Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CyberSecurity Summary

News Education Arts

Episodes

Showing 601-700 of 1034
«« ← Prev Page 7 of 11 Next → »»

Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI

11 Jan 2025

Contributed by Lukas

This excerpt from "Network Programmability with YANG.pdf" explains the YANG language, which is designed for network configuration and management. It...

Network Forensics: Tracking Hackers through Cyberspace

10 Jan 2025

Contributed by Lukas

The source Book provides a comprehensive overview of network forensics, covering topics like evidence acquisition, packet analysis, intrusion detectio...

Network Design Cookbook: Architecting Cisco Networks

10 Jan 2025

Contributed by Lukas

This Book "Network Design Cookbook_Architecting Cisco Networks" guide. The guide aims to teach network design best practices and methodologies using C...

Network Connectivity: Concepts, Computation, and Optimization

10 Jan 2025

Contributed by Lukas

This Book investigate the concept of network connectivity, a measure of how well-connected nodes are within a network. They explore connectivity measu...

National Cyber Summit (NCS) Research Track 2020

09 Jan 2025

Contributed by Lukas

The provided Book explore various facets of cybersecurity, including education, risk assessment, and security solutions for specific technologies. The...

MSSQL Penetration Testing - Metasploit

09 Jan 2025

Contributed by Lukas

The provided Book is a guide on how to use Metasploit to penetrate and test Microsoft SQL Server (MSSQL) databases. The guide covers various steps, be...

MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410

09 Jan 2025

Contributed by Lukas

The Book  provide a comprehensive guide to installing, configuring, and managing Microsoft Windows Server 2012/R2. The text covers a wide range of to...

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security

09 Jan 2025

Contributed by Lukas

The Book  is an excerpt from a certification guidebook intended for individuals seeking to become Microsoft Security Operations Analysts. The guidebo...

ModSecurity Handbook

08 Jan 2025

Contributed by Lukas

The Book is a manual for ModSecurity, an open-source web application firewall. The manual covers a wide range of topics, including installation, confi...

Modern System Administration: Managing Reliable and Sustainable Systems

08 Jan 2025

Contributed by Lukas

This Book titled Modern System Administration: Building and Maintaining Reliable Systems, explores the evolving role of system administrators in the c...

Modern Full-Stack Development: Using TypeScript, React, Node.js, Webpack, and Docker

08 Jan 2025

Contributed by Lukas

The provided Book "Modern Full-Stack Development Using TypeScript, React, Node.js," which aims to guide readers through building web applications usin...

Modern DevOps Practices: Implement and secure DevOps in the public cloud with cutting-edge tools, tips, tricks, and techniques

08 Jan 2025

Contributed by Lukas

The Book is a comprehensive guide to modern DevOps practices, focusing on containerization, Kubernetes, and various tools like Docker, Terraform, Ansi...

Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization

08 Jan 2025

Contributed by Lukas

The provided Book "Modern Cybersecurity Practices," which is a guide to exploring and implementing agile cybersecurity frameworks and strategies withi...

Mobile Deep Learning with TensorFlow Lite, ML Kit and Flutter

07 Jan 2025

Contributed by Lukas

The provided Book excerpts come from the book "Mobile Deep Learning with TensorFlow Lite, ML Kit, and Flutter," offering a comprehensive guide to inte...

Mining Social Media: Finding Stories in Internet Data

07 Jan 2025

Contributed by Lukas

This Book, Mining Social Media: Finding Stories in Internet Data, by Lam Thuy Vo, is a guide for journalists and others interested in analyzing social...

Minimizing and Exploiting Leakage in VLSI Design

07 Jan 2025

Contributed by Lukas

This Book focuses on minimizing leakage power consumption in VLSI design. The authors examine leakage currents and their impact on circuit performance...

Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition

06 Jan 2025

Contributed by Lukas

This Book excerpt is a guide to managing and troubleshooting networks, specifically using the CompTIA Network+ certification exam as a guide. It cover...

Migrating Linux to Microsoft Azure: A hands-on guide to efficiently relocating your Linux workload to Azure

06 Jan 2025

Contributed by Lukas

This Book excerpt detailing the process of migrating Linux workloads to Microsoft Azure. The book outlines the four main phases of migration: Assess, ...

Microsoft 365 Security Administration: MS-500 Exam Guide

06 Jan 2025

Contributed by Lukas

This Book is a guide to Microsoft 365 security administration, specifically focusing on the MS-500 exam. It details how to plan and implement security...

Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900

06 Jan 2025

Contributed by Lukas

This Book provides a comprehensive overview of Microsoft's security, compliance, and identity fundamentals. It explores industry-standard security con...

Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge

05 Jan 2025

Contributed by Lukas

This Book is a comprehensive guide for individuals preparing to take the Microsoft Information Protection Administrator Associate (SC-400) exam. It pr...

Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy

05 Jan 2025

Contributed by Lukas

The Microsoft Identity and Access Administrator Exam Guide, written by Dwayne Natwick and reviewed by industry experts, offers a comprehensive guide t...

Microprocessor 5: Software and Hardware Aspects of Development, Debugging and Testing - The Microcomputer

05 Jan 2025

Contributed by Lukas

The source Book provides a detailed overview of microprocessor systems, covering their software and hardware aspects. It examines topics such as assem...

Microprocessor 2: Communication in a Digital System

05 Jan 2025

Contributed by Lukas

The first source, "Microprocessor 2: Core Concepts ─ Communication in a Digital System" by Philippe Darche, is a detailed technical guide exploring ...

Microprocessor 1: Prolegomena - Calculation and Storage Functions - Models of Computation and Computer Architecture

04 Jan 2025

Contributed by Lukas

The Book focusing on the microprocessor, a key component in modern computers. The first volume in the series introduces foundational concepts related ...

Python 101: 2nd Edition

04 Jan 2025

Contributed by Lukas

The Book is a comprehensive guide to Python programming, covering fundamental concepts, practical applications, and advanced techniques. It delves int...

Metasploit: The Penetration Tester's Guide

04 Jan 2025

Contributed by Lukas

This Book "Metasploit: The Penetration Tester's Guide." It is a guide for those who want to learn how to use the Metasploit Framework to test the secu...

Memory Systems: Cache, DRAM, Disk

04 Jan 2025

Contributed by Lukas

The Book provide a comprehensive overview of memory systems, focusing on the design, implementation, and optimization of various memory components, in...

Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks

04 Jan 2025

Contributed by Lukas

This Book, Mastering Windows Security and Hardening, is a comprehensive guide to securing Windows systems, focusing on both client and server environm...

Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy

03 Jan 2025

Contributed by Lukas

This Book is a comprehensive guide to mastering Windows Group Policy. It covers the fundamentals of Group Policy, including its role in managing users...

Mastering Python Forensics

03 Jan 2025

Contributed by Lukas

The Book "Mastering Python Forensics" by Dr. Michael Spreitzenbarth and Dr. Johann Uhrmann. This book teaches readers how to use Python to perform dig...

Mastering Docker: Enhance your containerization and DevOps skills to deliver production-ready applications

03 Jan 2025

Contributed by Lukas

This is a collection of excerpts from the book Mastering Docker, 4th Edition, which explores the fundamentals and advanced uses of Docker, a containe...

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

03 Jan 2025

Contributed by Lukas

This Book "Mastering Defensive Security," which covers essential concepts and techniques for securing computer systems, networks, and data. The book a...

Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

03 Jan 2025

Contributed by Lukas

The Book "Mastering Cyber Intelligence," which aims to equip readers with the knowledge and skills necessary to develop and implement a comprehensive ...

Mastering Azure Security: Keeping your Microsoft Azure workloads safe, 2nd Edition

02 Jan 2025

Contributed by Lukas

This Book Mastering Azure Security by Mustafa Toroman and Tom Janetscheck. It provides a comprehensive guide to securing Microsoft Azure workloads, co...

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

02 Jan 2025

Contributed by Lukas

This Book, Mastering Defensive Security, is a guide to cybersecurity practices designed for professionals. It covers a variety of topics including vul...

Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS

02 Jan 2025

Contributed by Lukas

The Book is a guide for learning about Windows Server 2022, including both the traditional desktop experience and the more secure Server Core installa...

Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principle

01 Jan 2025

Contributed by Lukas

This excerpt from the book "Mastering Windows Security and Hardening" provides a comprehensive guide to securing Windows environments. It covers a wid...

Mastering Palo Alto Networks

01 Jan 2025

Contributed by Lukas

This Book is an excerpt from a guide titled "Mastering Palo Alto Networks" which aims to teach readers how to deploy and manage Palo Alto Networks fir...

Mastering Modern Linux

01 Jan 2025

Contributed by Lukas

This Book provides a detailed overview of the Linux operating system, including its history, architecture, and functionality. The text covers a wide r...

