Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CyberSecurity Summary

News Education Arts

Episodes

Showing 501-600 of 1034
«« ← Prev Page 6 of 11 Next → »»

Security Automation with Ansible 2

25 Feb 2025

Contributed by Lukas

This Book is a table of contents and excerpts from Security Automation with Ansible 2, a book detailing how to automate security tasks using Ansible. ...

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

24 Feb 2025

Contributed by Lukas

"Securing VoIP Networks" is a technical Book examining the security challenges of Voice over Internet Protocol (VoIP) systems. The book details variou...

Secure Programming with Static Analysis

24 Feb 2025

Contributed by Lukas

Secure Programming with Static Analysis is a Book detailing how to write secure software using static analysis tools. It focuses on common coding erro...

Secure PHP Development: Building 50 Practical Applications

23 Feb 2025

Contributed by Lukas

This Book excerpt details the creation of numerous PHP applications, focusing on secure coding practices and a reusable application framework. The aut...

Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML

23 Feb 2025

Contributed by Lukas

This Book is an excerpt from Dennis Sawyers' Book, "Automated Machine Learning with Microsoft Azure," which provides a comprehensive guide to using au...

Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language

22 Feb 2025

Contributed by Lukas

This Book is a table of contents and excerpts from a Book teaching Rust web programming. It covers fundamental Rust concepts like memory management an...

Modern Vulnerability Management: Predictive Cybersecurity

22 Feb 2025

Contributed by Lukas

Modern Vulnerability Management: Predictive Cybersecurity is a Book by Roytman and Bellis that offers a data-driven approach to vulnerability manageme...

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

21 Feb 2025

Contributed by Lukas

This Book explores the inner workings of various malware, including the TDL3 and TDL4 rootkits and the Festi, Rovnix, Gapz, and Olmasco bootkits. The ...

Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel

21 Feb 2025

Contributed by Lukas

Rootkits, as explained in "Rootkits - Subverting the Windows Kernel," are powerful hacking tools that enable attackers to maintain virtually undetecta...

RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)

20 Feb 2025

Contributed by Lukas

This Book excerpt is a training guide and exam preparation manual for the Red Hat Certified System Administrator (RHCSA) exam on Red Hat Enterprise Li...

Reverse Engineering Questions and Answers - George Duckett

20 Feb 2025

Contributed by Lukas

This Stack Exchange Q&A thread centers on reverse engineering, covering various aspects like disassembling binaries (ARM, x86), identifying compil...

Red Team Development and Operations: A practical guide

19 Feb 2025

Contributed by Lukas

This Book is a practical guide to red teaming in cybersecurity, written by Joe Vest and James Tubberville. It explains the methodology of red teaming,...

Red Hat Linux Security and Optimization

19 Feb 2025

Contributed by Lukas

This is an excerpt from Red Hat Linux Security and Optimization, a technical manual authored by Mohammed J. Kabir. The book extensively covers system...

Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)

18 Feb 2025

Contributed by Lukas

This Book is an excerpt from a study guide for the Red Hat Certified Engineer (RHCE) exam, focusing on Ansible automation. It covers Ansible's fundame...

The Red Team Handbook - The Army's Guide To Making Better Decisions

18 Feb 2025

Contributed by Lukas

The "Red Team Handbook" produced by the TRADOC G-2 Operational Environment Enterprise outlines the U.S. Army's approach to Red Teaming, a flexible cog...

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

18 Feb 2025

Contributed by Lukas

This Book is a collection of chapters exploring security, privacy, and trust issues in the Internet of Things (IoT) and Cyber-Physical Systems (CPS), ...

Real-World Python: A Hacker's Guide to Solving Problems with Code

17 Feb 2025

Contributed by Lukas

This Book is a collection of excerpts from Real-World Python: A Hacker’s Guide to Solving Problems with Code, by Lee Vaughan. The excerpts detail nu...

Raspberry Pi Assembly Language Programming: ARM Processor Coding

17 Feb 2025

Contributed by Lukas

This Book is from a Book on Raspberry Pi assembly language programming. It covers fundamental assembly instructions, memory management, and control fl...

Ransomware and Cyber Extortion: Response and Prevention

17 Feb 2025

Contributed by Lukas

This Book is from a Book titled "Ransomware and Cyber Extortion Response and Prevention," which provides a comprehensive guide to understanding, respo...

