CyberSecurity Summary
Episodes
(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test
17 Dec 2024
Contributed by Lukas
The Book "(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test" is a study guide for the CISSP certification ex...
ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide
17 Dec 2024
Contributed by Lukas
The Book provide a comprehensive guide to the Certified in Risk and Information Systems Control (CRISC) certification exam. It explores various aspect...
IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT
17 Dec 2024
Contributed by Lukas
This "IoT and OT Security Handbook" explains the challenges of securing IoT and OT devices in the era of Industry 4.0. The book highlights the importa...
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
17 Dec 2024
Contributed by Lukas
This excerpt comes from iOS Forensics for Investigators, a book by Gianluca Tiepolo, a cybersecurity researcher specializing in mobile forensics and ...
iOS Application Security: The Definitive Guide for Hackers and Developers
17 Dec 2024
Contributed by Lukas
The source is a book entitled "iOS Application Security" by William Pollock. The book is a guide to security practices and common security vulnerabili...
iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics
17 Dec 2024
Contributed by Lukas
The Book is an excerpt from a book about iOS 14 programming fundamentals using Swift. The Book covers fundamental topics such as object types, variabl...
Investigating Windows Systems
16 Dec 2024
Contributed by Lukas
The source Book is an excerpt from "Investigating Windows Systems.pdf," a book that aims to guide digital forensic analysts through the process of ana...
Investigating Internet Crimes
16 Dec 2024
Contributed by Lukas
This excerpt from the book "Investigating Internet Crimes" provides a comprehensive guide for law enforcement officers and investigators on how to eff...
Introduction to Computer Organization
16 Dec 2024
Contributed by Lukas
The Book provide an introductory overview of computer organization, covering the fundamental concepts of hardware and software. The sources explore to...
Introduction to Compiler Design
16 Dec 2024
Contributed by Lukas
This excerpt from Introduction to Compiler Design by Torben Ægidius Mogensen provides a comprehensive overview of compiler design principles, focus...
Incident Response Techniques for Ransomware Attacks
16 Dec 2024
Contributed by Lukas
This excerpt is from a book titled "Incident Response Techniques for Ransomware Attacks", which provides a comprehensive guide to the modern ransomwar...
Incident Response with Threat Intelligence
16 Dec 2024
Contributed by Lukas
The Book are chapters on incident response with threat intelligence. The text covers a range of topics, including the different types of threat actors...
Incident Response & Computer Forensics, Third Edition
15 Dec 2024
Contributed by Lukas
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you wi...
Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration
15 Dec 2024
Contributed by Lukas
This is a guide on implementing and managing VxRail HCI solutions. It explains the VxRail system architecture, software components, and licensing. The...
Implementing Effective Code Reviews: How to Build and Maintain Clean Code
15 Dec 2024
Contributed by Lukas
This Book "Implementing Effective Code Reviews" by Giuliana Carullo. The book is designed to guide software engineers in writing clean and efficient c...
Implementing Cryptography Using Python
15 Dec 2024
Contributed by Lukas
The Book titled "Implementing Cryptography Using Python" by Shannon W. Bray. It is a guide for information security professionals who want to learn ho...
Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide
15 Dec 2024
Contributed by Lukas
This Book provides an extensive overview of Cisco networking concepts and technologies. It explores topics ranging from basic network fundamentals to ...
Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,
15 Dec 2024
Contributed by Lukas
This Book about reverse engineering, specifically focusing on the x86 architecture. The Book provides a comprehensive guide to understanding the inter...
Implementing Cisco IP Switch Networks (300-115)
15 Dec 2024
Contributed by Lukas
The Book provides a guide for implementing Cisco IP Switch Networks. The guide details configuring Cisco switches, setting up VLANS, trunk links, and ...
IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over
15 Dec 2024
Contributed by Lukas
The Book is the IEEE Standard for Ethernet (IEEE 802.3-2018), a Book that specifies the technical details for the Ethernet network standard. The stand...
IBM b-type Gen 7 Installation, Migration, and Best Practices Guide
15 Dec 2024
Contributed by Lukas
This Book provides an extensive guide on installing, migrating, and implementing best practices for the IBM b-type Gen 7 SAN director. It covers vario...
