audiobooks
Trending audiobooks
The most talked-about and well-loved Security titles this month.
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5CISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Blockchain and the Law: The Rule of Code Rating: 4 out of 5 stars4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Rating: 5 out of 5 stars5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5Blockchain For Dummies Rating: 5 out of 5 stars5/5Blockchain: The Insights You Need from Harvard Business Review Rating: 4 out of 5 stars4/5Ransomware Protection Playbook Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5How I Rob Banks: And Other Such Places Rating: 3 out of 5 stars3/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5Threats: What Every Engineer Should Learn From Star Wars Rating: 5 out of 5 stars5/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Alice and Bob Learn Application Security Rating: 5 out of 5 stars5/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Rating: 4 out of 5 stars4/5Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Rating: 5 out of 5 stars5/5Schneier on Security Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5The Art of the Steal: How to Protect Yourself and Your Business from Fraud, America's #1 Crime Rating: 0 out of 5 stars0 ratings
Others you might like
From classic favorites to brand new hits, it’s all here for you to discover.
There’s more to discover in Security
Escape into new audiobooks and new adventures.
The Rise Of Central Bank Digital Currencies (Cbdcs) Rating: 0 out of 5 stars0 ratingsThe Perfect Weapon: War, Sabotage, and Fear in the Cyber Age Rating: 4 out of 5 stars4/5Cybersecurity Essentials: Protecting Your Digital World Rating: 0 out of 5 stars0 ratingsHack the Airwaves: Advanced BLE Exploitation Techniques Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker: Session Hijacking, SQL Injections, Cloud Computing, And Cryptography Rating: 0 out of 5 stars0 ratingsQuantum Cryptography: Securing the Future with Quantum Tech Rating: 0 out of 5 stars0 ratingsHACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5Summary of Bruce Sterling's The Hacker Crackdown Law and Disorder on the Electronic Frontier Rating: 0 out of 5 stars0 ratingsCEH: Crush the CEH Test! Listen to powerful lessons designed for your exam triumph. Rating: 0 out of 5 stars0 ratingsCyber Incident Response: Counterintelligence And Forensics For Security Investigators Rating: 0 out of 5 stars0 ratingsCybersecurity: The New Frontline in Protecting Our Digital Future Rating: 0 out of 5 stars0 ratingsKey Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World Rating: 0 out of 5 stars0 ratingsRethinking IT Security Rating: 0 out of 5 stars0 ratingsThe Art of Exploit Development: A Practical Guide to Writing Custom Exploits for Red Teamers Rating: 0 out of 5 stars0 ratingsFAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions Rating: 0 out of 5 stars0 ratingsEthical Hacking for Beginners: Comprehensive Introduction to the World of Cybersecurity Rating: 0 out of 5 stars0 ratingsParenting in the Digital Age: Raising Kids in a Tech-Driven World Rating: 0 out of 5 stars0 ratingsThe Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5The Complete Handbook of Data Privacy and GDPR: : A Comprehensive Resource for IAPP Certification Rating: 0 out of 5 stars0 ratingsHacking API: Navigating the Intricacies of API Security and Ethical Hacking Rating: 0 out of 5 stars0 ratingsDefensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition) Rating: 0 out of 5 stars0 ratingsThe Darkening Web: The War for Cyberspace Rating: 3 out of 5 stars3/5The Art of the Steal: How to Protect Yourself and Your Business from Fraud, America's #1 Crime Rating: 0 out of 5 stars0 ratingsCult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World Rating: 4 out of 5 stars4/5Certified Information Security Manager (CISM) Certification:: A Practical Study Guide Rating: 0 out of 5 stars0 ratingsCyber Security: Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware Rating: 5 out of 5 stars5/5EU Cybersecurity Regulations Explained: DORA, NIS 2, and Risk Management Rating: 0 out of 5 stars0 ratingsMalware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsEthical Hacking & Penetration