Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age
Written by Steven Levy
Narrated by Rich Miller
4/5
()
About this audiobook
Steven Levy
Steven Levy is editor at large at Wired magazine. The Washington Post has called him “America’s premier technology journalist.” His was previously founder of Backchannel and chief technology writer and senior editor for Newsweek. Levy has written seven previous books and his work has appeared in Rolling Stone, Harper’s Magazine, Macworld, The New York Times Magazine, Esquire, The New Yorker, and Premiere. Levy has also won several awards during his thirty-plus years of writing about technology and is the author of several previous books including Facebook: The Inside Story; Insanely Great; The Perfect Thing; and In the Plex. He lives in New York City.
Related to Crypto
Related audiobooks
The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5Worm: The First Digital World War Rating: 4 out of 5 stars4/5Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien" Rating: 4 out of 5 stars4/5The Secret Life: Three True Stories of the Digital Age Rating: 3 out of 5 stars3/5The Truth Machine: The Blockchain and the Future of Everything Rating: 5 out of 5 stars5/5Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist That Almost Destroyed It All Rating: 4 out of 5 stars4/5The Infinite Machine: How an Army of Crypto-hackers Is Building the Next Internet with Ethereum Rating: 4 out of 5 stars4/5Tubes: A Journey to the Center of the Internet Rating: 4 out of 5 stars4/5A Mind at Play: How Claude Shannon Invented the Information Age Rating: 4 out of 5 stars4/5Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency Rating: 5 out of 5 stars5/5Bitcoin Billionaires: A True Story of Genius, Betrayal, and Redemption Rating: 5 out of 5 stars5/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Life in Code: A Personal History of Technology Rating: 4 out of 5 stars4/5Proof of Stake: The Making of Ethereum and the Philosophy of Blockchains Rating: 5 out of 5 stars5/5Mastering Ethereum Rating: 4 out of 5 stars4/5Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Rating: 4 out of 5 stars4/5The Second Age of Computer Science: From Algol Genes to Neural Nets Rating: 3 out of 5 stars3/5Chaos Monkeys Revised Edition: Obscene Fortune and Random Failure in Silicon Valley Rating: 4 out of 5 stars4/5What Technology Wants Rating: 4 out of 5 stars4/5The Chip: How Two Americans Invented the Microchip and Launched a Revolution Rating: 5 out of 5 stars5/5Blockchain: The Next Everything Rating: 4 out of 5 stars4/5Create Your Own Economy: The Path to Prosperity in a Disordered World Rating: 3 out of 5 stars3/5The Perfect Thing: How the iPod Shuffles Commerce, Culture, and Coolness Rating: 4 out of 5 stars4/5Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond Rating: 4 out of 5 stars4/5Ghost Work: How to Stop Silicon Valley from Building a New Global Underclass Rating: 4 out of 5 stars4/5Rise of the Machines: A Cybernetic History Rating: 4 out of 5 stars4/5Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money Rating: 4 out of 5 stars4/5Troublemakers: Silicon Valley's Coming of Age Rating: 5 out of 5 stars5/5Who Owns the Future? Rating: 4 out of 5 stars4/5iWoz: How I Invented the Personal Computer and Had Fun Along the Way Rating: 4 out of 5 stars4/5
Security For You
Cybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Certified Information Security Manager CISM Study Guide Rating: 0 out of 5 stars0 ratingsThe Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5
Reviews for Crypto
1 rating0 reviews