Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CyberSecurity Summary

News Education Arts

Episodes

Showing 701-800 of 1034
«« ← Prev Page 8 of 11 Next → »»

(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test

17 Dec 2024

Contributed by Lukas

The Book "(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test" is a study guide for the CISSP certification ex...

ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide

17 Dec 2024

Contributed by Lukas

The Book provide a comprehensive guide to the Certified in Risk and Information Systems Control (CRISC) certification exam. It explores various aspect...

IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

17 Dec 2024

Contributed by Lukas

This "IoT and OT Security Handbook" explains the challenges of securing IoT and OT devices in the era of Industry 4.0. The book highlights the importa...

iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

17 Dec 2024

Contributed by Lukas

This excerpt comes from iOS Forensics for Investigators, a book by Gianluca Tiepolo, a cybersecurity researcher specializing in mobile forensics and ...

iOS Application Security: The Definitive Guide for Hackers and Developers

17 Dec 2024

Contributed by Lukas

The source is a book entitled "iOS Application Security" by William Pollock. The book is a guide to security practices and common security vulnerabili...

iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics

17 Dec 2024

Contributed by Lukas

The Book is an excerpt from a book about iOS 14 programming fundamentals using Swift. The Book covers fundamental topics such as object types, variabl...

Investigating Windows Systems

16 Dec 2024

Contributed by Lukas

The source Book is an excerpt from "Investigating Windows Systems.pdf," a book that aims to guide digital forensic analysts through the process of ana...

Investigating Internet Crimes

16 Dec 2024

Contributed by Lukas

This excerpt from the book "Investigating Internet Crimes" provides a comprehensive guide for law enforcement officers and investigators on how to eff...

Introduction to Computer Organization

16 Dec 2024

Contributed by Lukas

The Book provide an introductory overview of computer organization, covering the fundamental concepts of hardware and software. The sources explore to...

Introduction to Compiler Design

16 Dec 2024

Contributed by Lukas

This excerpt from Introduction to Compiler Design by Torben Ægidius Mogensen provides a comprehensive overview of compiler design principles, focus...

Incident Response Techniques for Ransomware Attacks

16 Dec 2024

Contributed by Lukas

This excerpt is from a book titled "Incident Response Techniques for Ransomware Attacks", which provides a comprehensive guide to the modern ransomwar...

Incident Response with Threat Intelligence

16 Dec 2024

Contributed by Lukas

The Book are chapters on incident response with threat intelligence. The text covers a range of topics, including the different types of threat actors...

Incident Response & Computer Forensics, Third Edition

15 Dec 2024

Contributed by Lukas

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you wi...

Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration

15 Dec 2024

Contributed by Lukas

This is a guide on implementing and managing VxRail HCI solutions. It explains the VxRail system architecture, software components, and licensing. The...

Implementing Effective Code Reviews: How to Build and Maintain Clean Code

15 Dec 2024

Contributed by Lukas

This Book "Implementing Effective Code Reviews" by Giuliana Carullo. The book is designed to guide software engineers in writing clean and efficient c...

Implementing Cryptography Using Python

15 Dec 2024

Contributed by Lukas

The Book titled "Implementing Cryptography Using Python" by Shannon W. Bray. It is a guide for information security professionals who want to learn ho...

Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

15 Dec 2024

Contributed by Lukas

This Book provides an extensive overview of Cisco networking concepts and technologies. It explores topics ranging from basic network fundamentals to ...

Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,

15 Dec 2024

Contributed by Lukas

This Book about reverse engineering, specifically focusing on the x86 architecture. The Book provides a comprehensive guide to understanding the inter...

Implementing Cisco IP Switch Networks (300-115)

15 Dec 2024

Contributed by Lukas

The Book provides a guide for implementing Cisco IP Switch Networks. The guide details configuring Cisco switches, setting up VLANS, trunk links, and ...

IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over

15 Dec 2024

Contributed by Lukas

The Book is the IEEE Standard for Ethernet (IEEE 802.3-2018), a Book that specifies the technical details for the Ethernet network standard. The stand...

