Nouveau chez Audible ?
Top ventes
-
Cyber Wars
- Hacks That Shocked the Business World
- De : Charles Arthur
- Lu par : Joe Jameson
- Durée : 7 h et 40 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are....
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- De : Mike Chapple, James Michael Stewart, Darril Gibson
- Lu par : Tom Parks
- Durée : 65 h et 38 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with...
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- De : Eric Conrad, Seth Misenar, Joshua Feldman
- Lu par : Matthew E. Kelly
- Durée : 10 h et 4 min
- Version intégrale
-
Global3
-
Performance2
-
Histoire2
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De : Kevin Mitnick, William L. Simon
- Lu par : Ray Porter
- Durée : 13 h et 59 min
- Version intégrale
-
Global8
-
Performance7
-
Histoire7
Kevin Mitnick was the most elusive computer break-in artist in history....
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De : Andy Greenberg
- Lu par : Mark Bramhall
- Durée : 12 h et 2 min
- Version intégrale
-
Global6
-
Performance5
-
Histoire5
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true...
-
-
In audible!
- Écrit par : Vincent le 08/01/2020
-
The Art of Deception
- Controlling the Human Element of Security
- De : Kevin D. Mitnick, William L. Simon, Steve Wozniak
- Lu par : Nick Sullivan
- Durée : 13 h et 41 min
- Version intégrale
-
Global2
-
Performance0
-
Histoire0
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since...
-
Cyber Wars
- Hacks That Shocked the Business World
- De : Charles Arthur
- Lu par : Joe Jameson
- Durée : 7 h et 40 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are....
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- De : Mike Chapple, James Michael Stewart, Darril Gibson
- Lu par : Tom Parks
- Durée : 65 h et 38 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with...
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- De : Eric Conrad, Seth Misenar, Joshua Feldman
- Lu par : Matthew E. Kelly
- Durée : 10 h et 4 min
- Version intégrale
-
Global3
-
Performance2
-
Histoire2
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De : Kevin Mitnick, William L. Simon
- Lu par : Ray Porter
- Durée : 13 h et 59 min
- Version intégrale
-
Global8
-
Performance7
-
Histoire7
Kevin Mitnick was the most elusive computer break-in artist in history....
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De : Andy Greenberg
- Lu par : Mark Bramhall
- Durée : 12 h et 2 min
- Version intégrale
-
Global6
-
Performance5
-
Histoire5
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true...
-
-
In audible!
- Écrit par : Vincent le 08/01/2020
-
The Art of Deception
- Controlling the Human Element of Security
- De : Kevin D. Mitnick, William L. Simon, Steve Wozniak
- Lu par : Nick Sullivan
- Durée : 13 h et 41 min
- Version intégrale
-
Global2
-
Performance0
-
Histoire0
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since...
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- De : Phil Champagne
- Lu par : Stephanie Murphy
- Durée : 7 h et 27 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
The book of Satoshi, the collected writings of Satoshi Nakamoto....
-
The New Architecture
- A Structural Revolution in Cybersecurity
- De : Doug Collins
- Lu par : John Phillips
- Durée : 7 h et 34 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
Written by a career cybersecurity consultant who has worked with the military and financial institutions — the systems discussed are the ones he spent his career protecting.
-
Hacke-moi si tu peux
- Mémoires d’un cyberpirate repenti
- De : Florent Curtet, Sophie Garcin
- Lu par : Cédric Dumond
- Durée : 4 h et 36 min
- Version intégrale
-
Global47
-
Performance35
-
Histoire35
Mémoires d'un cyberpirate repenti. Enfant génial et hyperactif, Florent voit dans l'ordinateur le complice d'une vie. Cette machine qui grandira en même temps que...
-
-
Un domaine de Hacker jadis inconnu
- Écrit par : jean pierre le 13/03/2024
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De : Bruce Schneier
- Lu par : Roger Wayne
- Durée : 8 h et 6 min
- Version intégrale
-
Global3
-
Performance2
-
Histoire2
Everything is a computer. Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality....
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- De : Lyn Alden
- Lu par : Guy Swann
- Durée : 17 h et 31 min
- Version intégrale
-
Global6
-
Performance4
-
Histoire4
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
Un scénario optimiste pour bitcoin
- De : Vijay Boyapati, Edouard Gallego - traducteur, Gary Sablon - traducteur, et autres
- Lu par : Jacques Edouard
- Durée : 2 h et 41 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
Un scénario optimiste pour bitcoin est un livre plutôt court et agréable à lire, qui résume très bien les différents arguments en faveur de Bitcoin, idéal pour les débutants mais aussi un très bon rappel pour les connaisseurs.
-
The Invisible Ledger
- Everyday Data Harvesting, Privacy-Preserving Technologies, and the Future of Human-Centered Digital Identity
- De : Limon Biswas
- Lu par : Myriam Berger
- Durée : 1 h et 11 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
Every click, search, swipe, and movement through digital space leaves behind a trace.
