Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CyberSecurity Summary

News Education Arts

Episodes

Showing 401-500 of 1034
«« ← Prev Page 5 of 11 Next → »»

Beginner's Guide to Exploitation on ARM Vol 1

24 Apr 2025

Contributed by Lukas

This Book is a beginner's guide to exploiting vulnerabilities on ARM systems, which are commonly used in mobile devices. The book guides the reader th...

5G/5G-Advanced: The New Generation Wireless Access Technology

24 Apr 2025

Contributed by Lukas

This Book is a technical overview of the 5G NR (New Radio) standard, focusing on the technical aspects of the radio interface, including the physical ...

5G for Dummies

24 Apr 2025

Contributed by Lukas

This is an excerpt from a Book titled "5G for Dummies" a special edition for Sprint Business. The text provides an overview of 5G technology, its hist...

Cisco CCNA Command Guide: Tips and Tricks to Learn Cisco CCNA Command Guide

22 Apr 2025

Contributed by Lukas

The Book provide a comprehensive guide to the Cisco Certified Network Associate (CCNA) Routing and Switching certification. It details the history of ...

HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools

22 Apr 2025

Contributed by Lukas

It covers various hacking techniques, including network scanning, post-exploitation, and ethical hacking. The second source is a collection of cyberse...

Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform

21 Apr 2025

Contributed by Lukas

This excerpt from the Book "Inside Azure Management" provides a comprehensive overview of Azure management and monitoring tools. It highlights the evo...

Inside Cyber Warfare: Mapping the Cyber Underworld

21 Apr 2025

Contributed by Lukas

The Book is an excerpt from the book "Inside Cyber Warfare: Mapping the Cyber Underworld" by Jeffrey Carr. The book explores the complex world of cybe...

Cryptography & Network Security

20 Apr 2025

Contributed by Lukas

The Book provide an overview of cryptography and network security. defines mathematical symbols and notation used in cryptography and network security...

Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud

20 Apr 2025

Contributed by Lukas

This excerpt from the Book "Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud" is a comprehen...

Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)

19 Apr 2025

Contributed by Lukas

Intelligent Mobile Malware Detection is a book that provides a comprehensive overview of Android malware detection mechanisms. The book begins by int...

Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security

19 Apr 2025

Contributed by Lukas

This Book presents threat hunting playbooks aligned with MITRE ATT&CK tactics. Each playbook focuses on a specific attack phase (e.g., reconnaissa...

You Don't Know JS: Scope & Closures

16 Apr 2025

Contributed by Lukas

This Book is an excerpt from Kyle Simpson's book, "You Don't Know JS: Scope & Closures" which comprehensively explains JavaScript scope and closur...

You Don't Know JS: ES6 & Beyond

14 Apr 2025

Contributed by Lukas

Kyle Simpson's "You Don't Know JS: ES6 & Beyond" is a programming textbook covering JavaScript's ES6 (ECMAScript 2015) update and future features...

You Don't Know JS: Async & Performance

14 Apr 2025

Contributed by Lukas

This Book is from Kyle Simpson's "You Don't Know JS: Async & Performance," exploring JavaScript's asynchronous nature. It contrasts the limitation...

Writing Security Tools and Exploits

13 Apr 2025

Contributed by Lukas

This Book excerpt on writing security exploits and tools. It covers various software vulnerabilities, such as buffer overflows (stack and heap), forma...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

13 Apr 2025

Contributed by Lukas

This Book is a detailed guide on using Wireshark, a network protocol analyzer, for security professionals. The book covers fundamental networking conc...

Wireshark 101: Essential Skills for Network Analysis

12 Apr 2025

Contributed by Lukas

This Book is an excerpt from the second edition of a book titled "Wireshark 101 Essential Skills for Network Analysis," which teaches beginners how to...

Wireshark Network Security

12 Apr 2025

Contributed by Lukas

The provided Book is the table of contents and introductory material for a book titled Wireshark Network Security. The book aims to teach network admi...

Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals

11 Apr 2025

Contributed by Lukas

This Book excerpt detailing the use of Wireshark for network forensics. It covers Wireshark installation and basic usage, including packet capture and...

Windows Server 2022 & PowerShell All-in-One For Dummies

11 Apr 2025

Contributed by Lukas

The source Book "Windows Server 2022 & PowerShell All-in-One For Dummies" by Sara Perrott. It provides a comprehensive guide for system administra...

