Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CyberSecurity Summary

News Education Arts

Episodes

Showing 801-900 of 1033
«« ← Prev Page 9 of 11 Next → »»

Docker Cookbook: Solutions and Examples for Building Distributed Applications

28 Nov 2024

Contributed by Lukas

The Book "Docker Cookbook" by Sébastien Goasguen. The Book provides practical recipes and solutions for building and managing distributed application...

Docker in Practice

28 Nov 2024

Contributed by Lukas

The Book titled "Docker.in.Practice," which offers a comprehensive guide to utilizing Docker, a containerization platform. The Book explores fundament...

Cyber Intelligence Report: 2020 Quarter 1: Dive Into the 5th Domain: Threat Intelligence

28 Nov 2024

Contributed by Lukas

This Book is a guide for using CSI Linux, a free and open-source Linux distribution designed for digital forensics and incident response investigation...

Distributed Denial of Service Attacks: Real-world Detection and Mitigation

28 Nov 2024

Contributed by Lukas

This Book is an academic textbook exploring the nature of Distributed Denial of Service (DDoS) attacks. It examines various types of DDoS attacks, inc...

Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats

28 Nov 2024

Contributed by Lukas

The source Book provides a comprehensive guide to digital forensics and incident response. It covers foundational elements of incident response and di...

Digital Security: Cyber Terror and Cyber Security

28 Nov 2024

Contributed by Lukas

This Book excerpt, from "Digital Security: Cyber Terror and Cyber Security," focuses on the relationship between the real world and the digital world,...

Digital Forensics in the Era of Artificial Intelligence

28 Nov 2024

Contributed by Lukas

This collection of Book excerpts explores the use of artificial intelligence, particularly machine learning and deep learning, in digital forensics. I...

Digital Forensics Explained

27 Nov 2024

Contributed by Lukas

The Book provide a comprehensive guide to digital forensics, covering topics like incident response, report writing, social media investigations, soci...

Digital Forensics Basics: A Practical Guide Using Windows OS

27 Nov 2024

Contributed by Lukas

"Digital Forensics Basics: A Practical Guide Using Windows OS" is a textbook by Nihad A. Hassan providing a comprehensive guide to digital forensics w...

Elsevier's Dictionary of Information Security

27 Nov 2024

Contributed by Lukas

The Elsevier’s Dictionary of Information Security is a comprehensive reference tool that defines common terms used in the field of information secur...

DevOps and Containers Security: Security and Monitoring in Docker Containers

27 Nov 2024

Contributed by Lukas

The Book is a book excerpt about DevOps and container security. The book focuses on providing a practical and theoretical understanding of Docker cont...

DevOps Troubleshooting: Linux Server Best Practices

27 Nov 2024

Contributed by Lukas

The provided Book comes from the book "DevOps Troubleshooting Linux Server Best Practices," which aims to equip developers and QA professionals in Dev...

Designing Secure Software: A Guide for Developers

27 Nov 2024

Contributed by Lukas

The Book provide guidance on designing and building secure software. The text focuses on building a security mindset and applying this mindset to the ...

Designing BSD Rootkits: An Introduction to Kernel Hacking

27 Nov 2024

Contributed by Lukas

"Designing BSD Rootkits" is a tutorial for programmers interested in learning about kernel-mode rootkits. It explains how to write rootkits that maint...

Deployment CISCO SD-WAN LAB ON EVE-NG

27 Nov 2024

Contributed by Lukas

This Book describes the process of building a Cisco SD-WAN lab using EVE-NG, a network simulation platform. The document details the software requirem...

Demystifying Intelligent Multimode Security Systems

27 Nov 2024

Contributed by Lukas

This excerpt from Demystifying.Intelligent.Multimode.Security.Systems.pdf focuses on the increasing complexity and security needs of intelligent mul...

Demystified Object-Oriented Programming with C++

27 Nov 2024

Contributed by Lukas

This Book, Demystified Object-Oriented Programming with C++, serves as a comprehensive guide to object-oriented programming (OOP) in C++. It covers a ...

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

26 Nov 2024

Contributed by Lukas

This Book, DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance, focuses on the multifaceted threat of distributed denial-of-servic...

Data Science Projects with Python - Second Edition

26 Nov 2024

Contributed by Lukas

The Book provide a comprehensive guide to data science with Python, focusing on machine learning techniques for building predictive models. The book c...

The DataOps Revolution

26 Nov 2024

Contributed by Lukas

The provided Book is an excerpt from a Book titled "The DataOps Revolution: Delivering the Data-Driven Enterprise." This book tells the story of Jenni...

