1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books Education News Arts Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1006
Years Active
2024 - 2025
Share to:
Radio Frequency Identification Technologies

Radio Frequency Identification Technologies

This Book is a workshop summary report from the Committee on Radio Frequency Identification Technologies under the National Research Council's Computer Science and Telecommunications Board, published…
00:30:45  |   Thu 29 May 2025
CompTIA Security+ Guide to Network Security Fundamentals

CompTIA Security+ Guide to Network Security Fundamentals

Focuses on various aspects of information security, primarily serving as a guide for the CompTIA Security+ certification. It covers fundamental concepts such as threat actors and their motivations, c…
00:47:53  |   Thu 29 May 2025
Radio Frequency Integrated Circuits and Technologies

Radio Frequency Integrated Circuits and Technologies

A snippet from a technical resource related to the design and application of radio frequency integrated circuits. As the title suggests, it likely discusses the intricate aspects of circuits used in …
00:04:01  |   Wed 28 May 2025
RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200)

RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200)

A study guide for the Red Hat Certified System Administrator (RHCSA) exam, focusing on Red Hat Enterprise Linux 9 (RHEL 9). It covers foundational topics necessary for system administration, such as …
00:31:21  |   Wed 28 May 2025
Handbook of Smart Antennas for RFID Systems

Handbook of Smart Antennas for RFID Systems

Focuses on radio frequency identification (RFID) systems, specifically exploring smart antennas used within these systems. It discusses various aspects of RFID, including its history, operating frequ…
00:28:44  |   Tue 27 May 2025
Professional C++ (Tech Today)

Professional C++ (Tech Today)

Offers a comprehensive guide to advanced C++ programming concepts and techniques, ranging from template programming, including template parameters and variadic templates, to object-oriented design, c…
00:24:19  |   Tue 27 May 2025
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats

Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats

Focuses on understanding and counteracting evasive malware. It begins by introducing code analysis techniques to identify malicious intent. The material then details how malware employs context aware…
00:17:21  |   Mon 26 May 2025
Darknet Master: Tor and Deep Web Secrets

Darknet Master: Tor and Deep Web Secrets

Provides an extensive overview of the Darknet and Deep Web, differentiating them from the surface web and explaining how they operate, primarily through Tor (The Onion Router) for anonymous browsing …
00:11:19  |   Mon 26 May 2025
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more

A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more

A comprehensive guide for network defenders. It focuses on threat detection and network analysis using a suite of open-source tools. Key components covered include the installation and configuration …
00:24:19  |   Sun 25 May 2025
Cryptography and Network Security: Principles and Practice, Global Ed

Cryptography and Network Security: Principles and Practice, Global Ed

Cover fundamental aspects of cryptography and network security, outlining concepts like divisibility, modular arithmetic, and prime numbers as mathematical underpinnings. They explore symmetric ciphe…
00:50:02  |   Sun 25 May 2025
Cryptography: Algorithms, Protocols, and Standards for Computer Security

Cryptography: Algorithms, Protocols, and Standards for Computer Security

Provide a broad overview of cryptographic concepts and techniques. The sources discuss various types of cryptographic primitives, including hash functions, message authentication codes, digital signa…
00:35:32  |   Sat 24 May 2025
Writing a C Compiler: Build a Real Programming Language from Scratch

Writing a C Compiler: Build a Real Programming Language from Scratch

It  walk the reader through the stages of compilation, beginning with basic steps like lexical analysis and parsing using techniques like recursive descent and precedence climbing. The sources introd…
00:21:38  |   Sat 24 May 2025
Windows 10 System Programming, Part 2

Windows 10 System Programming, Part 2

These excerpts, primarily from the second part of a book on Windows 10 System Programming, explore various facets of system-level programming using the Windows API. The text covers diverse topics inc…
00:29:16  |   Fri 23 May 2025
Windows 10 System Programming, Part 1

Windows 10 System Programming, Part 1

These Book offer an in-depth look at Windows system programming, primarily focusing on processes, threads, memory management, and file I/O. They explain fundamental concepts like what a process is, h…
00:37:45  |   Fri 23 May 2025
Windows APT Warfare: Identify and prevent Windows APT attacks effectively

Windows APT Warfare: Identify and prevent Windows APT attacks effectively

The Book is a technical guide focused on understanding and countering advanced persistent threats (APTs) targeting Windows systems. It explores concepts from reverse engineering, compilers, and opera…
00:30:21  |   Thu 22 May 2025
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

A practical guide to modern web penetration testing authored by Rafay Baloch and published by CRC Press in 2025. The content covers a wide range of web security topics, beginning with fundamentals of…
00:30:48  |   Thu 22 May 2025
JavaScript for Sound Artists

JavaScript for Sound Artists

It is a guide for individuals interested in creating interactive audio applications using JavaScript within a web browser. The book introduces foundational JavaScript concepts such as variables, data…
00:18:26  |   Wed 21 May 2025
Building Your Own JavaScript Framework: Architect extensible and reusable framework systems

Building Your Own JavaScript Framework: Architect extensible and reusable framework systems

It covers various aspects of JavaScript framework development, ranging from historical context and the evolution of the ecosystem to core architectural patterns, tooling, testing, documentation, and …
00:26:40  |   Wed 21 May 2025
Visual Threat Intelligence: An Illustrated Guide For Threat Researchers

Visual Threat Intelligence: An Illustrated Guide For Threat Researchers

Beginning with fundamental concepts like the intelligence lifecycle and various gathering disciplines such as OSINT, HUMINT, GEOINT, SIGINT, and FININT. It explores identifying and profiling threat a…
00:17:49  |   Tue 20 May 2025
12 Twisted Python Projects for Young Coders

12 Twisted Python Projects for Young Coders

Designed to teach programming to beginners in a fun and engaging way. The book focuses on using the Python language along with the guizero library to create Graphical User Interfaces (GUIs) through t…
00:15:30  |   Tue 20 May 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.