Browse audiobooks by Alex Wagner, listen to samples and when you're ready head over to Audiobooks.com where you can get 3 FREE audiobooks on us
Tod einer Schnüfflerin - Penny Küfer ermittelt 2
Statt an der Detektivakademie für ihren Abschluss zu pauken, verschlägt es die ambitionierte Jungschnüfflerin diesmal an einen Lost Place, in ein ehemaliges Grandhotel nahe dem Zauberberg Semmering.In den alten Mauern wohnt seit vielen Jahren nur noch die Erinnerung - und neuerdings ein besonders hinterhältiger Mörder. Und dann ist da noch dieses seltsame Gerücht über ein Geheimversteck voller Diamanten ...-
Alex Wagner (Author), Sarah Dostal (Narrator)
Audiobook
Mord im Okzident Express - Penny Küfer ermittelt 1
Das erste Abenteuer der beliebten Krimi-Heldin:Frech, furchtlos und noch ziemlich grün hinter den Ohren: Penny Küfer, Privatdetektivin.Also eigentlich: angehende Privatdetektivin. Streng genommen hat Penny gerade einmal die erste Ausbildungswoche an der Detektiv-Akademie hinter sich, wurde soeben von ihrer Mutter enterbt und von ihrem Verlobten verlassen. Da bleibt nur noch ein Trost: die lang erträumte Reise im Okzident Express, dem luxuriösesten Zug, der je über Europas Schienen rollte. Dumm nur, dass der ambitionierten Jungschnüfflerin noch vor dem ersten Glas Champagner eine Leiche vor die Füße fällt ... und das ausgerechnet in ihrem eigenen Abteil.-
Alex Wagner (Author), Sarah Dostal (Narrator)
Audiobook
HACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 3 BOOKS IN 1
THIS BOOK INCLUDES 3 MANUSCRIPTS; - BOOK 1: Hacking: Denial of Service Attacks - BOOK 2: Hacking: How to Hack Web Apps - BOOK 3: Hacking: Rooting & Jailbreaking This audiobook will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools discussed in this audiobook on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all listeners to deploy any tool described in this audiobook for White Hat use only. BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! In this book you will learn: - Introduction to Botnets - The history of DOS attacks - Defining DoS Attacks - Distributed Denial of Service Attacks - Key Attributes of DoS Attacks - HTTP Flood Attacks - SYN Flood Attacks - UDP and ICMP Attacks - DNS reflection Attack - Dos Attacks using Kali Linux - Peer-to-Peer DoS Attack - Slowloris DDoS Attack - Permanent DoS Attack - Man on the Side Attack - Cross-Site Scripting Attack - Forceful Browsing Attack - Deploying Mass Assignment Attack - Cookie Poisoning Attack - Cross Site Request Forgery - Privilege Elevation - Jailbreaking - Session fixation Attack - Keystroke Logging Attack - Rooting Android Devices - How to Install Android in Hyper-V - How to Root Android Devices - Android Attack Types - Securing Android Devices - IOS Architecture Basics - IOS Hardware Security - IOS App Security - IOS Jailbreak Types - IOS Jailbreaking BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), David Knowles, Matyas J., Sam Thurman (Narrator)
Audiobook
HACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 6 BOOKS IN 1
THIS AUDIOBOOK INCLUDES 6 MANUSCRIPTS: - BOOK 1 - Hacking with Kali Linux: Penetration Testing Hacking Bible - BOOK 2 - Social Engineering Attacks, Techniques & Prevention - BOOK 3 - Hacking Firewalls & Bypassing Honeypots - BOOK 4 - Denial of Service Attacks - BOOK 5 - How to Hack Web Apps - BOOK 6 - Rooting & Jailbreaking This audiobook will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY. BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! YOU WILL LEARN: - How to Install Kali Linux, TOR, How to use BurpSuite for various attacks - SSL & CMS Scanning Techniques, Port Scanning & Network Sniffing - How to Configure SPAN and how to implement SYN Scan Attack - How to Brute Force with Hydra and how to use Low Orbit ion Cannon - How to use Netcat, Meterpreter, Armitage, SET - How to deploy Spear Phishing & PowerShell Attack and various Wireless Hacking Attacks - How to use Deep Magic, Recon-ng, HTTrack, Weevely, H-ping_3, EtterCAP, Xplico, Scapy, Parasite6, The Metasploit Framework, Credential Harvester and MANY MORE KALI LINUX HACKING TOOLS… - Psychological manipulation and In-person social engineering techniques - How to use PhishTank and Phish5 - IP address spoofing and Source Routing - Tiny fragment attack and Fragmentation attack - Overlapping Fragments Attack and Time-to-Live attack and much more... BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), David Knowles, Jack Bellows, Mathas J., Sam Thurman (Narrator)
Audiobook
HACKING WITH KALI LINUX: Penetration Testing Hacking Bible
This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY. The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step. Additionally you will be demonstrated how to create a Denial of Service Attack, how to manipulate the network infrastructure by creating fake packets, as well how to replicate any networking device, and fool end users to install backdoors on demand. There are many step by step deployment guides on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering. BUY THIS BOOK NOW AND GET STARTED TODAY! IN THIS BOOK YOU WILL LEARN: •How to Install Kali Linux & TOR •How to use BurpSuite for various attacks •SSL & CMS Scanning Techniques •Port Scanning & Network Sniffing •How to Configure SPAN •How to implement SYN Scan Attack •How to Brute Force with Hydra •How to use Low Orbit ion Cannon •How to use Netcat, Meterpreter, Armitage, SET •How to deploy Spear Phishing & PowerShell Attack •How to deploy various Wireless Hacking Attacks •How to use Deep Magic, Recon-ng, HTTrack, Weevely, H-ping_3, EtterCAP, Xplico, Scapy, Parasite6, The Metasploit Framework, Credential Harvester and MANY MORE KALI LINUX HACKING TOOLS… BUY THIS BOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Jack Bellows (Narrator)
Audiobook
HACKING: Hacking Firewalls & Bypassing Honeypots
If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY. The main focus of this book is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots work. Your reading of this book will boost your knowledge on what is possible in today's hacking world and help you to become an Ethical Hacker aka Penetration Tester. BUY THIS BOOK NOW AND GET STARTED TODAY! IN THIS BOOK YOU WILL LEARN ABOUT: -What is The OSI Model -What are Zone Based Firewalls -Firewall Behavior and TCP State Table -Network Address Translation -Port Address Translation -Demilitarized Zone -TCP & UDP Traffic on Firewalls -Client Connection Process -System Intrusion Indicators -Indicators of Network Intrusion -Anomalous Behaviour -Firewall Implementations & Architectures -Packet Filtering Firewalls -Circuit-level Gateway -Application Firewalls -Stateful Firewalls -Next-Gen Firewalls -Detecting Firewalls -IP address spoofing -Source Routing -Tiny fragment attack -Tunneling -Evasion Tools -Intrusion Detection Systems -Signature-based IDS -Statistical Anomaly-based IDS -Network-Based IDS -Host Intrusion Detection System -Evasion by Confusion -Fragmentation attack -Overlapping Fragments Attack -Time-to-Live attack -DoS Attack & Flooding Attack -IDS weakness Detection -Honeypot Types & Honeypot Detection BUY THIS BOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Jack Bellows (Narrator)
Audiobook
Considering that you are preparing to became an Ethical Hacker, IT Security Analyst, IT Security Engineer, or a Cybersecurity Specialist, yet still in doubt and want to know about Vulnerabilities in both Web Applications and Web Services, how to hack them, as well as how to secure them, you will find this book extremely useful. If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY. BUY THIS BOOK NOW AND GET STARTED TODAY! IN THIS BOOK YOU WILL LEARN ABOUT: •Cross-Site Scripting Attack •Forceful Browsing Attack •Banner Grabbing •Server Fingerprinting •HTML Tampering •Deploying Mass Assignment Attack •Cookie Poisoning Attack •Cross Site Request Forgery •Exposing 'Remember Me' •Privilege Elevation •Jailbreaking •Session fixation Attack •Keystroke Logging Attack •Rooting Android Devices •Rowhammer Attack and much more... BUY THIS BOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Sam Thurman (Narrator)
Audiobook
HACKING: Social Engineering Attacks, Techniques & Prevention
This book will focus on social engineering techniques that are favourite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY. The focus of this book will be to introduce some of the most well known social engineering techniques. This book contains step by step deployment guides of performances on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering. IN THIS BOOK YOU WILL LEARN ABOUT: -Phishing, Vishing, Smishing, Spear Phishing and Whaling -The history of social engineering -Psychological manipulation -Human Weaknesses -Social Engineering Categories -Cold Call Virus Scams -Authority & Fear Establishment -Executing the Social Engineering Attack -Signifying Legitimacy by Providing Value -Open-Source Intelligence -Organizational Reconnaissance -Identifying Targets Within an Organization -In-person social engineering techniques -Dumpster Diving & Data Breaches -Phishing Page Types -Filter Evasion Techniques -How to use PhishTank and Phish5 -Identity Theft and Impersonation -Social Engineering Countermeasures -Paper & Digital Record Destruction -Physical Security Measures -Principle of Least Privilege -2FA & Side Channel ID Verification -Logging & Monitoring -How to respond to an Attack -Tips to Avoid Being a Victim BUY THIS BOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Jack Bellows (Narrator)
Audiobook
HACKING: Denial of Service Attacks
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY. The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step. Your reading of this book will boost your knowledge on what is possible in today’s hacking world and help you to become an Ethical Hacker. BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! IN THIS BOOK YOU WILL LEARN: •Introduction to Botnets •The history of DOS attacks •Distributed Denial of Service Attacks •The Impact of DoS Attacks •Protocols & The OSI Model •HTTP Flood Attacks •SYN Flood Attacks •UDP and ICMP Attacks •DNS reflection Attack •Dos Attacks using Kali Linux •Peer-to-Peer DoS Attack •Slowloris DDoS Attack •Man on the Side Attack •The “Cutwail” Botnet •Low Orbit Ion Cannon •Preparation Against DOS Attacks •Discovering the Attack Pattern •Defense Strategy: Absorbing DoS Attacks •Recognizing Traffic Pattern •Defense Strategy at Layer 4 & Layer 7 BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Jack Bellows (Narrator)
Audiobook
THIS AUDIOBOOK INCLUDES 3 MANUSCRIPTS: - BOOK 1: Hacking with Kali Linux: Penetration Testing Hacking Bible - BOOK 2: Social Engineering Attacks, Techniques & Prevention - BOOK 3: Hacking Firewalls & Bypassing Honeypots In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. This audiobook will focus on some of the most dangerous hacker tools that are favorite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY. BUY THIS BOOK NOW AND GET STARTED TODAY! IN THIS BOOK YOU WILL LEARN: •How to Install Kali Linux & TOR •How to use BurpSuite for various attacks •SSL & CMS Scanning Techniques •Port Scanning & Network Sniffing •How to Configure SPAN •How to implement SYN Scan Attack •How to Brute Force with Hydra •How to use Low Orbit ion Cannon •How to use Netcat, Meterpreter, Armitage, SET •How to deploy Spear Phishing & PowerShell Attack •How to deploy various Wireless Hacking Attacks •Phishing, Vishing, Smishing, Spear Phishing and Whaling •Executing the Social Engineering Attack •In-person social engineering techniques •Dumpster Diving & Data Breaches •Phishing Page Types •Filter Evasion Techniques •How to use PhishTank and Phish5 •Identity Theft and Impersonation •Fragmentation attack •Overlapping Fragments Attack •Time-to-Live attack •DoS Attack & Flooding Attack BUY THIS BOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Jack Bellows (Narrator)
Audiobook
Futureface: A Family Mystery, an Epic Quest, and the Secret to Belonging
An acclaimed journalist travels the globe to solve the mystery of her ancestry, confronting the question at the heart of the American experience of immigration, race, and identity. Who are my people. Alex Wagner has always been fascinated by stories of exile and migration.
Alex Wagner (Author), Alex Wagner (Narrator)
Audiobook
©PTC International Ltd T/A LoveReading is registered in England. Company number: 10193437. VAT number: 270 4538 09. Registered address: 157 Shooters Hill, London, SE18 3HP.
Terms & Conditions | Privacy Policy | Disclaimer