Testing: A Comprehensive Guide Rating: 0 out of 5 stars0 ratingsCCSP - Certified Cloud Security Professional Certification Handbook: Cloud Security Primer Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Beginner’s Guide to Cybersecurity Mastery: Learn Skills to Protect Against Cyber Threats Effectively Rating: 0 out of 5 stars0 ratingsSandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Rating: 4 out of 5 stars4/5Data Security and Privacy for Beginners: A Beginner's Guide to Safeguarding Your Data and Preserving Privacy in the Digital Age Rating: 0 out of 5 stars0 ratingsCryptography And Computer Science: Design Manual For Algorithms, Codes And Ciphers Rating: 0 out of 5 stars0 ratingsSecuring the Digital Frontier: Protecting Data in Cyberspace: Building Strong Defenses Against Digital Intrusions Rating: 0 out of 5 stars0 ratingsAmerica the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare Rating: 0 out of 5 stars0 ratingsNavigating Cybersecurity and Ethical Hacking: The Art of Ethical Hacking: Exploring Cybersecurity from Within Rating: 0 out of 5 stars0 ratingsLearning DevSecOps: A Practical Guide to Processes and Tools Rating: 0 out of 5 stars0 ratingsFuture Horizons in Cybersecurity: Defensive Fortitude: A Comprehensive Guide to Safeguarding Digital Assets Rating: 0 out of 5 stars0 ratingsCybersecurity Unveiled: The Art of Cyber Defense: A Comprehensive Guide to Protecting Your Data Rating: 0 out of 5 stars0 ratingsFuture Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It Rating: 0 out of 5 stars0 ratingsThe Code of Honor: Embracing Ethics in Cybersecurity Rating: 0 out of 5 stars0 ratingsCryptocurrency Frontier: Navigating Altcoins and ICOs: Strategies, Risks, and Opportunities in the World of Digital Currency Rating: 0 out of 5 stars0 ratingsMastering Cybersecurity: : A Comprehensive Guide for CISSP, CISA, CISM, GSEC. SSCP Certification Exams Rating: 0 out of 5 stars0 ratingsBlockchain: Everything You Need to Know About Blockchain Rating: 5 out of 5 stars5/5Practical Cloud Security: A Guide for Secure Design and Deployment (2nd Edition) Rating: 0 out of 5 stars0 ratingsBitcoin Mining for Beginners: A Beginner's Guide to Cryptocurrency Gold Rating: 0 out of 5 stars0 ratingsInside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security Rating: 0 out of 5 stars0 ratingsMaximizing Investment Returns: Navigating the Crypto Market: A Comprehensive Guide to Successful Investments Rating: 0 out of 5 stars0 ratingsUnveiling Vulnerabilities: Ethical Hacking and Penetration Testing: Navigating the Cybersecurity Landscape Responsibly Rating: 0 out of 5 stars0 ratingsGray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratingsDark Mirror: Edward Snowden and the American Surveillance State Rating: 4 out of 5 stars4/5Bitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Rating: 4 out of 5 stars4/5AI Cybersecurity: Guardians of the Net Rating: 0 out of 5 stars0 ratingsCountdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Rating: 4 out of 5 stars4/5The Cybersecurity Blueprint: Building a Secure and Resilient Digital Infrastructure Rating: 0 out of 5 stars0 ratingsCybersecurity: Cybersecurity Essentials: Safeguarding Your Digital World Rating: 0 out of 5 stars0 ratingsPentest+ Exam Pass: (PT0-002): Penetration Testing And Vulnerability Management For Cybersecurity Professionals Rating: 0 out of 5 stars0 ratingsHACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 3 BOOKS IN 1 Rating: 0 out of 5 stars0 ratingsHacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 0 out of 5 stars0 ratingsMichael Saylor's Bitcoin MicroStrategy Rating: 0 out of 5 stars0 ratingsLinux for Beginners: 37 Linux Commands you Must Know Rating: 4 out of 5 stars4/5Summary of Andy Greenberg's Sandworm Rating: 4 out of 5 stars4/5The Ethical Hacker's Handbook: A Comprehensive Guide to Cybersecurity Assessment Rating: 0 out of 5 stars0 ratingsZero Trust Networks: Building Secure Systems in Untrusted Networks (2nd Edition) Rating: 5 out of 5 stars5/5DORA & NIS 2 Compliance Toolkit:: Building a Secure Digital Future Rating: 0 out of 5 stars0 ratingsCYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Kali Linux CLI Boss: Novice To Command Line Maestro Rating: 0 out of 5 stars0 ratingsThrough