NIST Cybersecurity & Privacy Program and Cyber Security, a Battle We Can't Lose
Start Protecting Your Personal and Business Data
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Tom Brooks
-
By:
-
NIST
-
Tom Brooks
About this listen
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public. Our work ranges from specific information that can be put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.
As part of our efforts to cultivate trust in information, systems, and technologies and to help organizations measure and manage risk, we carry out cybersecurity assignments defined by federal statutes, executive orders, and policies, including developing cybersecurity standards and guidelines for federal agencies.
Cybercrimes are increasing each day. With the advent of cyber-crimes, cybercriminals are getting smarter by adopting effective techniques. They can leak your personal information such as your social security, bank account details, credit card numbers, and so much more. No matter what profession we have, we are dependent on laptops. Downloading antiviruses is not enough to protect your system from hacking. You need to have a proper cybersecurity system so that there is no chance of hacking.
We need to have cybersecurity. Cybercrimes are increasing every day because of the exposure to the information related to our identity that is readily available on cloud services. This is a complete guide that will provide you with all the necessary information that you would want to know about cyber security. If you have been a victim of cybercrime, or you are looking for ways to protect your system, then you chose the right book. The thing is that although cyber crimes are getting the government's attention, and the government has managed to take action, we should always remain alert so that we can avoid their occurrence completely.
What this book will inform you:
- The cyber security world
- What really is cyber
- What are cyber security risks and issues we are facing?
- Cyber warfare and attacks against companies
- What is hacking?
- How to protect yourself?
- Best practices
Listeners also enjoyed...
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great supplement to the physical book
- By Andrea Christine on 06-08-24
By: Bruce Brown
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 1 hr and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- By: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrated by: Gwen Bettwy
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- By SMB on 09-21-21
By: Gwen Bettwy, and others
-
Blockchain: Two Books
- The Complete Edition on the Blockchain Basics, Technology and Its Application in Cryptocurrency and Other Industries That Are Happening Now
- By: Lee Sebastian
- Narrated by: John Flemming
- Length: 3 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Need to learn blockchain quickly? This crash course will get you up to speed on the basics quickly. This two-in-one audiobook bundle covers all important aspects of blockchain and its applications, especially in cryptocurrency.
By: Lee Sebastian
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- By Cristen Mini on 01-15-24
By: Matthew K. Sharp, and others
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great supplement to the physical book
- By Andrea Christine on 06-08-24
By: Bruce Brown
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 1 hr and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- By: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrated by: Gwen Bettwy
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- By SMB on 09-21-21
By: Gwen Bettwy, and others
-
Blockchain: Two Books
- The Complete Edition on the Blockchain Basics, Technology and Its Application in Cryptocurrency and Other Industries That Are Happening Now
- By: Lee Sebastian
- Narrated by: John Flemming
- Length: 3 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Need to learn blockchain quickly? This crash course will get you up to speed on the basics quickly. This two-in-one audiobook bundle covers all important aspects of blockchain and its applications, especially in cryptocurrency.
By: Lee Sebastian
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- By Cristen Mini on 01-15-24
By: Matthew K. Sharp, and others
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
How to Measure Anything in Cybersecurity Risk
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Patrick Cronin
- Length: 10 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
-
Not appropriate for audio, buy a hard copy instead
- By Wanderer on 01-20-17
By: Douglas W. Hubbard, and others
-
CISSP All-in-One Exam Guide, Ninth Edition
- By: Fernando Maymi, Shon Harris
- Narrated by: Teri Schnaubelt
- Length: 51 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2®. CISSP All-in-One Exam Guide, Ninth Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations.
-
-
Comprehensive Knowledge
- By Anonymous User on 05-09-24
By: Fernando Maymi, and others
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- By: Noah Zhang
- Narrated by: Gary Westphalen
- Length: 2 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Our society has become saturated with internet-connected devices and trackers everywhere. From home routers to your mobile phones, most people are easily hacked if targeted. In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual.
-
-
Wonderful experience
- By Byars on 10-21-19
By: Noah Zhang
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- By Customer on 04-22-22
By: Ben Malisow
-
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
- By: Paul Rosenzweig, The Great Courses
- Narrated by: Paul Rosenzweig
- Length: 9 hrs and 41 mins
- Original Recording
-
Overall
-
Performance
-
Story
Cyberspace is the 21st century’s greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.
-
-
A well-packaged set of zero surprises.
- By Todd Algren on 04-24-14
By: Paul Rosenzweig, and others
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
Related to this topic
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- By: Sean Cannell, Benji Travis
- Narrated by: Sean Cannell, Benji Travis
- Length: 5 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- By Scott on 08-04-19
By: Sean Cannell, and others
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- By: Gretchen Bakke
- Narrated by: Emily Caudwell
- Length: 11 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- By Ronald on 09-24-16
By: Gretchen Bakke
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- By: Sean Cannell, Benji Travis
- Narrated by: Sean Cannell, Benji Travis
- Length: 5 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- By Scott on 08-04-19
By: Sean Cannell, and others
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- By: Gretchen Bakke
- Narrated by: Emily Caudwell
- Length: 11 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- By Ronald on 09-24-16
By: Gretchen Bakke
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
Doom Guy
- Life in First Person
- By: John Romero
- Narrated by: John Romero
- Length: 17 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Doom Guy: Life in First Person is the long-awaited autobiography of gaming’s original rock star and the cocreator of DOOM, Quake, and Wolfenstein—some of the most recognizable and important titles in video game history. Credited with the invention of the first-person shooter, a genre that continues to dominate the market today, he is gaming royalty. Told in remarkable detail, a byproduct of his hyperthymesia, Romero recounts his storied career.
