
NIST Cybersecurity & Privacy Program
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Obtén 2 audiolibros gratis con tu prueba.
Compra ahora por $6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Tom Brooks
Acerca de esta escucha
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public. Our work ranges from specific information that can be put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.
As part of our efforts to cultivate trust in information, systems, and technologies and to help organizations measure and manage risk, we carry out cybersecurity assignments defined by federal statutes, executive orders, and policies, including developing cybersecurity standards and guidelines for federal agencies.
Our cybersecurity activities are driven by the needs of US industry, government agencies, and the broader public, and they are undertaken only if our expertise is appropriate for NIST, which is a non-regulatory agency, and can make a difference. We manage very few operational programs, recognizing that other agencies and organizations focus on those aspects of cybersecurity, often using NIST-developed resources to inform their work.
©2021 Tom Brooks (P)2021 Tom BrooksLos oyentes también disfrutaron...
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- De: Bruce Brown
- Narrado por: Frank Block
- Duración: 1 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great supplement to the physical book
- De Andrea Christine en 06-08-24
De: Bruce Brown

-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- De: National Institute of Standards and Technology
- Narrado por: Tom Brooks
- Duración: 1 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
-
His is a scam and should not even be a book
- De Georgia Schmitt en 01-11-25
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- De: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrado por: Gwen Bettwy
- Duración: 5 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- De SMB en 09-21-21
De: Gwen Bettwy, y otros
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- De: Bruce Brown
- Narrado por: Frank Block
- Duración: 1 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great supplement to the physical book
- De Andrea Christine en 06-08-24
De: Bruce Brown

-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- De: National Institute of Standards and Technology
- Narrado por: Tom Brooks
- Duración: 1 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
-
His is a scam and should not even be a book
- De Georgia Schmitt en 01-11-25
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- De: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrado por: Gwen Bettwy
- Duración: 5 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- De SMB en 09-21-21
De: Gwen Bettwy, y otros
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
Cybersecurity for Dummies
- De: Joseph Steinberg
- Narrado por: BJ Harrison
- Duración: 13 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- De Anonymous User en 07-09-21
De: Joseph Steinberg
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- De: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrado por: Matthew E. Kelly
- Duración: 10 h y 4 m
- Versión completa
-
General
-
Narración:
-
Historia
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- De Amazon Customer en 08-24-21
De: Eric Conrad, y otros
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
CISSP All-in-One Exam Guide, Ninth Edition
- De: Fernando Maymi, Shon Harris
- Narrado por: Teri Schnaubelt
- Duración: 51 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2®. CISSP All-in-One Exam Guide, Ninth Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations.
-
-
Comprehensive Knowledge
- De Anonymous User en 05-09-24
De: Fernando Maymi, y otros
-
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
- De: Paul Rosenzweig, The Great Courses
- Narrado por: Paul Rosenzweig
- Duración: 9 h y 41 m
- Grabación Original
-
General
-
Narración:
-
Historia
Cyberspace is the 21st century’s greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.
-
-
A well-packaged set of zero surprises.
- De Todd Algren en 04-24-14
De: Paul Rosenzweig, y otros
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- De: Ben Malisow
- Narrado por: Daniel Henning
- Duración: 16 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- De Customer en 04-22-22
De: Ben Malisow
-
Cybersecurity for Beginners
- De: Raef Meeuwisse
- Narrado por: Danny Eastman
- Duración: 7 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- De keith en 03-25-18
De: Raef Meeuwisse
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- De: Quinn Kiser
- Narrado por: Ivan Busenius
- Duración: 7 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- De Scott Redfern en 10-01-21
De: Quinn Kiser
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- De: Murphy Rangel
- Narrado por: Luciano Marin
- Duración: 3 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
De: Murphy Rangel
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- De: David James Carmack
- Narrado por: Ivan Busenius
- Duración: 3 h y 58 m
- Versión completa
-
General
-
Narración:
-
Historia
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Computer Networking First Step
- The Essential Guide to Networking to Introduce Yourself to The Computer Network Through a Top-Down Approach and Various Infrastructures (Programming)
- De: Tim Wired
- Narrado por: Jacob McNatt
- Duración: 3 h y 53 m
- Versión completa
-
General
-
Narración:
-
Historia
While you may have never thought of networking in detail, this book will introduce you to the basics of networking, the different types of networks available, the types of network topologies that you will encounter, the concept of server virtualization, and details of how to handle network breaches.
