Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CyberSecurity Summary

News Education Arts

Episodes

Showing 901-1000 of 1033
«« ← Prev Page 10 of 11 Next → »»

Certified Blackhat: Methodology to Unethical Hacking

16 Nov 2024

Contributed by Lukas

This Book is a guide for ethical hacking written by a cybersecurity professional. It aims to teach readers how to understand hacking methodologies, in...

Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications

16 Nov 2024

Contributed by Lukas

This Book, IEEE Std 802.3-2002, is a standard for local and metropolitan area networks (LANs) that defines the specifications for the Physical and Dat...

CCNP R&S Practical Workbook

16 Nov 2024

Contributed by Lukas

This Book"CCNP R&S Practical Workbook" provides a comprehensive guide for configuring and troubleshooting networking technologies, specifically fo...

CCNA Voice Lab Manual

16 Nov 2024

Contributed by Lukas

The Book is a lab manual for Cisco's CCNA Voice certification, covering the configuration and troubleshooting of Cisco Unified Communications Manager ...

CC Certified in Cybersecurity All-in-One Exam Guide

16 Nov 2024

Contributed by Lukas

This excerpt from the Certified in Cybersecurity All-in-One Exam Guide details the foundational knowledge needed for individuals pursuing the Certif...

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

16 Nov 2024

Contributed by Lukas

This Book "Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence", a Book written by Kevin C...

The Car Hacker's Handbook: A Guide for the Penetration Tester

16 Nov 2024

Contributed by Lukas

"The Car Hacker's Handbook" is a guide for penetration testers focused on automotive security. It teaches readers how to assess vulnerabilities in mod...

C++20: Get the Details

15 Nov 2024

Contributed by Lukas

The Book is a detailed explanation of the new features in C++20, including the Ranges library, Coroutines, Concepts, and Modules. The document also pr...

C How to Program

15 Nov 2024

Contributed by Lukas

The Book provide an extensive overview of the C programming language, encompassing its fundamental concepts, syntax, and practical applications. The t...

Building an Effective Security Program

15 Nov 2024

Contributed by Lukas

This Book presents a comprehensive guide to building an effective cybersecurity program, covering all aspects from identifying threats and vulnerabili...

Building Mobile Apps at Scale: 39 Engineering Challenges

15 Nov 2024

Contributed by Lukas

The Book is a collection of excerpts from "Building Mobile Apps at Scale," which provides advice and insights on the complexities and challenges of bu...

Bug Bounty Automation With Python

15 Nov 2024

Contributed by Lukas

This excerpt from the book Bug Bounty Automation With Python: The Secrets of Bug Hunting provides a comprehensive introduction to automating bug bou...

Cybersecurity Blue Team Strategies

14 Nov 2024

Contributed by Lukas

The Book provides a detailed guide to building and managing a cybersecurity blue team. It covers a range of topics, including the roles and responsibi...

Blockchains for Network Security: Principles, technologies and applications

14 Nov 2024

Contributed by Lukas

The book chapter excerpt that focuses on the integration of blockchain technology with various applications, specifically in the context of network se...

Blockchain for Cybersecurity and Privacy

14 Nov 2024

Contributed by Lukas

The provided Book explore the potential applications of blockchain technology in a variety of contexts, including cybersecurity, supply chain manageme...

Black Hat GraphQL: Attacking Next Generation APIs

14 Nov 2024

Contributed by Lukas

"Black Hat GraphQL" is a guide for security professionals interested in learning how to attack GraphQL APIs. The book explains the fundamentals of Gr...

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

14 Nov 2024

Contributed by Lukas

The Book is a compilation of research papers on cybersecurity, specifically focusing on methods to detect and classify cyber threats. These papers exp...

Big Data Forensics: Learning Hadoop Investigations

14 Nov 2024

Contributed by Lukas

This book, Big Data Forensics - Learning Hadoop Investigations, is a guide for IT professionals interested in the field of digital forensics as it ap...

Beyond the Basic Stuff with Python: Best Practices for Writing Clean Code

14 Nov 2024

Contributed by Lukas

This is a guide for intermediate Python programmers who want to expand their knowledge beyond basic syntax. The text covers advanced best practices su...

Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition

14 Nov 2024

Contributed by Lukas

This excerpt from the book "Beyond BIOS: Developing with the Unified Extensible Firmware Interface" by Vincent Zimmer, Suresh Marisetty, and Michael R...