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud
15 Dec 2024
Contributed by Lukas
The Book is an excerpt from the book "Hybrid Cloud Security Patterns," authored by Sreekanth Iyer and reviewed by Tony Carrato. It details various sec...
How Linux Works, 3rd Edition: What Every Superuser Should Know
15 Dec 2024
Contributed by Lukas
The Book provide an in-depth guide to understanding the workings of Linux, ranging from fundamental system concepts to practical configurations and sc...
How to Measure Anything in Cybersecurity Risk
15 Dec 2024
Contributed by Lukas
This is an excerpt from How to Measure Anything in Cybersecurity Risk by Douglas Hubbard and Richard Seiersen, which argues for a more quantitative ...
How to Hack Like a Legend: Breaking Windows
13 Dec 2024
Contributed by Lukas
This excerpt from the Book "How to Hack Like a Legend" by Sparc Flow is a guide to ethical hacking techniques. The book provides a detailed step-by-st...
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
13 Dec 2024
Contributed by Lukas
This book, How to Catch a Phish, provides a practical guide to detecting phishing emails, which are designed to trick users into providing sensitive ...
History of REvil
13 Dec 2024
Contributed by Lukas
The Book, “History of REvil”, is a detailed report that investigates the history of the REvil ransomware gang, a criminal enterprise based in Russ...
Hiding from the Internet: Eliminating Personal Online Information
13 Dec 2024
Contributed by Lukas
The Book, "Hiding From The Internet," is a comprehensive guide to maintaining online privacy. The author, a former government employee who experienced...
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
12 Dec 2024
Contributed by Lukas
This is a Book that explains how to investigate covert communications and analyzes the tools and methods that criminals use to hide their communicatio...
Hash Crack: Password Cracking Manual v.3
12 Dec 2024
Contributed by Lukas
This Book, "HASH CRACK Password Cracking Manual v.3" is a comprehensive guide for cracking password hashes, written for network defenders and penetrat...
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
12 Dec 2024
Contributed by Lukas
The Book is an early access excerpt from the Hardware Hacking Handbook by Jasper van Woudenberg and Colin O'Flynn. This excerpt focuses on embedded se...
Hardware Security: A Hands-on Learning Approach
12 Dec 2024
Contributed by Lukas
This Book, "Hardware Security A Hands-on Learning Approach," is a comprehensive guide to hardware security. It focuses on the vulnerabilities and atta...
Hands-On Penetration Testing on Windows
11 Dec 2024
Contributed by Lukas
The Book called "Hands-On Penetration Testing on Windows," which explains penetration testing concepts and techniques for those with intermediate to a...
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
11 Dec 2024
Contributed by Lukas
The Book "Hands-On Dark Web Analysis" by Sion Retzkin. The book provides a comprehensive guide for understanding and navigating the Deep Web and Dark ...
Hands-On Chatbots and Conversational UI Development
11 Dec 2024
Contributed by Lukas
The Book "Hands-On Chatbots and Conversational UI Development," which is a guide for building chatbots and voice user interfaces. The book covers a ra...
Hands-On Penetration Testing with Kali NetHunter
11 Dec 2024
Contributed by Lukas
This excerpt is from a book that teaches ethical hacking and penetration testing using Kali Linux, specifically the NetHunter edition, designed for mo...
Handbook for CTFers
10 Dec 2024
Contributed by Lukas
The Book is a handbook for CTF competitors, a type of cybersecurity competition. It provides information about various security vulnerabilities and at...
Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook
10 Dec 2024
Contributed by Lukas
The provided Book excerpts from "Hacklog: Volume 1" are a handbook on anonymity, IT security, and ethical hacking. The book guides readers on how to p...
Hacking: The Art of Exploitation, 2nd Edition
10 Dec 2024
Contributed by Lukas
This Book material is an excerpt from a book titled "Hacking: The Art of Exploitation." It explores the art of hacking through a combination of practi...