Wireless Network Security

10 Apr 2025

Contributed by Lukas

This Book is a technical manual focused on wireless network security. It covers various wireless technologies, including WLAN, infrared, and near-fiel...

Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel

10 Apr 2025

Contributed by Lukas

This Book, "Windows Ransomware Detection and Protection," provides a comprehensive guide to understanding and mitigating ransomware threats. Experts M...

Windows Malware Analysis Essentials: Master the Fundamentals of Malware Analysis for the Windows Platform and Enhance Your Anti-malware

09 Apr 2025

Contributed by Lukas

"Windows Malware Analysis Essentials" is a technical Book authored by Victor Marak that provides a comprehensive guide to malware analysis on the Wind...

Windows Kernel Programming

09 Apr 2025

Contributed by Lukas

This Book excerpts Windows kernel programming, covering Windows internals and kernel development. It explains process and thread structures, including...

Windows Internals, Part 2 (Developer Reference)

08 Apr 2025

Contributed by Lukas

This Book is an excerpt from the seventh edition of "Windows Internals, Part 2," a technical book detailing the inner workings of the Windows operatin...

Windows and Linux Penetration Testing from Scratch

08 Apr 2025

Contributed by Lukas

This Book is an excerpt from a penetration testing manual, focusing on techniques for compromising Windows and Linux systems. The book details various...

Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

07 Apr 2025

Contributed by Lukas

The Book is an excerpt on securing Windows 8 and Windows Server 2012 systems. The Book discusses various aspects of network security, including genera...

Web Application Advanced Hacking

07 Apr 2025

Contributed by Lukas

Maor Tal's "Web Application Advanced Hacking" is a hands-on guide to advanced web application hacking techniques for security researchers and bug bou...

You Don't Know JS: this & Object Prototypes

06 Apr 2025

Contributed by Lukas

This Book provides excerpts from Kyle Simpson's Book, "You Don't Know JS: this & Object Prototypes," which explores JavaScript's often-misundersto...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

06 Apr 2025

Contributed by Lukas

The provided Book is a compilation of excerpts from "The Shellcoder’s Handbook, Second Edition," a book focusing on software exploitation. It detail...

Web Hacking 101

06 Apr 2025

Contributed by Lukas

"Web Hacking 101" is a guide to ethical hacking, focusing on real-world examples of vulnerability reports that yielded bug bounties. The book covers v...

Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs

04 Apr 2025

Contributed by Lukas

This Book is a table of contents and excerpts from the "Zed Attack Proxy Cookbook," a guide to using the OWASP ZAP tool for web application security t...

Zero Trust Networks: Building Secure Systems in Untrusted Networks

04 Apr 2025

Contributed by Lukas

Zero Trust Networks, by Evan Gilman and Doug Barth, explores building secure systems in untrusted networks. The book critiques the limitations of peri...

You Don't Know JS: Types & Grammar

03 Apr 2025

Contributed by Lukas

Kyle Simpson's You Don't Know JS: Types & Grammar is a guide to mastering JavaScript's intricacies. The book thoroughly explains JavaScript's se...

You Don't Know JS: Up & Going

03 Apr 2025

Contributed by Lukas

Kyle Simpson's "You Don't Know JS" Book series offers an in-depth exploration of JavaScript, challenging the common practice of only learning a superf...

Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code

01 Apr 2025

Contributed by Lukas

Dmitry Vostokov's Book, Foundations of Linux Debugging, Disassembling, and Reversing, teaches readers to analyze binary code, understand stack memory ...

Foundations of ARM64 Linux Debugging, Disassembling, and Reversing: Analyze Code, Understand Stack Memory Usage, and Reconstruct Original

01 Apr 2025

Contributed by Lukas

Dmitry Vostokov's Book, Foundations of ARM64 Linux Debugging, Disassembling, and Reversing, provides a practical guide to understanding ARM64 assembly...

Viruses, Hardware and Software Trojans: Attacks and Countermeasures

31 Mar 2025

Contributed by Lukas

This Book explores the threats of hardware and software Trojans, particularly in critical infrastructure like telecommunications and nuclear power pla...

Unleashing the Art of Digital Forensics

31 Mar 2025

Contributed by Lukas

"Unleashing the Art of Digital Forensics" is a Book covering various aspects of digital forensics, including techniques, challenges, and legal conside...