Database Security: Problems and Solutions

26 Nov 2024

Contributed by Lukas

This Book excerpts provide a comprehensive guide to database security, encompassing a broad spectrum of topics from fundamental information security p...

Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime

26 Nov 2024

Contributed by Lukas

This excerpt from the Book Data Security by T. H. Lenhard covers a wide range of data security topics, focusing on practical threats and mitigation st...

Data Science on the Google Cloud Platform

26 Nov 2024

Contributed by Lukas

Learn how easy it is to apply sophisticated statistical and machine learning methods to real-world problems when you build on top of the Google Cloud ...

Data Science Crash Course for Beginners: Fundamentals and Practices with Python

26 Nov 2024

Contributed by Lukas

This excerpt is from a Book titled "Data Science Crash Course for Beginners: Fundamentals and Practices". It introduces data science concepts and expl...

Data Pipelines with Apache Airflow

26 Nov 2024

Contributed by Lukas

This Book provides a comprehensive guide to Apache Airflow, a powerful open-source workflow management platform commonly used in data-intensive enviro...

Data Communications and Networking

25 Nov 2024

Contributed by Lukas

The Book provide an extensive overview of data communications and networking. The text covers fundamental concepts, such as data representation and fl...

Data Center Handbook: Plan, Design, Build, and Operations of a Smart Data Center

25 Nov 2024

Contributed by Lukas

The Book provide a comprehensive overview of data center design, operation, and management, covering a wide range of topics. The text discusses essent...

Data Analytics for Cybersecurity

25 Nov 2024

Contributed by Lukas

The Book "Data Analytics for Cybersecurity" provides a comprehensive guide to understanding and applying data analytics methods for cybersecurity. It ...

Data Privacy: A runbook for engineers

25 Nov 2024

Contributed by Lukas

This Book, Data Privacy: A Runbook for Engineers, is a guide for technology professionals navigating the complexities of data privacy in a rapidly evo...

Data Analysis with Python and PySpark

25 Nov 2024

Contributed by Lukas

This Book is an excerpt from the book Data Analysis with Python and PySpark by Jonathan Rioux. The book is a comprehensive guide to using PySpark, a p...

Data Analysis And Visualization

25 Nov 2024

Contributed by Lukas

The provided Book excerpts from "Data Analysis and Visualization" cover the fundamental concepts of probability and statistics. It begins by explainin...

Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More

24 Nov 2024

Contributed by Lukas

This Book is from a chapter on secure random number generation in a book on secure programming in C and C++. It discusses the importance of high-quali...

A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back

24 Nov 2024

Contributed by Lukas

This excerpt from Bruce Schneier's A Hacker's Mind explores how individuals and organizations exploit vulnerabilities in various systems—from comp...

Scratch 3 Programming Playground: Learn to Program by Making Cool Games

24 Nov 2024

Contributed by Lukas

"Scratch 3 Programming Playground: Learn to Program by Making Cool Games" by Al Sweigart is a comprehensive guide to creating video games using the S...

Data Center Handbook

24 Nov 2024

Contributed by Lukas

This Book is a collection of excerpts from the Data Center Handbook, a comprehensive guide to the design, construction, and operation of data centers....

Cyberwarfare: Threats to Critical Infrastructure

24 Nov 2024

Contributed by Lukas

The Book material explores the complex world of cyberwarfare, particularly its threats to critical infrastructure. It details the vulnerabilities of v...

Cybersecurity Fundamentals

24 Nov 2024

Contributed by Lukas

The source is a Book titled "Cybersecurity Fundamentals: A Real-World Perspective" by Kutub Thakur. This text focuses on providing a comprehensive und...

Cybersecurity for Beginners: How to prevent Phishing & Social Engineering Attacks

24 Nov 2024

Contributed by Lukas

This Book excerpt is from a cybersecurity Book that explains the concepts of social engineering and phishing attacks, focusing on how to recognize and...

Cybersecurity First Principles: A Reboot of Strategy and Tactics

24 Nov 2024

Contributed by Lukas

This Book , "Cybersecurity First Principles: A Reboot of Strategy and Tactics," offers a framework for understanding and addressing cybersecurity chal...

Cybercrime Investigators Handbook

24 Nov 2024

Contributed by Lukas

The Book provide a comprehensive handbook for cybercrime investigators, outlining the key considerations, methodologies, and legal frameworks involved...