Mastering Mobile Forensics

01 Jan 2025

Contributed by Lukas

The Book provides a comprehensive guide to mobile forensics, focusing on the intricacies of acquiring and analyzing data from iOS, Android, and Window...

Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT

31 Dec 2024

Contributed by Lukas

"Mastering Malware Analysis" is a comprehensive guide for malware analysts. The Book covers a broad range of topics, including assembly language, PE f...

Mastering Windows Network Forensics and Investigation

31 Dec 2024

Contributed by Lukas

This Book, "Mastering Windows Network Forensics," is a comprehensive guide for network investigators and incident responders to master the art of cond...

Windows Internals - Part 2

31 Dec 2024

Contributed by Lukas

"Windows Internals, Sixth Edition, Part 2" is a technical guide that provides an in-depth look at the inner workings of the Windows operating system, ...

Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware

31 Dec 2024

Contributed by Lukas

This Book, Malware Analysis and Detection Engineering, offers a comprehensive guide to understanding and combating malware. It covers a broad range of...

Malware Forensics: Investigating and Analyzing Malicious Code

30 Dec 2024

Contributed by Lukas

This Book is a comprehensive guide to malware incident response, covering both Windows and Linux systems. It details the tools and techniques needed t...

Malware Forensics Field Guide for Windows Systems

30 Dec 2024

Contributed by Lukas

The Book "Malware Forensics Field Guide for Windows Systems" by Cameron H. Malin and Eoghan Casey. The book is a guide for digital forensic investigat...

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

30 Dec 2024

Contributed by Lukas

The Book called "Malware Analyst's Cookbook," which is a guide for anyone who works with or against malicious software. The book covers a wide range o...

Machine Learning Mastery With Python: Understand Your Data, Create Accurate Models and Work Projects End-To-End

30 Dec 2024

Contributed by Lukas

The Book from "Machine Learning Mastery With Python: Understand Your Data, Create Accurate Models and Work Projects End-To-End" is a comprehensive gui...

Machine Learning for Cybersecurity: Innovative Deep Learning Solutions

29 Dec 2024

Contributed by Lukas

The Book present a series of studies exploring the use of machine learning techniques for detecting and preventing cybersecurity threats. One source f...

LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202

29 Dec 2024

Contributed by Lukas

This Book is a study guide for the LPIC-2 certification exam, focusing on advanced Linux administration topics. It provides detailed explanations of e...

Lock Picking for Beginners: A Complete Step-by-Step Visual Guide on How to Pick Locks with Simple Tools Using Quick and Effective Techniques

29 Dec 2024

Contributed by Lukas

This book, "Lock Picking for Beginners: A Complete Step-by-Step Visual Guide," is a comprehensive guide to the art of lock picking. The book begins by...

LOCK PICKING EQUIPMENT FOR BEGINNERS

29 Dec 2024

Contributed by Lukas

The Book is a guide to lock picking for beginners. The author explains the workings of pin tumbler locks, detailing the components and mechanisms invo...

LOCK PICKING: The Complete Guide for Beginners to Master the Art of Lock Picking Skills and Avoid Beginner Mistakes

28 Dec 2024

Contributed by Lukas

This is an excerpt from a book that provides a comprehensive guide to the art of lock picking for beginners. It covers the different types of locks an...

LLVM Essentials: Become familiar with the LLVM infrastructure and start using LLVM libraries to design a compiler

28 Dec 2024

Contributed by Lukas

This book is a guide for LLVM, an open-source compiler infrastructure. The text focuses on teaching readers how to write compilers for custom architec...

Linux 101 hacks

28 Dec 2024

Contributed by Lukas

The Book is a guide for Linux users called "Linux 101 Hacks". It covers a wide range of topics, from essential commands to more advanced system admini...

Linux Command Line and Shell Scripting Bible

28 Dec 2024

Contributed by Lukas

The Book provide a comprehensive guide to Linux command-line tools and shell scripting. They cover fundamental concepts like navigating the file syste...

Linux System Administration for the 2020s

28 Dec 2024

Contributed by Lukas

The Book provide a comprehensive guide for system administrators working with Linux in the 2020s, covering various aspects of administration, from bas...

Linux Hardening in Hostile Networks

27 Dec 2024

Contributed by Lukas

This excerpt from the ebook "Linux Hardening in Hostile Networks" details various security measures that can be applied to Linux systems. It starts by...