Racket Programming the Fun Way: From Strings to Turing Machines

15 Feb 2025

Contributed by Lukas

This Book is a table of contents and excerpts from the Book "Racket Programming the Fun Way" a tutorial teaching the Racket programming language. The ...

Python for Data Analysis: Data Wrangling with pandas, NumPy, and Jupyter

15 Feb 2025

Contributed by Lukas

This Book excerpt is from the Book Python for Data Analysis by Wes McKinney. The book focuses on how to perform data analysis using Python, specifical...

Python: Penetration Testing for Developers

15 Feb 2025

Contributed by Lukas

This Book is a textbook excerpt from "Python Penetration Testing for Developers" and provides a comprehensive guide to penetration testing using Pytho...

Python Hacking Essentials

14 Feb 2025

Contributed by Lukas

This excerpt from the Book "Python Network Hacking Essentials" provides a comprehensive guide for beginners interested in network hacking. It starts w...

Python GUI Programming with Tkinter: Design and build functional and user-friendly GUI applications

14 Feb 2025

Contributed by Lukas

The provided Book is a collection of excerpts from a book on GUI programming in Python using Tkinter. The excerpts cover various aspects of Tkinter de...

Python for Professionals: Hands-on Guide for Python Professionals

14 Feb 2025

Contributed by Lukas

The Book "Python for Professionals" is a guide for programmers learning Python as a second language. It explains core Python concepts, including data ...

Python 201: Intermediate Python

13 Feb 2025

Contributed by Lukas

The provided Book is an excerpt from a document titled "Python 201" which acts as a guide for intermediate Python programmers. The text focuses on var...

Python 101: 2nd Edition

13 Feb 2025

Contributed by Lukas

The Book provide a comprehensive guide to learning Python programming, covering both fundamental concepts and advanced techniques. The document is div...

Python Made Simple: Full Beginner’s Guide to Mastering Python

13 Feb 2025

Contributed by Lukas

"Python & Hacking" is a comprehensive guide for beginners to learn Python programming. It starts with the basics of Python syntax, data types, and...

Protective Security: Creating Military-Grade Defenses for Your Digital Business

12 Feb 2025

Contributed by Lukas

The Book, "Protective Security: Creating Military-Grade Defenses for Your Digital Business," written by Jim Seaman, draws on the author's experiences ...

Pro PHP Security

12 Feb 2025

Contributed by Lukas

This Book, Pro PHP Security, focuses on the practical aspects of building secure PHP applications. It emphasizes understanding and preventing common w...

Programming Linux Anti-Reversing Technique

12 Feb 2025

Contributed by Lukas

This Book excerpt details Linux anti-reversing techniques, focusing on compiler options and file format manipulation to hinder reverse engineering eff...

Programming and Automating Cisco Networks: A guide to network programmability and automation in the data center, campus, and WAN

10 Feb 2025

Contributed by Lukas

This Book provides a comprehensive guide to network programmability and automation, covering foundational skills and specific applications in Cisco Da...

Professor Messer's CompTIA A+ 220-901 and 220-902 Course Notes

10 Feb 2025

Contributed by Lukas

Professor Messer's CompTIA 220-1001 Core 1 A+ Course Notes is a comprehensive study guide covering various aspects of computer hardware and networkin...

Professional Red Teaming: Conducting Successful Cybersecurity Engagements

10 Feb 2025

Contributed by Lukas

It explores the process of red teaming, including shaping the engagement scope, establishing rules of engagement, executing the assessment, and report...

Pro Ember Data: Getting Ember Data to Work with Your API

09 Feb 2025

Contributed by Lukas

David Tang's "Pro Ember Data" is a guide to using Ember Data with custom APIs. The book explains Ember Data's architecture, including the store, ada...

Privacy in Practice (Security, Audit and Leadership Series)

09 Feb 2025

Contributed by Lukas

This Book is a table of contents and excerpts from a book on global privacy practices, authored by Dr. Alan Tang. The book comprehensively covers vari...

