CyberSecurity Summary
Episodes
Security Automation with Ansible 2
25 Feb 2025
Contributed by Lukas
This Book is a table of contents and excerpts from Security Automation with Ansible 2, a book detailing how to automate security tasks using Ansible. ...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
24 Feb 2025
Contributed by Lukas
"Securing VoIP Networks" is a technical Book examining the security challenges of Voice over Internet Protocol (VoIP) systems. The book details variou...
Secure Programming with Static Analysis
24 Feb 2025
Contributed by Lukas
Secure Programming with Static Analysis is a Book detailing how to write secure software using static analysis tools. It focuses on common coding erro...
Secure PHP Development: Building 50 Practical Applications
23 Feb 2025
Contributed by Lukas
This Book excerpt details the creation of numerous PHP applications, focusing on secure coding practices and a reusable application framework. The aut...
Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML
23 Feb 2025
Contributed by Lukas
This Book is an excerpt from Dennis Sawyers' Book, "Automated Machine Learning with Microsoft Azure," which provides a comprehensive guide to using au...
Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language
22 Feb 2025
Contributed by Lukas
This Book is a table of contents and excerpts from a Book teaching Rust web programming. It covers fundamental Rust concepts like memory management an...
Modern Vulnerability Management: Predictive Cybersecurity
22 Feb 2025
Contributed by Lukas
Modern Vulnerability Management: Predictive Cybersecurity is a Book by Roytman and Bellis that offers a data-driven approach to vulnerability manageme...
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
21 Feb 2025
Contributed by Lukas
This Book explores the inner workings of various malware, including the TDL3 and TDL4 rootkits and the Festi, Rovnix, Gapz, and Olmasco bootkits. The ...
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
21 Feb 2025
Contributed by Lukas
Rootkits, as explained in "Rootkits - Subverting the Windows Kernel," are powerful hacking tools that enable attackers to maintain virtually undetecta...
RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)
20 Feb 2025
Contributed by Lukas
This Book excerpt is a training guide and exam preparation manual for the Red Hat Certified System Administrator (RHCSA) exam on Red Hat Enterprise Li...
Reverse Engineering Questions and Answers - George Duckett
20 Feb 2025
Contributed by Lukas
This Stack Exchange Q&A thread centers on reverse engineering, covering various aspects like disassembling binaries (ARM, x86), identifying compil...
Red Team Development and Operations: A practical guide
19 Feb 2025
Contributed by Lukas
This Book is a practical guide to red teaming in cybersecurity, written by Joe Vest and James Tubberville. It explains the methodology of red teaming,...
Red Hat Linux Security and Optimization
19 Feb 2025
Contributed by Lukas
This is an excerpt from Red Hat Linux Security and Optimization, a technical manual authored by Mohammed J. Kabir. The book extensively covers system...
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
18 Feb 2025
Contributed by Lukas
This Book is an excerpt from a study guide for the Red Hat Certified Engineer (RHCE) exam, focusing on Ansible automation. It covers Ansible's fundame...
The Red Team Handbook - The Army's Guide To Making Better Decisions
18 Feb 2025
Contributed by Lukas
The "Red Team Handbook" produced by the TRADOC G-2 Operational Environment Enterprise outlines the U.S. Army's approach to Red Teaming, a flexible cog...
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)
18 Feb 2025
Contributed by Lukas
This Book is a collection of chapters exploring security, privacy, and trust issues in the Internet of Things (IoT) and Cyber-Physical Systems (CPS), ...
Real-World Python: A Hacker's Guide to Solving Problems with Code
17 Feb 2025
Contributed by Lukas
This Book is a collection of excerpts from Real-World Python: A Hacker’s Guide to Solving Problems with Code, by Lee Vaughan. The excerpts detail nu...
Raspberry Pi Assembly Language Programming: ARM Processor Coding
17 Feb 2025
Contributed by Lukas
This Book is from a Book on Raspberry Pi assembly language programming. It covers fundamental assembly instructions, memory management, and control fl...
Ransomware and Cyber Extortion: Response and Prevention
17 Feb 2025
Contributed by Lukas
This Book is from a Book titled "Ransomware and Cyber Extortion Response and Prevention," which provides a comprehensive guide to understanding, respo...
