Cybersecurity cover art

Cybersecurity

An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare

Preview

Try for $0.00
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Premium Plus auto-renews for $14.95/mo + applicable taxes after 30 days. Cancel anytime.

Cybersecurity

Written by: Lester Evans
Narrated by: Michael Reaves
Try for $0.00

$14.95 a month after 30 days. Cancel anytime.

Buy Now for $18.74

Buy Now for $18.74

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Tax where applicable.
Cancel

About this listen

If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention....

Do you create tons of accounts you will never again visit?

Does your password contain a sequence of numbers, such as “123456”?

Do you automatically click all links and download all email attachments coming from your friends?

This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.

With this handy little book as your starting point, you can finally go from a starry-eyed internet user to a paranoid cybersecurity geek.

With plenty of examples, this audiobook will show you that the internet is not merely a way to watch cute cat videos; it's a battlefield, a military invention that was accidentally found to be capable of overpowering any threat economically, digitally and politically.

From the crudest forums to the most sophisticated online services, there is a war going on, and, whether you want it or not, you're involved by the very fact you're here, so better arm yourself with knowledge.

Here’s just a tiny fraction of what you’ll discover:

  • How the internet is held together with a pinky swear
  • How hackers use raunchy photos to eke out private information
  • Examples of preposterous social engineering attacks
  • Equally preposterous defense from those attacks
  • How people in charge don't even realize what hacking means
  • How there's only one surefire way to protect against hacking
  • Research on past, present, and future hacking methods
  • Difference between good and bad hackers
  • How to lower your exposure to hacking
  • Why companies pester you to attach a phone number to an account
  • Why social media is the most insecure way to spend your afternoon

And much, much more....

©2018 Lester Evans (P)2019 Lester Evans
Computer Science History & Culture Security & Encryption Computer Security
activate_Holiday_promo_in_buybox_DT_T2

What listeners say about Cybersecurity

Average Customer Ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    8
  • 4 Stars
    4
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    7
  • 4 Stars
    5
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 4.5 out of 5 stars
  • 5 Stars
    9
  • 4 Stars
    2
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Absolutely Amazing for my first audiobook

After listening to this front to back, I really appreciate the authors use of strong analogies to explain certain topics. I also am very entertained by the sheer amount of real life stories as well as solutions to most of them. The unbiased opinions also made me very intrigued into listening to this. 5 Star for sure.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful