CyberSecurity Summary
Episodes
Beginner's Guide to Exploitation on ARM Vol 1
24 Apr 2025
Contributed by Lukas
This Book is a beginner's guide to exploiting vulnerabilities on ARM systems, which are commonly used in mobile devices. The book guides the reader th...
5G/5G-Advanced: The New Generation Wireless Access Technology
24 Apr 2025
Contributed by Lukas
This Book is a technical overview of the 5G NR (New Radio) standard, focusing on the technical aspects of the radio interface, including the physical ...
5G for Dummies
24 Apr 2025
Contributed by Lukas
This is an excerpt from a Book titled "5G for Dummies" a special edition for Sprint Business. The text provides an overview of 5G technology, its hist...
Cisco CCNA Command Guide: Tips and Tricks to Learn Cisco CCNA Command Guide
22 Apr 2025
Contributed by Lukas
The Book provide a comprehensive guide to the Cisco Certified Network Associate (CCNA) Routing and Switching certification. It details the history of ...
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools
22 Apr 2025
Contributed by Lukas
It covers various hacking techniques, including network scanning, post-exploitation, and ethical hacking. The second source is a collection of cyberse...
Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform
21 Apr 2025
Contributed by Lukas
This excerpt from the Book "Inside Azure Management" provides a comprehensive overview of Azure management and monitoring tools. It highlights the evo...
Inside Cyber Warfare: Mapping the Cyber Underworld
21 Apr 2025
Contributed by Lukas
The Book is an excerpt from the book "Inside Cyber Warfare: Mapping the Cyber Underworld" by Jeffrey Carr. The book explores the complex world of cybe...
Cryptography & Network Security
20 Apr 2025
Contributed by Lukas
The Book provide an overview of cryptography and network security. defines mathematical symbols and notation used in cryptography and network security...
Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud
20 Apr 2025
Contributed by Lukas
This excerpt from the Book "Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud" is a comprehen...
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
19 Apr 2025
Contributed by Lukas
Intelligent Mobile Malware Detection is a book that provides a comprehensive overview of Android malware detection mechanisms. The book begins by int...
Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security
19 Apr 2025
Contributed by Lukas
This Book presents threat hunting playbooks aligned with MITRE ATT&CK tactics. Each playbook focuses on a specific attack phase (e.g., reconnaissa...
You Don't Know JS: Scope & Closures
16 Apr 2025
Contributed by Lukas
This Book is an excerpt from Kyle Simpson's book, "You Don't Know JS: Scope & Closures" which comprehensively explains JavaScript scope and closur...
You Don't Know JS: ES6 & Beyond
14 Apr 2025
Contributed by Lukas
Kyle Simpson's "You Don't Know JS: ES6 & Beyond" is a programming textbook covering JavaScript's ES6 (ECMAScript 2015) update and future features...
You Don't Know JS: Async & Performance
14 Apr 2025
Contributed by Lukas
This Book is from Kyle Simpson's "You Don't Know JS: Async & Performance," exploring JavaScript's asynchronous nature. It contrasts the limitation...
Writing Security Tools and Exploits
13 Apr 2025
Contributed by Lukas
This Book excerpt on writing security exploits and tools. It covers various software vulnerabilities, such as buffer overflows (stack and heap), forma...
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
13 Apr 2025
Contributed by Lukas
This Book is a detailed guide on using Wireshark, a network protocol analyzer, for security professionals. The book covers fundamental networking conc...
Wireshark 101: Essential Skills for Network Analysis
12 Apr 2025
Contributed by Lukas
This Book is an excerpt from the second edition of a book titled "Wireshark 101 Essential Skills for Network Analysis," which teaches beginners how to...
Wireshark Network Security
12 Apr 2025
Contributed by Lukas
The provided Book is the table of contents and introductory material for a book titled Wireshark Network Security. The book aims to teach network admi...
Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals
11 Apr 2025
Contributed by Lukas
This Book excerpt detailing the use of Wireshark for network forensics. It covers Wireshark installation and basic usage, including packet capture and...
Windows Server 2022 & PowerShell All-in-One For Dummies
11 Apr 2025
Contributed by Lukas
The source Book "Windows Server 2022 & PowerShell All-in-One For Dummies" by Sara Perrott. It provides a comprehensive guide for system administra...