Hacking Android
10 Dec 2024
Contributed by Lukas
The Book provides a comprehensive guide to hacking and securing Android applications, covering both static and dynamic analysis techniques. The source...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
08 Dec 2024
Contributed by Lukas
This Book is a comprehensive guide to computer hacking, written by Roger A. Grimes, a seasoned computer security professional with decades of experien...
Hacking Kubernetes: Threat-Driven Analysis and Defense
08 Dec 2024
Contributed by Lukas
This excerpt from the book "Hacking Kubernetes" by Andrew Martin and Michael Hausenblas is a guide for cybersecurity professionals working with Kubern...
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future
08 Dec 2024
Contributed by Lukas
The provided Book, excerpts from "Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future" explores the relatio...
Hacking Exposed: Malware & Rootkits Secrets & Solutions
08 Dec 2024
Contributed by Lukas
The Book "Hacking Exposed: Malware & Rootkits provides a comprehensive examination of modern malware and rootkits, exploring their evolution, tech...
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
08 Dec 2024
Contributed by Lukas
The Book "Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security," written by Gary Hall and Erin Watson. The book is a gu...
Hacking APIs: Breaking Web Application Programming Interfaces
08 Dec 2024
Contributed by Lukas
This is an excerpt from "Hacking APIs: Breaking Web Application Programming Interfaces". The book provides a comprehensive guide to hacking APIs, cove...
Hacking SaaS: An Insider's Guide to Managing Software Business Success
08 Dec 2024
Contributed by Lukas
The Book is an excerpt from "Hacking SaaS: An Insider’s Guide to Managing Software Business Success," a book written by Eric Mersch, an experienced ...
Hacking Multifactor Authentication
08 Dec 2024
Contributed by Lukas
This excerpt from the book "Hacking Multifactor Authentication" provides a comprehensive look at the various ways attackers can bypass multifactor aut...
HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX
07 Dec 2024
Contributed by Lukas
This excerpt from a hacking guidebook provides comprehensive information about ethical hacking, penetration testing, and cybersecurity. It delves into...
Hacking VoIP: Protocols, Attacks, and Countermeasures
07 Dec 2024
Contributed by Lukas
The Book, "Hacking VoIP: Protocols, Attacks, and Countermeasures" by Himanshu Dwivedi, is a book that details the security vulnerabilities of Voice ov...
Hacking the Xbox: An Introduction to Reverse Engineering
07 Dec 2024
Contributed by Lukas
"Hacking the Xbox: An Introduction to Reverse Engineering" is a guide for hackers interested in learning about reverse engineering, specifically focus...
Hacking Gps
07 Dec 2024
Contributed by Lukas
This excerpt from the book "Hacking GPS" by Kathie Kingsley-Hughes covers a wide range of topics relating to Global Positioning Systems (GPS) includin...
Hacking For Dummies
07 Dec 2024
Contributed by Lukas
The source Book provides a comprehensive guide to understanding and mitigating information security risks. It covers a range of topics, including comm...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
07 Dec 2024
Contributed by Lukas
This excerpt is from the book "Hacking and Securing iOS Applications" by Jonathan Zdziarski. The book provides a comprehensive guide to the vulnerabil...
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
06 Dec 2024
Contributed by Lukas
The excerpt is from a book exploring the complex, multifaceted nature of Anonymous, a decentralized online collective known for its hacktivism and tro...
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
06 Dec 2024
Contributed by Lukas
The Book provide a comprehensive guide to ethical hacking, covering a wide range of topics from basic programming concepts to advanced techniques for ...
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools
06 Dec 2024
Contributed by Lukas
The source Book is from the book "Gray Hat C# : A Hacker's Guide to Creating and Automating Security Tools" by Brandon Perry. This book teaches reader...
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
05 Dec 2024
Contributed by Lukas
The provided Book are excerpts from the book "Gray Hat Python" by Justin Seitz, which aims to teach readers how to use Python for hacking and reverse ...
Google Hacking for Penetration Testers
05 Dec 2024
Contributed by Lukas
This is a guide to Google hacking, focusing on how Google can be used to find sensitive information on the internet. The book covers topics like locat...