-
-
If you don't have a text copy of the book, beware
- De A Consumer en 04-08-20
De: Tim Wired
Relacionado con este tema
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- De Fausto Cepeda en 04-03-19
De: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
Superintelligence
- Paths, Dangers, Strategies
- De: Nick Bostrom
- Narrado por: Napoleon Ryan
- Duración: 14 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- De Gary en 09-12-14
De: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- De: Sean Cannell, Benji Travis
- Narrado por: Sean Cannell, Benji Travis
- Duración: 5 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- De Scott en 08-04-19
De: Sean Cannell, y otros
-
Surveillance Valley
- The Secret Military History of the Internet
- De: Yasha Levine
- Narrado por: LJ Ganser
- Duración: 10 h y 42 m
- Versión completa
-
General
-
Narración:
-
Historia
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
Profound look at the internet and surveillance
- De stuartjash en 04-06-18
De: Yasha Levine
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- De Fausto Cepeda en 04-03-19
De: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
Superintelligence
- Paths, Dangers, Strategies
- De: Nick Bostrom
- Narrado por: Napoleon Ryan
- Duración: 14 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding the future of humanity and intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful - possibly beyond our control.
-
-
Colossus: The Forbin Project is coming
- De Gary en 09-12-14
De: Nick Bostrom
-
YouTube Secrets
- The Ultimate Guide to Growing Your Following and Making Money as a Video Influencer
- De: Sean Cannell, Benji Travis
- Narrado por: Sean Cannell, Benji Travis
- Duración: 5 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
YouTube sensations and best-selling authors Sean Cannell and Benji Travis take your YouTube channel from slow and dormant to accelerated and engaged, using premium and updated YouTube growth tips for creators, business owners, digital entrepreneurs, and influencers. This is the ultimate game plan to grow a following and make money with the power of video.
-
-
Don't use a credit on this. Moderately passable
- De Scott en 08-04-19
De: Sean Cannell, y otros
-
Surveillance Valley
- The Secret Military History of the Internet
- De: Yasha Levine
- Narrado por: LJ Ganser
- Duración: 10 h y 42 m
- Versión completa
-
General
-
Narración:
-
Historia
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
Profound look at the internet and surveillance
- De stuartjash en 04-06-18
De: Yasha Levine
-
Slenderman
- Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls
- De: Kathleen Hale
- Narrado por: Therese Plummer
- Duración: 9 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
On May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two 12-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier’s violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called “Slenderman”. Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.
-
-
Excellent narration
- De Pink Amy en 08-21-22
De: Kathleen Hale
-
The Grid
- The Fraying Wires Between Americans and Our Energy Future
- De: Gretchen Bakke
- Narrado por: Emily Caudwell
- Duración: 11 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
The grid is an accident of history and of culture, in no way intrinsic to how we produce, deliver and consume electrical power. Yet this is the system the United States ended up with, a jerry-built structure now so rickety and near collapse that a strong wind or a hot day can bring it to a grinding halt. The grid is now under threat from a new source: renewable and variable energy, which puts stress on its logics as much as its components.
-
-
A disappointment
- De Ronald en 09-24-16
De: Gretchen Bakke
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- De: Steven Levy
- Narrado por: Mike Chamberlain
- Duración: 20 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- De Dan Collins en 07-01-16
De: Steven Levy
-
Doom Guy
- Life in First Person
- De: John Romero
- Narrado por: John Romero
- Duración: 17 h y 4 m
- Versión completa
-
General
-
Narración:
-
Historia
Doom Guy: Life in First Person is the long-awaited autobiography of gaming’s original rock star and the cocreator of DOOM, Quake, and Wolfenstein—some of the most recognizable and important titles in video game history. Credited with the invention of the first-person shooter, a genre that continues to dominate the market today, he is gaming royalty. Told in remarkable detail, a byproduct of his hyperthymesia, Romero recounts his storied career.
-
-
Intimate stories of gaming history in First Person
- De Emyli en 07-28-23
De: John Romero
-
Prediction Machines
- The Simple Economics of Artificial Intelligence
- De: Ajay Agrawal, Joshua Gans, Avi Goldfarb
- Narrado por: LJ Ganser
- Duración: 7 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Artificial intelligence does the seemingly impossible - driving cars, trading stocks, and teaching children. But facing the sea change that AI will bring can be paralyzing. How should companies set strategies, governments design policies, and people plan their lives for a world so different from what we know? In Prediction Machines, three eminent economists recast the rise of AI as a drop in the cost of prediction. With this single, masterful stroke, they lift the curtain on the AI-is-magic hype and show how basic tools from economics provide clarity about the AI revolution and a basis for action by CEOs, managers, policy makers, investors, and entrepreneurs.
-
-
Not sure what I was expecting, but underwhelmed
- De William J Brown en 09-27-18
De: Ajay Agrawal, y otros
-
Super Pumped
- The Battle for Uber
- De: Mike Isaac
- Narrado por: Holter Graham, Mike Isaac
- Duración: 12 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
A New York Times technology correspondent presents the dramatic rise and fall of Uber, set against the rapid upheaval in Silicon Valley during the mobile era. Based on hundreds of interviews with current and former Uber employees, along with previously unpublished documents, Super Pumped is a pause-resisting story of ambition and deception, obscene wealth, and bad behavior, that explores how blistering technological and financial innovation culminated in one of the most catastrophic 12-month periods in American corporate history.