Linux Firewalls: Enhancing Security with nftables and Beyond: Enhancing Security with nftables and Beyond

27 Dec 2024

Contributed by Lukas

This Book is a chapter from a book on Linux firewalls. It discusses the fundamentals of packet filtering, security measures, and the implementation of...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort

27 Dec 2024

Contributed by Lukas

This Book, Linux Firewalls: Attack Detection, is a comprehensive guide to securing Linux systems by using iptables to detect and respond to network at...

Linux System Administration: Solve Real-life Linux Problems Quickly

27 Dec 2024

Contributed by Lukas

This Book is an excerpt from the book "Linux System Administration" by Tom Adelstein and Bill Lubanovic. It is a comprehensive guide to Linux system a...

Linux Server Security: Hack and Defend

27 Dec 2024

Contributed by Lukas

The provided Book comes from the book "Linux Server Security: Hack and Defend" by Chris Binnie. The book aims to provide a broad overview of system an...

Linux Kernel Debugging: Leverage proven tools and advanced techniques to effectively debug Linux kernels and kernel modules

25 Dec 2024

Contributed by Lukas

This Book provides a comprehensive guide to debugging the Linux kernel, covering various methods and tools. The book begins by defining what debugging...

Linux Inside

25 Dec 2024

Contributed by Lukas

The provided Book excerpts come from a series of blog posts about the Linux kernel for the x86_64 architecture. The posts aim to explain the kernel's ...

Linux Fundamentals

25 Dec 2024

Contributed by Lukas

The Book "Linux Fundamentals, 2nd Edition" that explores various aspects of the Linux operating system. It covers topics such as the Linux kernel, GNU...

Linux for Networking Professionals: Securely configure and operate Linux network services for the enterprise

25 Dec 2024

Contributed by Lukas

This excerpt is from a book titled "Linux for Networking Professionals," which focuses on utilizing the Linux operating system for network-related ser...

Linux For Hacking - Install Test And Hack

25 Dec 2024

Contributed by Lukas

This Book, an excerpt from "Linux For Hacking", is a guide for Linux system administrators on how to secure their systems from hackers. The guide cove...

Linux: Embedded Development

24 Dec 2024

Contributed by Lukas

This excerpt from the book "Linux Embedded Development" provides a comprehensive guide to embedded Linux development. It begins by introducing fundame...

Linux Command Line and Shell Scripting Bible

24 Dec 2024

Contributed by Lukas

The Book provide a comprehensive guide to the Linux command line and shell scripting. The text covers a wide range of topics, including basic commands...

Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing

24 Dec 2024

Contributed by Lukas

This Book is a technical manual on IT security that focuses on Red Hat products and solutions. The text covers basic network protocols, Linux system a...

Learning iOS Forensics

24 Dec 2024

Contributed by Lukas

This is a technical book about iOS forensics for investigators. The book begins with an overview of iOS devices and how to identify them, then explai...

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

24 Dec 2024

Contributed by Lukas

This Book is a guide for performing security testing with Kali Linux. It explores essential tools and techniques for vulnerability identification and ...

Learning Java by Building Android Games

23 Dec 2024

Contributed by Lukas

The Book provide a comprehensive guide to Android game development using Java, starting with basic concepts and gradually progressing to more advanced...

Learning the vi and Vim Editors: Text Processing at Maximum Speed and Power

23 Dec 2024

Contributed by Lukas

The Book provides a comprehensive guide to the vi text editor, a powerful tool for Unix-based systems, and its various clones such as Vim, nvi, elvis,...

Learning Nessus for Penetration Testing

23 Dec 2024

Contributed by Lukas

This Book provides an in-depth guide to using Nessus, a popular vulnerability assessment and penetration testing tool. The book begins by defining vul...

Learning Metasploit Exploitation and Development

23 Dec 2024

Contributed by Lukas

The source Book provides a comprehensive guide to the Metasploit Framework, a powerful tool used by penetration testers to find and exploit security v...

Learning Linux Binary Analysis

22 Dec 2024

Contributed by Lukas

"Learning Linux Binary Analysis" is a technical guide for computer security researchers and software engineers who want to learn about binary analysis...

Learning DevOps - Second Edition

22 Dec 2024

Contributed by Lukas

This book, Learning DevOps, Second Edition, is a comprehensive guide to DevOps practices and principles, focusing on practical application and implem...

Learn to Program with Kotlin: From the Basics to Projects with Text and Image Processing

22 Dec 2024

Contributed by Lukas

A book that teaches Kotlin programming through the creation of interesting projects. It begins with a basic introduction to programming and Kotlin, th...