Wireless Network Security
10 Apr 2025
Contributed by Lukas
This Book is a technical manual focused on wireless network security. It covers various wireless technologies, including WLAN, infrared, and near-fiel...
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel
10 Apr 2025
Contributed by Lukas
This Book, "Windows Ransomware Detection and Protection," provides a comprehensive guide to understanding and mitigating ransomware threats. Experts M...
Windows Malware Analysis Essentials: Master the Fundamentals of Malware Analysis for the Windows Platform and Enhance Your Anti-malware
09 Apr 2025
Contributed by Lukas
"Windows Malware Analysis Essentials" is a technical Book authored by Victor Marak that provides a comprehensive guide to malware analysis on the Wind...
Windows Kernel Programming
09 Apr 2025
Contributed by Lukas
This Book excerpts Windows kernel programming, covering Windows internals and kernel development. It explains process and thread structures, including...
Windows Internals, Part 2 (Developer Reference)
08 Apr 2025
Contributed by Lukas
This Book is an excerpt from the seventh edition of "Windows Internals, Part 2," a technical book detailing the inner workings of the Windows operatin...
Windows and Linux Penetration Testing from Scratch
08 Apr 2025
Contributed by Lukas
This Book is an excerpt from a penetration testing manual, focusing on techniques for compromising Windows and Linux systems. The book details various...
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure
07 Apr 2025
Contributed by Lukas
The Book is an excerpt on securing Windows 8 and Windows Server 2012 systems. The Book discusses various aspects of network security, including genera...
Web Application Advanced Hacking
07 Apr 2025
Contributed by Lukas
Maor Tal's "Web Application Advanced Hacking" is a hands-on guide to advanced web application hacking techniques for security researchers and bug bou...
You Don't Know JS: this & Object Prototypes
06 Apr 2025
Contributed by Lukas
This Book provides excerpts from Kyle Simpson's Book, "You Don't Know JS: this & Object Prototypes," which explores JavaScript's often-misundersto...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
06 Apr 2025
Contributed by Lukas
The provided Book is a compilation of excerpts from "The Shellcoder’s Handbook, Second Edition," a book focusing on software exploitation. It detail...
Web Hacking 101
06 Apr 2025
Contributed by Lukas
"Web Hacking 101" is a guide to ethical hacking, focusing on real-world examples of vulnerability reports that yielded bug bounties. The book covers v...
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs
04 Apr 2025
Contributed by Lukas
This Book is a table of contents and excerpts from the "Zed Attack Proxy Cookbook," a guide to using the OWASP ZAP tool for web application security t...
Zero Trust Networks: Building Secure Systems in Untrusted Networks
04 Apr 2025
Contributed by Lukas
Zero Trust Networks, by Evan Gilman and Doug Barth, explores building secure systems in untrusted networks. The book critiques the limitations of peri...
You Don't Know JS: Types & Grammar
03 Apr 2025
Contributed by Lukas
Kyle Simpson's You Don't Know JS: Types & Grammar is a guide to mastering JavaScript's intricacies. The book thoroughly explains JavaScript's se...
You Don't Know JS: Up & Going
03 Apr 2025
Contributed by Lukas
Kyle Simpson's "You Don't Know JS" Book series offers an in-depth exploration of JavaScript, challenging the common practice of only learning a superf...
Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code
01 Apr 2025
Contributed by Lukas
Dmitry Vostokov's Book, Foundations of Linux Debugging, Disassembling, and Reversing, teaches readers to analyze binary code, understand stack memory ...
Foundations of ARM64 Linux Debugging, Disassembling, and Reversing: Analyze Code, Understand Stack Memory Usage, and Reconstruct Original
01 Apr 2025
Contributed by Lukas
Dmitry Vostokov's Book, Foundations of ARM64 Linux Debugging, Disassembling, and Reversing, provides a practical guide to understanding ARM64 assembly...
Viruses, Hardware and Software Trojans: Attacks and Countermeasures
31 Mar 2025
Contributed by Lukas
This Book explores the threats of hardware and software Trojans, particularly in critical infrastructure like telecommunications and nuclear power pla...
Unleashing the Art of Digital Forensics
31 Mar 2025
Contributed by Lukas
"Unleashing the Art of Digital Forensics" is a Book covering various aspects of digital forensics, including techniques, challenges, and legal conside...
