Zero Trust Security Demystified
Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
KC Wayman
-
By:
-
L.D. Knowings
About this listen
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets
Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach?
We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
But all hope is not lost.
There’s a new knight in shining armor that promises to turn the tide in our favor–Zero Trust Security.
Step into a future where your digital assets are well-guarded with the help of this must-have guide. Inside, you'll discover:
- The fundamentals and principles of Zero Trust Security–set yourself on the right path to fortify your digital fortress
- The alarming cyber threat landscape of today… and how Zero Trust Security is a beacon of hope amidst it
- The pillars of Zero Trust Architecture (plus their instrumental role in safeguarding your data)
- The technological aspects and critical considerations for Zero Trust implementation
- How to operationalize Zero Trust… and ensure it's not just a strategy but your new reality
- The complex interplay between compliance, regulations, and Zero Trust–navigate the complexities of legal requirements with confidence
- Practical strategies to tackle the challenges and barriers in Zero Trust adoption
And much more!
With this book’s straightforward explanations, direct insights, and actionable tips and strategies for seamless integration, you’ll find yourself seamlessly navigating the complex world of Zero Trust Security in no time.
The future of cybersecurity is Zero Trust. Are you 100% ready for it? Click "Add to Cart" right now.
©2023 Keyven Lewis (P)2024 Keyven LewisListeners also enjoyed...
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- By: Taimur Ijlal
- Narrated by: Craig Neutzling
- Length: 1 hr and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
-
ZT
- By George on 04-14-24
By: Taimur Ijlal
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- By: Razi Rais, Christina Morillo, Evan Gilman, and others
- Narrated by: Mike Chamberlain
- Length: 12 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
By: Razi Rais, and others
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing. Authored by seasoned cybersecurity experts, this comprehensive book provides an immersive journey through the critical principles, methodologies, and practical applications needed to navigate the CompTIA Pentest+ Certification.
-
-
This is not a good guide for the exam at all…waste of time and money.
- By Rob F. on 10-09-24
By: Jake T Mills
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- By: Jake T. Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies. Each question is accompanied by detailed explanations and insights into the reasoning behind the correct answers, helping you grasp the underlying concepts thoroughly.
-
-
Very basic, not helpful for testing
- By Michael R. Young on 03-02-24
By: Jake T. Mills
-
OSCP Offensive Security Certified Professional
- Practice Tests with Answers to Pass the OSCP Ethical Hacking Certification Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether you're a budding cybersecurity enthusiast or a seasoned professional seeking to fortify your skill set, this book is your gateway to success. Equip yourself with the knowledge, strategies, and expertise essential not just for acing an exam, but for thriving in a dynamic cybersecurity career.
-
-
Not an OSCP book. Mistitled
- By bret burkert on 12-18-24
By: Jake T Mills
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
By: Cindy Green-Ortiz, and others
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- By: Taimur Ijlal
- Narrated by: Craig Neutzling
- Length: 1 hr and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
-
ZT
- By George on 04-14-24
By: Taimur Ijlal
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- By: Razi Rais, Christina Morillo, Evan Gilman, and others
- Narrated by: Mike Chamberlain
- Length: 12 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
By: Razi Rais, and others
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing. Authored by seasoned cybersecurity experts, this comprehensive book provides an immersive journey through the critical principles, methodologies, and practical applications needed to navigate the CompTIA Pentest+ Certification.
-
-
This is not a good guide for the exam at all…waste of time and money.
- By Rob F. on 10-09-24
By: Jake T Mills
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- By: Jake T. Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies. Each question is accompanied by detailed explanations and insights into the reasoning behind the correct answers, helping you grasp the underlying concepts thoroughly.
-
-
Very basic, not helpful for testing
- By Michael R. Young on 03-02-24
By: Jake T. Mills
-
OSCP Offensive Security Certified Professional
- Practice Tests with Answers to Pass the OSCP Ethical Hacking Certification Exam
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether you're a budding cybersecurity enthusiast or a seasoned professional seeking to fortify your skill set, this book is your gateway to success. Equip yourself with the knowledge, strategies, and expertise essential not just for acing an exam, but for thriving in a dynamic cybersecurity career.
