Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CyberSecurity Summary

News Education Arts

Episodes

Showing 201-300 of 1033
«« ← Prev Page 3 of 11 Next → »»

RFID at Ultra and Super High Frequencies: Theory and application

04 Aug 2025

Contributed by Lukas

Offers an in-depth exploration of Radio Frequency Identification (RFID) technology, specifically focusing on Ultra High Frequency (UHF) and Super High...

Python 3 Web Development Beginner's Guide

04 Aug 2025

Contributed by Lukas

Aims to equip readers with the knowledge to build and customize Python web applications without relying on a predefined framework. It covers a broad s...

RFID in Logistics: A Practical Introduction

03 Aug 2025

Contributed by Lukas

Provides a comprehensive introduction to Radio Frequency Identification (RFID) technology within the context of logistics and supply chain management....

The complete Python & C++ Manual

03 Aug 2025

Contributed by Lukas

Introduces both Python and C++ programming languages, guiding newcomers through the fundamentals of hardware and software interaction. It offers pract...

The Dark Web: Breakthroughs in Research and Practice (Critical Explorations)

02 Aug 2025

Contributed by Lukas

Provides an extensive overview of the dark web, exploring its multifaceted nature through four primary sections: Cyber Crime and Security, Data Mining...

Python: Tricks and Tips

02 Aug 2025

Contributed by Lukas

Provides a comprehensive guide to programming, primarily focusing on C++ and Python. It offers beginner-friendly instructions on setting up developmen...

Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID

01 Aug 2025

Contributed by Lukas

Presents a critical examination of Radio Frequency Identification (RFID) technology. Published in 2005, the book argues that corporations and governme...

Social Engineering: The Art of Psychological Warfare, Human Hacking, Persuasion & Deception

01 Aug 2025

Contributed by Lukas

A comprehensive guide to social engineering. It defines social engineering as exploiting human psychology to gain unauthorized access, contrasting it ...

Security Issues and Privacy Concerns in Industry 4.0 Applications

31 Jul 2025

Contributed by Lukas

Addresses various security issues and privacy concerns within the context of Industry 4.0 applications. Topics explored include the use of Internet of...

Security and Privacy in Wireless and Mobile Networks

31 Jul 2025

Contributed by Lukas

Focusing on security and privacy within wireless and mobile networks, initially published in the journal Future Internet from 2017-2018. It covers div...

Security in RFID and Sensor Networks

31 Jul 2025

Contributed by Lukas

Focuses on security considerations within RFID (Radio-Frequency Identification) and sensor networks, divided into two main parts: security in RFID and...

GREY HAT HACKER: THE PLAYBOOK OF A GENIUS

30 Jul 2025

Contributed by Lukas

Serves as a practical guide to ethical hacking and penetration testing. It systematically introduces fundamental concepts of hacking, details the setu...

RFID-Enabled Sensor Design and Applications (Artech House Integrated Microsystems)

30 Jul 2025

Contributed by Lukas

Explores the intricate world of RFID (Radio Frequency Identification) technology and its integration with sensors. It begins by detailing various auto...

The Essential Guide to HTML5: Using Games to Learn HTML5 and JavaScript

29 Jul 2025

Contributed by Lukas

Explores HTML5, CSS, and JavaScript features through the creation of interactive web applications and games. It covers fundamental concepts like docum...

Python: The Complete Guide

29 Jul 2025

Contributed by Lukas

Detailing its use in the digital world and offering practical applications. Readers can explore fundamental concepts like common coding mistakes and v...

Learning Vue.js 2: Learn how to build amazing and complex reactive web applications easily with Vue.js

28 Jul 2025

Contributed by Lukas

Provides a comprehensive guide to understanding and implementing web applications using the Vue.js 2.0 framework. It explores core Vue.js concepts suc...

Learning Web Design: A Beginner's Guide to HTML, CSS, JavaScript, and Web Graphics

28 Jul 2025

Contributed by Lukas

Serves as a comprehensive guide to web design and development. The excerpts explain fundamental concepts of HTML, covering elements, attributes, and d...