UNIX and Linux System Administration Handbook, 4th Edition

30 Mar 2025

Contributed by Lukas

This Book is an excerpt from the UNIX and Linux System Administration Handbook, covering various aspects of system administration. Sections detail sof...

UNIX: The Textbook, Third Edition

30 Mar 2025

Contributed by Lukas

This Book chapter provides a "Quick Start" guide to the UNIX operating system, covering fundamental commands for file management, text editing (vi, vi...

Understanding Network Hacks: Attack and Defense with Python 3

29 Mar 2025

Contributed by Lukas

This Book is an excerpt from a book titled "Understanding Network Hacks Attack and Defense with Python 3," which teaches network security concepts and...

Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program

29 Mar 2025

Contributed by Lukas

This Book is from a cybersecurity risk management book, offering a practical, three-part framework for building a sustainable program. The book emphas...

Ubuntu Unleashed 2019: Covering 18.04, 18.10, 19.04, and 19.10

28 Mar 2025

Contributed by Lukas

This Book excerpt details Ubuntu Linux, focusing on installation, system administration, and software management. It covers using both the graphical u...

Troubleshooting & Maintaining PCs All-in-One For Dummies

28 Mar 2025

Contributed by Lukas

This Book is an excerpt from the fourth edition of Troubleshooting & Maintaining Your PC All-in-One For Dummies. The book offers comprehensive gui...

Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership

27 Mar 2025

Contributed by Lukas

This Book is an excerpt from Tribe of Hackers: Security Leaders, a book offering cybersecurity leadership strategies. The excerpt features interviews ...

Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

27 Mar 2025

Contributed by Lukas

This Book comprises excerpts from Tribe of Hackers Red Team, a book by Marcus J. Carey and Jennifer Jin. The excerpts feature interviews with numerous...

Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity

26 Mar 2025

Contributed by Lukas

This Book excerpt features interviews with numerous cybersecurity professionals, collectively offering insights into effective blue team strategies. T...

Tor And The Deep Web 2020: A Beginner's Guide to Staying Anonymous, Dark Net Journey on How to Be Anonymous Online

26 Mar 2025

Contributed by Lukas

This beginner's guide to the dark web explains how Tor and onion routing mask a user's IP address, creating anonymity. It details the three-layered sy...

TLS Mastery: Tux edition

25 Mar 2025

Contributed by Lukas

The Book provide a comprehensive guide to Transport Layer Security (TLS), a fundamental technology for securing internet communications. The text cove...

Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks

25 Mar 2025

Contributed by Lukas

This Book is about threat hunting in cloud environments, specifically AWS and Azure. The authors, experienced cybersecurity professionals, present a f...

Threat Modeling: Designing for Security

24 Mar 2025

Contributed by Lukas

This Book about threat modeling, a process for identifying and mitigating security risks in software. The book explains various threat modeling strate...

Write Great Code, Volume 2, 2nd Edition: Thinking Low-Level, Writing High-Level

24 Mar 2025

Contributed by Lukas

This Book is an excerpt from a Book on writing efficient high-level language (HLL) code by leveraging low-level understanding. It explores compiler op...

Software Craftsman, The: Professionalism, Pragmatism, Pride

23 Mar 2025

Contributed by Lukas

Sandro Mancuso's The Software Craftsman advocates for professionalism and pride in software development, contrasting outdated notions of seniority w...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

23 Mar 2025

Contributed by Lukas

The provided Book is an excerpt from "The Shellcoder’s Handbook," a book detailing the exploitation of software security vulnerabilities. The book f...

The Quick Python Book, Second Edition

22 Mar 2025

Contributed by Lukas

This Book is from the second edition of The Quick Python Book, a programming tutorial. The book covers fundamental Python concepts, including syntax, ...

The Pentester BluePrint: Starting a Career as an Ethical Hacker

22 Mar 2025

Contributed by Lukas

"The Pentester Blueprint" is a guide to becoming an ethical hacker (pentester). The book covers the necessary technical skills, including operating ...

The Official Raspberry Pi Beginner's Guide: How to use your new computer

21 Mar 2025

Contributed by Lukas

This Book provides a comprehensive introduction to the Raspberry Pi 4 Model B, covering its components, setup, and programming using Scratch and Pytho...

The Official CompTIA Security+ Certification Study Guide

21 Mar 2025

Contributed by Lukas

This Book is an excerpt from a CompTIA Security+ study guide that provides information about network security. The guide explores topics such as risk ...