-
-
Intimate stories of gaming history in First Person
- By Emyli on 07-28-23
By: John Romero
-
Slenderman
- Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls
- By: Kathleen Hale
- Narrated by: Therese Plummer
- Length: 9 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
On May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two 12-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier’s violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called “Slenderman”. Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.
-
-
Excellent narration
- By Pink Amy on 08-21-22
By: Kathleen Hale
-
Tesla
- Inventor of the Electrical Age
- By: W. Bernard Carlson
- Narrated by: Allan Robertson
- Length: 16 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Nikola Tesla was a major contributor to the electrical revolution that transformed daily life at the turn of the 20th century. His inventions, patents, and theoretical work formed the basis of modern AC electricity, and contributed to the development of radio and television. Like his competitor Thomas Edison, Tesla was one of America's first celebrity scientists, enjoying the company of New York high society and dazzling the likes of Mark Twain with his electrical demonstrations. An astute self-promoter and gifted showman, he cultivated a public image of the eccentric genius.
-
-
A detailed examination of Tesla's work
- By Jean on 02-01-14
-
The Complete Software Developer's Career Guide
- How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job
- By: John Sonmez
- Narrated by: John Sonmez
- Length: 20 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technical knowledge alone isn't enough - increase your software development income by leveling up your soft skills Early in his software developer career, John Sonmez discovered that technical knowledge alone isn't enough to break through to the next income level - developers need "soft skills" like the ability to learn new technologies just in time, communicate clearly with management and consulting clients, negotiate a fair hourly rate, and unite teammates and coworkers in working toward a common goal.
-
-
The Complete Bro-grammer's Career Guide
- By Leels on 09-18-19
By: John Sonmez
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
Millennium
- From Religion to Revolution: How Civilization Has Changed over a Thousand Years
- By: Ian Mortimer
- Narrated by: John Lee
- Length: 15 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Millennium, best-selling historian Ian Mortimer takes the listener on a whirlwind tour of the last 10 centuries of Western history. It is a journey into a past vividly brought to life and bursting with ideas, that pits one century against another in his quest to measure which century saw the greatest change. We journey from a time when there was a fair chance of your village being burned to the ground by invaders - and dried human dung was a recommended cure for cancer - to a world in which explorers sailed into the unknown and civilizations came into conflict.
-
-
Bad ending - literally
- By John Gordon on 12-14-16
By: Ian Mortimer
-
Glow Kids
- How Screen Addiction Is Hijacking Our Kids - and How to Break the Trance
- By: Nicholas Kardaras PhD
- Narrated by: Jonathan Davis
- Length: 11 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Glow Kids, Dr. Nicholas Kardaras will examine how technology - more specifically, age-inappropriate screen tech, with all of its glowing ubiquity - has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis.
-
-
Fear Mongering - a modern day Mazes and Monsters
- By Veronica on 11-03-20
-
Super Pumped
- The Battle for Uber
- By: Mike Isaac
- Narrated by: Holter Graham, Mike Isaac
- Length: 12 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
A New York Times technology correspondent presents the dramatic rise and fall of Uber, set against the rapid upheaval in Silicon Valley during the mobile era. Based on hundreds of interviews with current and former Uber employees, along with previously unpublished documents, Super Pumped is a pause-resisting story of ambition and deception, obscene wealth, and bad behavior, that explores how blistering technological and financial innovation culminated in one of the most catastrophic 12-month periods in American corporate history.
-
-
A forced narrative and a bad version of Bad Blood
- By Benji on 09-09-19
By: Mike Isaac
-
Prediction Machines
- The Simple Economics of Artificial Intelligence
- By: Ajay Agrawal, Joshua Gans, Avi Goldfarb
- Narrated by: LJ Ganser
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence does the seemingly impossible - driving cars, trading stocks, and teaching children. But facing the sea change that AI will bring can be paralyzing. How should companies set strategies, governments design policies, and people plan their lives for a world so different from what we know? In Prediction Machines, three eminent economists recast the rise of AI as a drop in the cost of prediction. With this single, masterful stroke, they lift the curtain on the AI-is-magic hype and show how basic tools from economics provide clarity about the AI revolution and a basis for action by CEOs, managers, policy makers, investors, and entrepreneurs.
-
-
Not sure what I was expecting, but underwhelmed
- By William J Brown on 09-27-18
By: Ajay Agrawal, and others
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- By: Phil Champagne
- Narrated by: Stephanie Murphy
- Length: 7 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Book of Satoshi, the collected writings of Satoshi Nakamoto, creator of the bitcoin. The foreword was written by Jeff Berwick.
-
-
Great historic read that'll teach the blockchain
- By Peter Hanson on 05-19-16
By: Phil Champagne