1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books Education News Arts Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1006
Years Active
2024 - 2025
Share to:
Learning Numpy Array

Learning Numpy Array

It aims to supercharge scientific Python computations by thoroughly explaining the effective use of the NumPy library. The book covers fundamental concepts such as NumPy array objects, data types, an…
00:20:54  |   Tue 10 Jun 2025
Instant PHP Web Scraping

Instant PHP Web Scraping

A practical guide to web scraping using PHP. It introduces readers to fundamental web scraping techniques, progressing from setting up a development environment with Eclipse and XAMPP to more complex…
00:20:15  |   Tue 10 Jun 2025
GLSL Essentials

GLSL Essentials

Provides an introduction to OpenGL Shading Language (GLSL), a high-level programming language used to control the rendering pipeline in computer graphics. It covers the fundamentals of the GLSL langu…
00:20:11  |   Sun 08 Jun 2025
Getting Started With Electronic Projects

Getting Started With Electronic Projects

A practical guide to building various electronic projects, progressing from simple endeavors like converting flashlights and headlamps to infrared to more complex systems. It includes instructions fo…
00:21:55  |   Sun 08 Jun 2025
Force.com Development Blueprints

Force.com Development Blueprints

Offers a comprehensive guide to developing on the Salesforce Force.com platform. It includes sections on building essential business systems such as a CRM for student admissions and an e-commerce fra…
00:36:12  |   Sat 07 Jun 2025
A Beginners Guide to Python 3 Programming

A Beginners Guide to Python 3 Programming

Offers excerpts from a beginner's guide to Python 3 programming, focusing on foundational concepts and practical application. It introduces the Python language, its interpreted nature, and how to set…
00:36:07  |   Sat 07 Jun 2025
Asynchronous Android: Harness the Power of Multi-Core Mobile Processors to Build Responsive Android Applications

Asynchronous Android: Harness the Power of Multi-Core Mobile Processors to Build Responsive Android Applications

Provides an overview of asynchronous programming in Android, emphasizing the importance of keeping the user interface responsive by performing tasks off the main thread. It introduces and explains va…
00:37:03  |   Thu 05 Jun 2025
Python for Civil and Structural Engineers

Python for Civil and Structural Engineers

Provides an overview of using Python for civil and structural engineering applications. It serves as a tutorial, starting with Python basics, including setting up the environment and understanding sy…
00:25:38  |   Thu 05 Jun 2025
Artificial Intelligence For Dummies

Artificial Intelligence For Dummies

Introduces Artificial Intelligence (AI) by defining the term, exploring its history, and considering various applications. It examines the crucial role of data, including its potential inaccuracies, …
00:29:47  |   Wed 04 Jun 2025
Optimizing Processes with RFID and Auto ID: Fundamentals, Problems and Solutions, Example Applications

Optimizing Processes with RFID and Auto ID: Fundamentals, Problems and Solutions, Example Applications

Provides a comprehensive overview of RFID and automatic identification technologies. It discusses the historical development and current applications of RFID and barcode systems across various indust…
00:30:44  |   Wed 04 Jun 2025
Python GUI Programming Cookbook: Use recipes to develop responsive and powerful GUIs using Tkinter

Python GUI Programming Cookbook: Use recipes to develop responsive and powerful GUIs using Tkinter

Focuses on Python GUI programming, particularly using the tkinter and wxPython libraries. It covers the fundamentals of building graphical interfaces, such as creating forms and widgets, managing the…
00:26:13  |   Tue 03 Jun 2025
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond

Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond

Examines the legal implications of integrating advanced technologies like RFID and intelligent software agents into retail and other commercial processes. It explores how these technologies interact …
00:29:54  |   Tue 03 Jun 2025
CentOS 6 Linux Server Cookbook: A Practical Guide to Installing, Configuring, and Administering the Centos Community-based Enterprise Server

CentOS 6 Linux Server Cookbook: A Practical Guide to Installing, Configuring, and Administering the Centos Community-based Enterprise Server

Provides practical guidance for managing a CentOS 6 Linux server. It offers step-by-step instructions on various server administration tasks, ranging from initial installation and configuration to se…
00:24:22  |   Mon 02 Jun 2025
Auto-identification and Ubiquitous Computing Applications: Rfid and Smart Technologies for Information Convergence

Auto-identification and Ubiquitous Computing Applications: Rfid and Smart Technologies for Information Convergence

Explores the multifaceted applications of Radio Frequency Identification (RFID) technology across various sectors. Several sections discuss the history and fundamental concepts of RFID systems, inclu…
00:18:56  |   Mon 02 Jun 2025
Analog Circuit Design: Robust Design, Sigma Delta Converters, RFID

Analog Circuit Design: Robust Design, Sigma Delta Converters, RFID

Explored include techniques for robust design, particularly addressing challenges in high-temperature, high-voltage, radiation-exposed, and electromagnetically noisy environments, such as those found…
00:23:29  |   Sun 01 Jun 2025
Head First JavaScript Programming: A Learner's Guide to Modern JavaScript

Head First JavaScript Programming: A Learner's Guide to Modern JavaScript

Provides a comprehensive introduction to JavaScript programming, designed for interactive learning. It covers fundamental concepts such as variables, loops, and conditional statements, and progresses…
00:17:22  |   Sun 01 Jun 2025
The Art of Network Penetration Testing: How to take over any company in the world

The Art of Network Penetration Testing: How to take over any company in the world

This Book is an in-depth guide to network penetration testing, offering practical instruction on simulating attacks to identify security vulnerabilities. It covers the methodology of penetration test…
00:24:23  |   Sat 31 May 2025
Pro RFID in BizTalk Server 2009 (Expert's Voice in BizTalk)

Pro RFID in BizTalk Server 2009 (Expert's Voice in BizTalk)

It functions as a comprehensive guide for developing and deploying RFID solutions using Microsoft BizTalk Server. The book explains the fundamental concepts of RFID technology, its components, and it…
00:29:25  |   Sat 31 May 2025
Radio Frequency Integrated Circuit Design (Artech House Microwave Library

Radio Frequency Integrated Circuit Design (Artech House Microwave Library

Focuses on the design and implementation of key circuit blocks for the radio frequency (RF) portion of a radio using integrated circuit (IC) technology. It covers crucial design challenges, including…
00:26:22  |   Fri 30 May 2025
The Art of Mac Malware, Volume 2: Detecting Malicious Software

The Art of Mac Malware, Volume 2: Detecting Malicious Software

A technical guide focused on programmatic Mac malware detection. The content covers examining various data sources like process information, network activity, and persistence mechanisms to identify m…
00:17:28  |   Fri 30 May 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.