Racket Programming the Fun Way: From Strings to Turing Machines
15 Feb 2025
Contributed by Lukas
This Book is a table of contents and excerpts from the Book "Racket Programming the Fun Way" a tutorial teaching the Racket programming language. The ...
Python for Data Analysis: Data Wrangling with pandas, NumPy, and Jupyter
15 Feb 2025
Contributed by Lukas
This Book excerpt is from the Book Python for Data Analysis by Wes McKinney. The book focuses on how to perform data analysis using Python, specifical...
Python: Penetration Testing for Developers
15 Feb 2025
Contributed by Lukas
This Book is a textbook excerpt from "Python Penetration Testing for Developers" and provides a comprehensive guide to penetration testing using Pytho...
Python Hacking Essentials
14 Feb 2025
Contributed by Lukas
This excerpt from the Book "Python Network Hacking Essentials" provides a comprehensive guide for beginners interested in network hacking. It starts w...
Python GUI Programming with Tkinter: Design and build functional and user-friendly GUI applications
14 Feb 2025
Contributed by Lukas
The provided Book is a collection of excerpts from a book on GUI programming in Python using Tkinter. The excerpts cover various aspects of Tkinter de...
Python for Professionals: Hands-on Guide for Python Professionals
14 Feb 2025
Contributed by Lukas
The Book "Python for Professionals" is a guide for programmers learning Python as a second language. It explains core Python concepts, including data ...
Python 201: Intermediate Python
13 Feb 2025
Contributed by Lukas
The provided Book is an excerpt from a document titled "Python 201" which acts as a guide for intermediate Python programmers. The text focuses on var...
Python 101: 2nd Edition
13 Feb 2025
Contributed by Lukas
The Book provide a comprehensive guide to learning Python programming, covering both fundamental concepts and advanced techniques. The document is div...
Python Made Simple: Full Beginner’s Guide to Mastering Python
13 Feb 2025
Contributed by Lukas
"Python & Hacking" is a comprehensive guide for beginners to learn Python programming. It starts with the basics of Python syntax, data types, and...
Protective Security: Creating Military-Grade Defenses for Your Digital Business
12 Feb 2025
Contributed by Lukas
The Book, "Protective Security: Creating Military-Grade Defenses for Your Digital Business," written by Jim Seaman, draws on the author's experiences ...
Pro PHP Security
12 Feb 2025
Contributed by Lukas
This Book, Pro PHP Security, focuses on the practical aspects of building secure PHP applications. It emphasizes understanding and preventing common w...
Programming Linux Anti-Reversing Technique
12 Feb 2025
Contributed by Lukas
This Book excerpt details Linux anti-reversing techniques, focusing on compiler options and file format manipulation to hinder reverse engineering eff...
Programming and Automating Cisco Networks: A guide to network programmability and automation in the data center, campus, and WAN
10 Feb 2025
Contributed by Lukas
This Book provides a comprehensive guide to network programmability and automation, covering foundational skills and specific applications in Cisco Da...
Professor Messer's CompTIA A+ 220-901 and 220-902 Course Notes
10 Feb 2025
Contributed by Lukas
Professor Messer's CompTIA 220-1001 Core 1 A+ Course Notes is a comprehensive study guide covering various aspects of computer hardware and networkin...
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
10 Feb 2025
Contributed by Lukas
It explores the process of red teaming, including shaping the engagement scope, establishing rules of engagement, executing the assessment, and report...
Pro Ember Data: Getting Ember Data to Work with Your API
09 Feb 2025
Contributed by Lukas
David Tang's "Pro Ember Data" is a guide to using Ember Data with custom APIs. The book explains Ember Data's architecture, including the store, ada...
Privacy in Practice (Security, Audit and Leadership Series)
09 Feb 2025
Contributed by Lukas
This Book is a table of contents and excerpts from a book on global privacy practices, authored by Dr. Alan Tang. The book comprehensively covers vari...
Preventing Ransomware: Understand, prevent, and remediate ransomware attacks
09 Feb 2025
Contributed by Lukas
The provided Book "Preventing Ransomware," published by Packt Publishing. The excerpt details various aspects of malware and ransomware, including the...
