A Gentle Introduction to Social Engineering Attack and Prevention
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Timothy Burke
-
By:
-
Stephen Haunts
About this listen
Should that delivery man be walking around the office unattended? Has someone just asked you to hold the door, and you don't recognize them? Do you trust that person trying to befriend you in the bar next to the office?
These are all potential social-engineering plays against you by professional criminals.
Social engineering is one of the biggest threats to our organizations today. Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems.
In this audiobook, we will look at some of the techniques used in social engineering and look at how to guard yourself against them. We will cover subjects like:
- Information gathering
- Pretexting
- Elicitation
- Manipulation
- Personal mitigation techniques
- Corporate mitigation techniques
About the author: Stephen Haunts is an experienced software developer with a focus on Microsoft .NET technologies and security for back-end enterprise systems. Stephen is also a Pluralsight author, blogger at stephenhaunts.com, writer, and international conference speaker at events like NDC London, NDC Oslo, NDC Sydney, Techorama, and SDD Conf. Stephen also runs a user group called Derbyshire Dot Net in the UK.
©2008 Stephen Haunts (P)2018 Stephen HauntsListeners also enjoyed...
-
Social Media Scams: Protect Yourself from Scams
- By: Susan Zeppieri, Francis Zeppieri
- Narrated by: David Van Der Molen
- Length: 1 hr and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you ever come across something online that looks a little bit too good to be true? It might be a competition you’ve won that you didn’t know you’d entered or a new cryptocurrency with a low buy-in price and promised high returns.
By: Susan Zeppieri, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
In the Plex
- How Google Thinks, Works, and Shapes Our Lives
- By: Steven Levy
- Narrated by: L. J. Ganser
- Length: 19 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Few companies in history have ever been as successful and as admired as Google, the company that has transformed the Internet and become an indispensable part of our lives. How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes listeners inside Google headquarters - the Googleplex - to explain how Google works.
-
-
Just ok for me
- By Everyday Mom on 04-23-11
By: Steven Levy
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Digital Gold
- Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money
- By: Nathaniel Popper
- Narrated by: Robert Fass
- Length: 10 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
A New York Times technology and business reporter charts the dramatic rise of Bitcoin and the fascinating personalities who are striving to create a new global money for the Internet age.
-
-
Informative, but dry
- By Tomer on 05-10-16
By: Nathaniel Popper
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Social Media Scams: Protect Yourself from Scams
- By: Susan Zeppieri, Francis Zeppieri
- Narrated by: David Van Der Molen
- Length: 1 hr and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you ever come across something online that looks a little bit too good to be true? It might be a competition you’ve won that you didn’t know you’d entered or a new cryptocurrency with a low buy-in price and promised high returns.
By: Susan Zeppieri, and others
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
In the Plex
- How Google Thinks, Works, and Shapes Our Lives
- By: Steven Levy
- Narrated by: L. J. Ganser
- Length: 19 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Few companies in history have ever been as successful and as admired as Google, the company that has transformed the Internet and become an indispensable part of our lives. How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes listeners inside Google headquarters - the Googleplex - to explain how Google works.
-
-
Just ok for me
- By Everyday Mom on 04-23-11
By: Steven Levy
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Digital Gold
- Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money
- By: Nathaniel Popper
- Narrated by: Robert Fass
- Length: 10 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
A New York Times technology and business reporter charts the dramatic rise of Bitcoin and the fascinating personalities who are striving to create a new global money for the Internet age.
-
-
Informative, but dry
- By Tomer on 05-10-16
By: Nathaniel Popper
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Scams
- Uncover Scams, Lies, Frauds, and Deceit
- By: Cammy Fetchens
- Narrated by: Randy Fuller
- Length: 2 hrs and 12 mins
- Unabridged
-
Overall
-
Performance
-
Story
For all you gullible people out there: Yes, there are lots and lots and lots of scams. And you’ve probably fallen for one or two in the past. If not, great. If you have, then this is just another reason to listen to this guide: so you won’t fall into the snares of the scammers ever again. In this audiobook, the sad, bad side of society will be highlighted. The obscure will be exposed. The sneaky snake oil salesmen will be called out for what they are.
-
-
Cool
- By Steven on 04-21-20
By: Cammy Fetchens
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Hacked Again
- By: Scott N. Schober
- Narrated by: John Pruden
- Length: 3 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
-
-
Very good book
- By Jay Grey on 08-19-23
By: Scott N. Schober
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- By: Brian Krebs
- Narrated by: Christopher Lane
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Risky topic, but Br. Krebs hits it out of the park
- By RRiley on 12-21-14
By: Brian Krebs
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- By: Keith Martin
- Narrated by: Matthew Waterson
- Length: 7 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies - in short, everything we do online.