The Linux Programming Interface: A Linux and UNIX System Programming Handbook

20 Mar 2025

Contributed by Lukas

The provided Book is a collection of excerpts from Michael Kerrisk's "The Linux Programming Interface," a comprehensive guide to Linux and UNIX system...

The Hacker Playbook: Practical Guide To Penetration Testing

20 Mar 2025

Contributed by Lukas

"The Hacker Playbook: Practical Guide to Penetration Testing" is a manual providing a hands-on approach to penetration testing. The book details vari...

The Hacker Playbook 3: Practical Guide To Penetration Testing

19 Mar 2025

Contributed by Lukas

"The Hacker Playbook 3" is a guide to penetration testing and red teaming, focusing on advanced techniques to simulate real-world attacks. The book c...

The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process

19 Mar 2025

Contributed by Lukas

This Book comprises excerpts from "The Docker Workshop," a guide to building and deploying applications using Docker. The book covers Dockerfiles, ima...

The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World

18 Mar 2025

Contributed by Lukas

The Decision Intelligence Handbook by Pratt and Malcolm is a practical guide to Decision Intelligence (DI), a methodology for improving decision-maki...

The Complete Cyber Security Course

18 Mar 2025

Contributed by Lukas

The provided Book is a collection of excerpts from a cybersecurity course. The course, "The Complete Cyber Security Course Volume I Hackers Exposed," ...

The Clean Coder: A Code of Conduct for Professional Programmers

17 Mar 2025

Contributed by Lukas

This Book is an excerpt from Robert C. Martin's "The Clean Coder," a book focused on professionalism in software development. It explores various aspe...

CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)

17 Mar 2025

Contributed by Lukas

The provided Book is an excerpt from The CERT Oracle Secure Coding Standard for Java, a guide to secure coding practices in Java. It details numerous ...

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

16 Mar 2025

Contributed by Lukas

"The Security Culture Playbook" is a guide to understanding and improving organizational security culture. The book emphasizes that security culture ...

The IDA Pro Book, 2nd Edition

16 Mar 2025

Contributed by Lukas

This Book is an excerpt from the second edition of "The IDA Pro Book," a guide to using IDA Pro, a popular disassembler. The book covers various aspec...

The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization

15 Mar 2025

Contributed by Lukas

This Book is a technical guide to Jakarta EE security, covering its history, architecture, and implementation details. It details Jakarta Authenticati...

The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence

15 Mar 2025

Contributed by Lukas

"The Unix-Haters Handbook" compiles six years of messages from the UNIX-HATERS mailing list, expressing widespread frustration with the Unix operatin...

The threat intelligence handbook

14 Mar 2025

Contributed by Lukas

The provided Book is an excerpt from the second edition of The Threat Intelligence Handbook, published by CyberEdge Group and primarily authored by Re...

The Tangled Web: A Guide to Securing Modern Web Applications

14 Mar 2025

Contributed by Lukas

The provided Book is a table of contents and excerpts from Michal Zalewski's book, "The Tangled Web: A Guide to Securing Modern Web Applications." The...

The Social Engineer's Playbook: A Practical Guide to Pretexting

12 Mar 2025

Contributed by Lukas

Jeremiah Talamantes's The Social Engineer's Playbook is a practical guide to pretexting, a form of social engineering. The book covers various soci...

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

12 Mar 2025

Contributed by Lukas

This Book excerpt chronicles the rise of ransomware and the efforts of a unique group of cybersecurity experts, the Ransomware Hunting Team, to combat...

The Mac Hacker's Handbook

10 Mar 2025

Contributed by Lukas

This Book is an excerpt from "The Mac Hacker's Handbook," a book exploring the security vulnerabilities of Mac OS X. The book details methods for disc...

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

10 Mar 2025

Contributed by Lukas

This Book is an excerpt from The Hacker's Handbook, a technical manual detailing network security vulnerabilities and exploits. It systematically expl...

The Hacker Playbook 2: Practical Guide To Penetration Testing

09 Mar 2025

Contributed by Lukas

"The Hacker Playbook 2" is a guide to penetration testing, expanding upon the first book with updated attacks and techniques. The book covers variou...

The Complete Book of Locks and Locksmithing

09 Mar 2025

Contributed by Lukas

This Book is an excerpt from "The Complete Book of Locks and Locksmithing," a comprehensive guide to locks and locksmithing. It covers the history of ...

