
We're pleased to have you join us
30-day trial with Audible is available.
New Releases
-
Click with Caution
- 10 Online Red Flags That Scream ‘Scam!’ (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 2)
- By: Alsden Kier
- Narrated by: stephen plaushin
- Length: 1 hr and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The internet has transformed our world in amazing ways. With just a few clicks, we can talk to friends on the other side of the globe, discover new music, explore our favorite hobbies, shop for just about anything, and even take entire college courses from the comfort of our couch. It’s no exaggeration to say that the internet is one of the greatest tools ever invented. But just like in the real world, not everyone you meet online has good intentions. Hidden among the games, chats, and cute cat videos are people who spend their time trying to trick others.
-
-
Teachers Should Use This Book
- By Isabella Owen on 16-06-25
By: Alsden Kier
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- By: Alsden Keir
- Narrated by: Darren Guido
- Length: 1 hr and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends. Communicating through screens has become so common that most of us don’t even think twice before opening a message, clicking a link, or responding to a notification. But in that sea of normal communication lies something much more dangerous: messages designed to trick you, to make you give away your passwords, financial details, or other private information. These scams often come hidden in the very tools we trust most—email and text.
-
-
Essential Knowledge for the Digital Age
- By Libby Matthews on 31-05-25
By: Alsden Keir
-
Beyond the Firewall
- Enhancing SCADA Security in the Age of Cyber Threats
- By: Chukwudi Abalogu
- Narrated by: B Fike
- Length: 4 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
The background noise of power grids working alongside water pipelines carrying liquid and trains moving along tracks represent the hidden heartbeat of modern civilization which supports our global connectedness. The vital systems supporting our economies and societies remain hidden from everyday view while they sustain both the simple and complex aspects of daily life. At the heart of this critical infrastructure lies a network of sophisticated control systems: SCADA–Supervisory Control and Data Acquisition.
-
-
Way more interesting than I thought It’d be
- By Victor on 16-06-25
By: Chukwudi Abalogu
-
Beginners Guide to VPNs
- Your Secret Tunnel to Online Privacy
- By: Alsden Keir
- Narrated by: Michelle Peitz
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where every click is tracked, every search is analyzed, and every online move leaves a trace, digital privacy has never been more critical or vulnerable. Beginners Guide to VPNs: Your Secret Tunnel to Online Privacy by Alsden Keir is your essential roadmap to understanding, choosing, and using Virtual Private Networks (VPNs) confidently and clearly. Far from being a tool for tech experts or conspiracy theorists, a VPN is a simple, effective solution for anyone who values online privacy, security, and freedom.
-
-
Worth Every Penny
- By Justin Walker on 17-06-25
By: Alsden Keir
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- By: Taimur Ijlal
- Narrated by: Shawn Elliott
- Length: 2 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
By: Taimur Ijlal
-
Mastering Zero Trust
- Strategy, Architecture & Execution: Design, Implementation, and Operations
- By: Arjun Mehta
- Narrated by: Arjun Mehta, Jeremy Leigh
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Mastering Zero Trust: Strategy, Architecture & Execution: Design, Implementation, and Operations" offers a comprehensive guide to understanding and implementing Zero Trust Security in modern networks. This audiobook begins with an exploration of the evolution of cybersecurity and the challenges posed by traditional perimeter-based models. It introduces the foundational principles of Zero Trust—verify explicitly, apply least privilege access, and assume breach—highlighting why this approach is essential for today’s decentralized, cloud-driven environments.
By: Arjun Mehta
-
Click with Caution
- 10 Online Red Flags That Scream ‘Scam!’ (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 2)
- By: Alsden Kier
- Narrated by: stephen plaushin
- Length: 1 hr and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The internet has transformed our world in amazing ways. With just a few clicks, we can talk to friends on the other side of the globe, discover new music, explore our favorite hobbies, shop for just about anything, and even take entire college courses from the comfort of our couch. It’s no exaggeration to say that the internet is one of the greatest tools ever invented. But just like in the real world, not everyone you meet online has good intentions. Hidden among the games, chats, and cute cat videos are people who spend their time trying to trick others.
-
-
Teachers Should Use This Book
- By Isabella Owen on 16-06-25
By: Alsden Kier
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- By: Alsden Keir
- Narrated by: Darren Guido
- Length: 1 hr and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends. Communicating through screens has become so common that most of us don’t even think twice before opening a message, clicking a link, or responding to a notification. But in that sea of normal communication lies something much more dangerous: messages designed to trick you, to make you give away your passwords, financial details, or other private information. These scams often come hidden in the very tools we trust most—email and text.
-
-
Essential Knowledge for the Digital Age
- By Libby Matthews on 31-05-25
By: Alsden Keir
-
Beyond the Firewall
- Enhancing SCADA Security in the Age of Cyber Threats
- By: Chukwudi Abalogu
- Narrated by: B Fike
- Length: 4 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
The background noise of power grids working alongside water pipelines carrying liquid and trains moving along tracks represent the hidden heartbeat of modern civilization which supports our global connectedness. The vital systems supporting our economies and societies remain hidden from everyday view while they sustain both the simple and complex aspects of daily life. At the heart of this critical infrastructure lies a network of sophisticated control systems: SCADA–Supervisory Control and Data Acquisition.
-
-
Way more interesting than I thought It’d be
- By Victor on 16-06-25
By: Chukwudi Abalogu
-
Beginners Guide to VPNs
- Your Secret Tunnel to Online Privacy
- By: Alsden Keir
- Narrated by: Michelle Peitz
- Length: 2 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where every click is tracked, every search is analyzed, and every online move leaves a trace, digital privacy has never been more critical or vulnerable. Beginners Guide to VPNs: Your Secret Tunnel to Online Privacy by Alsden Keir is your essential roadmap to understanding, choosing, and using Virtual Private Networks (VPNs) confidently and clearly. Far from being a tool for tech experts or conspiracy theorists, a VPN is a simple, effective solution for anyone who values online privacy, security, and freedom.
-
-
Worth Every Penny
- By Justin Walker on 17-06-25
By: Alsden Keir
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- By: Taimur Ijlal
- Narrated by: Shawn Elliott
- Length: 2 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
By: Taimur Ijlal
-
Mastering Zero Trust
- Strategy, Architecture & Execution: Design, Implementation, and Operations
- By: Arjun Mehta
- Narrated by: Arjun Mehta, Jeremy Leigh
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Mastering Zero Trust: Strategy, Architecture & Execution: Design, Implementation, and Operations" offers a comprehensive guide to understanding and implementing Zero Trust Security in modern networks. This audiobook begins with an exploration of the evolution of cybersecurity and the challenges posed by traditional perimeter-based models. It introduces the foundational principles of Zero Trust—verify explicitly, apply least privilege access, and assume breach—highlighting why this approach is essential for today’s decentralized, cloud-driven environments.
By: Arjun Mehta