Learn PowerShell in a Month of Lunches, Fourth Edition

22 Dec 2024

Contributed by Lukas

The Book provide a comprehensive guide to learning and using PowerShell. They cover fundamental concepts such as cmdlets, help systems, pipelines, and...

Learn Linux Quickly: A Friendly Guide to Easily Master the World's Most Powerful Operating System

21 Dec 2024

Contributed by Lukas

The Book is a comprehensive guide to learning the Linux operating system, covering essential commands, concepts, and practical applications. The book ...

Learn How to Hack Like a Pro

21 Dec 2024

Contributed by Lukas

This book titled "Hacking: Learn How to Hack Like a Pro" by Manish Pundeer, a cybersecurity expert. The book is designed for beginners who want to lea...

Learn Computer Forensics - Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence

21 Dec 2024

Contributed by Lukas

The Book is a PDF book titled "Learn Computer Forensics," which acts as a guide to understanding the fundamental principles and techniques of computer...

Laptops For Dummies

21 Dec 2024

Contributed by Lukas

The Book is a comprehensive guide to using laptops, covering topics like setting up a new laptop, understanding its components, and using it for vario...

Kubernetes Security and Observability

20 Dec 2024

Contributed by Lukas

This Book, Kubernetes Security and Observability, provides a comprehensive overview of building a secure and observable Kubernetes cluster. It details...

Kubernetes Security - Operating Kubernetes Clusters and Applications Safely

20 Dec 2024

Contributed by Lukas

This excerpt from the book Kubernetes Security by Liz Rice and Michael Hausenblas provides a comprehensive overview of how to secure Kubernetes clus...

Keyboard Shortcuts For Data Scientists

20 Dec 2024

Contributed by Lukas

The Book "Keyboard Shortcuts For Data Scientists.pdf" provides keyboard shortcuts for commonly used software tools by data scientists. The document is...

Kali Linux Reference Guide: A Pentester's Voyage

20 Dec 2024

Contributed by Lukas

The provided Book comes from a book titled "Kali Linux Reference Guide: A Pentester's Voyage" which serves as a comprehensive guide for individuals se...

Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition

20 Dec 2024

Contributed by Lukas

This excerpt from the book "Kali Linux 2: Assuring Security" is a comprehensive guide to using Kali Linux for penetration testing. It begins by introd...

Kali Linux Wireless Penetration Testing Beginner's Guide

20 Dec 2024

Contributed by Lukas

This Book is an excerpt from the book "Kali Linux Wireless Penetration Testing Beginner's Guide" by Vivek Ramachandran and Cameron Buchanan. The book ...

Kali Linux Revealed: Mastering the Penetration Testing Distribution

20 Dec 2024

Contributed by Lukas

The Book material provides a comprehensive guide to Kali Linux, covering everything from basic system fundamentals and package management to advanced ...

Kali Linux Ctf Blueprints

19 Dec 2024

Contributed by Lukas

The source Book provides a comprehensive guide to building and utilizing penetration testing environments using Kali Linux. The document outlines spec...

Kali Linux

19 Dec 2024

Contributed by Lukas

The Book titled "Kali Linux". It includes the email address and professional title of Souhail Laghchim, who identifies himself as a developer. This su...

JNCIP: Juniper Networks Certified Internet Professional Study Guide

19 Dec 2024

Contributed by Lukas

The provided Book comes from a study guide for the Juniper Networks Certified Internet Professional (JNCIP) exam. The study guide covers key concepts ...

Jumpstarting the Raspberry Pi Zero W: Control the World Around You with a $10 Computer

19 Dec 2024

Contributed by Lukas

This Book from “Jumpstarting the Raspberry Pi Zero W” by Akkana Peck focuses on using the Raspberry Pi Zero W to control hardware and network devi...

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

19 Dec 2024

Contributed by Lukas

The Book "The Art of Intrusion" by Kevin Mitnick and William Simon, a detailed account of hacker exploits and security vulnerabilities. The text explo...

(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide

19 Dec 2024

Contributed by Lukas

The Book is an excerpt from a study guide for the Systems Security Certified Practitioner (SSCP) exam. It explains key information security concepts a...

ISO/IEC 9899:1999, Programming languages -- C

19 Dec 2024

Contributed by Lukas

The Book material provides a comprehensive and detailed description of the C programming language, including its syntax, semantics, and standard libra...

JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron

17 Dec 2024

Contributed by Lukas

The Book provide a comprehensive guide to building cross-platform applications with GraphQL, React, React Native, and Electron. The first source, "Jav...

«« ← Prev Page 7 of 11 Next → »»