Preventing Ransomware: Understand, prevent, and remediate ransomware attacks

09 Feb 2025

Contributed by Lukas

The provided Book "Preventing Ransomware," published by Packt Publishing. The excerpt details various aspects of malware and ransomware, including the...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century

08 Feb 2025

Contributed by Lukas

"Practical Intrusion Analysis" is a comprehensive guide to intrusion detection, expanding beyond traditional vendor-specific focuses. The book cover...

Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

08 Feb 2025

Contributed by Lukas

The Book excerpts are from a book on practical binary analysis. It explains the challenges of analyzing binaries, such as the lack of high-level abstr...

Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs

08 Feb 2025

Contributed by Lukas

This Book excerpt for the WebdriverIO automation framework, written for software testers. It covers installation and configuration, locating elements ...

Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

07 Feb 2025

Contributed by Lukas

This Book is an excerpt from Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk by Andrew Magnusson, a guide for improvin...

Practical Rust Web Projects: Building Cloud and Web-Based Applications

07 Feb 2025

Contributed by Lukas

The provided Book "Practical Rust Web Projects: Building Cloud and Web-Based Applications" discuss various ways to develop web applications using the ...

Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems

07 Feb 2025

Contributed by Lukas

The Book provides a comprehensive guide to packet analysis, a crucial skill for network administrators and security professionals. It explains the fun...

Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition

01 Feb 2025

Contributed by Lukas

This Book, Practical Mobile Forensics, is a comprehensive guide to investigating mobile devices. It covers the acquisition, analysis, and recovery of ...

Practical Linux System Administration: A Guide to Installation, Configuration, and Management

01 Feb 2025

Contributed by Lukas

This Book titled "Practical Linux System Administration" by Kenneth Hess. The text provides a comprehensive guide for Linux system administrators, cov...

Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT

01 Feb 2025

Contributed by Lukas

This Book "Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT" provides a comprehensive guide to securing industrial control systems (ICS...

Practical C Programming: Solutions for modern C developers to create efficient and well-structured programs

30 Jan 2025

Contributed by Lukas

This Book is a compilation of programming recipes and explanations from a book titled "Practical C Programming." The book provides practical solutions...

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

30 Jan 2025

Contributed by Lukas

This Book titled "Practical Reverse Engineering." It provides a comprehensive guide to reverse engineering techniques for x86, x64, and ARM architectu...

Practical Linux Security Cookbook

30 Jan 2025

Contributed by Lukas

The Book "Practical Linux Security Cookbook," which provides a guide to configuring and implementing security measures on Linux systems. It covers top...

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

27 Jan 2025

Contributed by Lukas

This Book, "Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things" provides a comprehensive guide to the security vulnerabil...

PowerShell for Sysadmins: Workflow Automation Made Easy

27 Jan 2025

Contributed by Lukas

The provided Book "PowerShell for Sysadmins: Workflow Automation Made Easy" by Adam Bertram. The excerpt is a guide to using PowerShell for automating...

PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems

27 Jan 2025

Contributed by Lukas

The provided Book is an excerpt from a book titled "PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems," focus...

Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language

25 Jan 2025

Contributed by Lukas

The Book provides a comprehensive guide to Microsoft Power BI, a powerful business intelligence tool. It begins with a basic overview of Power BI's co...

PoC or GTFO, Volume 2

25 Jan 2025

Contributed by Lukas

This Book, "PoC or GTFO, Volume 2," is a compilation of articles written by a variety of authors on the subject of software exploitation. The articles...

PoC or GTFO, Volume 3

25 Jan 2025

Contributed by Lukas

The Book titled "PoC or GTFO, Volume 3" which contains various articles discussing "Proof of Concept" exploits for a wide range of systems and devices...

PoC or GTFO, Volume 1

24 Jan 2025

Contributed by Lukas

The Book, "PoC or GTFO, Volume 1" is a collection of articles and essays from various authors on the topic of computer security and reverse engineerin...

Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology

24 Jan 2025

Contributed by Lukas

The Book, Physical Red Team Operations: Physical Penetration Testing, is a guide for security professionals on how to plan and execute physical red te...

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

24 Jan 2025

Contributed by Lukas

The Book material provides a comprehensive guide to phishing attacks, exploring various types, tactics, communication channels, and legal aspects. It ...

PGP & GPG: Email for the Practical Paranoid

22 Jan 2025

Contributed by Lukas

This excerpt from the Book "PGP & GPG: Email for the Practical Paranoid" by Michael W. Lucas provides an overview of the open-source encryption pr...