-
-
Not an OSCP book. Mistitled
- By bret burkert on 12-18-24
By: Jake T Mills
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
By: Cindy Green-Ortiz, and others
-
Microsoft Certified Azure Administrator
- The Ultimate Guide to Practice Test Questions, Answers, and Master the Associate Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether you're an Azure enthusiast aiming to validate your skills or an IT professional seeking to enhance your career prospects, this book will empower you to become a certified Azure Administrator Associate. With a solid grasp of Azure's key principles and hands-on expertise, you'll be well-prepared to meet the growing demand for Azure administrators in today's competitive job market. Start your journey to certification success today.
-
-
Aspiring
- By Anonymous User on 11-27-23
By: Jamie Murphy
-
Generative Artificial Intelligence for Beginners
- Unravel the Mysteries of AI with Ease and Confidence through Practical Guides, Ethical Insights, and Real-World Applications
- By: Gwen Taylor
- Narrated by: Lee Goettl
- Length: 4 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
Comprehensive Guide to Remarriage Success offers essential advice, proven strategies, and real-life insights to help you navigate the complexities of remarriage and build a strong, joyful partnership.
-
-
Seems AI generated
- By Pap Lőrinc on 07-20-24
By: Gwen Taylor
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great supplement to the physical book
- By Andrea Christine on 06-08-24
By: Bruce Brown
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
Computer Networking
- An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and Hacking
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area.
-
-
Clear & Direct is donations
- By Dillon on 07-18-24
By: Quinn Kiser
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- By: Taimur Ijlal
- Narrated by: Sean Oblak
- Length: 1 hr and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced. However, this topic can be quite challenging for newcomers who want to understand the governance and cyber-security risks that AI introduces. This book assumes zero prior knowledge of AI or machine learning and explains in an easy-to-understand way how to govern and secure AI.
-
-
Recommended for anyone who is interested in Artificial Intelligence
- By Anonymous User on 07-18-22
By: Taimur Ijlal
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- By: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, and others
- Narrated by: The Voice Gallery
- Length: 8 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
-
-
A Must for Aspiring Cybersecurity Professionals
- By Chuck S on 02-12-23
By: Dr. Gerald Auger, and others
-
The Kubernetes Book
- By: Nigel Poulton
- Narrated by: Nigel Poulton
- Length: 4 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
Containers are revolutionizing the way we build, ship, and run our applications. But like all good things, they come with their own set of challenges. This is where Kubernetes enters the scene. Kubernetes helps you deploy and manage containerized applications at scale. With Kubernetes, you can develop your applications on your laptop, deploy to your chosen cloud platform, migrate to a different cloud platform, and even migrate to your private cloud at your on-premises datacenter.
-
-
Finally a technical book for Audible
- By Dave K on 08-28-19
By: Nigel Poulton
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Spelling 1-100 for Kids
- By: Sarah Johnson
- Narrated by: Tiffany Peacock
- Length: 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
This engaging and educational book is designed to help children aged 3 to 9 learn how to spell numbers from 1 to 100. Through fun activities, and easy-to-follow exercises, young listeners are introduced to the world of numbers in a playful and interactive way. Each number is spelt making it easier for children to associate the numerical value with its written form.
-
-
Perfect.
- By Myrtle Cohen on 10-25-24
By: Sarah Johnson
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- By: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrated by: Gwen Bettwy
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- By SMB on 09-21-21
By: Gwen Bettwy, and others
Related to this topic
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- By: Sean Cannell, Benji Travis
- Narrated by: Sean Cannell, Benji Travis
- Length: 5 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- By Scott on 08-04-19
By: Sean Cannell, and others
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- By: Gretchen Bakke
- Narrated by: Emily Caudwell
- Length: 11 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- By Ronald on 09-24-16
By: Gretchen Bakke
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
The Complete Software Developer's Career Guide
- How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job
- By: John Sonmez
- Narrated by: John Sonmez
- Length: 20 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technical knowledge alone isn't enough - increase your software development income by leveling up your soft skills Early in his software developer career, John Sonmez discovered that technical knowledge alone isn't enough to break through to the next income level - developers need "soft skills" like the ability to learn new technologies just in time, communicate clearly with management and consulting clients, negotiate a fair hourly rate, and unite teammates and coworkers in working toward a common goal.