Natural Language Processing with Java: Techniques for building machine learning and neural network models for NLP, 2nd Edition

27 Jul 2025

Contributed by Lukas

Provides an overview of Natural Language Processing (NLP) techniques and their implementation using Java APIs. It covers fundamental concepts like tok...

Network Basics for Hackers: How Networks Work and How They Break

27 Jul 2025

Contributed by Lukas

Serves as a comprehensive guide to fundamental networking concepts from a hacker's perspective. It begins by covering TCP/IP basics, including subnett...

Network Scanning Cookbook: Practical network security using Nmap and Nessus 7

26 Jul 2025

Contributed by Lukas

Serves as a comprehensive guide for information security professionals on network security scanning. Authored by Sairam Jetty and published by Packt P...

Kali Linux: Advanced Methods and Strategies to Learn Kali Linux

26 Jul 2025

Contributed by Lukas

Provides a comprehensive guide to using Kali Linux for penetration testing and security auditing. It covers the stages of penetration testing, includi...

Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure

25 Jul 2025

Contributed by Lukas

Serves as a comprehensive guide for security professionals. It outlines the fundamental concepts of network security, including the CIA triad and vari...

Neural Networks and Deep Learning: A Textbook

24 Jul 2025

Contributed by Lukas

Provides an extensive overview of neural networks and deep learning, beginning with fundamental concepts like single-layer and multilayer networks, ac...

Neural Network Programming with Java: Create and unleash the power of neural networks by implementing professional Java code

24 Jul 2025

Contributed by Lukas

Serves as a practical guide for implementing neural networks using Java. It covers foundational concepts of artificial neural networks (ANNs), various...

PostgreSQL Server Programming

23 Jul 2025

Contributed by Lukas

Focuses on advanced programming within the PostgreSQL database server itself, moving beyond simple SQL queries. The text covers various topics, includ...

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

23 Jul 2025

Contributed by Lukas

Explores the hidden world of cyberweapons and their impact on global security, drawing from over three hundred interviews conducted by the author over...

Python Data Science: The Ultimate Crash Course, Tips, and Tricks to Learn Data Analytics, Machine Learning, and Their Application

22 Jul 2025

Contributed by Lukas

Introduces readers to the field of data science, emphasizing its growing importance in various industries due to the massive increase in data generate...

Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking

22 Jul 2025

Contributed by Lukas

Examines the world of computer hacking and cybercrime, drawing from a book that utilizes criminal profiling techniques to understand hacker motivation...

Learning Robotics using Python: Design, simulate, program, and prototype an autonomous mobile robot using ROS, OpenCV, PCL, and Python

21 Jul 2025

Contributed by Lukas

A comprehensive guide to designing, simulating, programming, and prototyping autonomous mobile robots using ROS, OpenCV, PCL, and Python. Authored by ...

Python Data Cleaning Cookbook: Modern techniques and Python tools to detect and remove dirty data and extract key insights

21 Jul 2025

Contributed by Lukas

Provides a comprehensive guide to data cleaning techniques using Python, specifically focusing on the pandas library. It covers essential steps from i...

Intrusion Detection Guide

20 Jul 2025

Contributed by Lukas

Offers comprehensive insights into cybersecurity incident response and threat hunting. Authored by multiple experts, it covers foundational concepts a...

How to Hack Like a Ghost: Breaching the Cloud

20 Jul 2025

Contributed by Lukas

Serves as a comprehensive guide to modern ethical hacking, with a strong focus on cloud environments and sophisticated offensive security techniques. ...

Head First Learn to Code: A Learner's Guide to Coding and Computational Thinking

19 Jul 2025

Contributed by Lukas

Provides an in-depth guide to learning Python programming, starting with foundational concepts like computational thinking and basic syntax, variables...