IBM b-type Gen 7 Installation, Migration, and Best Practices Guide

15 Dec 2024

Contributed by Lukas

This Book provides an extensive guide on installing, migrating, and implementing best practices for the IBM b-type Gen 7 SAN director. It covers vario...

Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud

15 Dec 2024

Contributed by Lukas

The Book is an excerpt from the book "Hybrid Cloud Security Patterns," authored by Sreekanth Iyer and reviewed by Tony Carrato. It details various sec...

How Linux Works, 3rd Edition: What Every Superuser Should Know

15 Dec 2024

Contributed by Lukas

The Book provide an in-depth guide to understanding the workings of Linux, ranging from fundamental system concepts to practical configurations and sc...

How to Measure Anything in Cybersecurity Risk

15 Dec 2024

Contributed by Lukas

This is an excerpt from How to Measure Anything in Cybersecurity Risk by Douglas Hubbard and Richard Seiersen, which argues for a more quantitative ...

How to Hack Like a Legend: Breaking Windows

13 Dec 2024

Contributed by Lukas

This excerpt from the Book "How to Hack Like a Legend" by Sparc Flow is a guide to ethical hacking techniques. The book provides a detailed step-by-st...

How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

13 Dec 2024

Contributed by Lukas

This book, How to Catch a Phish, provides a practical guide to detecting phishing emails, which are designed to trick users into providing sensitive ...

History of REvil

13 Dec 2024

Contributed by Lukas

The Book, “History of REvil”, is a detailed report that investigates the history of the REvil ransomware gang, a criminal enterprise based in Russ...

Hiding from the Internet: Eliminating Personal Online Information

13 Dec 2024

Contributed by Lukas

The Book, "Hiding From The Internet," is a comprehensive guide to maintaining online privacy. The author, a former government employee who experienced...

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

12 Dec 2024

Contributed by Lukas

This is a Book that explains how to investigate covert communications and analyzes the tools and methods that criminals use to hide their communicatio...

Hash Crack: Password Cracking Manual v.3

12 Dec 2024

Contributed by Lukas

This Book, "HASH CRACK Password Cracking Manual v.3" is a comprehensive guide for cracking password hashes, written for network defenders and penetrat...

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

12 Dec 2024

Contributed by Lukas

The Book is an early access excerpt from the Hardware Hacking Handbook by Jasper van Woudenberg and Colin O'Flynn. This excerpt focuses on embedded se...

Hardware Security: A Hands-on Learning Approach

12 Dec 2024

Contributed by Lukas

This Book, "Hardware Security A Hands-on Learning Approach," is a comprehensive guide to hardware security. It focuses on the vulnerabilities and atta...

Hands-On Penetration Testing on Windows

11 Dec 2024

Contributed by Lukas

The Book called "Hands-On Penetration Testing on Windows," which explains penetration testing concepts and techniques for those with intermediate to a...

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

11 Dec 2024

Contributed by Lukas

The Book "Hands-On Dark Web Analysis" by Sion Retzkin. The book provides a comprehensive guide for understanding and navigating the Deep Web and Dark ...

Hands-On Chatbots and Conversational UI Development

11 Dec 2024

Contributed by Lukas

The Book "Hands-On Chatbots and Conversational UI Development," which is a guide for building chatbots and voice user interfaces. The book covers a ra...

Hands-On Penetration Testing with Kali NetHunter

11 Dec 2024

Contributed by Lukas

This excerpt is from a book that teaches ethical hacking and penetration testing using Kali Linux, specifically the NetHunter edition, designed for mo...

Handbook for CTFers

10 Dec 2024

Contributed by Lukas

The Book is a handbook for CTF competitors, a type of cybersecurity competition. It provides information about various security vulnerabilities and at...

Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook

10 Dec 2024

Contributed by Lukas

The provided Book excerpts from "Hacklog: Volume 1" are a handbook on anonymity, IT security, and ethical hacking. The book guides readers on how to p...

Hacking: The Art of Exploitation, 2nd Edition

10 Dec 2024

Contributed by Lukas

This Book material is an excerpt from a book titled "Hacking: The Art of Exploitation." It explores the art of hacking through a combination of practi...