-
-
The Complete Bro-grammer's Career Guide
- By Leels on 09-18-19
By: John Sonmez
-
Slenderman
- Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls
- By: Kathleen Hale
- Narrated by: Therese Plummer
- Length: 9 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
On May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two 12-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier’s violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called “Slenderman”. Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.
-
-
Excellent narration
- By Pink Amy on 08-21-22
By: Kathleen Hale
-
Superintelligence
- Paths, Dangers, Strategies
- By: Nick Bostrom
- Narrated by: Napoleon Ryan
- Length: 14 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- By Gary on 09-12-14
By: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- By: Sean Cannell, Benji Travis
- Narrated by: Sean Cannell, Benji Travis
- Length: 5 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- By Scott on 08-04-19
By: Sean Cannell, and others
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- By: Gretchen Bakke
- Narrated by: Emily Caudwell
- Length: 11 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- By Ronald on 09-24-16
By: Gretchen Bakke
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- By: Steven Levy
- Narrated by: Mike Chamberlain
- Length: 20 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- By Dan Collins on 07-01-16
By: Steven Levy
-
The Complete Software Developer's Career Guide
- How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job
- By: John Sonmez
- Narrated by: John Sonmez
- Length: 20 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technical knowledge alone isn't enough - increase your software development income by leveling up your soft skills Early in his software developer career, John Sonmez discovered that technical knowledge alone isn't enough to break through to the next income level - developers need "soft skills" like the ability to learn new technologies just in time, communicate clearly with management and consulting clients, negotiate a fair hourly rate, and unite teammates and coworkers in working toward a common goal.
-
-
The Complete Bro-grammer's Career Guide
- By Leels on 09-18-19
By: John Sonmez
-
Slenderman
- Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls
- By: Kathleen Hale
- Narrated by: Therese Plummer
- Length: 9 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
On May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two 12-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier’s violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called “Slenderman”. Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.
-
-
Excellent narration
- By Pink Amy on 08-21-22
By: Kathleen Hale
-
Doom Guy
- Life in First Person
- By: John Romero
- Narrated by: John Romero
- Length: 17 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Doom Guy: Life in First Person is the long-awaited autobiography of gaming’s original rock star and the cocreator of DOOM, Quake, and Wolfenstein—some of the most recognizable and important titles in video game history. Credited with the invention of the first-person shooter, a genre that continues to dominate the market today, he is gaming royalty. Told in remarkable detail, a byproduct of his hyperthymesia, Romero recounts his storied career.
-
-
Intimate stories of gaming history in First Person
- By Emyli on 07-28-23
By: John Romero
-
Tesla
- Inventor of the Electrical Age
- By: W. Bernard Carlson
- Narrated by: Allan Robertson
- Length: 16 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Nikola Tesla was a major contributor to the electrical revolution that transformed daily life at the turn of the 20th century. His inventions, patents, and theoretical work formed the basis of modern AC electricity, and contributed to the development of radio and television. Like his competitor Thomas Edison, Tesla was one of America's first celebrity scientists, enjoying the company of New York high society and dazzling the likes of Mark Twain with his electrical demonstrations. An astute self-promoter and gifted showman, he cultivated a public image of the eccentric genius.
-
-
A detailed examination of Tesla's work
- By Jean on 02-01-14
-
Prediction Machines
- The Simple Economics of Artificial Intelligence
- By: Ajay Agrawal, Joshua Gans, Avi Goldfarb
- Narrated by: LJ Ganser
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial intelligence does the seemingly impossible - driving cars, trading stocks, and teaching children. But facing the sea change that AI will bring can be paralyzing. How should companies set strategies, governments design policies, and people plan their lives for a world so different from what we know? In Prediction Machines, three eminent economists recast the rise of AI as a drop in the cost of prediction. With this single, masterful stroke, they lift the curtain on the AI-is-magic hype and show how basic tools from economics provide clarity about the AI revolution and a basis for action by CEOs, managers, policy makers, investors, and entrepreneurs.