-
-
Greatly enjoyed and learned
- By Glenn Nunes on 03-30-21
By: Keith Martin
-
Cybersecurity
- A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to discover how to protect yourself, your family, and business against cyber attacks, then pay attention...Have you been curious about how hackers choose their victims or develop their attack plans? Have you been hacked before? Do you want to learn to protect your systems and networks from hackers? This audiobook serves as a launchpad for learning more about the Internet and cybersecurity. Throughout this audiobook, you will take a journey into the world of cybercrimes and cybersecurity.
-
-
Secure your information through this audiobook.
- By Roger Strong on 08-24-21
By: Quinn Kiser
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
-
If It's Smart, It's Vulnerable
- By: Mikko Hypponen
- Narrated by: Rich Miller
- Length: 7 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
All our devices and gadgets—from our refrigerators to our home security systems—are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing.
-
-
One of the best books on this topic
- By hamilton on 02-25-24
By: Mikko Hypponen
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
Scam Me If You Can
- Simple Strategies to Outsmart Today's Rip-off Artists
- By: Frank Abagnale
- Narrated by: Jason Culp
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you at risk of being scammed? Former con artist and best-selling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks. Maybe you're wondering how to make the scam phone calls stop. Perhaps someone has stolen your credit card number. Or you've been a victim of identity theft. Even if you haven't yet been the target of a crime, con artists are always out there, waiting for the right moment to steal your information, your money, and your life.
-
-
Very basic, full with scary stories, but little actionable information
- By EI on 10-18-19
By: Frank Abagnale
Related to this topic
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- By: Frank W. Abagnale
- Narrated by: Raymond Todd
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- By Sheila on 06-05-07
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
High-Tech, High-Touch Customer Service
- Inspire Timeless Loyalty in the Demanding New World of Social Commerce
- By: Micah Solomon
- Narrated by: Micah Solomon, Sean Pratt
- Length: 6 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In an age of Twitter, smartphones, and self-service kiosks, high-tech but still high-touch customer service is the answer. Today’s customers are a hard bunch to crack. Time-strapped, screen-addicted, value-savvy, and socially engaged, their expectations are tougher than ever for a business to keep up with. They are empowered like never before and expect businesses to respect that sense of empowerment - lashing out at those that don’t. Take heart: Old-fashioned customer service, fully retooled for today’s blistering pace and digitally connected reality, is what you need to build the kind of loyal customer base that allows you to survive - and thrive.
-
-
This is the book that cracks the code!
- By Nick Morgan on 04-30-13
By: Micah Solomon
-
Cyber Wars
- Hacks That Shocked the Business World
- By: Charles Arthur
- Narrated by: Joe Jameson
- Length: 7 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- By Quella on 01-11-19
By: Charles Arthur
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- By: Frank W. Abagnale
- Narrated by: Raymond Todd
- Length: 7 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- By Sheila on 06-05-07
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- By: Kevin Poulsen
- Narrated by: Eric Michael Summerer
- Length: 8 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
-
This should be a movie
- By Hijenks on 05-19-15
By: Kevin Poulsen
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- By: John P. Carlin, Garrett M. Graff
- Narrated by: Kevin Stillwell
- Length: 16 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- By Raz on 01-08-19
By: John P. Carlin, and others
-
High-Tech, High-Touch Customer Service
- Inspire Timeless Loyalty in the Demanding New World of Social Commerce
- By: Micah Solomon
- Narrated by: Micah Solomon, Sean Pratt
- Length: 6 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In an age of Twitter, smartphones, and self-service kiosks, high-tech but still high-touch customer service is the answer. Today’s customers are a hard bunch to crack. Time-strapped, screen-addicted, value-savvy, and socially engaged, their expectations are tougher than ever for a business to keep up with. They are empowered like never before and expect businesses to respect that sense of empowerment - lashing out at those that don’t. Take heart: Old-fashioned customer service, fully retooled for today’s blistering pace and digitally connected reality, is what you need to build the kind of loyal customer base that allows you to survive - and thrive.
-
-
This is the book that cracks the code!