the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Cryptography For Beginners: Unlocking the Secrets of Secure Communication Rating: 0 out of 5 stars0 ratingsComputer Science 2.0 Beginners Crash Course - Python, Javascript, Cyber Security And Algorithms Rating: 0 out of 5 stars0 ratingsZero Day: Novice No More: Expose Software Vulnerabilities And Eliminate Bugs Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker: Reconnaissance, Vulnerability Analysis & Social Engineering Rating: 0 out of 5 stars0 ratingsPentesting 101: Cracking Gadgets And Hacking Software Rating: 0 out of 5 stars0 ratingsBurners and Black Markets: How to Be Invisible on Android, Blackberry & Iphone Rating: 5 out of 5 stars5/5Risk Management and ISO 31000: A pocket guide Rating: 5 out of 5 stars5/5Bitcoin & Cryptocurrency Technologies (3 Books in 1): Bitcoin Invest in Digital Gold, Wallet Technology Book and Anonymous Altcoins Rating: 0 out of 5 stars0 ratingsAdvanced OSINT Strategies: Online Investigations And Intelligence Gathering Rating: 0 out of 5 stars0 ratingsThe Basics of Hacking Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsSocial Engineering for Beginners: Manipulating Minds, Securing Systems Rating: 5 out of 5 stars5/5How Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsOWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks Rating: 0 out of 5 stars0 ratingsCybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity Rating: 5 out of 5 stars5/5OSINT Cracking Tools: Maltego, Shodan, Aircrack-NG, Recon-NG Rating: 0 out of 5 stars0 ratingsHACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5Summary of Ellen Notbohm's Ten Things Every Child with Autism Wishes You Knew Rating: 0 out of 5 stars0 ratingsNMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library Rating: 0 out of 5 stars0 ratingsBug Hunting 101: Novice To Virtuoso: Web Application Security For Ethical Hackers Rating: 0 out of 5 stars0 ratingsMastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5OSINT 101 Handbook: Expert-Level Intelligence Gathering: Advanced Reconnaissance, Threat Assessment, And Counterintelligence Rating: 0 out of 5 stars0 ratingsMind Hacking for Self-Mastery Rating: 5 out of 5 stars5/5Hack Your Way to Security Bundle, 2 in 1 Bundle Rating: 0 out of 5 stars0 ratingsHacking for Beginners Rating: 5 out of 5 stars5/5The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Rating: 0 out of 5 stars0 ratingsDarknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsBlue Team Operations: Defense: Operational Security, Incident Response & Digital Forensics Rating: 0 out of 5 stars0 ratingsHacking Wireless With Kali Linux: Learn Fast How To Penetrate Any Wireless Network | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsDigital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsTrojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Rating: 0 out of 5 stars0 ratingsOSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre Rating: 0 out of 5 stars0 ratingsThe Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security Rating: 0 out of 5 stars0 ratingsDefense In Depth: Network Security And Cyber Resilience Rating: 0 out of 5 stars0 ratingsThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsCyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 0 out of 5 stars0 ratingsThe Smartest Person in the Room Rating: 5 out of 5 stars5/5The Enigma Story: The Truth Behind the 'Unbreakable' World War II Cipher Rating: 0 out of 5 stars0 ratingsNine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 4 out of 5 stars4/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5Malware Reverse Engineering: Cracking The Code Rating: 0 out of 5 stars0 ratingsThe Tao of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsFighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Rating: 0 out of 5 stars0 ratingsMetaverse and NFT: Discovering Web 3.0, Investing in Non-fungible Tokens, Virtual Reality, Crypto Gaming, and Art Rating: 0 out of 5 stars0 ratingsNFT: What Malevich Didn't Know Rating: 0 out of 5 stars0 ratingsUnmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Bitcoin For Beginners: Bitcoin, Bitcoin Mining, Cryptography And The Cypherpunk Movement | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsCyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know