Computers / Security Audiobooks

The Perfect WeaponAudiobookStore.com is your premier source for computers/security books from all of your favorite authors including . Our impressive collection of computers/security titles includes such great choices as This Machine Kills Secrets and The Perfect Weapon to name a few. We conveniently offer downloadable audio and no matter what your favorite portable listening device is you can be listening to compelling books in no time. Spend some time exploring our incredible computers/security selection and find all of the titles you're looking for!

Sort by:
Extended Sample The Perfect Weapon  by David E. Sanger
Extended Sample This Machine Kills Secrets  by Andy Greenberg
Extended Sample The Art of Deception  by Kevin Mitnick
Extended Sample #DELETED  by Allum Bokhari
Extended Sample CRACK99  by David Locke Hall
Extended Sample We See It All  by Jon Fasman
Extended Sample Cyber Privacy  by April Falcon Doss
Extended Sample The Connected Parent  by John Palfrey
Extended Sample Keep Calm and Log On  by Gillian “Gus” Andrews
Extended Sample Blockchain and Cryptocurrency 2 Books in 1: The Ultimate Guide to Bitcoin and its Technology – Learn how to profit for the coming 2020 Bull Run!  by Corey Bowen
Extended Sample The Hacker and the State  by Ben Buchanan
Extended Sample Blockchain Basics  by Daniel Drescher
Extended Sample Cryptography  by Keith Martin
Extended Sample Dark Mirror  by Barton Gellman
Extended Sample The Cuckoo's Egg  by Clifford Stoll
Extended Sample Cybersecurity For Dummies  by Joseph Steinberg
Extended Sample A Leader’s Guide to Cybersecurity  by Jack J. Domet
Extended Sample Investigating Cryptocurrencies  by Nick Furneaux
Extended Sample Sandworm  by Andy Greenberg
Extended Sample The Real Business of Blockchain  by Christophe Uzureau
Extended Sample The Cybersecurity Playbook  by Allison Cerra
Extended Sample Cybercrime Investigators Handbook  by Graeme Edwards
Extended Sample Hacking the Hacker  by Roger A. Grimes
Extended Sample Blockchain: The Insights You Need from Harvard Business Review  by Don Tapscott
Extended Sample Cybersecurity  by Boris Groysberg
Extended Sample Sharenthood  by Leah A. Plunkett
Extended Sample Big Tech Tyrants  by Floyd Brown
Extended Sample Scam Me If You Can  by Frank Abagnale
Page 1 of 3