Beginning Flutter: A Hands On Guide to App Development

14 Nov 2024

Contributed by Lukas

The provided text excerpts come from the book "Beginning Flutter: A Hands-On Guide to App Development" by Marco L. Napoli. The book provides a compreh...

Beginning Security with Microsoft Technologies

14 Nov 2024

Contributed by Lukas

This excerpt is from the book Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data by Vasantha Lakshmi. The book f...

Networking with MikroTik: MTCNA Study Guide

14 Nov 2024

Contributed by Lukas

This study guide from Manito Networks, LLC is designed to help individuals prepare for the MikroTik Certified Network Associate (MTCNA) exam. The guid...

Becoming The Hacker

14 Nov 2024

Contributed by Lukas

The source text provides a comprehensive guide to web application security from the perspective of a hacker. The text covers common web vulnerabilitie...

Basic Security Testing With Kali Linux, Third Edition

14 Nov 2024

Contributed by Lukas

This source is a book about computer security testing, specifically focused on using Kali Linux as a platform for ethical hacking. The book covers a w...

Bash Quick Start Guide: Get up and running with shell scripting with Bash

13 Nov 2024

Contributed by Lukas

The provided text comes from the Bash Quick Start Guide, a guide to programming with the Bash shell. The guide starts with the basics of Bash, such as...

Azure Security Cookbook

13 Nov 2024

Contributed by Lukas

The sources are from an Azure Security Cookbook, a guide for implementing Azure security features and tools. The cookbook explains how to secure Azure...

AWS Penetration Testing

13 Nov 2024

Contributed by Lukas

The Book provides a comprehensive guide to penetration testing AWS environments, covering various AWS services such as S3 buckets, RDS databases, Lamb...

AWS Certified Solutions Architect Associate: The ultimate guide for the SAA-C02 exam

13 Nov 2024

Contributed by Lukas

This guide provides an introduction to AWS, a cloud computing platform, and details key concepts and services for the AWS Certified Solutions Architec...

AWS Certified Security - Specialty Exam Guide

11 Nov 2024

Contributed by Lukas

This summary is talking about the Book "AWS Certified Security - Specialty Exam Guide".This is a study guide for the AWS Certified Security - Specialt...

Programming in Python 3

11 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Programming in Python 3".The sources are from the second edition of Programming in Python 3, a book that teach...

Automating DevOps with GitLab CI/CD Pipelines

11 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Automating DevOps with GitLab CI/CD Pipelines".This excerpt from the book "Automating DevOps with GitLab CI/CD...

Arm Assembly Internals and Reverse Engineering

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Arm Assembly Internals and Reverse Engineering".This is a text excerpt from a book about reverse engineering, ...

Applied Text Analysis with Python

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Applied Text Analysis with Python".This is a textbook chapter excerpt about applied text analysis using Python...

Applied Incident Response

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Applied Incident Response".The source is a book about applied incident response, focusing on practical techniq...

API Testing and Development with Postman

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "API Testing and Development with Postman".This document is an excerpt from the book, "API Testing and Developm...

Android Apps Security: Mitigate Hacking Attacks and Security Breaches

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Android Apps Security: Mitigate Hacking Attacks and Security Breaches".The sources are from a book titled "And...

Android Programming for Beginners

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Android Programming for Beginners".This book, "Android Programming for Beginners," guides readers through the ...

Android Malware and Analysis

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Android Malware and Analysis".The first source, "Android_Malware_and_Analysis.pdf," is a comprehensive guide t...

Android Security Internals: An In-Depth Guide to Android's Security Architecture

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Android Security Internals: An In-Depth Guide to Android's Security Architecture".This document is an excerpt ...

Pentesting Industrial Control Systems

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Pentesting Industrial Control Systems".This document provides an ethical hacker's guide to analyzing, compromi...

Android Security: Attacks and Defenses

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Android Security: Attacks and Defenses".This excerpt from the book "Android Security: Attacks and Defenses" by...

Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus sof...

Anti-Hacker Tool Kit, Fourth Edition

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Anti-Hacker Tool Kit, Fourth Edition".The provided text is an excerpt from the book "Anti-Hacker Tool Kit, 4th...

Amazon Connect - Up and Running

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Amazon Connect - Up and Running".The provided text is an excerpt from the book "Amazon Connect: Up and Running...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Android Forensics: Investigation, Analysis and Mobile Security for Google Android".The source material provide...

Aligning Security Operations with the MITRE ATT&CK Framework

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Aligning Security Operations with the MITRE ATT&CK Framework".This excerpt is from a book that explains ho...

Alice and Bob Learn Application Security

10 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Alice and Bob Learn Application Security".The provided text excerpts come from the book "Alice and Bob Learn A...

AI Self-Driving Cars Divulgement: Practical Advances In Artificial Intelligence And Machine Learning

07 Nov 2024

Contributed by Lukas

This summary is talking about the Book "AI Self-Driving Cars Divulgement: Practical Advances In Artificial Intelligence And Machine Learning".The sour...

Advanced API Security

07 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Advanced API Security".This is an excerpt from a book titled "Advanced API Security: Securing APIs with OAuth ...

Advanced Apple Debugging & Reverse Engineering

07 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Advanced Apple Debugging & Reverse Engineering".This text provides an extensive guide to advanced debuggin...

Advanced Programming in the UNIX Environment, 3rd Edition

07 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Advanced Programming in the UNIX Environment, 3rd Edition".The source material provides a comprehensive guide ...

Advanced Penetration Testing: Hacking the World's Most Secure Networks

07 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Advanced Penetration Testing: Hacking the World's Most Secure Networks".The book, Advanced Penetration Testing...

Advanced Penetration Testing for Highly-Secured Environments

07 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Advanced Penetration Testing for Highly-Secured Environments".This text comes from a book titled "Advanced Pen...

Learning Pentesting for Android Devices

07 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Learning Pentesting for Android Devices".This is an excerpt from "Learning Pentesting for Android Devices" by ...

Accelerated Windows Memory Dump Analysis

07 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Accelerated Windows Memory Dump Analysis".The provided text excerpts are from a training manual for software d...

Raspberry Pi Cookbook: Software and Hardware Problems and Solutions

07 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Raspberry Pi Cookbook: Software and Hardware Problems and Solutions".The source text provides a comprehensive ...

Practical Security for Agile and DevOps

07 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Practical Security for Agile and DevOps".This text comes from the book "Practical Security for Agile and DevOp...

6800 assembly language programming

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "6800 assembly language programming".The book, "6800 Assembly Language Programming," by Lance A. Leventhal, exp...

101 Labs - CompTIA Network+

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "101 Labs - CompTIA Network+".The sources are a compilation of labs from the "101 Labs – CompTIA Network+.pdf...

55 Ways to Have Fun With Google

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "55 Ways to Have Fun With Google".The source is a book called "55 Ways to Have Fun With Google" by Philipp Lens...

The Art of Deception: Controlling the Human Element of Security

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "The Art of Deception: Controlling the Human Element of Security".Kevin Mitnick's The Art of Deception is a com...

Practical Forensic Analysis of Artifacts on iOS and Android Devices

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Practical Forensic Analysis of Artifacts on iOS and Android Devices".This is a textbook excerpt outlining the ...

Practical Linux System Administration

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Practical Linux System Administration".The document is an excerpt from an O'Reilly book about practical Linux ...

Practical Security Automation

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Practical Security Automation".The sources provide a comprehensive guide to automating security testing for so...

Nmap Network Exploration and Security Auditing Cookbook

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Nmap Network Exploration and Security Auditing Cookbook".The provided text is an excerpt from the book Nmap: N...

Network Protocols for Security Professionals

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Network Protocols for Security Professionals".The text provides a comprehensive guide to network security prot...

The Road to React with Firebase: Your journey to master advanced React for business web applications

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "The Road to React with Firebase: Your journey to master advanced React for business web applications".This doc...

Reactive Programming with RxJS 5

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Reactive Programming with RxJS 5".The first source is an excerpt from the book "Reactive Programming with RxJS...

Practical Social Engineering: A Primer for the Ethical Hacker

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Practical Social Engineering: A Primer for the Ethical Hacker".This is a text excerpt from a guide for ethical...

A Python Guide for Web Scraping

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "A Python Guide for Web Scraping".The text is a book excerpt that provides a comprehensive guide to web scrapin...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Practical Forensic Imaging: Securing Digital Evidence with Linux Tools".The source is an excerpt from the book...

Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory

06 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory".This book, "Practical Me...

Python for Cybersecurity: Using Python for Cyber Offense and Defense

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Python for Cybersecurity: Using Python for Cyber Offense and Defense".This book demonstrates how to use Python...

Practical SQL, 2nd Edition: A Beginner's Guide to Storytelling with Data

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Practical SQL, 2nd Edition: A Beginner's Guide to Storytelling with Data"."Practical SQL, 2nd Edition" is a co...