UNIX and Linux System Administration Handbook, 4th Edition
30 Mar 2025
Contributed by Lukas
This Book is an excerpt from the UNIX and Linux System Administration Handbook, covering various aspects of system administration. Sections detail sof...
UNIX: The Textbook, Third Edition
30 Mar 2025
Contributed by Lukas
This Book chapter provides a "Quick Start" guide to the UNIX operating system, covering fundamental commands for file management, text editing (vi, vi...
Understanding Network Hacks: Attack and Defense with Python 3
29 Mar 2025
Contributed by Lukas
This Book is an excerpt from a book titled "Understanding Network Hacks Attack and Defense with Python 3," which teaches network security concepts and...
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program
29 Mar 2025
Contributed by Lukas
This Book is from a cybersecurity risk management book, offering a practical, three-part framework for building a sustainable program. The book emphas...
Ubuntu Unleashed 2019: Covering 18.04, 18.10, 19.04, and 19.10
28 Mar 2025
Contributed by Lukas
This Book excerpt details Ubuntu Linux, focusing on installation, system administration, and software management. It covers using both the graphical u...
Troubleshooting & Maintaining PCs All-in-One For Dummies
28 Mar 2025
Contributed by Lukas
This Book is an excerpt from the fourth edition of Troubleshooting & Maintaining Your PC All-in-One For Dummies. The book offers comprehensive gui...
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
27 Mar 2025
Contributed by Lukas
This Book is an excerpt from Tribe of Hackers: Security Leaders, a book offering cybersecurity leadership strategies. The excerpt features interviews ...
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
27 Mar 2025
Contributed by Lukas
This Book comprises excerpts from Tribe of Hackers Red Team, a book by Marcus J. Carey and Jennifer Jin. The excerpts feature interviews with numerous...
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
26 Mar 2025
Contributed by Lukas
This Book excerpt features interviews with numerous cybersecurity professionals, collectively offering insights into effective blue team strategies. T...
Tor And The Deep Web 2020: A Beginner's Guide to Staying Anonymous, Dark Net Journey on How to Be Anonymous Online
26 Mar 2025
Contributed by Lukas
This beginner's guide to the dark web explains how Tor and onion routing mask a user's IP address, creating anonymity. It details the three-layered sy...
TLS Mastery: Tux edition
25 Mar 2025
Contributed by Lukas
The Book provide a comprehensive guide to Transport Layer Security (TLS), a fundamental technology for securing internet communications. The text cove...
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
25 Mar 2025
Contributed by Lukas
This Book is about threat hunting in cloud environments, specifically AWS and Azure. The authors, experienced cybersecurity professionals, present a f...
Threat Modeling: Designing for Security
24 Mar 2025
Contributed by Lukas
This Book about threat modeling, a process for identifying and mitigating security risks in software. The book explains various threat modeling strate...
Write Great Code, Volume 2, 2nd Edition: Thinking Low-Level, Writing High-Level
24 Mar 2025
Contributed by Lukas
This Book is an excerpt from a Book on writing efficient high-level language (HLL) code by leveraging low-level understanding. It explores compiler op...
Software Craftsman, The: Professionalism, Pragmatism, Pride
23 Mar 2025
Contributed by Lukas
Sandro Mancuso's The Software Craftsman advocates for professionalism and pride in software development, contrasting outdated notions of seniority w...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
23 Mar 2025
Contributed by Lukas
The provided Book is an excerpt from "The Shellcoder’s Handbook," a book detailing the exploitation of software security vulnerabilities. The book f...
The Quick Python Book, Second Edition
22 Mar 2025
Contributed by Lukas
This Book is from the second edition of The Quick Python Book, a programming tutorial. The book covers fundamental Python concepts, including syntax, ...
The Pentester BluePrint: Starting a Career as an Ethical Hacker
22 Mar 2025
Contributed by Lukas
"The Pentester Blueprint" is a guide to becoming an ethical hacker (pentester). The book covers the necessary technical skills, including operating ...
The Official Raspberry Pi Beginner's Guide: How to use your new computer
21 Mar 2025
Contributed by Lukas
This Book provides a comprehensive introduction to the Raspberry Pi 4 Model B, covering its components, setup, and programming using Scratch and Pytho...
The Official CompTIA Security+ Certification Study Guide
21 Mar 2025
Contributed by Lukas
This Book is an excerpt from a CompTIA Security+ study guide that provides information about network security. The guide explores topics such as risk ...