Hacking Android

10 Dec 2024

Contributed by Lukas

The Book provides a comprehensive guide to hacking and securing Android applications, covering both static and dynamic analysis techniques. The source...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

08 Dec 2024

Contributed by Lukas

This Book is a comprehensive guide to computer hacking, written by Roger A. Grimes, a seasoned computer security professional with decades of experien...

Hacking Kubernetes: Threat-Driven Analysis and Defense

08 Dec 2024

Contributed by Lukas

This excerpt from the book "Hacking Kubernetes" by Andrew Martin and Michael Hausenblas is a guide for cybersecurity professionals working with Kubern...

Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future

08 Dec 2024

Contributed by Lukas

The provided Book, excerpts from "Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future" explores the relatio...

Hacking Exposed: Malware & Rootkits Secrets & Solutions

08 Dec 2024

Contributed by Lukas

The Book "Hacking Exposed: Malware & Rootkits provides a comprehensive examination of modern malware and rootkits, exploring their evolution, tech...

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

08 Dec 2024

Contributed by Lukas

The Book "Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security," written by Gary Hall and Erin Watson. The book is a gu...

Hacking APIs: Breaking Web Application Programming Interfaces

08 Dec 2024

Contributed by Lukas

This is an excerpt from "Hacking APIs: Breaking Web Application Programming Interfaces". The book provides a comprehensive guide to hacking APIs, cove...

Hacking SaaS: An Insider's Guide to Managing Software Business Success

08 Dec 2024

Contributed by Lukas

The Book is an excerpt from "Hacking SaaS: An Insider’s Guide to Managing Software Business Success," a book written by Eric Mersch, an experienced ...

Hacking Multifactor Authentication

08 Dec 2024

Contributed by Lukas

This excerpt from the book "Hacking Multifactor Authentication" provides a comprehensive look at the various ways attackers can bypass multifactor aut...

HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX

07 Dec 2024

Contributed by Lukas

This excerpt from a hacking guidebook provides comprehensive information about ethical hacking, penetration testing, and cybersecurity. It delves into...

Hacking VoIP: Protocols, Attacks, and Countermeasures

07 Dec 2024

Contributed by Lukas

The Book, "Hacking VoIP: Protocols, Attacks, and Countermeasures" by Himanshu Dwivedi, is a book that details the security vulnerabilities of Voice ov...

Hacking the Xbox: An Introduction to Reverse Engineering

07 Dec 2024

Contributed by Lukas

"Hacking the Xbox: An Introduction to Reverse Engineering" is a guide for hackers interested in learning about reverse engineering, specifically focus...

Hacking Gps

07 Dec 2024

Contributed by Lukas

This excerpt from the book "Hacking GPS" by Kathie Kingsley-Hughes covers a wide range of topics relating to Global Positioning Systems (GPS) includin...

Hacking For Dummies

07 Dec 2024

Contributed by Lukas

The source Book provides a comprehensive guide to understanding and mitigating information security risks. It covers a range of topics, including comm...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

07 Dec 2024

Contributed by Lukas

This excerpt is from the book "Hacking and Securing iOS Applications" by Jonathan Zdziarski. The book provides a comprehensive guide to the vulnerabil...

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

06 Dec 2024

Contributed by Lukas

The excerpt is from a book exploring the complex, multifaceted nature of Anonymous, a decentralized online collective known for its hacktivism and tro...

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

06 Dec 2024

Contributed by Lukas

The Book provide a comprehensive guide to ethical hacking, covering a wide range of topics from basic programming concepts to advanced techniques for ...

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

06 Dec 2024

Contributed by Lukas

The source Book is from the book "Gray Hat C# : A Hacker's Guide to Creating and Automating Security Tools" by Brandon Perry. This book teaches reader...

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

05 Dec 2024

Contributed by Lukas

The provided Book are excerpts from the book "Gray Hat Python" by Justin Seitz, which aims to teach readers how to use Python for hacking and reverse ...

Google Hacking for Penetration Testers

05 Dec 2024

Contributed by Lukas

This is a guide to Google hacking, focusing on how Google can be used to find sensitive information on the internet. The book covers topics like locat...

Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo

05 Dec 2024

Contributed by Lukas

This book, Google Cloud Certified Professional Cloud Network Engineer Guide, is a comprehensive guide to Google Cloud Platform (GCP) networking. It c...

Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

05 Dec 2024

Contributed by Lukas

This excerpt from the book "Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense" by Bryson Payne is a guide to ethical hacking that t...

Go Programming Language For Dummies

05 Dec 2024

Contributed by Lukas

This excerpt from the book "Go Programming Language For Dummies" provides a detailed introduction to the Go programming language, focusing on core con...

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

05 Dec 2024

Contributed by Lukas

"Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" is Kevin Mitnick's autobiography detailing his life as a computer hacker. The te...

Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy

05 Dec 2024

Contributed by Lukas

This is a comprehensive guide to Ghidra, a reverse engineering tool developed by the National Security Agency (NSA). The book covers a wide range of t...

Get Programming with Go

05 Dec 2024

Contributed by Lukas

A book that teaches the Go programming language. It provides a step-by-step guide to Go, starting with the basics, such as declaring variables and per...

Game Hacking: Developing Autonomous Bots for Online Games by Cano

05 Dec 2024

Contributed by Lukas

This is a comprehensive guide on game hacking, outlining the various tools and techniques used to manipulate and modify online games. The book covers ...

Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU

05 Dec 2024

Contributed by Lukas

The Book are a combination of the preface and selected chapters from the book "Fuzzing Against The Machine" by Eduardo Blázquez and Antonio Nappa. Th...

Fuzzing for Software Security

04 Dec 2024

Contributed by Lukas

This excerpt from the Book "Fuzzing for Software Security Testing and Quality Assurance" by Ari Takanen, Jared DeMott, and Charlie Miller focuses on e...

Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL

04 Dec 2024

Contributed by Lukas

The Book provide a comprehensive guide to building a full-stack web application using React, TypeScript, Node.js, Express, and GraphQL. The book "Full...

Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL

04 Dec 2024

Contributed by Lukas

The provided Book excerpts are from the book "Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL" by Nader Dabit. This...

Full Stack Python Security: Cryptography, TLS, and attack resistance

04 Dec 2024

Contributed by Lukas

The Book provide a comprehensive guide to securing Python-based web applications. The text covers fundamental cryptographic concepts, such as hashing ...

From Hacking to Report Writing: An Introduction to Security and Penetration Testing

04 Dec 2024

Contributed by Lukas

The source Book provides a guide to security testing. It explains the different types of security tests, including black box, white box, and gray box,...

Foundational Java: Key Elements and Practical Programming

04 Dec 2024

Contributed by Lukas

This excerpt from the book "Foundational Java" provides an overview of object-oriented programming in Java. It explores key concepts such as classes, ...

Linux All-In-One For Dummies

04 Dec 2024

Contributed by Lukas

The source Book provides a comprehensive guide to understanding and using Linux, covering a wide range of topics from basic installation and system ad...

Flutter for Beginners

04 Dec 2024

Contributed by Lukas

The provided Book excerpts come from the book "Flutter for Beginners" by Alessandro Biessek, offering a comprehensive guide to Flutter app development...

FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES

03 Dec 2024

Contributed by Lukas

The Book provide an extensive guide to cybersecurity and privacy, using an analogy of a medieval castle to explain the importance of building strong d...

Finding Beacons in the Dark

03 Dec 2024

Contributed by Lukas

This research Book explores the Cobalt Strike framework, a popular tool used by both red teams and malicious actors for penetration testing and cybera...

Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!

03 Dec 2024

Contributed by Lukas

This excerpt is from a book that teaches aspiring ethical hackers how to conduct penetration tests. The book provides a framework for ethical hacking,...

Ethical Hacker's Certification Guide (CEHv11)

03 Dec 2024

Contributed by Lukas

This excerpt is from a book on ethical hacking and penetration testing, specifically geared toward preparing individuals for the Certified Ethical Hac...

Ethical Hacking-Joe Grant

03 Dec 2024

Contributed by Lukas

This Book is an introduction to ethical hacking, using the Kali Linux operating system. It covers a range of topics related to information security, i...