Hands-On Neural Networks with TensorFlow 2.0: Understand TensorFlow, from static graph to eager execution, and design neural networks

19 Jul 2025

Contributed by Lukas

Provides an in-depth guide to neural networks and machine learning using TensorFlow 2.0. It begins by explaining fundamental concepts like datasets, s...

Hands-On Neuroevolution with Python: Build high-performing artificial neural network architectures using neuroevolution-based algorithms

18 Jul 2025

Contributed by Lukas

Provides an in-depth guide to neuroevolution, a field focusing on evolving artificial neural networks, primarily using the NEAT algorithm and its adva...

Hands-On Deep Learning with R: A practical guide to designing, building, and improving neural network models using R

18 Jul 2025

Contributed by Lukas

Serves as a practical guide for designing and building deep learning models using the R programming language. It comprehensively covers foundational m...

Hacking with Kali Linux: A Guide to Ethical Hacking: A Beginner's Guide with Practical Examples to Test Infrastructure Security with Kali

17 Jul 2025

Contributed by Lukas

Introduces readers to ethical hacking and cybersecurity using the Kali Linux operating system. It differentiates between black hat, gray hat, and whit...

Hacking: The Unlocking of Transparency

17 Jul 2025

Contributed by Lukas

Serves as a comprehensive guide to ethical hacking, beginning with the author's personal journey from curiosity-driven "black hat" hacking to establis...

Hacking : The Ultimate Hacking for Beginners : How to Hack : Hacking Intelligence : Certified Hacking Book

16 Jul 2025

Contributed by Lukas

Offers a comprehensive overview of hacking and computer security, beginning with definitions of hacking and the different classifications of hackers, ...

Hacking Exposed Computer Forensics

16 Jul 2025

Contributed by Lukas

Offers an in-depth look at computer forensics, providing guidance for both new and experienced professionals. It reviews methods for collecting and an...

Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists

15 Jul 2025

Contributed by Lukas

Provides practical instruction for electronics enthusiasts. The book covers fundamental concepts such as voltage, current, resistance, and power, expl...

Hacking (Compact Research: The Internet)

15 Jul 2025

Contributed by Lukas

Serves as a comprehensive guide for information security professionals and forensic examiners. It offers detailed methodologies for conducting digital...

Hacking: Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing

14 Jul 2025

Contributed by Lukas

Serves as a comprehensive manual for individuals interested in creating and modifying electronic devices, emphasizing practical, hands-on learning. It...

Hack Attacks Testing: How to Conduct Your Own Security Audit

14 Jul 2025

Contributed by Lukas

Offers a detailed examination of computer hacking, its history, methods, and implications, particularly within the context of the internet. It explore...

Game Theory and Machine Learning for Cyber Security

13 Jul 2025

Contributed by Lukas

Offers an extensive overview of computer hacking, basic security, and penetration testing. The book aims to equip readers with the knowledge of how ha...

Fundamentals of Quantum Computing: Theory and Practice

13 Jul 2025

Contributed by Lukas

Serves as a practical guide for building and operating a "Tiger Box," a system designed to identify and analyze network security vulnerabilities. It c...

From Hacking to Report Writing: An Introduction to Security and Penetration Testing

12 Jul 2025

Contributed by Lukas

Provides an introduction to security and penetration testing, offering practical guidance from initial setup to report writing. It covers various type...

Foundations of Information Security: A Straightforward Introduction

12 Jul 2025

Contributed by Lukas

Serves as a comprehensive guide to fundamental information security concepts, suitable for beginners and professionals alike. It covers a broad spectr...

Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro

11 Jul 2025

Contributed by Lukas

Serves as a comprehensive guide to ethical hacking and penetration testing using Kali Linux. It outlines the fundamental concepts of Linux, various so...

Ethical Hacking and Penetration Testing Guide

11 Jul 2025

Contributed by Lukas

Provides a structured approach to understanding and executing security assessments. The book details a four-step methodology that covers planning, inf...

