- Sciences informatiques (700)
- Sécurité et cryptage (476)
- Histoire et culture (918)

Nouveau chez Audible ?
Top ventes
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De : Christopher Hadnagy
- Lu par : Christopher Hadnagy
- Durée : 9 h et 28 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De : Kevin Mitnick, William L. Simon
- Lu par : Ray Porter
- Durée : 13 h et 59 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Kevin Mitnick was the most elusive computer break-in artist in history....
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De : Kevin Mitnick
- Lu par : Ray Porter
- Durée : 9 h et 17 min
- Version intégrale
-
Global
-
Performance
-
Histoire
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
Social Engineering
- The Art of Human Hacking
- De : Paul Wilson - foreword, Christopher Hadnagy
- Lu par : A. T. Chandler
- Durée : 14 h et 52 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides....
-
La cryptologie
- De : Jacques Stern
- Lu par : Jacques Stern
- Durée : 1 h et 23 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Des mathématiques à la révolution numérique, Jacques Stern, père de la cryptologie française moderne, présente ici son...
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- De : Frank W. Abagnale
- Lu par : Raymond Todd
- Durée : 7 h et 16 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Someone in the U.S. is an identity-theft victim every four seconds. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes....
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De : Christopher Hadnagy
- Lu par : Christopher Hadnagy
- Durée : 9 h et 28 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De : Kevin Mitnick, William L. Simon
- Lu par : Ray Porter
- Durée : 13 h et 59 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Kevin Mitnick was the most elusive computer break-in artist in history....
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De : Kevin Mitnick
- Lu par : Ray Porter
- Durée : 9 h et 17 min
- Version intégrale
-
Global
-
Performance
-
Histoire
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
Social Engineering
- The Art of Human Hacking
- De : Paul Wilson - foreword, Christopher Hadnagy
- Lu par : A. T. Chandler
- Durée : 14 h et 52 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides....
-
La cryptologie
- De : Jacques Stern
- Lu par : Jacques Stern
- Durée : 1 h et 23 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Des mathématiques à la révolution numérique, Jacques Stern, père de la cryptologie française moderne, présente ici son...
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- De : Frank W. Abagnale
- Lu par : Raymond Todd
- Durée : 7 h et 16 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Someone in the U.S. is an identity-theft victim every four seconds. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes....
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- De : Phil Champagne
- Lu par : Stephanie Murphy
- Durée : 7 h et 27 min
- Version intégrale
-
Global
-
Performance
-
Histoire
The book of Satoshi, the collected writings of Satoshi Nakamoto....
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De : Andy Greenberg
- Lu par : Mark Bramhall
- Durée : 12 h et 2 min
- Version intégrale
-
Global
-
Performance
-
Histoire
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it....
-
-
In audible!
- Écrit par : Vincent le 08/01/2020
-
Cybersecurity
- Learn Fast How to Become an InfoSec Pro 3 Books in 1
- De : John Knowles
- Lu par : Scott Clem
- Durée : 14 h
- Version intégrale
-
Global
-
Performance
-
Histoire
Three audiobooks in one deal: book 1: How to Establish Effective Security Management Functions; book 2: How to Apply the NIST Risk Management Framework; book 3: How to Manage Risk, Using the NIST Cybersecurity Framework....
-
Simple CISSP
- De : Phil Martin
- Lu par : Phil Martin
- Durée : 16 h et 55 min
- Version intégrale
-
Global
-
Performance
-
Histoire
The CISSP certification is the gold standard for security professionals....
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- De : Marc Goodman
- Lu par : Robertson Dean, Marc Goodman
- Durée : 20 h et 9 min
- Version intégrale
-
Global
-
Performance
-
Histoire
One of the world's leading authorities on global security, Marc Goodman takes listeners deep into the digital underground....
-
Hacking with Kali Linux: The Ultimate Beginners Guide
- Learn and Practice the Basics of Ethical Hacking and Cybersecurity
- De : Nathan Jones
- Lu par : Daniel Perez
- Durée : 4 h et 3 min
- Version intégrale
-
Global
-
Performance
-
Histoire
This audiobook will teach you exactly how to set up Kali Linux and use it to test your systems for possible weaknesses so that you can patch things up accordingly. It is a complete book on cybersecurity, written with beginners in mind....
-
Hacking with Kali Linux
- A Beginner’s Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security
- De : Zach Codings
- Lu par : Donald Cuddington
- Durée : 5 h
- Version intégrale
-
Global
-
Performance
-
Histoire
Have you always been fascinated by the hackers on TV? Do you want to introduce yourself to the world of hacking? Do you know penetration testing is one of the fastest growing fields? If your answer to these questions is yes then keep reading....
-
Hacking with Kali Linux: 2020 Edition
- Practical Guide to Computer Network Hacking, Encryption, Cybersecurity, Penetration Testing for Beginners. The Secrets of VPN Services, Firewalls and the Linux Command Line.
- De : Jason Callaway
- Lu par : Jason Belvill
- Durée : 3 h et 12 min
- Version intégrale
-
Global
-
Performance
-
Histoire
If you are searching for the fastest way to learn the secrets of a professional hacker, then keep reading...You are about to begin a journey into the deepest areas of the web, which will lead you to understand perfectly the most effective strategies to hack any system you want....