Ethical Hacking: Techniques, Tools, and Countermeasures

03 Dec 2024

Contributed by Lukas

The source Book provides a comprehensive overview of ethical hacking techniques, tools, and countermeasures for information security professionals. Th...

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

03 Dec 2024

Contributed by Lukas

The Book are chapters from a book titled "Essential Cybersecurity Science" by Josiah Dykstra, which explores the application of the scientific method ...

Essential Of Artificial Intelligence

03 Dec 2024

Contributed by Lukas

The Book provide an extensive overview of Python fundamentals, covering the basics of programming using Python, including data types, operators, funct...

Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World

02 Dec 2024

Contributed by Lukas

The source is a book excerpt on enterprise-level security. It focuses on a security model called ELS (Enterprise Level Security) and its practical imp...

Enterprise Level Security 1 & 2

02 Dec 2024

Contributed by Lukas

The Book is a comprehensive guide to enterprise-level security for information systems. It explains principles, architectures, and techniques for secu...

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

02 Dec 2024

Contributed by Lukas

The sources provide an extensive overview of enterprise integration patterns, focusing on the use of messaging systems for connecting applications. It...

Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide

02 Dec 2024

Contributed by Lukas

The provided Book comes from a Nutanix Enterprise Cloud Administration (ECA) course guide. The guide outlines the various components and features of t...

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

02 Dec 2024

Contributed by Lukas

This excerpt from "Engineering Trustworthy Systems" is a guide for cybersecurity professionals, focusing on how to design and build trustworthy system...

Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow

02 Dec 2024

Contributed by Lukas

The source material explores the complex landscape of cybercrime, examining various aspects from criminal profiles and activities in the dark web, to ...

Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

02 Dec 2024

Contributed by Lukas

The sources present a comprehensive overview of cryptography, both classical and quantum, emphasizing its practical applications in organizations and ...

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

02 Dec 2024

Contributed by Lukas

This book, Empirical Cloud Security, aims to provide a practical guide for evaluating risks and attacks in cloud environments. The second edition foc...

Embedded Linux Development Using Yocto Project

02 Dec 2024

Contributed by Lukas

This source is a Book titled "Embedded Linux Development Using Yocto Project", providing a comprehensive guide to building custom Linux systems for em...

Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming

01 Dec 2024

Contributed by Lukas

This Book is a compilation of excerpts from Marijn Haverbeke's "Eloquent JavaScript: A Modern Introduction to Programming." The book explores the Java...

Eleventh Hour CISSP: Study Guide

01 Dec 2024

Contributed by Lukas

The source is an excerpt from a Book titled "Eleventh Hour CISSP" which provides a comprehensive overview of information security concepts, principles...

Reversing: Secrets of Reverse Engineering

01 Dec 2024

Contributed by Lukas

The provided source Book is an excerpt from a Book titled "Reversing: Secrets of Reverse Engineering." The book discusses the process of reverse engin...

Efficient Linux at the Command Line: Boost Your Command-Line Skills

01 Dec 2024

Contributed by Lukas

The source is an excerpt from the book "Efficient Linux at the Command Line" by Vance Wilson, which covers advanced command-line techniques for naviga...

Effective Cybersecurity: A Guide to Using Best Practices and Standards

01 Dec 2024

Contributed by Lukas

This Book, "Effective Cybersecurity: A Guide," provides a comprehensive overview of cybersecurity best practices and standards. It focuses on managing...

Effective C: An Introduction to Professional C Programming

01 Dec 2024

Contributed by Lukas

The Book source is an excerpt from "Effective C: An Introduction to Professional C Programming" by Robert C. Seacord. It covers various aspects of C p...

Easy Learning Design Patterns Javascript: Build Better Coding and Design Patterns

01 Dec 2024

Contributed by Lukas

This excerpt from Easy Learning Design Patterns Javascript by Yang Hu is a beginner's guide to understanding and implementing design patterns in Jav...

Dynamically Enabled Cyber Defense

28 Nov 2024

Contributed by Lukas

This excerpt from the Book "Dynamically Enabled Cyber Defense" explores the evolving threat of cyberattacks and the need for more dynamic defense stra...

«« ← Prev Page 8 of 11 Next → »»