The Linux Programming Interface: A Linux and UNIX System Programming Handbook
20 Mar 2025
Contributed by Lukas
The provided Book is a collection of excerpts from Michael Kerrisk's "The Linux Programming Interface," a comprehensive guide to Linux and UNIX system...
The Hacker Playbook: Practical Guide To Penetration Testing
20 Mar 2025
Contributed by Lukas
"The Hacker Playbook: Practical Guide to Penetration Testing" is a manual providing a hands-on approach to penetration testing. The book details vari...
The Hacker Playbook 3: Practical Guide To Penetration Testing
19 Mar 2025
Contributed by Lukas
"The Hacker Playbook 3" is a guide to penetration testing and red teaming, focusing on advanced techniques to simulate real-world attacks. The book c...
The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process
19 Mar 2025
Contributed by Lukas
This Book comprises excerpts from "The Docker Workshop," a guide to building and deploying applications using Docker. The book covers Dockerfiles, ima...
The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World
18 Mar 2025
Contributed by Lukas
The Decision Intelligence Handbook by Pratt and Malcolm is a practical guide to Decision Intelligence (DI), a methodology for improving decision-maki...
The Complete Cyber Security Course
18 Mar 2025
Contributed by Lukas
The provided Book is a collection of excerpts from a cybersecurity course. The course, "The Complete Cyber Security Course Volume I Hackers Exposed," ...
The Clean Coder: A Code of Conduct for Professional Programmers
17 Mar 2025
Contributed by Lukas
This Book is an excerpt from Robert C. Martin's "The Clean Coder," a book focused on professionalism in software development. It explores various aspe...
CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)
17 Mar 2025
Contributed by Lukas
The provided Book is an excerpt from The CERT Oracle Secure Coding Standard for Java, a guide to secure coding practices in Java. It details numerous ...
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
16 Mar 2025
Contributed by Lukas
"The Security Culture Playbook" is a guide to understanding and improving organizational security culture. The book emphasizes that security culture ...
The IDA Pro Book, 2nd Edition
16 Mar 2025
Contributed by Lukas
This Book is an excerpt from the second edition of "The IDA Pro Book," a guide to using IDA Pro, a popular disassembler. The book covers various aspec...
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization
15 Mar 2025
Contributed by Lukas
This Book is a technical guide to Jakarta EE security, covering its history, architecture, and implementation details. It details Jakarta Authenticati...
The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence
15 Mar 2025
Contributed by Lukas
"The Unix-Haters Handbook" compiles six years of messages from the UNIX-HATERS mailing list, expressing widespread frustration with the Unix operatin...
The threat intelligence handbook
14 Mar 2025
Contributed by Lukas
The provided Book is an excerpt from the second edition of The Threat Intelligence Handbook, published by CyberEdge Group and primarily authored by Re...
The Tangled Web: A Guide to Securing Modern Web Applications
14 Mar 2025
Contributed by Lukas
The provided Book is a table of contents and excerpts from Michal Zalewski's book, "The Tangled Web: A Guide to Securing Modern Web Applications." The...
The Social Engineer's Playbook: A Practical Guide to Pretexting
12 Mar 2025
Contributed by Lukas
Jeremiah Talamantes's The Social Engineer's Playbook is a practical guide to pretexting, a form of social engineering. The book covers various soci...
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
12 Mar 2025
Contributed by Lukas
This Book excerpt chronicles the rise of ransomware and the efforts of a unique group of cybersecurity experts, the Ransomware Hunting Team, to combat...
The Mac Hacker's Handbook
10 Mar 2025
Contributed by Lukas
This Book is an excerpt from "The Mac Hacker's Handbook," a book exploring the security vulnerabilities of Mac OS X. The book details methods for disc...
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
10 Mar 2025
Contributed by Lukas
This Book is an excerpt from The Hacker's Handbook, a technical manual detailing network security vulnerabilities and exploits. It systematically expl...
The Hacker Playbook 2: Practical Guide To Penetration Testing
09 Mar 2025
Contributed by Lukas
"The Hacker Playbook 2" is a guide to penetration testing, expanding upon the first book with updated attacks and techniques. The book covers variou...
The Complete Book of Locks and Locksmithing
09 Mar 2025
Contributed by Lukas
This Book is an excerpt from "The Complete Book of Locks and Locksmithing," a comprehensive guide to locks and locksmithing. It covers the history of ...