-
Investigating Cryptocurrencies
- Understanding, Extracting, and Analyzing Blockchain Evidence
- De : Nick Furneaux
- Lu par : Christopher Grove
- Durée : 10 h et 22 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market....
-
Hacking for Beginners
- A Step-by-Step Guide to Learn How to Hack Websites, Smartphones, Wireless Networks, Work with Social Engineering, Complete a Penetration Test, and Keep Your Computer Safe
- De : Julian James McKinnon
- Lu par : Ivan Busenius
- Durée : 3 h et 9 min
- Version intégrale
-
Global
-
Performance
-
Histoire
This guidebook is going to spend some time taking a look at the world of hacking and some of the great techniques that come with this type of process as well....
-
The Art of Deception
- Controlling the Human Element of Security
- De : Kevin Mitnick
- Lu par : Nick Sullivan
- Durée : 13 h et 41 min
- Version intégrale
-
Global
-
Performance
-
Histoire
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security....
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- De : Phil Martin
- Lu par : Phil Martin
- Durée : 17 h
- Version intégrale
-
Global
-
Performance
-
Histoire
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire study guide and breaks it into easy-to-absorb chapters....
-
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide
- De : Steve Watkins
- Lu par : Andy Cresswell
- Durée : 53 min
- Version intégrale
-
Global
-
Performance
-
Histoire
An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe....
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- De : Eric Conrad, Seth Misenar, Joshua Feldman
- Lu par : Matthew E. Kelly
- Durée : 10 h et 4 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- De : Joseph Menn
- Lu par : Jonathan Davis
- Durée : 8 h et 11 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
-
The Connected Parent
- An Expert Guide to Parenting in a Digital World
- De : John Palfrey, Urs Gasser
- Lu par : Abby Craden
- Durée : 7 h et 9 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Today's teenagers spend about nine hours per day online. Parents of this ultra-connected generation struggle with decisions completely new to parenting: How can parents help their children gain the most from the best aspects of the digital age? Find out....
-
Blockchain and the Law
- The Rule of Code
- De : Primavera De Filippi, Aaron Wright
- Lu par : Teri Schnaubelt
- Durée : 8 h et 55 min
- Version intégrale
-
Global
-
Performance
-
Histoire
De Filippi and Wright welcome the new possibilities inherent in blockchains. But as Blockchain and the Law makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking....
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De : Kim Zetter
- Lu par : Joe Ochman
- Durée : 13 h
- Version intégrale
-
Global
-
Performance
-
Histoire
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare....
-
-
Excellent!
- Écrit par : Nils le 14/02/2017
-
Cybersecurity Essentials
- De : Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Lu par : Ryan Burke
- Durée : 17 h et 27 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De : Bruce Schneier
- Lu par : Roger Wayne
- Durée : 8 h et 6 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Everything is a computer. Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality....
-
Hacking: 4 Books in 1
- Hacking for Beginners, Hacker Basic Security, Networking Hacking, Kali Linux for Hackers
- De : Erickson Karnel, Coding Hood
- Lu par : Nikola Muckajev
- Durée : 12 h et 13 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Have you always been interested and fascinated by the world of hacking? Do you wish to learn more about networking? Do you want to know how to protect your system from being compromised and learn about advanced security protocols? Then Hacking: 4 Books in 1 is for you....
-
Tools and Weapons
- The Promise and the Peril of the Digital Age
- De : Brad Smith, Carol Ann Browne
- Lu par : Carol Ann Browne, Brad Smith
- Durée : 11 h et 11 min
- Version intégrale
-
Global
-
Performance
-
Histoire
From Microsoft's President and one of the tech industry's wisest thinkers, a frank and thoughtful reckoning with how to balance enormous promise and existential risk as the digitisation of everything accelerates....
-
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
- De : Lance Henderson
- Lu par : James C. Lewis
- Durée : 3 h et 20 min
- Version intégrale
-
Global
-
Performance
-
Histoire
This manual will give you the incognito tools that'll make you a master of anonymity....
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- De : Glenn Greenwald
- Lu par : L. J. Ganser
- Durée : 9 h et 49 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- De : David E. Sanger
- Lu par : Robertson Dean
- Durée : 12 h et 53 min
- Version intégrale
-
Global
-
Performance
-
Histoire
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
-
The Truth Machine
- The Blockchain and the Future of Everything
- De : Michael J Casey, Paul Vigna
- Lu par : Sean Runnette
- Durée : 10 h et 24 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Michael J. Casey and Paul Vigna demystify the blockchain and explain why it can restore personal control over our data, assets, and identities....
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- De : Roger A. Grimes
- Lu par : Jonathan Todd Ross
- Durée : 10 h et 46 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- De : Anthony Hack
- Lu par : Jordan Gunner, Robert Plank
- Durée : 15 h et 41 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you....
-
Unmasking the Social Engineer
- The Human Element of Security
- De : Christopher Hadnagy, Paul F. Kelly, Paul Ekman
- Lu par : Christopher Hadnagy
- Durée : 5 h et 20 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Learn to identify the social engineer by non-verbal behavior....
-
Ethical Hacking
- Complete Tips and Tricks to Ethical Hacking
- De : Joe Grant
- Lu par : Frank Block
- Durée : 4 h et 16 min
- Version intégrale
-
Global
-
Performance
-
Histoire
When you think of hacking, what might come to your mind are complex codes and scripts that only geniuses can understand. Again, the notion created by the media is that malicious people only do hacking for their personal gains....