Practical Malware Analysis

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Practical Malware Analysis".Provides a comprehensive guide to understanding, analyzing, and defeating malware....

The Security Hippie

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "The Security Hippie".The source is a book titled "The Security Hippie" by Barak Engel, who recounts his experi...

Practical Data Science with Jupyter

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Practical Data Science with Jupyter".The provided text is an excerpt from the book "Practical Data Science wit...

PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting".The provided text is an excerpt from a "...

Privacy, Security And Forensics in The Internet of Things (IoT)

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Privacy, Security And Forensics in The Internet of Things (IoT)".The provided texts explore the challenges and...

Pro ASP.NET Core 3 (Develop Cloud-Ready Web Applications Using MVC 3, Blazor, and Razor Pages)

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Pro ASP.NET Core 3 (Develop Cloud-Ready Web Applications Using MVC 3, Blazor, and Razor Pages)".The source is ...

Pro Angular 9: Build Powerful and Dynamic Web Apps

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Pro Angular 9: Build Powerful and Dynamic Web Apps".This text provides a guide to building powerful and dynami...

Ransomware Protection Playbook

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Ransomware Protection Playbook ".This document, "Ransomware Protection Playbook," by Roger Grimes, explores th...

Pro Active Directory Certificate Services

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Pro Active Directory Certificate Services".This document is a guide to understanding and implementing Microsof...

Python Tricks: A Buffet of Awesome Python Features

04 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Python Tricks: A Buffet of Awesome Python Features ".The reviewer explains that they purchased the book after...

Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation

03 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary em...

Python Basics A Practical Introduction to Python 3

03 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Python Basics A Practical Introduction to Python 3".The sources are excerpts from the "Python Basics: A Practi...

The Foundations of Threat Hunting

03 Nov 2024

Contributed by Lukas

This summary is talking about the Book "The Foundations of Threat Hunting".This book, The Foundations of Threat Hunting, provides a comprehensive guid...

Security Analytics A Data Centric Approach to Information Security

02 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Security Analytics A Data Centric Approach to Information Security".These sources explore various aspects of i...

The Kubernetes Bible: The definitive guide to deploying and managing Kubernetes across major cloud platforms

02 Nov 2024

Contributed by Lukas

This summary is talking about the Book "The Kubernetes Bible: The definitive guide to deploying and managing Kubernetes across major cloud platforms"....

OWASP Web Security Testing Guide WSTG

02 Nov 2024

Contributed by Lukas

This summary is talking about the Book "OWASP Web Security Testing Guide WSTG".The OWASP Web Security Testing Guide v4.2 provides a comprehensive fram...

Warez: The Infrastructure and Aesthetics of Piracy

02 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Warez: The Infrastructure and Aesthetics of Piracy".Explores the history and culture of the Warez Scene, a glo...

Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid

02 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid".This text pro...

Ransomware and Cybercrime

02 Nov 2024

Contributed by Lukas

This summary is talking about the Book "Ransomware and Cybercrime".The excerpt from Ransomware and Cybercrime by Andrew Jenkinson focuses on the risin...

Unauthorised Access: Physical Penetration Testing For IT Security Teams

31 Oct 2024

Contributed by Lukas

This summary is talking about the Book "Unauthorised Access: Physical Penetration Testing For IT Security Teams".The sources are a compilation of exce...

Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic

31 Oct 2024

Contributed by Lukas

This summary is talking about the Book "Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic".The sources provide a co...

Response Evidence Preservation and Collection

31 Oct 2024

Contributed by Lukas

This summary is talking about the Book "Response Evidence Preservation and Collection".The provided text is a collection of excerpts from a PDF docume...

RTFM - Red Team Field Manual v2

31 Oct 2024

Contributed by Lukas

This summary is talking about the Book "RTFM - Red Team Field Manual v2".This document, titled "RTFM - Red Team Field Manual," serves as a comprehensi...

Real-World Bug Hunting: A Field Guide to Web Hacking

30 Oct 2024

Contributed by Lukas

This summary is talking about the Book "Real-World Bug Hunting: A Field Guide to Web Hacking".This book is a comprehensive guide to web hacking, focus...

Red Team Guide A Practical Guide For Red Team And Offensive Security

30 Oct 2024

Contributed by Lukas

This summary is talking about the Book "Red Team Guide A Practical Guide For Red Team And Offensive Security".The provided text is an excerpt from a "...

«« ← Prev Page 10 of 11 Next → »»