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
08 Feb 2025
Contributed by Lukas
"Practical Intrusion Analysis" is a comprehensive guide to intrusion detection, expanding beyond traditional vendor-specific focuses. The book cover...
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
08 Feb 2025
Contributed by Lukas
The Book excerpts are from a book on practical binary analysis. It explains the challenges of analyzing binaries, such as the lack of high-level abstr...
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs
08 Feb 2025
Contributed by Lukas
This Book excerpt for the WebdriverIO automation framework, written for software testers. It covers installation and configuration, locating elements ...
Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
07 Feb 2025
Contributed by Lukas
This Book is an excerpt from Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk by Andrew Magnusson, a guide for improvin...
Practical Rust Web Projects: Building Cloud and Web-Based Applications
07 Feb 2025
Contributed by Lukas
The provided Book "Practical Rust Web Projects: Building Cloud and Web-Based Applications" discuss various ways to develop web applications using the ...
Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems
07 Feb 2025
Contributed by Lukas
The Book provides a comprehensive guide to packet analysis, a crucial skill for network administrators and security professionals. It explains the fun...
Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition
01 Feb 2025
Contributed by Lukas
This Book, Practical Mobile Forensics, is a comprehensive guide to investigating mobile devices. It covers the acquisition, analysis, and recovery of ...
Practical Linux System Administration: A Guide to Installation, Configuration, and Management
01 Feb 2025
Contributed by Lukas
This Book titled "Practical Linux System Administration" by Kenneth Hess. The text provides a comprehensive guide for Linux system administrators, cov...
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT
01 Feb 2025
Contributed by Lukas
This Book "Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT" provides a comprehensive guide to securing industrial control systems (ICS...
Practical C Programming: Solutions for modern C developers to create efficient and well-structured programs
30 Jan 2025
Contributed by Lukas
This Book is a compilation of programming recipes and explanations from a book titled "Practical C Programming." The book provides practical solutions...
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
30 Jan 2025
Contributed by Lukas
This Book titled "Practical Reverse Engineering." It provides a comprehensive guide to reverse engineering techniques for x86, x64, and ARM architectu...
Practical Linux Security Cookbook
30 Jan 2025
Contributed by Lukas
The Book "Practical Linux Security Cookbook," which provides a guide to configuring and implementing security measures on Linux systems. It covers top...
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
27 Jan 2025
Contributed by Lukas
This Book, "Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things" provides a comprehensive guide to the security vulnerabil...
PowerShell for Sysadmins: Workflow Automation Made Easy
27 Jan 2025
Contributed by Lukas
The provided Book "PowerShell for Sysadmins: Workflow Automation Made Easy" by Adam Bertram. The excerpt is a guide to using PowerShell for automating...
PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems
27 Jan 2025
Contributed by Lukas
The provided Book is an excerpt from a book titled "PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems," focus...
Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language
25 Jan 2025
Contributed by Lukas
The Book provides a comprehensive guide to Microsoft Power BI, a powerful business intelligence tool. It begins with a basic overview of Power BI's co...
PoC or GTFO, Volume 2
25 Jan 2025
Contributed by Lukas
This Book, "PoC or GTFO, Volume 2," is a compilation of articles written by a variety of authors on the subject of software exploitation. The articles...
PoC or GTFO, Volume 3
25 Jan 2025
Contributed by Lukas
The Book titled "PoC or GTFO, Volume 3" which contains various articles discussing "Proof of Concept" exploits for a wide range of systems and devices...
PoC or GTFO, Volume 1
24 Jan 2025
Contributed by Lukas
The Book, "PoC or GTFO, Volume 1" is a collection of articles and essays from various authors on the topic of computer security and reverse engineerin...
Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology
24 Jan 2025
Contributed by Lukas
The Book, Physical Red Team Operations: Physical Penetration Testing, is a guide for security professionals on how to plan and execute physical red te...
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
24 Jan 2025
Contributed by Lukas
The Book material provides a comprehensive guide to phishing attacks, exploring various types, tactics, communication channels, and legal aspects. It ...
PGP & GPG: Email for the Practical Paranoid
22 Jan 2025
Contributed by Lukas
This excerpt from the Book "PGP & GPG: Email for the Practical Paranoid" by Michael W. Lucas provides an overview of the open-source encryption pr...
Personal Digital Security: Protecting Yourself from Online Crime
22 Jan 2025
Contributed by Lukas
This excerpt from the Book, "Personal Digital Security: Protecting Yourself from Online Crime" provides advice on how to keep personal computers and m...
Perform a web penetration test
22 Jan 2025
Contributed by Lukas
This Book teaches readers how to perform a web penetration test. The course explains the stages of a penetration test, beginning with understanding th...
Penetration Testing With Perl
22 Jan 2025
Contributed by Lukas
This excerpt from the Book "Pentesting With Perl" describes how to use Perl programming for penetration testing. The book covers a wide range of topic...
Linux Forensics
21 Jan 2025
Contributed by Lukas
This Book, Linux Forensics, aims to provide a comprehensive guide to digital forensics using Linux. It explores various techniques for collecting, ana...
Pentest Secrets: Breaking The Unbreakable Enterprise Security
21 Jan 2025
Contributed by Lukas
The excerpt is a section from the book "Pentest Secrets," which details the author's experience with a double-blind penetration test. The author, Saga...
Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools
21 Jan 2025
Contributed by Lukas
Penetration Testing with the Bash Shell is a guide to using the Bash shell and Kali Linux command-line tools for penetration testing. The book covers...
Penetration Testing For Dummies
21 Jan 2025
Contributed by Lukas
This Book is a compilation of excerpts from Penetration Testing for Dummies by Robert Shimonski. The book provides a comprehensive guide to penetratio...
PASS the CompTIA Network+ Exam N10-007
20 Jan 2025
Contributed by Lukas
This Book provides an extensive overview of network concepts, devices, and protocols with a particular focus on CompTIA Network+ exam preparation. It ...
Hands-On Red Team Tactics
20 Jan 2025
Contributed by Lukas
The Book is a guide to ethical hacking and penetration testing, focusing on red team tactics. The guide outlines common penetration testing standards ...
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats
20 Jan 2025
Contributed by Lukas
The provided Book "Cybersecurity Threats, Malware Trends, and Strategies," by Tim Rains. This book explains how to mitigate cybersecurity risks for or...
Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities
19 Jan 2025
Contributed by Lukas
This Book "Metasploit 5.x for Beginners - Second Edition" by Sagar Rahalkar. The book aims to teach readers how to effectively use the Metasploit fram...
Cybersecurity Attacks - Red Team Strategies
19 Jan 2025
Contributed by Lukas
This Book is a comprehensive guide to building and managing a red team program within an organization. The text covers essential topics such as defini...
Practical Web Penetration Testing
19 Jan 2025
Contributed by Lukas
The source Book "Practical Web Penetration Testing" by Gus Khawaja, published by Packt Publishing. The book is a guide for security professionals and ...
Network Security with pfSense
19 Jan 2025
Contributed by Lukas
The provided Book "Network Security with pfSense" by Manuj Aggarwal and published by Packt Publishing. This comprehensive guide covers installing, con...
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
18 Jan 2025
Contributed by Lukas
"Burp Suite Cookbook" is a guide to mastering web penetration testing using the Burp Suite tool. The book provides practical recipes for tackling vul...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
18 Jan 2025
Contributed by Lukas
This Book is about malware analysis. It covers several topics related to the process of investigating and understanding malicious software, including ...
OWASP Mobile Security Testing Guide
18 Jan 2025
Contributed by Lukas
The Book is a comprehensive guide to mobile security testing, specifically focusing on Android and iOS platforms. It covers a wide range of security t...
Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20
17 Jan 2025
Contributed by Lukas
This is a comprehensive guide to software architecture using C++. It covers key concepts like architectural styles, requirements, system design, perfo...
OSSTMM 3
17 Jan 2025
Contributed by Lukas
The OSSTMM (Open Source Security Testing Methodology Manual) is a framework for conducting comprehensive security audits. This methodology emphasize...
MacOS and iOS Internals, Volume III: Security & Insecurity
17 Jan 2025
Contributed by Lukas
The provided Book is an excerpt from a book titled "OS Internals Volume III: Security & Insecurity" by Jonathan Levin. This book describes securit...