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo
05 Dec 2024
Contributed by Lukas
This book, Google Cloud Certified Professional Cloud Network Engineer Guide, is a comprehensive guide to Google Cloud Platform (GCP) networking. It c...
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
05 Dec 2024
Contributed by Lukas
This excerpt from the book "Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense" by Bryson Payne is a guide to ethical hacking that t...
Go Programming Language For Dummies
05 Dec 2024
Contributed by Lukas
This excerpt from the book "Go Programming Language For Dummies" provides a detailed introduction to the Go programming language, focusing on core con...
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
05 Dec 2024
Contributed by Lukas
"Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" is Kevin Mitnick's autobiography detailing his life as a computer hacker. The te...
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy
05 Dec 2024
Contributed by Lukas
This is a comprehensive guide to Ghidra, a reverse engineering tool developed by the National Security Agency (NSA). The book covers a wide range of t...
Get Programming with Go
05 Dec 2024
Contributed by Lukas
A book that teaches the Go programming language. It provides a step-by-step guide to Go, starting with the basics, such as declaring variables and per...
Game Hacking: Developing Autonomous Bots for Online Games by Cano
05 Dec 2024
Contributed by Lukas
This is a comprehensive guide on game hacking, outlining the various tools and techniques used to manipulate and modify online games. The book covers ...
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
05 Dec 2024
Contributed by Lukas
The Book are a combination of the preface and selected chapters from the book "Fuzzing Against The Machine" by Eduardo Blázquez and Antonio Nappa. Th...
Fuzzing for Software Security
04 Dec 2024
Contributed by Lukas
This excerpt from the Book "Fuzzing for Software Security Testing and Quality Assurance" by Ari Takanen, Jared DeMott, and Charlie Miller focuses on e...
Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL
04 Dec 2024
Contributed by Lukas
The Book provide a comprehensive guide to building a full-stack web application using React, TypeScript, Node.js, Express, and GraphQL. The book "Full...
Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL
04 Dec 2024
Contributed by Lukas
The provided Book excerpts are from the book "Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL" by Nader Dabit. This...
Full Stack Python Security: Cryptography, TLS, and attack resistance
04 Dec 2024
Contributed by Lukas
The Book provide a comprehensive guide to securing Python-based web applications. The text covers fundamental cryptographic concepts, such as hashing ...
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
04 Dec 2024
Contributed by Lukas
The source Book provides a guide to security testing. It explains the different types of security tests, including black box, white box, and gray box,...
Foundational Java: Key Elements and Practical Programming
04 Dec 2024
Contributed by Lukas
This excerpt from the book "Foundational Java" provides an overview of object-oriented programming in Java. It explores key concepts such as classes, ...
Linux All-In-One For Dummies
04 Dec 2024
Contributed by Lukas
The source Book provides a comprehensive guide to understanding and using Linux, covering a wide range of topics from basic installation and system ad...
Flutter for Beginners
04 Dec 2024
Contributed by Lukas
The provided Book excerpts come from the book "Flutter for Beginners" by Alessandro Biessek, offering a comprehensive guide to Flutter app development...
FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES
03 Dec 2024
Contributed by Lukas
The Book provide an extensive guide to cybersecurity and privacy, using an analogy of a medieval castle to explain the importance of building strong d...
Finding Beacons in the Dark
03 Dec 2024
Contributed by Lukas
This research Book explores the Cobalt Strike framework, a popular tool used by both red teams and malicious actors for penetration testing and cybera...
Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!
03 Dec 2024
Contributed by Lukas
This excerpt is from a book that teaches aspiring ethical hackers how to conduct penetration tests. The book provides a framework for ethical hacking,...
Ethical Hacker's Certification Guide (CEHv11)
03 Dec 2024
Contributed by Lukas
This excerpt is from a book on ethical hacking and penetration testing, specifically geared toward preparing individuals for the Certified Ethical Hac...
Ethical Hacking-Joe Grant
03 Dec 2024
Contributed by Lukas
This Book is an introduction to ethical hacking, using the Kali Linux operating system. It covers a range of topics related to information security, i...