Cyberjutsu: Cybersecurity for the Modern Ninja

23 Nov 2024

Contributed by Lukas

The source Book, "Cyberjutsu: Cybersecurity for the Modern Ninja," draws comparisons between ancient ninja tactics and modern cybersecurity practices....

Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security

23 Nov 2024

Contributed by Lukas

This excerpt is from "Cyber Security on Azure: An IT Professional’s Guide to Microsoft." The Book discusses how to secure an Azure environment by us...

Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic Security

23 Nov 2024

Contributed by Lukas

The Book that explains cybersecurity concepts, emphasizing the importance of protecting personal data from hackers and cybercriminals. The book examin...

Cyber Forensics

23 Nov 2024

Contributed by Lukas

The Book entitled "Cyber Forensics: Examining Emerging and Hybrid Technologies" which provides a comprehensive exploration of cyber forensics in the d...

Cyber Security and IT Infrastructure Protection

23 Nov 2024

Contributed by Lukas

The Book titled Cyber Security and IT Infrastructure Protection. The book examines various aspects of cyber security, including data encryption, publi...

Cyber Security: The complete guide to cyber threats and protection

23 Nov 2024

Contributed by Lukas

The Book material provides a comprehensive overview of cybersecurity, covering various aspects of this crucial field. The text explores the cyber thre...

Cyber Risks and Insurance: The Legal Principles

22 Nov 2024

Contributed by Lukas

The Book present a comprehensive analysis of cyber risks and insurance, particularly in relation to the legal principles and regulations governing dat...

Cyber Crime Investigator's Field Guide

22 Nov 2024

Contributed by Lukas

The Book text is an excerpt from the Cyber Crime Investigator’s Field Guide, which provides a comprehensive guide for cybercrime investigators. The ...

Cuckoo Malware Analysis

22 Nov 2024

Contributed by Lukas

The provided Book is an excerpt from the book "Cuckoo Malware Analysis" by Digit Oktavianto and Iqbal Muhardianto. The excerpt primarily focuses on Cu...

Cryptography and Network Security: Principles and Practice

22 Nov 2024

Contributed by Lukas

The source Book provides a comprehensive overview of cryptography and network security. It starts with fundamental computer security concepts, coverin...

SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition

22 Nov 2024

Contributed by Lukas

The provided Book comes from a book titled "CSSLP Certification All-in-One Exam Guide, Third Edition," which is a comprehensive guide for individuals ...

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

22 Nov 2024

Contributed by Lukas

The sources are from a book titled "Hands-On Cryptography with Python" by Samuel Bowne. This book aims to teach readers about cryptography and how to ...

Cryptography and Network Security

22 Nov 2024

Contributed by Lukas

This Book excerpt comes from the book "Cryptography and Network Security" by Marcelo S. Alencar. The book, intended for both graduate and undergraduat...

The Security Risk Assessment Handbook

22 Nov 2024

Contributed by Lukas

The provided Book is an excerpt from a comprehensive guide to information security risk assessment, outlining a methodical approach to identifying, an...

The Art of Linux Kernel Design

21 Nov 2024

Contributed by Lukas

This Book provides a deep dive into the design and implementation of the Linux 0.11 operating system. It examines key concepts like memory management,...

Secure Data Science

21 Nov 2024

Contributed by Lukas

This Book is an excerpt from the book "Secure Data Science: Integrating Cyber Security and Data Science," which focuses on the intersection of cyberse...

Container Security: Fundamental Technology Concepts that Protect Containerized Applications

21 Nov 2024

Contributed by Lukas

This excerpt from Container Security by Liz Rice provides a detailed overview of container security best practices and technologies. It covers every...

Computer Science Distilled: Learn the Art of Solving Computational Problems

21 Nov 2024

Contributed by Lukas

This excerpt is from a book called "Computer Science Distilled" by Wladston Ferreira Filho. It provides a concise overview of core computer science co...

Computer Networking and Cybersecurity

21 Nov 2024

Contributed by Lukas

The Book is guide for understanding computer networking and cybersecurity. The first source focuses on the technical aspects of computer networking, c...

Computer Security -- ESORICS 2013

21 Nov 2024

Contributed by Lukas

The Book explore various aspects of computer security, including secure communication, data privacy, malware detection, and access control. The papers...

Computer Graphics from Scratch: A Programmer's Introduction to 3D Rendering

21 Nov 2024

Contributed by Lukas

A Book that explains the algorithms used in modern computer graphics. It covers topics from basic ray tracing and rasterization to more complex techni...