-
-
A forced narrative and a bad version of Bad Blood
- De Benji en 09-09-19
De: Mike Isaac
-
Tesla
- Inventor of the Electrical Age
- De: W. Bernard Carlson
- Narrado por: Allan Robertson
- Duración: 16 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Nikola Tesla was a major contributor to the electrical revolution that transformed daily life at the turn of the 20th century. His inventions, patents, and theoretical work formed the basis of modern AC electricity, and contributed to the development of radio and television. Like his competitor Thomas Edison, Tesla was one of America's first celebrity scientists, enjoying the company of New York high society and dazzling the likes of Mark Twain with his electrical demonstrations. An astute self-promoter and gifted showman, he cultivated a public image of the eccentric genius.
-
-
A detailed examination of Tesla's work
- De Jean en 02-01-14
-
The Complete Software Developer's Career Guide
- How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job
- De: John Sonmez
- Narrado por: John Sonmez
- Duración: 20 h y 4 m
- Versión completa
-
General
-
Narración:
-
Historia
Technical knowledge alone isn't enough - increase your software development income by leveling up your soft skills Early in his software developer career, John Sonmez discovered that technical knowledge alone isn't enough to break through to the next income level - developers need "soft skills" like the ability to learn new technologies just in time, communicate clearly with management and consulting clients, negotiate a fair hourly rate, and unite teammates and coworkers in working toward a common goal.
-
-
The Complete Bro-grammer's Career Guide
- De Leels en 09-18-19
De: John Sonmez
-
Millennium
- From Religion to Revolution: How Civilization Has Changed over a Thousand Years
- De: Ian Mortimer
- Narrado por: John Lee
- Duración: 15 h y 14 m
- Versión completa
-
General
-
Narración:
-
Historia
In Millennium, best-selling historian Ian Mortimer takes the listener on a whirlwind tour of the last 10 centuries of Western history. It is a journey into a past vividly brought to life and bursting with ideas, that pits one century against another in his quest to measure which century saw the greatest change. We journey from a time when there was a fair chance of your village being burned to the ground by invaders - and dried human dung was a recommended cure for cancer - to a world in which explorers sailed into the unknown and civilizations came into conflict.
-
-
Bad ending - literally
- De John Gordon en 12-14-16
De: Ian Mortimer
-
Glow Kids
- How Screen Addiction Is Hijacking Our Kids - and How to Break the Trance
- De: Nicholas Kardaras PhD
- Narrado por: Jonathan Davis
- Duración: 11 h y 5 m
- Versión completa
-
General
-
Narración:
-
Historia
In Glow Kids, Dr. Nicholas Kardaras will examine how technology - more specifically, age-inappropriate screen tech, with all of its glowing ubiquity - has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis.
-
-
Fear Mongering - a modern day Mazes and Monsters
- De Veronica en 11-03-20
-
Algorithms of Oppression
- How Search Engines Reinforce Racism
- De: Safiya Umoja Noble
- Narrado por: Shayna Small
- Duración: 6 h y 21 m
- Versión completa
-
General
-
Narración:
-
Historia
Run a Google search for “black girls” - what will you find? “Big Booty” and other sexually explicit terms are likely to come up as top search terms. But, if you type in “white girls”, the results are radically different. The suggested porn sites and un-moderated discussions about “why black women are so sassy” or “why black women are so angry” presents a disturbing portrait of black womanhood in modern society. In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search engines like Google offer an equal playing field for all forms of ideas, identities, and activities.
-
-
Read this book. Tell everyone you know about it.
- De Joshua Daniel-Wariya en 06-06-19
-
The Box
- How the Shipping Container Made the World Smaller and the World Economy Bigger
- De: Marc Levinson
- Narrado por: Adam Lofbomm
- Duración: 12 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
In April 1956, a refitted oil tanker carried 58 shipping containers from Newark to Houston. From that modest beginning, container shipping developed into a huge industry that made the boom in global trade possible. The Box tells the dramatic story of the container's creation, the decade of struggle before it was widely adopted, and the sweeping economic consequences of the sharp fall in transportation costs that containerization brought about.
-
-
Fascinating Topic sometimes lost in minutiae
- De zombie64 en 07-15-14
De: Marc Levinson
Lo que los oyentes dicen sobre NIST Cybersecurity & Privacy Program
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- UMPiloto
- 04-03-23
Narrator Pronounces ‘Cryptography’ Incorrectly
The narrator continually pronounced ‘cryptography’ incorrectly in the first section, so I couldn’t keep listening…it was just too distracting.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña