0 - 500
0
500

CRACK99: The Takedown of a $100 Million Chinese Software Pirate

CRACK99: The Takedown of a $100 Million Chinese Software Pirate

The utterly gripping story of the most outrageous case of cyber piracy prosecuted by the US Department of Justice. A former US Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish:…

Hacking with Kali Linux: A Comprehensive, Step-By-Step Beginner’s Guide to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing

Hacking with Kali Linux: A Comprehensive, Step-By-Step Beginner’s Guide to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing

Are you fascinated by the idea of hacking? Do you want to learn the secrets of ethical hackers? This practical, step-by-step guide audiobook will teach you all you need to know! Hacking is a term that evokes ideas of criminals infiltrating your website or online bank account and either bleeding you dry or causing all…

Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics

Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics

Are you working to transform cybersecurity into a business enabler? Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics is a guide for the modern day cybersecurity leader to put cyber risk into motion and allow cybersecurity operations to enable the business. Topics covered in this book include: The end goal of cyber risk analytics Where to…

Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering

Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering

Ever feel like you don’t even own the hardware and software you paid dearly for?  Ever get the impression that you have to ask for permission before installing or changing a program on your device?  Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads?  You’re not alone.  Half-baked…

Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners

Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners

If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then pay attention….  Two manuscripts in one audiobook:  Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare Ethical Hacking: The Ultimate Beginner’s…

Hacking: Basic Security, Penetration Testing, and How to Hack

Hacking: Basic Security, Penetration Testing, and How to Hack

Do you want to learn how to hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? This easy guide will help transform and increase your hacking skill set. You’ll be excited to see your skills improve drastically…

A Concise Introduction to ISO/IEC 27001:2013

A Concise Introduction to ISO/IEC 27001:2013

A concise introductory guide to the information security management systems (ISMS) standard ISO/IEC 27001:2013. PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.