Computer Forensics With Ftk

21 Nov 2024

Contributed by Lukas

The source Book provides a comprehensive guide to using the Forensic Toolkit (FTK) for computer forensics investigations. The text covers everything f...

Computer Forensics and Cyber Crime

21 Nov 2024

Contributed by Lukas

This excerpt from the book Computer Forensics and Cyber Crime: An Introduction examines the evolution of computer crime. The text explores the histo...

Computer and Network Security Essentials

20 Nov 2024

Contributed by Lukas

The source Book is a compilation of chapters from a book on computer and network security. The chapters cover a wide range of topics related to cybers...

CompTIA Security+: SY0-601 Certification Guide - Second Edition: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+

20 Nov 2024

Contributed by Lukas

The Book material is a CompTIA Security+ study guide that explains the concepts and tools used in the field of cybersecurity. It covers essential topi...

CompTIA Security+ Certification Practice Exams, Fourth Edition

20 Nov 2024

Contributed by Lukas

This Book, CompTIA Security+ Certification Practice Exams, provides practice questions to help readers prepare for the CompTIA Security+ exam. The boo...

CompTIA Network+ N10_007 Practice Exam Questions

20 Nov 2024

Contributed by Lukas

The Book is a study guide for the CompTIA Network+ N10-007 certification exam. It includes practice exam questions, explanations of answers, and an ov...

Mike Meyers' CompTIA Network+ Certification Passport, Seventh Edition - Exam N10-008

20 Nov 2024

Contributed by Lukas

This is a compilation of excerpts from a study guide for the CompTIA Network+ certification exam. The guide covers fundamental networking concepts, in...

CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61

20 Nov 2024

Contributed by Lukas

The Book is an excerpt from a study guide for the CompTIA IT Fundamentals+ (ITF+) certification exam. The guide covers a broad range of topics in Info...

CompTIA Cloud+ Certification All-in-One Exam Guide - Exam CV0-003

20 Nov 2024

Contributed by Lukas

The source Book provides a comprehensive guide to cloud computing, covering various aspects from fundamental concepts to advanced technologies and sec...

CompTIA CASP+ CAS-004 Certification Guide

20 Nov 2024

Contributed by Lukas

This Book is an excerpt from the CompTIA CASP+ CAS-004 Certification Guide, written by Mark Birch. The text explains the importance of security in a m...

CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide

20 Nov 2024

Contributed by Lukas

This Book is a CompTIA Advanced Security Practitioner (CASP+) CAS-004 certification guide. It explains the concepts, protocols, and practices related ...

CompTIA A+ Core 2 Exam: Guide to Operating Systems and Security

20 Nov 2024

Contributed by Lukas

The provided Book comes from a CompTIA A+ Core 2 exam guide and covers a range of topics related to computer hardware and software, including Windows ...

Comptia A Plus Core 1 and Core 2 Exam Practice Questions & Dumps: 200+ Exam Questions for Comptia A+

20 Nov 2024

Contributed by Lukas

The Book of practice questions for CompTIA A+ Core 1 and Core 2 certification exams, published by Omega Books. The book was first published in 2020 by...

CompTIA CASP+ CAS-004 Exam Guide

20 Nov 2024

Contributed by Lukas

The provided Book is an excerpt from a CompTIA CASP+ CAS-004 exam guide. It focuses on cybersecurity best practices and security controls for various ...

CompTIA Security+ Exam Study Guide

20 Nov 2024

Contributed by Lukas

The CompTIA Security+ Exam Study Guide is a resource for preparing for the CompTIA Security+ certification exam, which focuses on industry-recognized ...

Penetration Testing And Network Defense

19 Nov 2024

Contributed by Lukas

This excerpt from the Book "Penetration Testing and Network Defense" provides a comprehensive guide to ethical hacking techniques for cybersecurity pr...

CompTIA PenTest+ Certification For Dummies

19 Nov 2024

Contributed by Lukas

This Book is an excerpt from a book aimed at helping people prepare for the CompTIA PenTest+ certification exam. The text focuses on penetration testi...

CompTIA Pentest+ Technology Workbook

19 Nov 2024

Contributed by Lukas

The Book is a study guide for the CompTIA PenTest+ exam, focusing on the technical details of penetration testing and cybersecurity. It covers the met...

Complete A+ Guide to IT Hardware and Software Lab Manual

19 Nov 2024

Contributed by Lukas

The Book a CompTIA A+ certification course on IT hardware and software. The Book provides an in-depth guide to computer hardware and software componen...