- By Nick Morgan on 04-30-13
By: Micah Solomon
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Survive Like a Spy
- Real CIA Operatives Reveal How They Stay Safe in a Dangerous World and How You Can Too
- By: Jason Hanson
- Narrated by: Jason Hanson
- Length: 6 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everyone loves a good spy story, but most of the ones we hear are fictional. That's because the most dangerous and important spycraft is done in secret, often without anyone even noticing. In Survive Like a Spy, best-selling author and former CIA officer Jason Hanson takes the listener deep inside the world of espionage, revealing true stories and expert tactics from real agents engaged in life-threatening missions around the world.
-
-
Fantastic book, practical tips, too much marketing
- By Jennifer Sights on 04-05-18
By: Jason Hanson
-
Exceptional Service, Exceptional Profit
- The Secrets of Building a Five-Star Customer Service Organization
- By: Leonardo Inghilleri, Micah Solomon
- Narrated by: Sean Pratt
- Length: 5 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a tight market, your most powerful growth engine - and your best protection from competitive inroads - is this: Put everything you can into cultivating true customer loyalty. Loyal customers are less sensitive to price competition, more forgiving of small glitches, and, ultimately, become "walking billboards" who will happily promote your brand.
In Exceptional Service, Exceptional Profit, insiders Leonardo Inghilleri and Micah Solomon reveal the secrets of providing online and offline customer service so superior it nearly guarantees loyalty.
-
-
Great book, recommended!
- By KLD on 07-03-15
By: Leonardo Inghilleri, and others
-
The Starfish and the Spider
- The Unstoppable Power of Leaderless Organizations
- By: Ori Brafman, Rod Beckstrom
- Narrated by: Sean Pratt
- Length: 5 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you cut off a spider's leg, it's crippled; if you cut off its head, it dies. But if you cut off a starfish's leg it grows a new one, and the old leg can grow into an entirely new starfish. The Starfish and the Spider argues that organizations fall into two categories: "spiders", which have a rigid hierarchy, and "starfish", which rely on the power of peer relationships.
-
-
Centralized and decentralized models
- By Chan Meng on 12-07-07
By: Ori Brafman, and others
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- By: Kim Zetter
- Narrated by: Joe Ochman
- Length: 13 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- By Greg on 11-22-14
By: Kim Zetter
-
Technically Wrong
- Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
- By: Sara Wachter-Boettcher
- Narrated by: Andrea Emmes
- Length: 5 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed, or why. It's time we change that. Many of the services we rely on are full of oversights, biases, and downright ethical nightmares. Chatbots that harass women. Signup forms that fail anyone who's not straight. Social media sites that send peppy messages about dead relatives. Algorithms that put more black people behind bars.
-
-
Pretty good but not complete
- By Casey on 10-29-17
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
@War
- The Rise of the Military-Internet Complex
- By: Shane Harris
- Narrated by: Stephen R. Thorne
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- By Greg on 02-06-15
By: Shane Harris
-
Exploding the Phone
- The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell
- By: Phil Lapsley
- Narrated by: Johann North
- Length: 12 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before smartphones, back even before the Internet and personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary "harmonic telegraph", by the middle of the 20th century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.
-
-
Great Story along with Great Technical Research
- By Elsa Braun on 04-25-16
By: Phil Lapsley
-
Where Wizards Stay Up Late
- The Origins of the Internet
- By: Katie Hafner, Matthew Lyon
- Narrated by: Mark Douglas Nelson
- Length: 10 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Twenty-five years ago, it didn't exist. Today, 20 million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960s, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices.
-
-
Absolutely fascinating and we'll researched
- By Elsa Braun on 10-01-16
By: Katie Hafner, and others
-
The Plot to Hack America
- How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election
- By: Malcolm Nance
- Narrated by: Gregory Itzin
- Length: 6 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization's computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation's top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.
-
-
Short and Terrifying
- By Teadrinker on 03-19-17
By: Malcolm Nance
-
Program or Be Programmed
- Ten Commands for a Digital Age
- By: Douglas Rushkoff
- Narrated by: Douglas Rushkoff
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 10 chapters, composed of 10 "commands", Rushkoff provides cyber enthusiasts and technophobes alike with the guidelines to navigate the digital new universe. In this spirited, accessible poetics of new media, Rushkoff picks up where Marshall McLuhan left off, helping listeners to recognize programming as the new literacy of the digital age - and as a template through which to see beyond social conventions and power structures that have vexed us for centuries.
-
-
Good book, but with some crazy ranting
- By Bjarne on 02-05-15
By: Douglas Rushkoff