The Analytics Setup Guidebook

08 Mar 2025

Contributed by Lukas

This guidebook from Holistics, a data analytics company, offers a practical framework for building modern analytics systems. It covers setting up an a...

Testing and Securing Android Studio Applications

08 Mar 2025

Contributed by Lukas

This Book is the preface and table of contents from a book titled Testing and Securing Android Studio Applications. The book guides Android developers...

TCP/IP Protocol Suite

07 Mar 2025

Contributed by Lukas

The provided Book is a table of contents and excerpts from Behrouz Forouzan's "TCP/IP Protocol Suite, 4th Edition," covering various networking concep...

Take Control of Wi-Fi Networking and Security

07 Mar 2025

Contributed by Lukas

Glenn Fleishman's Take Control of Wi-Fi Networking and Security is a comprehensive guide to setting up and securing Wi-Fi networks. The book covers ...

SwiftUI Essentials - iOS 14 Edition: Learn to Develop iOS Apps Using SwiftUI, Swift 5 and Xcode 12

06 Mar 2025

Contributed by Lukas

This Book is a table of contents and excerpts from a book teaching iOS app development using SwiftUI. It covers fundamental Swift programming concepts...

Cryptography: Theory and Practice

06 Mar 2025

Contributed by Lukas

The provided Book is an excerpt from a cryptography textbook, specifically focusing on the theory and practice of various cryptographic systems. It co...

Cryptography And Network Security: Principles and Practices

05 Mar 2025

Contributed by Lukas

This Book is an excerpt from a cryptography and network security textbook. It covers various security mechanisms, including encryption algorithms (sym...

Cryptography and Network Security: Principles and Practice

05 Mar 2025

Contributed by Lukas

This Book is excerpt from William Stallings' book, Cryptography and Network Security: Principles and Practice, seventh edition. The excerpt covers a b...

SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks

04 Mar 2025

Contributed by Lukas

This Book provides a comprehensive guide to SQL injection, covering both offensive and defensive strategies. Part one introduces SQL, database systems...

Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes

04 Mar 2025

Contributed by Lukas

This Book is on simplifying React application testing. It covers using the React Testing Library for unit and integration tests, emphasizing user-cent...

Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide

03 Mar 2025

Contributed by Lukas

This Book is a lab guide for a self-paced Silver Peak Advanced SDWAN course. It provides step-by-step instructions for configuring various networking ...

Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals

03 Mar 2025

Contributed by Lukas

This Book is excerpt from Jon Westfall's 2021 Book, "Set Up and Manage Your Virtual Private Server." The book guides readers through setting up and ad...

Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud

01 Mar 2025

Contributed by Lukas

This Book is a comprehensive guide to serverless security, focusing on the implementation of secure practices across AWS, Azure, and Google Cloud plat...

Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

01 Mar 2025

Contributed by Lukas

This Book is a detailed guide to modern cryptography, covering both theoretical concepts and practical implementations. The book explores various cryp...

Security in Computing

28 Feb 2025

Contributed by Lukas

This excerpt from Charles P. Pfleeger's "Security in Computing" (5th edition) is a textbook chapter on computer security. It examines various threats...

Security Warrior: Know Your Enemy

28 Feb 2025

Contributed by Lukas

Security Warrior is a technical manual focusing on network security, reverse engineering, and attack techniques. It covers various operating systems ...

Security Testing with Kali NetHunter

27 Feb 2025

Contributed by Lukas

This Book is an excerpt from a Book about security testing with Kali NetHunter, a mobile penetration testing platform for Android. The excerpt covers ...

Security Engineering: A Guide to Building Dependable Distributed Systems

27 Feb 2025

Contributed by Lukas

Ross Anderson's "Security Engineering: A Guide to Building Dependable Distributed Systems" explores various facets of security, from cryptographic v...

Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments

26 Feb 2025

Contributed by Lukas

Luigi Aversa's Security for Containers and Kubernetes is a comprehensive guide to securing containerized environments. The book covers container st...

Security Strategies in Linux Platforms and Applications

26 Feb 2025

Contributed by Lukas

This Book excerpt details Linux security strategies, covering threats, vulnerabilities, and hardening techniques. It explains Linux's architecture, in...

Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

25 Feb 2025

Contributed by Lukas

This Book is a technical Book excerpt focusing on network security, specifically detailing secure proxies and their role in modern threat detection an...

«« ← Prev Page 5 of 11 Next → »»