Ethical Hacking: A Hands-on Introduction to Breaking In

10 Jul 2025

Contributed by Lukas

A guide for understanding cybersecurity principles and ethical hacking techniques. It covers setting up a virtual lab environment with tools like Kali...

Head First HTML and CSS: A Learner's Guide to Creating Standards-Based Web Pages

10 Jul 2025

Contributed by Lukas

Serves as a comprehensive guide to web development fundamentals. It breaks down HTML for structuring web pages, covering elements like headings, parag...

Effective Cybersecurity: A Guide to Using Best Practices and Standards

09 Jul 2025

Contributed by Lukas

Offers a comprehensive guide to cybersecurity, emphasizing the importance of governance, risk management, and the implementation of security controls....

Easily: Practical Machine Learning Algorithms with Python

09 Jul 2025

Contributed by Lukas

Provides a comprehensive guide to machine learning algorithms using Python. It covers a range of supervised learning techniques like Decision Trees, R...

Drone Technology in Architecture, Engineering and Construction: A Strategic Guide to Unmanned Aerial Vehicle Operation and Implementation

08 Jul 2025

Contributed by Lukas

Explores the strategic implementation and operation of unmanned aerial vehicles (UAVs) within the AEC industries. It covers the practical aspects of d...

Doing Data Science: Straight Talk from the Frontline

08 Jul 2025

Contributed by Lukas

offers an overview of data science, drawing from a book based on a university course. It explores various algorithms and models such as linear and log...

Distributed Denial of Service Attacks: Real-world Detection and Mitigation

07 Jul 2025

Contributed by Lukas

Focusing on Distributed Denial of Service (DDoS) attacks. Authored primarily by Dr. Ilker Özçelik and Dr. Brooks, the book offers a comprehensive an...

Distributed Artificial Intelligence: A Modern Approach (Internet of Everything (IoE))

07 Jul 2025

Contributed by Lukas

Explores the multifaceted field of Distributed Artificial Intelligence (DAI), emphasizing its application in solving complex problems through coordina...

Deep Reinforcement Learning with Python: Master classic RL, deep RL, distributional RL, inverse RL, and more with OpenAI Gym and TensorFlow

06 Jul 2025

Contributed by Lukas

Explores various aspects of reinforcement learning (RL) and deep reinforcement learning (DRL), covering both foundational concepts and advanced algori...

Deep Learning with PyTorch 1.x: Implement deep learning techniques and neural network architecture variants using Python

06 Jul 2025

Contributed by Lukas

Provides a comprehensive guide to implementing deep learning techniques and neural network architectures using Python and the PyTorch framework. Autho...

Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

05 Jul 2025

Contributed by Lukas

Offers a comprehensive guide to cybersecurity, focusing on attack and defense strategies for infrastructure security. It explores the current threat l...

Cyber-Security Threats, Actors, and Dynamic Mitigation

05 Jul 2025

Contributed by Lukas

Explores various facets of cybersecurity, ranging from system and network threats to cryptographic vulnerabilities. It examines cyber-attack methodolo...

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques

04 Jul 2025

Contributed by Lukas

Provides an extensive overview of cybersecurity strategies, detailing both attack and defense methodologies. It covers the lifecycle of cyberattacks, ...

Cyber Security: Threats and Responses for Government and Business

04 Jul 2025

Contributed by Lukas

Provides an extensive overview of cybersecurity threats and responses, highlighting the dynamic and evolving nature of the cyber domain. It examines h...

Cyber Security: The CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief Information Security

03 Jul 2025

Contributed by Lukas

Introduces ESORMA, an Enterprise Security Operations Risk Management Architecture. This guide provides a practical, eight-domain framework—Scope, Pr...

Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices)

03 Jul 2025

Contributed by Lukas

Explores various facets of cybersecurity. It covers threats to computer networks, cyber-physical systems, and the Internet of Things (IoT), alongside ...