Coding Art: The Four Steps to Creative Programming with the Processing Language

19 Nov 2024

Contributed by Lukas

The Book "Coding Art" discusses the creative process of combining computer programming with artistic expression. The text focuses on using the Process...

Coding Python : The Ultimate Tool To Progress Your Python Programming From Good To Great While Making Coding In Scratch Look Easy

19 Nov 2024

Contributed by Lukas

The Book text is an excerpt from the book "Coding Python" by Michael and Erik Scratch, which is a guide for learning the Python programming language. ...

Cloud Native Security

19 Nov 2024

Contributed by Lukas

This Book, Cloud Native Security, explores the complexities of securing cloud-native applications and infrastructure. It dives into various aspects of...

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance

19 Nov 2024

Contributed by Lukas

This Book, Cloud Security and Privacy, provides a comprehensive guide to the rapidly evolving world of cloud computing. Written by three experts in th...

Cloud Computing LPU

19 Nov 2024

Contributed by Lukas

The Book"Cloud Computing LPU.pdf" is a guide to cloud computing, exploring its evolution from peer-to-peer (P2P) and distributed computing models. The...

Clean Agile: Back to Basics

19 Nov 2024

Contributed by Lukas

The source Book is an excerpt from Robert C. Martin’s book, Clean Agile: Back to Basics. The book argues that Agile software development has strayed...

CISSP in 21 Days, Second Edition

19 Nov 2024

Contributed by Lukas

The provided Book is an excerpt from the book "CISSP-in-21-Days, Second-Edition" which aims to help readers prepare for the Certified Information Syst...

CISSP Exam Cram

19 Nov 2024

Contributed by Lukas

The Book material provides a comprehensive guide to understanding and preparing for the CISSP certification exam, focusing on the security domains of ...

Cissp: 4 in 1- Beginner's Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Compreh

19 Nov 2024

Contributed by Lukas

This Book is a beginner's guide to the CISSP (Certified Information Systems Security Professional) certification. It outlines the key domains covered ...

Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition

17 Nov 2024

Contributed by Lukas

The Book "Principles of Computer Security: CompTIA Security+ and Beyond" provides a comprehensive overview of computer security, encompassing a wide r...

Practical Go: Building Scalable Network and Non-Network Applications

17 Nov 2024

Contributed by Lukas

The Book provided is an excerpt from the table of contents and introductory materials of a book titled "Practical Go: Building Scalable Network and No...

Practical Automation with PowerShell: Effective scripting from the console to the cloud

17 Nov 2024

Contributed by Lukas

The Book Practical Automation with PowerShell focuses on building automations in a secure and reliable manner. It explains concepts like using secure ...

Penetration Testing with Shellcode

17 Nov 2024

Contributed by Lukas

The Book titled "Penetration Testing with Shellcode" by Hamza Megahed. This book provides a comprehensive guide to detecting, exploiting, and securing...

Agile Security Operations: Engineering for agility in cyber defense, detection, and response

17 Nov 2024

Contributed by Lukas

This book, "Agile Security Operations," provides a comprehensive guide to modern cybersecurity practices, focusing on an approach that integrates acti...

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

17 Nov 2024

Contributed by Lukas

The provided Book is from a book titled "Cisco Networks," which appears to be a guide to networking concepts and technologies, specifically focusing o...

Cisco Catalyst 9000 - A new era of intent-based networking

17 Nov 2024

Contributed by Lukas

This Book, written by a team of Cisco engineers, aims to introduce the Cisco Catalyst 9000 family of switches. It highlights the new era of intent-bas...

CISA Review Manual, 27th Edition

17 Nov 2024

Contributed by Lukas

The Book is a portion of a review manual for the Certified Information Systems Auditor (CISA) exam. It covers various aspects of information systems a...

CISA Review Manual, 26th Edition

17 Nov 2024

Contributed by Lukas

The provided Book is an excerpt from the CISA Review Manual, 26th Edition, a study guide that prepares individuals for the Certified Information Syste...

Certified Application Security Engineer | JAVA: Technology Workbook

17 Nov 2024

Contributed by Lukas

This Book is a textbook for the Certified Application Security Engineer (CASE) exam, focusing specifically on Java technology. The book covers a wide ...

The Official (ISC)2 CCSP CBK Reference

16 Nov 2024

Contributed by Lukas

The Book are chapters from a guidebook about cloud computing security, providing in-depth information for security professionals. They cover a wide ra...

«« ← Prev Page 9 of 11 Next → »»