The Analytics Setup Guidebook
08 Mar 2025
Contributed by Lukas
This guidebook from Holistics, a data analytics company, offers a practical framework for building modern analytics systems. It covers setting up an a...
Testing and Securing Android Studio Applications
08 Mar 2025
Contributed by Lukas
This Book is the preface and table of contents from a book titled Testing and Securing Android Studio Applications. The book guides Android developers...
TCP/IP Protocol Suite
07 Mar 2025
Contributed by Lukas
The provided Book is a table of contents and excerpts from Behrouz Forouzan's "TCP/IP Protocol Suite, 4th Edition," covering various networking concep...
Take Control of Wi-Fi Networking and Security
07 Mar 2025
Contributed by Lukas
Glenn Fleishman's Take Control of Wi-Fi Networking and Security is a comprehensive guide to setting up and securing Wi-Fi networks. The book covers ...
SwiftUI Essentials - iOS 14 Edition: Learn to Develop iOS Apps Using SwiftUI, Swift 5 and Xcode 12
06 Mar 2025
Contributed by Lukas
This Book is a table of contents and excerpts from a book teaching iOS app development using SwiftUI. It covers fundamental Swift programming concepts...
Cryptography: Theory and Practice
06 Mar 2025
Contributed by Lukas
The provided Book is an excerpt from a cryptography textbook, specifically focusing on the theory and practice of various cryptographic systems. It co...
Cryptography And Network Security: Principles and Practices
05 Mar 2025
Contributed by Lukas
This Book is an excerpt from a cryptography and network security textbook. It covers various security mechanisms, including encryption algorithms (sym...
Cryptography and Network Security: Principles and Practice
05 Mar 2025
Contributed by Lukas
This Book is excerpt from William Stallings' book, Cryptography and Network Security: Principles and Practice, seventh edition. The excerpt covers a b...
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks
04 Mar 2025
Contributed by Lukas
This Book provides a comprehensive guide to SQL injection, covering both offensive and defensive strategies. Part one introduces SQL, database systems...
Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes
04 Mar 2025
Contributed by Lukas
This Book is on simplifying React application testing. It covers using the React Testing Library for unit and integration tests, emphasizing user-cent...
Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide
03 Mar 2025
Contributed by Lukas
This Book is a lab guide for a self-paced Silver Peak Advanced SDWAN course. It provides step-by-step instructions for configuring various networking ...
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
03 Mar 2025
Contributed by Lukas
This Book is excerpt from Jon Westfall's 2021 Book, "Set Up and Manage Your Virtual Private Server." The book guides readers through setting up and ad...
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
01 Mar 2025
Contributed by Lukas
This Book is a comprehensive guide to serverless security, focusing on the implementation of secure practices across AWS, Azure, and Google Cloud plat...
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
01 Mar 2025
Contributed by Lukas
This Book is a detailed guide to modern cryptography, covering both theoretical concepts and practical implementations. The book explores various cryp...
Security in Computing
28 Feb 2025
Contributed by Lukas
This excerpt from Charles P. Pfleeger's "Security in Computing" (5th edition) is a textbook chapter on computer security. It examines various threats...
Security Warrior: Know Your Enemy
28 Feb 2025
Contributed by Lukas
Security Warrior is a technical manual focusing on network security, reverse engineering, and attack techniques. It covers various operating systems ...
Security Testing with Kali NetHunter
27 Feb 2025
Contributed by Lukas
This Book is an excerpt from a Book about security testing with Kali NetHunter, a mobile penetration testing platform for Android. The excerpt covers ...
Security Engineering: A Guide to Building Dependable Distributed Systems
27 Feb 2025
Contributed by Lukas
Ross Anderson's "Security Engineering: A Guide to Building Dependable Distributed Systems" explores various facets of security, from cryptographic v...
Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments
26 Feb 2025
Contributed by Lukas
Luigi Aversa's Security for Containers and Kubernetes is a comprehensive guide to securing containerized environments. The book covers container st...
Security Strategies in Linux Platforms and Applications
26 Feb 2025
Contributed by Lukas
This Book excerpt details Linux security strategies, covering threats, vulnerabilities, and hardening techniques. It explains Linux's architecture, in...
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
25 Feb 2025
Contributed by Lukas
This Book is a technical Book excerpt focusing on network security, specifically detailing secure proxies and their role in modern threat detection an...