List Headline Image
Updated by ReviewsIN on Mar 08, 2022
 REPORT
ReviewsIN ReviewsIN
Owner
15 items   1 followers   0 votes   5 views

Buy Best Amazon Selling Audio Books in Computer Security & Encryption

Social Engineering, Second Edition: The Science of Human Hacking

Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.

Amazon.com: Hacking with Kali Linux: Wireless Penetration: A Beginner's Guide with Practical Examples to Learn to Cre...

Do you want to be able to protect your valuable information and any other important data that is on your system and keep it away from a hacker who wants to use it maliciously?

Would you like to be able to protect your system and learn more about the different methods hackers can use to get onto your computer through your wireless network?

Wireless networks have changed the way that we are able to interact with our systems and with technology. In the past, we relied on a wired service that kept us in one place or jumping from one computer to the next. Today, most devices, including phones, tablets, and computers, are mobile and can be used anywhere, thanks to the wireless network that seems to be everywhere. While this is great news for most people, we have to be aware that there are some problems that can arise and any vulnerabilities that a hacker would like to take advantage of.

Hacking for Beginners: Everything You Need to Know to Become an Elite Hacker

Welcome to the wonderful world of hacking, a seemingly magical world, crafted out of the heart of mystery and wonder, but an oh so very real world where those who hesitate for even just a moment end up in very deep doo-doo, and only the elite have what it takes to survive!

Amazon.com: Scam Me If You Can: Simple Strategies to Outsmart Today's Rip-off Artists (Audible Audio Edition): Frank ...

Are you at risk of being scammed? Former con artist and best-selling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks.

Maybe you're wondering how to make the scam phone calls stop. Perhaps someone has stolen your credit card number. Or you've been a victim of identity theft. Even if you haven't yet been the target of a crime, con artists are always out there, waiting for the right moment to steal your information, your money, and your life.

As one of the world's most respected authorities on the subjects of fraud, forgery, and cyber security, Frank Abagnale knows how scammers work. In Scam Me If You Can, he reveals the latest tricks that today's scammers, hackers, and con artists use to steal your money and personal information - often online and over the phone. Using plain language and vivid examples, Abagnale reveals hundreds of tips, including:

The best way to protect your phone from being hacked
The only time you should ever use a debit card
The one type of photo you should never post on social media
The only conditions under which you should use WiFi networks at the airport
The safest way to use an ATM

Simple CISSP

The CISSP certification is the gold standard for security professionals. This exam resource is up to date for the 2015 CISSP Common Body of Knowledge created by ISC2. Simple CISSP has been intentionally kept as brief as possible without the "fluff" many other tomes include. The audiobook is narrated by the author to ensure all information is conveyed by someone who understands the industry. As a result, all acronyms and security terminology is correctly pronounced and described.

Please note that chapters may not have a descriptive name as displayed on your mobile device - this is limitation of the publishing platform. However, each chapter will always start with the title being read aloud, so it should be fairly simple to scan through chapters when you wish to revisit a subject.

Amazon.com: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (Audible Audio Edition): Glenn...

In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy. As the arguments rage on and the government considers various proposals for reform, it is clear that we have yet to see the full impact of Snowden's disclosures.

Now for the first time, Greenwald fits all the pieces together, recounting his high-intensity 10-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with never-before-seen documents entrusted to him by Snowden himself. Going beyond NSA specifics, Greenwald also takes on the establishment media, excoriating their habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people. Finally, he asks what it means both for individuals and for a nation's political health when a government pries so invasively into the private lives of its citizens - and considers what safeguards and forms of oversight are necessary to protect democracy in the digital age.

Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers...

From elicitation, pretexting, influence, and manipulation, all aspects of social engineering are picked apart, discussed, and explained by using real world examples, personal experience, and the Science & Technology behind them to unraveled the mystery in social engineering.

Kevin Mitnick - one of the most famous social engineers in the world - popularized the term social engineering. He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

"Sandworm is much more than a true-life techno-thriller. It's a tour through a realm that is both invisible and critical to the daily lives of every person alive in the 21st century." (Los Angeles Times)

From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses - from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented 10 billion dollars in damage - the largest, most devastating cyberattack the world had ever seen.

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big ...

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and countermeasures for citizens and consumers in the age of Big Brother and Big Data.

Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility". Mitnick is the world's most famous - and formerly the most wanted - computer hacker. He has hacked in to some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

Amazon.com: Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Audible Audio Editio...

The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom - even democracy itself...

Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone.

With its origins in the earliest days of the Internet, the cDc is full of oddball characters - activists, artists, even future politicians. Many of these hackers have become top executives and advisors walking the corridors of power in Washington and Silicon Valley. The most famous is former Texas Congressman and current presidential candidate Beto O'Rourke, whose time in the cDc set him up to found a tech business, launch an alternative publication in El Paso, and make long-shot bets on unconventional campaigns.

Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge

The CISSP certification is the gold standard for security professionals, but ISC2's official study guide is anything but easy to read. Many books have tried to simplify this but fail to leave behind the $100 words and run-on sentences. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire official study guide and breaks it down into easy-to-absorb chapters with simple language. Tons of examples are included to drive the points home in a way that makes it effortless to remember. This Second Edition has been updated for the 2018 CISSP Body of Knowledge, and covers all 10 domains:

Security and Risk Management

Asset Security Security

Architecture and Engineering

Communication and Network Security

Identity and Access Management (IAM)

Security Assessment and Testing

Security Operations

Software Development Security

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies-and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat-and-mouse game that led through false identities, a host of cities, plenty of close shaves, and to an ultimate showdown with the feds, who would stop at nothing to bring him down.

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world's powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict.

The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes - from crippling infrastructure to sowing discord and doubt - cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran's nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump's first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.

In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery - apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.

Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.

The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent.

  • ReviewsIN,a reviews portal based on the user experience,who uses the products. List items may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission.

  • Tools