-
-
Not sure what I was expecting, but underwhelmed
- By William J Brown on 09-27-18
By: Ajay Agrawal, and others
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Millennium
- From Religion to Revolution: How Civilization Has Changed over a Thousand Years
- By: Ian Mortimer
- Narrated by: John Lee
- Length: 15 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Millennium, best-selling historian Ian Mortimer takes the listener on a whirlwind tour of the last 10 centuries of Western history. It is a journey into a past vividly brought to life and bursting with ideas, that pits one century against another in his quest to measure which century saw the greatest change. We journey from a time when there was a fair chance of your village being burned to the ground by invaders - and dried human dung was a recommended cure for cancer - to a world in which explorers sailed into the unknown and civilizations came into conflict.
-
-
Bad ending - literally
- By John Gordon on 12-14-16
By: Ian Mortimer
-
Surveillance Valley
- The Secret Military History of the Internet
- By: Yasha Levine
- Narrated by: LJ Ganser
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
Profound look at the internet and surveillance
- By stuartjash on 04-06-18
By: Yasha Levine
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- By: Phil Champagne
- Narrated by: Stephanie Murphy
- Length: 7 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Book of Satoshi, the collected writings of Satoshi Nakamoto, creator of the bitcoin. The foreword was written by Jeff Berwick.
-
-
Great historic read that'll teach the blockchain
- By Peter Hanson on 05-19-16
By: Phil Champagne
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Glow Kids
- How Screen Addiction Is Hijacking Our Kids - and How to Break the Trance
- By: Nicholas Kardaras PhD
- Narrated by: Jonathan Davis
- Length: 11 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Glow Kids, Dr. Nicholas Kardaras will examine how technology - more specifically, age-inappropriate screen tech, with all of its glowing ubiquity - has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis.
-
-
Fear Mongering - a modern day Mazes and Monsters
- By Veronica on 11-03-20
-
On Intelligence
- By: Jeff Hawkins, Sandra Blakeslee
- Narrated by: Jeff Hawkins, Stefan Rudnicki
- Length: 9 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Jeff Hawkins, the man who created the PalmPilot, Treo smart phone, and other handheld devices, has reshaped our relationship to computers. Now he stands ready to revolutionize both neuroscience and computing in one stroke, with a new understanding of intelligence itself.
-
-
Epiphany
- By James on 03-14-05
By: Jeff Hawkins, and others
-
Super Pumped
- The Battle for Uber
- By: Mike Isaac
- Narrated by: Holter Graham, Mike Isaac
- Length: 12 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
A New York Times technology correspondent presents the dramatic rise and fall of Uber, set against the rapid upheaval in Silicon Valley during the mobile era. Based on hundreds of interviews with current and former Uber employees, along with previously unpublished documents, Super Pumped is a pause-resisting story of ambition and deception, obscene wealth, and bad behavior, that explores how blistering technological and financial innovation culminated in one of the most catastrophic 12-month periods in American corporate history.
-
-
A forced narrative and a bad version of Bad Blood
- By Benji on 09-09-19
By: Mike Isaac
People who viewed this also viewed...
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- By: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, and others
- Narrated by: The Voice Gallery
- Length: 8 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
-
-
A Must for Aspiring Cybersecurity Professionals
- By Chuck S on 02-12-23
By: Dr. Gerald Auger, and others
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You'll find clear and concise information on critical security topics presented by way of practical, real-world examples, chapter reviews, and exam highlights.
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
By: Cindy Green-Ortiz, and others
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever.
-
-
Great book
- By KatieLynn on 10-08-24
By: Joseph Steinberg, and others
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- By: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, and others
- Narrated by: The Voice Gallery
- Length: 8 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
-
-
A Must for Aspiring Cybersecurity Professionals
- By Chuck S on 02-12-23
By: Dr. Gerald Auger, and others
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- By: Mike Chapple, David Seidl
- Narrated by: Ray Greenley
- Length: 17 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You'll find clear and concise information on critical security topics presented by way of practical, real-world examples, chapter reviews, and exam highlights.