Rating: 4 out of 5 stars4/5Governance of Enterprise IT based on COBIT 5: A Management Guide Rating: 0 out of 5 stars0 ratingsEthical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 5 out of 5 stars5/5The Secret Life: Three True Stories of the Digital Age Rating: 3 out of 5 stars3/5ISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5See Yourself in Cyber: Security Careers Beyond Hacking Rating: 0 out of 5 stars0 ratingsCompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5Cyber Wargaming: Research and Education for Security in a Dangerous Digital World Rating: 0 out of 5 stars0 ratingsHow To Protect Your Personal Computer: Your Step By Step Guide To Protecting Your Personal Computer Rating: 0 out of 5 stars0 ratingsZero Trust Security: Building Cyber Resilience & Robust Security Postures Rating: 4 out of 5 stars4/5The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Rating: 0 out of 5 stars0 ratingsBitcoin: Everything You Need to Know About Bitcoin Rating: 0 out of 5 stars0 ratingsOSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith Rating: 0 out of 5 stars0 ratingsISO27001/ISO27002:2013: A Pocket Guide Rating: 5 out of 5 stars5/5The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5Metasploit Masterclass For Ethical Hackers: Expert Penetration Testing And Vulnerability Assessment Rating: 0 out of 5 stars0 ratingsHOW TO IMPLEMENT ARTIFICIAL INTELLIGENCE AND CYBERSECURITY IN MODERN BUSINESSES: BASICS AND GUIDES FOR DUMMIES AND BEGINNERS Rating: 0 out of 5 stars0 ratingsHackers & Painters: Big Ideas from the Computer Age Rating: 5 out of 5 stars5/5Building a Cyber Risk Management Program: Evolving Security for the Digital Age Rating: 0 out of 5 stars0 ratingsCloud Security For Dummies Rating: 5 out of 5 stars5/5Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark Rating: 0 out of 5 stars0 ratingsCryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Cybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Maturity Model Certification (CMMC) – A pocket guide Rating: 0 out of 5 stars0 ratingsThe Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5How I Rob Banks: And Other Such Places Rating: 3 out of 5 stars3/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Certified Information Security Manager CISM Study Guide Rating: 5 out of 5 stars5/5CISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Blockchain for Kids, Teens, Adults, and Dummies: Introduction to Crypto Investing and Blockchain Technology in Simple Words Rating: 0 out of 5 stars0 ratingsCybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5The DevSecOps Playbook: Deliver Continuous Security at Speed Rating: 0 out of 5 stars0 ratingsRaising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Ransomware Protection Playbook Rating: 5 out of 5 stars5/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5The Art of Cyber Security: A practical guide to winning the war on cyber crime Rating: 0 out of 5 stars0 ratingsBEYOND BITCOIN INVESTING: Why other cryptocurrencies are so important and easy to make digital cash now Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Rating: 0 out of 5 stars0 ratingsThe Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5The Real Business of Blockchain: How Leaders Can Create Value in a New Digital Age Rating: 5 out of 5 stars5/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Breached!: Why Data Security Law Fails and How to Improve It: 1st Edition Rating: 5 out of 5 stars5/5Cyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsRed Team Operations: Attack: Black Box Hacking, Social Engineering & Web App Scanning Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Reconnaissance 101: Footprinting & Information Gathering: Ethical Hackers Bible To Collect Data About Target Systems Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Alice and Bob Learn Application Security Rating: 5 out of 5 stars5/5Threats: What Every Engineer Should Learn From Star Wars Rating: 5 out of 5 stars5/5Blockchain: The Insights You Need from Harvard Business Review Rating: 4 out of 5 stars4/5CompTIA Security+ (SY0-601) Exam Preparation: Strategies, Study Materials, and Practice Tests Rating: 0 out of 5 stars0 ratingsBlockchain For Dummies Rating: 5 out of 5 