Personal Digital Security: Protecting Yourself from Online Crime

22 Jan 2025

Contributed by Lukas

This excerpt from the Book, "Personal Digital Security: Protecting Yourself from Online Crime" provides advice on how to keep personal computers and m...

Perform a web penetration test

22 Jan 2025

Contributed by Lukas

This Book teaches readers how to perform a web penetration test. The course explains the stages of a penetration test, beginning with understanding th...

Penetration Testing With Perl

22 Jan 2025

Contributed by Lukas

This excerpt from the Book "Pentesting With Perl" describes how to use Perl programming for penetration testing. The book covers a wide range of topic...

Linux Forensics

21 Jan 2025

Contributed by Lukas

This Book, Linux Forensics, aims to provide a comprehensive guide to digital forensics using Linux. It explores various techniques for collecting, ana...

Pentest Secrets: Breaking The Unbreakable Enterprise Security

21 Jan 2025

Contributed by Lukas

The excerpt is a section from the book "Pentest Secrets," which details the author's experience with a double-blind penetration test. The author, Saga...

Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools

21 Jan 2025

Contributed by Lukas

Penetration Testing with the Bash Shell is a guide to using the Bash shell and Kali Linux command-line tools for penetration testing. The book covers...

Penetration Testing For Dummies

21 Jan 2025

Contributed by Lukas

This Book is a compilation of excerpts from Penetration Testing for Dummies by Robert Shimonski. The book provides a comprehensive guide to penetratio...

PASS the CompTIA Network+ Exam N10-007

20 Jan 2025

Contributed by Lukas

This Book provides an extensive overview of network concepts, devices, and protocols with a particular focus on CompTIA Network+ exam preparation. It ...

Hands-On Red Team Tactics

20 Jan 2025

Contributed by Lukas

The Book is a guide to ethical hacking and penetration testing, focusing on red team tactics. The guide outlines common penetration testing standards ...

Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats

20 Jan 2025

Contributed by Lukas

The provided Book "Cybersecurity Threats, Malware Trends, and Strategies," by Tim Rains. This book explains how to mitigate cybersecurity risks for or...

Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities

19 Jan 2025

Contributed by Lukas

This Book "Metasploit 5.x for Beginners - Second Edition" by Sagar Rahalkar. The book aims to teach readers how to effectively use the Metasploit fram...

Cybersecurity Attacks - Red Team Strategies

19 Jan 2025

Contributed by Lukas

This Book is a comprehensive guide to building and managing a red team program within an organization. The text covers essential topics such as defini...

Practical Web Penetration Testing

19 Jan 2025

Contributed by Lukas

The source Book "Practical Web Penetration Testing" by Gus Khawaja, published by Packt Publishing. The book is a guide for security professionals and ...

Network Security with pfSense

19 Jan 2025

Contributed by Lukas

The provided Book "Network Security with pfSense" by Manuj Aggarwal and published by Packt Publishing. This comprehensive guide covers installing, con...

Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

18 Jan 2025

Contributed by Lukas

"Burp Suite Cookbook" is a guide to mastering web penetration testing using the Burp Suite tool. The book provides practical recipes for tackling vul...

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

18 Jan 2025

Contributed by Lukas

This Book is about malware analysis. It covers several topics related to the process of investigating and understanding malicious software, including ...

OWASP Mobile Security Testing Guide

18 Jan 2025

Contributed by Lukas

The Book is a comprehensive guide to mobile security testing, specifically focusing on Android and iOS platforms. It covers a wide range of security t...

Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20

17 Jan 2025

Contributed by Lukas

This is a comprehensive guide to software architecture using C++. It covers key concepts like architectural styles, requirements, system design, perfo...

OSSTMM 3

17 Jan 2025

Contributed by Lukas

The OSSTMM (Open Source Security Testing Methodology Manual) is a framework for conducting comprehensive security audits. This methodology emphasize...

MacOS and iOS Internals, Volume III: Security & Insecurity

17 Jan 2025

Contributed by Lukas

The provided Book is an excerpt from a book titled "OS Internals Volume III: Security & Insecurity" by Jonathan Levin. This book describes securit...