-
-
Good book but
- By CODE33301 on 04-08-24
By: Mike Chapple, and others
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
By: Cindy Green-Ortiz, and others
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever.
-
-
Great book
- By KatieLynn on 10-08-24
By: Joseph Steinberg, and others
What listeners say about Zero Trust Security Demystified
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Alison Rose
- 03-17-24
A Blueprint for Secure Environments
Clear and concise explanations make complex concepts easy to understand, while practical examples and case studies illustrate how Zero Trust can be applied in real-world scenarios. Whether you're a security practitioner or a business leader, this book is essential reading for anyone looking to enhance their organization's security posture.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Scott Boone
- 03-14-24
Demystifying Zero Trust: A Must-Read Guide
As someone relatively new to the concept of Zero Trust security, I found this book to be incredibly enlightening. The author does an excellent job of breaking down the key components of Zero Trust and illustrating how they can be applied in real-world scenarios. I finished the book feeling much more confident in my understanding of this critical topic.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Merle Scott
- 03-16-24
Understanding the Essentials
Zero Trust Security Demystified is a comprehensive guide that leaves no stone unturned in its exploration of Zero Trust principles. From its conceptual underpinnings to its practical applications, this book offers readers a deep dive into the world of Zero Trust security. With clear explanations and actionable insights, the author equips readers with the knowledge and tools necessary to build a robust and resilient security infrastructure.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Peter Stone
- 03-14-24
A Comprehensive Dive into Zero Trust Security
Zero Trust Security Demystified is an excellent resource for anyone looking to understand the intricacies of implementing a Zero Trust framework. The book breaks down complex concepts into easily digestible pieces, making it accessible for both beginners and experts in the field. Highly recommended
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Ismael Hughes
- 03-17-24
A Guide to Building Secure Networks
Zero Trust Security Demystified is a must-read guide for anyone tasked with building secure networks in today's digital age. The author's comprehensive approach to Zero Trust provides readers with a deep understanding of its principles and practical strategies for implementation. With clear explanations and actionable insights, this book equips readers with the knowledge and tools needed to protect their organizations from cyber threats.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Kelvin Nichols
- 03-16-24
A Roadmap for Secure Environments
Zero Trust Security Demystified provides a comprehensive roadmap for organizations looking to fortify their cybersecurity defenses. The book carefully elucidates the principles of Zero Trust in a manner that is both accessible and informative. With practical examples and insightful guidance, this book equips readers with the knowledge needed to navigate the ever-evolving threat landscape.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Charlie Osborne
- 03-14-24
Zero Trust Unraveled: A Comprehensive Overview
This book exceeded my expectations in every way. Zero Trust Security Demystified takes a complex topic and breaks it down into manageable chunks without oversimplifying. The author's depth of knowledge is evident throughout, and I finished the book feeling empowered to tackle the challenges of implementing Zero Trust in my organization.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Matt Owen
- 03-16-24
A Practical Approach to Cybersecurity
Zero Trust Security Demystified offers a refreshingly practical approach to cybersecurity in an era of unprecedented threats. The author's expertise shines through as they provide readers with a comprehensive understanding of Zero Trust principles and actionable strategies for implementation. From risk assessment to identity management, this book covers all the bases, making it an invaluable resource for anyone serious about safeguarding their digital assets.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Harry Cole
- 03-16-24
Navigating the New Normal
As the digital landscape continues to evolve, Zero Trust Security Demystified emerges as a timely and indispensable guide. With meticulous attention to detail, the author unpacks the intricacies of Zero Trust, offering practical insights and actionable strategies for implementation. Whether you're a seasoned cybersecurity professional or a newcomer to the field, this book is sure to become a trusted companion in your journey toward enhanced security.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Mona Alexander
- 03-16-24
Cracking the Code of Zero Trust Security
Zero Trust Security Demystified is a revelation in the realm of cybersecurity literature. Through clear and concise prose, the author demystifies the complexities of Zero Trust, making it accessible to readers of all backgrounds. From its foundational principles to real-world applications, this book equips readers with the knowledge and tools necessary to embrace a Zero Trust approach with confidence.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful