Browse audiobooks narrated by Jack Bellows, listen to samples and when you're ready head over to Audiobooks.com where you can get 3 FREE audiobooks on us
Charon's Quest: An Underworld Saga Novel
The ferryman of the dead is forced to leave the life he’s always known. Apollo has had a vision: as the life of each soul flashes before Charon’s eyes, the ferryman ages like an old man. Charon needs to experience his own adventures to become youthful again, or he will soon die. The last thing Charon expects is to fall in love with a mortal woman—someone he can’t take with him when he returns. Charon must decide whether to abandon the love of his life or his duties. While Charon's Quest shares the world of The Underworld Saga (a bestselling paranormal romance/urban fantasy), it can be read before or after or anytime in between the rest of the books in the saga.
Eva Pohler (Author), Jack Bellows, Jack Mcarthur (Narrator)
Audiobook
HACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 6 BOOKS IN 1
THIS AUDIOBOOK INCLUDES 6 MANUSCRIPTS: - BOOK 1 - Hacking with Kali Linux: Penetration Testing Hacking Bible - BOOK 2 - Social Engineering Attacks, Techniques & Prevention - BOOK 3 - Hacking Firewalls & Bypassing Honeypots - BOOK 4 - Denial of Service Attacks - BOOK 5 - How to Hack Web Apps - BOOK 6 - Rooting & Jailbreaking This audiobook will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY. BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! YOU WILL LEARN: - How to Install Kali Linux, TOR, How to use BurpSuite for various attacks - SSL & CMS Scanning Techniques, Port Scanning & Network Sniffing - How to Configure SPAN and how to implement SYN Scan Attack - How to Brute Force with Hydra and how to use Low Orbit ion Cannon - How to use Netcat, Meterpreter, Armitage, SET - How to deploy Spear Phishing & PowerShell Attack and various Wireless Hacking Attacks - How to use Deep Magic, Recon-ng, HTTrack, Weevely, H-ping_3, EtterCAP, Xplico, Scapy, Parasite6, The Metasploit Framework, Credential Harvester and MANY MORE KALI LINUX HACKING TOOLS… - Psychological manipulation and In-person social engineering techniques - How to use PhishTank and Phish5 - IP address spoofing and Source Routing - Tiny fragment attack and Fragmentation attack - Overlapping Fragments Attack and Time-to-Live attack and much more... BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), David Knowles, Jack Bellows, Mathas J., Sam Thurman (Narrator)
Audiobook
HACKING WITH KALI LINUX: Penetration Testing Hacking Bible
This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY. The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step. Additionally you will be demonstrated how to create a Denial of Service Attack, how to manipulate the network infrastructure by creating fake packets, as well how to replicate any networking device, and fool end users to install backdoors on demand. There are many step by step deployment guides on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering. BUY THIS BOOK NOW AND GET STARTED TODAY! IN THIS BOOK YOU WILL LEARN: •How to Install Kali Linux & TOR •How to use BurpSuite for various attacks •SSL & CMS Scanning Techniques •Port Scanning & Network Sniffing •How to Configure SPAN •How to implement SYN Scan Attack •How to Brute Force with Hydra •How to use Low Orbit ion Cannon •How to use Netcat, Meterpreter, Armitage, SET •How to deploy Spear Phishing & PowerShell Attack •How to deploy various Wireless Hacking Attacks •How to use Deep Magic, Recon-ng, HTTrack, Weevely, H-ping_3, EtterCAP, Xplico, Scapy, Parasite6, The Metasploit Framework, Credential Harvester and MANY MORE KALI LINUX HACKING TOOLS… BUY THIS BOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Jack Bellows (Narrator)
Audiobook
HACKING: Hacking Firewalls & Bypassing Honeypots
If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY. The main focus of this book is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots work. Your reading of this book will boost your knowledge on what is possible in today's hacking world and help you to become an Ethical Hacker aka Penetration Tester. BUY THIS BOOK NOW AND GET STARTED TODAY! IN THIS BOOK YOU WILL LEARN ABOUT: -What is The OSI Model -What are Zone Based Firewalls -Firewall Behavior and TCP State Table -Network Address Translation -Port Address Translation -Demilitarized Zone -TCP & UDP Traffic on Firewalls -Client Connection Process -System Intrusion Indicators -Indicators of Network Intrusion -Anomalous Behaviour -Firewall Implementations & Architectures -Packet Filtering Firewalls -Circuit-level Gateway -Application Firewalls -Stateful Firewalls -Next-Gen Firewalls -Detecting Firewalls -IP address spoofing -Source Routing -Tiny fragment attack -Tunneling -Evasion Tools -Intrusion Detection Systems -Signature-based IDS -Statistical Anomaly-based IDS -Network-Based IDS -Host Intrusion Detection System -Evasion by Confusion -Fragmentation attack -Overlapping Fragments Attack -Time-to-Live attack -DoS Attack & Flooding Attack -IDS weakness Detection -Honeypot Types & Honeypot Detection BUY THIS BOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Jack Bellows (Narrator)