MacOS and iOS Internals, Volume I: User Mode

17 Jan 2025

Contributed by Lukas

The Book provide an in-depth look at the inner workings of the Apple operating systems, MacOS X and iOS, from the perspective of an operating system d...

Linux System Programming: Talking Directly to the Kernel and C Library

16 Jan 2025

Contributed by Lukas

The provided Book "OReilly.Linux System Programming 2nd.Edition" and cover various aspects of Linux system programming, including file I/O, process ma...

Understanding the Linux Kernel

16 Jan 2025

Contributed by Lukas

The Book are a collection of excerpts from "Understanding the Linux Kernel" by Daniel P. Bovet and Marco Cesati. The book provides a detailed explanat...

Operator Handbook: Red Team + OSINT + Blue Team Reference

16 Jan 2025

Contributed by Lukas

This Book provides a comprehensive guide for red and blue teams conducting security operations. It covers a wide range of topics including tools, tech...

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

15 Jan 2025

Contributed by Lukas

"Operationalizing Threat Intelligence" provides a comprehensive guide to building and implementing an effective threat intelligence program. The book ...

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

15 Jan 2025

Contributed by Lukas

This Book is a guide for conducting open source intelligence (OSINT) investigations. It provides a detailed overview of OSINT techniques and resources...

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

15 Jan 2025

Contributed by Lukas

This Book provides a comprehensive guide to Open Source Intelligence (OSINT) techniques, covering a wide range of topics from digital security and sof...

Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2

15 Jan 2025

Contributed by Lukas

This excerpt is from a Book that teaches programmers how to work with OWL ontologies using the Owlready2 Python library. The book provides a comprehen...

Official (ISC)2 Guide to the CISSP-ISSMP CBK

15 Jan 2025

Contributed by Lukas

The Book is a comprehensive guide for the Information Systems Security Management Professional (ISSMP) certification, covering the core principles and...

Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them

14 Jan 2025

Contributed by Lukas

This Book, "Offensive Shellcode from Scratch," provides an in-depth guide to understanding and creating shellcode, a type of malicious code used to ex...

Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data

14 Jan 2025

Contributed by Lukas

The Book provides a comprehensive guide to analyzing leaked datasets, focusing on ethical considerations, technical skills, and practical tools for in...

Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

13 Jan 2025

Contributed by Lukas

This excerpt from the book "Pentesting Azure" by Matt Burrough offers a comprehensive guide for penetration testers and security professionals who see...

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

13 Jan 2025

Contributed by Lukas

The provided Book is an excerpt from a guide to using Nmap, a free and open-source network scanner. The guide covers a wide range of topics including ...

NGINX Cookbook

13 Jan 2025

Contributed by Lukas

The Book is a guide to the NGINX web server, specifically focused on NGINX Plus, a commercial edition. It covers a wide range of topics, from basic in...

Networking All-in-One For Dummies

13 Jan 2025

Contributed by Lukas

The Book provide an in-depth overview of networking concepts, covering both hardware and software aspects. From the fundamentals of network protocols ...

Exam 98-366 Networking Fundamentals, 2nd Edition

12 Jan 2025

Contributed by Lukas

The Book, "Exam 98-366 Networking Fundamentals, 2nd Edition," is a textbook designed to prepare students for the Microsoft Technology Associate (MTA) ...

Windows Server Administration Fundamentals

12 Jan 2025

Contributed by Lukas

This source is a book about networking fundamentals that teaches readers how to connect computers and devices to form networks. It starts with basic c...

Network Security: Private Communication in a Public World

12 Jan 2025

Contributed by Lukas

This Book "Network Security: Private Communications in a Public World" (Third Edition) by Charlie Kaufman, Radia Perlman, Mike Speciner, and Ray Perln...

Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks

11 Jan 2025

Contributed by Lukas

This excerpt from the book "Network Security Monitoring" by Chris Fry and Martin Nystrom provides guidance on how to monitor network security effectiv...

Network Security Assessment: Know Your Network

11 Jan 2025

Contributed by Lukas

This book, Network Security Assessment, provides a comprehensive guide to penetration testing methods and techniques. The author covers a wide range ...

Network Security and Cryptography

11 Jan 2025

Contributed by Lukas

This Book is about computer network security and cryptography. It covers classical and modern cryptography, Internet security services such as IPSec a...

«« ← Prev Page 6 of 11 Next → »»