Cyber Victimology: Decoding Cyber-Crime Victimisation

02 Jul 2025

Contributed by Lukas

Examines the evolution of victimology to include cybercrime, discussing various patterns of cyber victimization affecting individuals, companies, and ...

Cyber Arms

02 Jul 2025

Contributed by Lukas

Explores the multifaceted evolution and implications of cyber warfare and cybersecurity. It traces the history of malicious code from simple pranks to...

Create Graphical User Interfaces with Python: How to build windows, buttons, and widgets for your Python projects

01 Jul 2025

Contributed by Lukas

Focuses on teaching users how to develop graphical user interfaces (GUIs) using Python and the guizero library. It covers various aspects, from creati...

C++ Primer (5th Edition)

01 Jul 2025

Contributed by Lukas

Explains core C++ concepts ranging from basic program compilation and execution on different operating systems to advanced topics like templates, exce...

Computer Networking: A Top-Down Approach

30 Jun 2025

Contributed by Lukas

Provides an extensive overview of computer networking and the Internet, starting with foundational concepts like network components, protocols (TCP/IP...

Classic Computer Science Problems in Python

30 Jun 2025

Contributed by Lukas

Provides a comprehensive exploration of fundamental computer science concepts and their practical applications using Python 3.7. It covers various pro...

Building Computer Vision Applications Using Artificial Neural Networks: With Step-by-Step Examples in OpenCV and TensorFlow with Python

29 Jun 2025

Contributed by Lukas

Offers a comprehensive guide to computer vision (CV), primarily focusing on its implementation using artificial neural networks (ANNs) and deep learni...

Building Android Apps in Python Using Kivy with Android Studio: With Pyjnius, Plyer, and Buildozer

29 Jun 2025

Contributed by Lukas

Serves as a comprehensive guide for developers interested in creating cross-platform Android applications with Python. It focuses on leveraging the Ki...

Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications

28 Jun 2025

Contributed by Lukas

Serves as a guide for aspiring penetration testers and bug bounty hunters to identify and exploit web application vulnerabilities. It introduces essen...

The Little Black Book of Computer Viruses: The Basic Technology

28 Jun 2025

Contributed by Lukas

Explores the fundamental technology of computer viruses, including various types like COM file infectors, executable viruses, and boot sector viruses,...

Beginning Sensor Networks with XBee, Raspberry Pi, and Arduino: Sensing the World with Python and MicroPython

27 Jun 2025

Contributed by Lukas

Provides an in-depth guide to building sensor networks. The book covers fundamental concepts like sensor network anatomy, various sensor types, and da...

Beginning Programming With Python For Dummies, 2Ed

27 Jun 2025

Contributed by Lukas

Provides an extensive introduction to Python programming. It covers fundamental concepts such as interacting with the Python command line, understandi...

BackTrack 5 Wireless Penetration Testing Beginner's Guide

26 Jun 2025

Contributed by Lukas

Serves as a comprehensive guide for understanding and executing wireless network penetration tests using the BackTrack 5 platform. Authored by Vivek R...

Azure Databricks Cookbook: Accelerate and scale real-time analytics solutions using the Apache Spark-based analytics service

26 Jun 2025

Contributed by Lukas

Provides an in-depth guide to Azure Databricks, focusing on its practical applications in big data solutions and real-time analytics. It covers fundam...

Automate it

23 Jun 2025

Contributed by Lukas

Offers Python-based solutions for business process automation. Authored by Chetan Giridhar and reviewed by Maurice HT Ling, the book covers a wide arr...

Asterisk Hacking

23 Jun 2025

Contributed by Lukas

Provides an in-depth guide to Asterisk, an open-source Private Branch Exchange (PBX) and Voice over Internet Protocol (VoIP) system. It covers install...

Artificial Intelligence With Python

23 Jun 2025

Contributed by Lukas

Serves as a comprehensive tutorial on artificial intelligence concepts and their practical application using Python. It explores various AI subfields ...