Ethical Hacking: Techniques, Tools, and Countermeasures
03 Dec 2024
Contributed by Lukas
The source Book provides a comprehensive overview of ethical hacking techniques, tools, and countermeasures for information security professionals. Th...
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
03 Dec 2024
Contributed by Lukas
The Book are chapters from a book titled "Essential Cybersecurity Science" by Josiah Dykstra, which explores the application of the scientific method ...
Essential Of Artificial Intelligence
03 Dec 2024
Contributed by Lukas
The Book provide an extensive overview of Python fundamentals, covering the basics of programming using Python, including data types, operators, funct...
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
02 Dec 2024
Contributed by Lukas
The source is a book excerpt on enterprise-level security. It focuses on a security model called ELS (Enterprise Level Security) and its practical imp...
Enterprise Level Security 1 & 2
02 Dec 2024
Contributed by Lukas
The Book is a comprehensive guide to enterprise-level security for information systems. It explains principles, architectures, and techniques for secu...
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
02 Dec 2024
Contributed by Lukas
The sources provide an extensive overview of enterprise integration patterns, focusing on the use of messaging systems for connecting applications. It...
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide
02 Dec 2024
Contributed by Lukas
The provided Book comes from a Nutanix Enterprise Cloud Administration (ECA) course guide. The guide outlines the various components and features of t...
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
02 Dec 2024
Contributed by Lukas
This excerpt from "Engineering Trustworthy Systems" is a guide for cybersecurity professionals, focusing on how to design and build trustworthy system...
Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow
02 Dec 2024
Contributed by Lukas
The source material explores the complex landscape of cybercrime, examining various aspects from criminal profiles and activities in the dark web, to ...
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
02 Dec 2024
Contributed by Lukas
The sources present a comprehensive overview of cryptography, both classical and quantum, emphasizing its practical applications in organizations and ...
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
02 Dec 2024
Contributed by Lukas
This book, Empirical Cloud Security, aims to provide a practical guide for evaluating risks and attacks in cloud environments. The second edition foc...
Embedded Linux Development Using Yocto Project
02 Dec 2024
Contributed by Lukas
This source is a Book titled "Embedded Linux Development Using Yocto Project", providing a comprehensive guide to building custom Linux systems for em...
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming
01 Dec 2024
Contributed by Lukas
This Book is a compilation of excerpts from Marijn Haverbeke's "Eloquent JavaScript: A Modern Introduction to Programming." The book explores the Java...
Eleventh Hour CISSP: Study Guide
01 Dec 2024
Contributed by Lukas
The source is an excerpt from a Book titled "Eleventh Hour CISSP" which provides a comprehensive overview of information security concepts, principles...
Reversing: Secrets of Reverse Engineering
01 Dec 2024
Contributed by Lukas
The provided source Book is an excerpt from a Book titled "Reversing: Secrets of Reverse Engineering." The book discusses the process of reverse engin...
Efficient Linux at the Command Line: Boost Your Command-Line Skills
01 Dec 2024
Contributed by Lukas
The source is an excerpt from the book "Efficient Linux at the Command Line" by Vance Wilson, which covers advanced command-line techniques for naviga...
Effective Cybersecurity: A Guide to Using Best Practices and Standards
01 Dec 2024
Contributed by Lukas
This Book, "Effective Cybersecurity: A Guide," provides a comprehensive overview of cybersecurity best practices and standards. It focuses on managing...
Effective C: An Introduction to Professional C Programming
01 Dec 2024
Contributed by Lukas
The Book source is an excerpt from "Effective C: An Introduction to Professional C Programming" by Robert C. Seacord. It covers various aspects of C p...
Easy Learning Design Patterns Javascript: Build Better Coding and Design Patterns
01 Dec 2024
Contributed by Lukas
This excerpt from Easy Learning Design Patterns Javascript by Yang Hu is a beginner's guide to understanding and implementing design patterns in Jav...
Dynamically Enabled Cyber Defense
28 Nov 2024
Contributed by Lukas
This excerpt from the Book "Dynamically Enabled Cyber Defense" explores the evolving threat of cyberattacks and the need for more dynamic defense stra...