-
The Future of Hacking
- The Rise of Cybercrime and the Fight to Keep Us Safe
- De : Laura S. Scherling
- Durée : 5 h et 30 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
The Future of Hacking explores the evolving landscape of cybersecurity, ethical hacking, and digital defense, revealing how hackers protect as much as they attack.
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De : Cliff Stoll
- Lu par : Will Damron
- Durée : 12 h et 46 min
- Version intégrale
-
Global3
-
Performance2
-
Histoire2
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would...
-
-
Génial
- Écrit par : vin le 29/09/2020
-
Le plan d'action cybernétique
- De : Andre Edmond
- Lu par : Cole Mercer
- Durée : 5 h et 51 min
- Version intégrale
-
Global1
-
Performance0
-
Histoire0
Libérez votre potentiel : Faites le saut vers la cybersécurité avec confiance ! Vous êtes un professionnel de l'informatique ou un technicien du service d'assistance cherchant à entrer dans le domaine de la cybersécurité mais vous ne savez pas par où commencer ?
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De : Christopher Hadnagy
- Lu par : Christopher Hadnagy
- Durée : 9 h et 28 min
- Version intégrale
-
Global6
-
Performance5
-
Histoire5
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
-
The New World Economy: A Beginner's Guide
- De : Randy Charles Epping
- Lu par : George Newbern
- Durée : 6 h et 49 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
What is blockchain? What is Bitcoin? How can central banks be instrumental in guiding a nation's economy? What are the underlying causes of trade deficits? Do trade wars actually help the domestic economy? How has the behavior of millennials and Generation Z affected the global economy? Find out...
-
The Practical CISSP Study Guide
- Master the CISSP Exam in Just 30 Days with Step-by-Step Real-World Scenarios and Expert Tips (CISSP Success Series, Book 1)
- De : Taimur Ijlal
- Lu par : Brendan Reese
- Durée : 6 h et 36 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
Master the CISSP domains not just for exam day but for lasting success in your cybersecurity career. Learn complex topics easily with practical examples and proven strategies to help you pass the CISSP exam on your first try.
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- De : Mike Chapple, David Seidl
- Lu par : Ray Greenley
- Durée : 24 h et 52 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You'll explore general...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De : Kevin Mitnick, Robert Vamosi, Mikko Hypponen - introduction
- Lu par : Ray Porter
- Durée : 9 h et 17 min
- Version intégrale
-
Global6
-
Performance5
-
Histoire5
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin...
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601 (Sixth Edition)
- De : Wm. Arthur Conklin, Greg White
- Lu par : Derek Shoales
- Durée : 30 h et 40 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam. Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this...
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- De : Mike Chapple, David Seidl
- Lu par : Ray Greenley
- Durée : 17 h et 20 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You'll find clear and concise information on critical...
-
Certified Ethical Hacker (CEH) Study Guide
- In-Depth Guidance and Practice
- De : Matt Walker
- Lu par : David Stifel
- Durée : 20 h et 27 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
The Certified Ethical Hacker (CEH) exam is not an enjoyable undertaking. But preparing for the exam itself needn't be that way. In this book, IT security and education professional Matt Walker will not only guide you through everything you need to pass the exam, but do so in a way that is...
-
NIST Cybersecurity Framework (CSF) for Information Systems Security
- De : Bruce Brown
- Lu par : Kim Pepper
- Durée : 8 h et 25 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security....
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- De : P. W. Singer, Allan Friedman
- Lu par : Sean Pratt
- Durée : 11 h et 29 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
In Cybersecurity and Cyberwar: What Everyone Needs to Know, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively...
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- De : Mike Chapple, David Seidl
- Lu par : Daniel Henning
- Durée : 19 h et 40 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test...
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- De : Phillip L. Wylie, Kim Crawley
- Lu par : Matthew Josdal
- Durée : 6 h et 22 min
- Version intégrale
-
Global2
-
Performance1
-
Histoire1
Jump-start your new and exciting career as a penetration tester. The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity...
-
-
excellent content
- Écrit par : Alfio Muschio le 25/11/2021
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- De : Joseph Menn
- Lu par : Jonathan Davis, Joseph Menn
- Durée : 6 h et 35 min
- Version intégrale
-
Global1
-
Performance1
-
Histoire1
The shocking untold story of the elite secret society of hackers fighting to protect our freedom, “a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age” (The New York Times Book Review) Cult of the Dead Cow is the tale of the oldest...
-
Cryptography
- A Very Short Introduction
- De : Fred Piper, Sean Murphy
- Lu par : L. J. Ganser
- Durée : 4 h et 26 min
- Version intégrale
-
Global0
-
Performance0
-
Histoire0
This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are...
Le genre littéraire jeunesse
Bref historique du genre
Les auteurs internationaux et français de jeunesse les plus populaires
- J.K. Rowling, auteur de la série “Harry Potter“
- Rick Riordan, auteur de la série “Percy Jackson“
- Roald Dahl, auteur de “Charlie et la chocolaterie“
- En France, on peut citer Timothée de Fombelle, Marie-Aude Murail et Jean-Claude Mourlevat.
Les sous-genres les plus populaires
- La littérature d'aventure
- La science-fiction
- La fantaisie
- La romance
- Le réalisme