stars5/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Rating: 5 out of 5 stars5/5A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsCloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5The CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5There's No Such Thing as Crypto Crime: An Investigative Handbook Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Cybersecurity for Beginners: Protecting Your Online Life Rating: 0 out of 5 stars0 ratingsA Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsThe Invisible Clash: FBI, Shin Bet, and the IRA's Struggle against Domestic War on Terror Rating: 0 out of 5 stars0 ratingsCryptography: A Very Short Introduction Rating: 5 out of 5 stars5/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsCybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Schneier on Security Rating: 4 out of 5 stars4/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Cyber War: The Next Threat to National Security and What to Do About It Rating: 3 out of 5 stars3/5Practical Fraud Prevention: Fraud and AML Analytics for Fintech and eCommerce, Using SQL and Python Rating: 0 out of 5 stars0 ratingsThe Impact of Blockchain: Technology on Industries and Economies Rating: 0 out of 5 stars0 ratingsA Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Rating: 5 out of 5 stars5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Data Privacy Decoded: Navigating Laws and Regulations Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5Generative AI for Data Privacy: Unlocking Innovation, Protecting Rights Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Rating: 5 out of 5 stars5/5Superintelligence on the Horizon: Steering the Course of Cybersecurity Rating: 0 out of 5 stars0 ratingsCyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Cybersecurity Risk Management: A Complete Framework Handbook Rating: 0 out of 5 stars0 ratingsCybersecurity: Safeguarding Your Digital World as a Cyber Sentinel: Strategies for Protecting Against Online Threats Rating: 0 out of 5 stars0 ratingsCrypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Rating: 4 out of 5 stars4/5Cybersecurity Analyst in Healthcare - The Comprehensive Guide Rating: 0 out of 5 stars0 ratingsThe LLM Security Handbook: Building Trustworthy AI Applications Rating: 0 out of 5 stars0 ratingsEthical Hacking Unlocked: A Beginner's Guide to Legal Penetration Testing Rating: 0 out of 5 stars0 ratingsSecurity Awareness For Dummies Rating: 5 out of 5 stars5/5Defending the Drive: : Cybersecurity Strategies for Automotive Electronics Rating: 0 out of 5 stars0 ratingsQuantum Cryptography: Comprehensive Introduction to Security in the Quantum Realm Rating: 0 out of 5 stars0 ratingsCybersecurity Essentials: Protecting Your Digital Life in Today’s World: Strategies, Tools, and Tips for Staying Safe Online Rating: 0 out of 5 stars0 ratingsDistributed Ledger Technology: Navigating the Future of Decentralized Systems Rating: 0 out of 5 stars0 ratingsCombatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning Rating: 0 out of 5 stars0 ratingsSecuring Your Data: A Cybersecurity Guide: Essential Techniques for Safeguarding Your Information Rating: 0 out of 5 stars0 ratingsCryptocurrency Cheats, Hacks, Hints, Tips, And Tricks Every Investor Should Know Rating: 0 out of 5 stars0 ratingsCybersecurity: Protecting Your Digital World: Essential Strategies and Best Practices for Staying Safe Online Rating: 0 out of 5 stars0 ratingsCyber Safe: Protecting Your Digital Life in an Interconnected World Rating: 0 out of 5 stars0 ratingsHuman Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker Rating: 0 out of 5 stars0 ratingsThe Art of Deception: Book Summary & Analysis Rating: 0 out of 5 stars0 ratingsCode Work: Hacking across the US/México Techno-Borderlands Rating: 0 out of 5 stars0 ratingsBlockchain and the Law: The Rule of Code Rating: 4 out of 5 stars4/5CompTIA CASP+: Boost your CompTIA CASP+ prep with cutting-edge audio lessons for peak exam performance! Rating: 0 out of 5 stars0 ratingsThe Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet Rating: 0 out of 5 stars0 ratings
Read what you want, how you want
Discover millions of ebooks, audiobooks, podcasts, and so much more with a free trial.
From $11.99/month after trial. Cancel anytime.