Artificial Intelligence in Finance: A Python-Based Guide

23 Jun 2025

Contributed by Lukas

Explores the integration of AI, particularly deep learning and reinforcement learning, with financial concepts. It contrasts normative financial theor...

Artificial Intelligence for .NET: Speech, Language, and Search: Building Smart Applications with Microsoft Cognitive Services APIs

21 Jun 2025

Contributed by Lukas

Serves as a practical guide for building smart applications using Microsoft Cognitive Services APIs. It covers the fundamental concepts of Artificial ...

Arduino Workshop: A Hands-On Introduction with 65 Projects

21 Jun 2025

Contributed by Lukas

Introduces the Arduino platform, a flexible, open-source microcontroller designed for hobbyists to create electronic projects. It details how to set u...

Arduino programming: the ultimate beginner's guide to learn Arduino programming step by step

20 Jun 2025

Contributed by Lukas

Introduces Arduino programming, explaining what Arduino is and its historical development. It details the advantages of using Arduino, such as its cos...

Arduino Cookbook: Recipes to Begin, Expand, and Enhance Your Projects

20 Jun 2025

Contributed by Lukas

Offers recipes for beginning, expanding, and enhancing projects with Arduino microcontrollers. It covers a wide array of topics, from fundamental math...

Approach To Real World Hacking

19 Jun 2025

Contributed by Lukas

Serves as a practical guide to various cybersecurity techniques, emphasizing ethical hacking. It systematically covers methods such as Cracking SSH, W...

Applied Deep Learning: A Case-Based Approach to Understanding Deep Neural Networks

19 Jun 2025

Contributed by Lukas

Guides readers through fundamental concepts of deep learning, including computational graphs, single neurons, and feedforward neural networks, often u...

Hacking With Experts

18 Jun 2025

Contributed by Lukas

Serves as a comprehensive guide to various computer-related topics, with a strong emphasis on "ethical hacking" techniques and digital security. The t...

AngularJS Web Application Development Cookbook

18 Jun 2025

Contributed by Lukas

Offers over 90 practical recipes, authored by Matt Frisbie, to help users architect performant applications and implement best practices in AngularJS....

Android Notes for Professionals

17 Jun 2025

Contributed by Lukas

A comprehensive guide spanning over 1000 pages, offering professional hints and tricks for Android development. It covers a vast array of topics, begi...

Android Design Patterns and Best Practice

17 Jun 2025

Contributed by Lukas

Serves as a comprehensive guide for developing reliable, robust, and efficient Android applications. It explores various industry-standard design patt...

AI Crash Course: A fun and hands-on introduction to machine learning, reinforcement learning, deep learning, and artificial intelligence

16 Jun 2025

Contributed by Lukas

Offers a comprehensive AI Crash Course authored by Hadelin de Ponteves, with contributions from Jan Warchocki and Kirill Eremenko, and published by Pa...

AI and Machine Learning for Coders: A Programmer's Guide to Artificial Intelligence

16 Jun 2025

Contributed by Lukas

Introduces machine learning and artificial intelligence to programmers, primarily focusing on TensorFlow. It covers fundamental concepts such as neura...

AI for Games

15 Jun 2025

Contributed by Lukas

Examines artificial intelligence (AI) in video games, covering various fundamental concepts and applications. It begins by outlining core AI elements ...

Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict

15 Jun 2025

Contributed by Lukas

Targets intermediate cybersecurity practitioners, offering insights for both offensive "red teams" and defensive "blue teams" in competition and real-...

Advanced Smart Computing Technologies in Cybersecurity and Forensics

14 Jun 2025

Contributed by Lukas

Explores various aspects of cybersecurity and digital forensics, emphasizing the role of advanced computing technologies like artificial intelligence,...

Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website

14 Jun 2025

Contributed by Lukas

Focuses on securing web applications built with ASP.NET Core. It begins by establishing foundational security concepts, such as the CIA triad (Confide...

«« ← Prev Page 3 of 11 Next → »»