Audiobook
HACKING: Social Engineering Attacks, Techniques & Prevention
This book will focus on social engineering techniques that are favourite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY. The focus of this book will be to introduce some of the most well known social engineering techniques. This book contains step by step deployment guides of performances on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering. IN THIS BOOK YOU WILL LEARN ABOUT: -Phishing, Vishing, Smishing, Spear Phishing and Whaling -The history of social engineering -Psychological manipulation -Human Weaknesses -Social Engineering Categories -Cold Call Virus Scams -Authority & Fear Establishment -Executing the Social Engineering Attack -Signifying Legitimacy by Providing Value -Open-Source Intelligence -Organizational Reconnaissance -Identifying Targets Within an Organization -In-person social engineering techniques -Dumpster Diving & Data Breaches -Phishing Page Types -Filter Evasion Techniques -How to use PhishTank and Phish5 -Identity Theft and Impersonation -Social Engineering Countermeasures -Paper & Digital Record Destruction -Physical Security Measures -Principle of Least Privilege -2FA & Side Channel ID Verification -Logging & Monitoring -How to respond to an Attack -Tips to Avoid Being a Victim BUY THIS BOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Jack Bellows (Narrator)
Audiobook
HACKING: Denial of Service Attacks
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY. The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step. Your reading of this book will boost your knowledge on what is possible in today’s hacking world and help you to become an Ethical Hacker. BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! IN THIS BOOK YOU WILL LEARN: •Introduction to Botnets •The history of DOS attacks •Distributed Denial of Service Attacks •The Impact of DoS Attacks •Protocols & The OSI Model •HTTP Flood Attacks •SYN Flood Attacks •UDP and ICMP Attacks •DNS reflection Attack •Dos Attacks using Kali Linux •Peer-to-Peer DoS Attack •Slowloris DDoS Attack •Man on the Side Attack •The “Cutwail” Botnet •Low Orbit Ion Cannon •Preparation Against DOS Attacks •Discovering the Attack Pattern •Defense Strategy: Absorbing DoS Attacks •Recognizing Traffic Pattern •Defense Strategy at Layer 4 & Layer 7 BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Jack Bellows (Narrator)
Audiobook
THIS AUDIOBOOK INCLUDES 3 MANUSCRIPTS: - BOOK 1: Hacking with Kali Linux: Penetration Testing Hacking Bible - BOOK 2: Social Engineering Attacks, Techniques & Prevention - BOOK 3: Hacking Firewalls & Bypassing Honeypots In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. This audiobook will focus on some of the most dangerous hacker tools that are favorite of both, White Hat and Black Hat hackers. If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY. BUY THIS BOOK NOW AND GET STARTED TODAY! IN THIS BOOK YOU WILL LEARN: •How to Install Kali Linux & TOR •How to use BurpSuite for various attacks •SSL & CMS Scanning Techniques •Port Scanning & Network Sniffing •How to Configure SPAN •How to implement SYN Scan Attack •How to Brute Force with Hydra •How to use Low Orbit ion Cannon •How to use Netcat, Meterpreter, Armitage, SET •How to deploy Spear Phishing & PowerShell Attack •How to deploy various Wireless Hacking Attacks •Phishing, Vishing, Smishing, Spear Phishing and Whaling •Executing the Social Engineering Attack •In-person social engineering techniques •Dumpster Diving & Data Breaches •Phishing Page Types •Filter Evasion Techniques •How to use PhishTank and Phish5 •Identity Theft and Impersonation •Fragmentation attack •Overlapping Fragments Attack •Time-to-Live attack •DoS Attack & Flooding Attack BUY THIS BOOK NOW AND GET STARTED TODAY!
Alex Wagner (Author), Jack Bellows (Narrator)
Audiobook
©PTC International Ltd T/A LoveReading is registered in England. Company number: 10193437. VAT number: 270 4538 09. Registered address: 157 Shooters Hill, London, SE18 3HP.
Terms & Conditions | Privacy Policy | Disclaimer