MacOS and iOS Internals, Volume I: User Mode
17 Jan 2025
Contributed by Lukas
The Book provide an in-depth look at the inner workings of the Apple operating systems, MacOS X and iOS, from the perspective of an operating system d...
Linux System Programming: Talking Directly to the Kernel and C Library
16 Jan 2025
Contributed by Lukas
The provided Book "OReilly.Linux System Programming 2nd.Edition" and cover various aspects of Linux system programming, including file I/O, process ma...
Understanding the Linux Kernel
16 Jan 2025
Contributed by Lukas
The Book are a collection of excerpts from "Understanding the Linux Kernel" by Daniel P. Bovet and Marco Cesati. The book provides a detailed explanat...
Operator Handbook: Red Team + OSINT + Blue Team Reference
16 Jan 2025
Contributed by Lukas
This Book provides a comprehensive guide for red and blue teams conducting security operations. It covers a wide range of topics including tools, tech...
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
15 Jan 2025
Contributed by Lukas
"Operationalizing Threat Intelligence" provides a comprehensive guide to building and implementing an effective threat intelligence program. The book ...
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
15 Jan 2025
Contributed by Lukas
This Book is a guide for conducting open source intelligence (OSINT) investigations. It provides a detailed overview of OSINT techniques and resources...
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
15 Jan 2025
Contributed by Lukas
This Book provides a comprehensive guide to Open Source Intelligence (OSINT) techniques, covering a wide range of topics from digital security and sof...
Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2
15 Jan 2025
Contributed by Lukas
This excerpt is from a Book that teaches programmers how to work with OWL ontologies using the Owlready2 Python library. The book provides a comprehen...
Official (ISC)2 Guide to the CISSP-ISSMP CBK
15 Jan 2025
Contributed by Lukas
The Book is a comprehensive guide for the Information Systems Security Management Professional (ISSMP) certification, covering the core principles and...
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them
14 Jan 2025
Contributed by Lukas
This Book, "Offensive Shellcode from Scratch," provides an in-depth guide to understanding and creating shellcode, a type of malicious code used to ex...
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
14 Jan 2025
Contributed by Lukas
The Book provides a comprehensive guide to analyzing leaked datasets, focusing on ethical considerations, technical skills, and practical tools for in...
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
13 Jan 2025
Contributed by Lukas
This excerpt from the book "Pentesting Azure" by Matt Burrough offers a comprehensive guide for penetration testers and security professionals who see...
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
13 Jan 2025
Contributed by Lukas
The provided Book is an excerpt from a guide to using Nmap, a free and open-source network scanner. The guide covers a wide range of topics including ...
NGINX Cookbook
13 Jan 2025
Contributed by Lukas
The Book is a guide to the NGINX web server, specifically focused on NGINX Plus, a commercial edition. It covers a wide range of topics, from basic in...
Networking All-in-One For Dummies
13 Jan 2025
Contributed by Lukas
The Book provide an in-depth overview of networking concepts, covering both hardware and software aspects. From the fundamentals of network protocols ...
Exam 98-366 Networking Fundamentals, 2nd Edition
12 Jan 2025
Contributed by Lukas
The Book, "Exam 98-366 Networking Fundamentals, 2nd Edition," is a textbook designed to prepare students for the Microsoft Technology Associate (MTA) ...
Windows Server Administration Fundamentals
12 Jan 2025
Contributed by Lukas
This source is a book about networking fundamentals that teaches readers how to connect computers and devices to form networks. It starts with basic c...
Network Security: Private Communication in a Public World
12 Jan 2025
Contributed by Lukas
This Book "Network Security: Private Communications in a Public World" (Third Edition) by Charlie Kaufman, Radia Perlman, Mike Speciner, and Ray Perln...
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
11 Jan 2025
Contributed by Lukas
This excerpt from the book "Network Security Monitoring" by Chris Fry and Martin Nystrom provides guidance on how to monitor network security effectiv...
Network Security Assessment: Know Your Network
11 Jan 2025
Contributed by Lukas
This book, Network Security Assessment, provides a comprehensive guide to penetration testing methods and techniques. The author covers a wide range ...
Network Security and Cryptography
11 Jan 2025
Contributed by Lukas
This Book is about computer network security and cryptography. It covers classical and modern cryptography, Internet security services such as IPSec a...