1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books Education News Arts Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1006
Years Active
2024 - 2025
Share to:
Visual Data Insights Using SAS ODS Graphics: A Guide to Communication-Effective Data Visualization

Visual Data Insights Using SAS ODS Graphics: A Guide to Communication-Effective Data Visualization

This Book presents LeRoy Bessler's guide to creating effective data visualizations using SAS ODS Graphics, drawing upon his extensive experience in information technology and data analysis. The book …
00:12:40  |   Fri 09 May 2025
Learning Vue: Core Concepts and Practical Patterns for Reusable, Composable, and Scalable User Interfaces

Learning Vue: Core Concepts and Practical Patterns for Reusable, Composable, and Scalable User Interfaces

This collection of excerpts originates from "Learning Vue: Core Concepts and Practical Patterns for Reusable, Composable, and Scalable User Interfaces" by Maya Shavin, published by O'Reilly Media, pr…
00:25:05  |   Fri 09 May 2025
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures

Learning Digital Identity: Design, Deploy, and Manage Identity Architectures

This collection of Book offers a comprehensive look at the evolution, concepts, and technologies surrounding digital identity. It traces the progression from centralized to federated and decentralize…
00:35:21  |   Thu 08 May 2025
Go Fundamentals: Gopher Guides

Go Fundamentals: Gopher Guides

This compilation of excerpts offers a comprehensive guide to the Go programming language, covering fundamental concepts for developers. Topics range from setting up modules and managing dependencies,…
00:32:48  |   Thu 08 May 2025
Extreme Privacy: What It Takes to Disappear

Extreme Privacy: What It Takes to Disappear

This Book, "Extreme Privacy: What It Takes to Disappear" by Michael Bazzell, serves as a detailed guide for users seeking to maximize their privacy and security on mobile devices, particularly focusi…
00:42:24  |   Wed 07 May 2025
Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition

Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition

This collection of excerpts focuses on digital forensics and incident response. It examines methodologies for investigating cyber attacks, including acquiring and analyzing various types of evidence.…
00:44:33  |   Wed 07 May 2025
Design for Developers

Design for Developers

This Book, "Design for Developers" by Stephanie Stimac, explores the critical intersection of design, user experience, and web development, emphasizing how understanding design principles can enhance…
00:25:36  |   Tue 06 May 2025
Deep Learning with Python

Deep Learning with Python

It explains how neural networks process data using tensors and tensor operations, and how they learn through gradient-based optimization and backpropagation. The material also introduces the Keras AP…
00:34:22  |   Tue 06 May 2025
Deep Learning for Data Architects: Unleash the power of Python's deep learning algorithms

Deep Learning for Data Architects: Unleash the power of Python's deep learning algorithms

Focuses on deep learning concepts and their practical applications within the field of data architecture and data science. It introduces foundational elements like Artificial Neural Networks, Python …
00:28:06  |   Mon 05 May 2025
Deep Dive: Exploring the Real-world Value of Open Source Intelligence

Deep Dive: Exploring the Real-world Value of Open Source Intelligence

This Book "Deep Dive: Exploring the Real-world Value of Open Source Intelligence" authored by Rae Baker and published by John Wiley & Sons, Inc., in 2023, offers a comprehensive guide to Open Source …
00:58:38  |   Mon 05 May 2025
Codebreaking: A Practical Guide

Codebreaking: A Practical Guide

This Book offers an in-depth look at codebreaking techniques and historical cryptograms, covering everything from basic frequency analysis to advanced computational methods like hill climbing. It exp…
00:21:18  |   Sun 04 May 2025
Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity

Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity

This excerpt comes from the "Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity".
The book provides a comprehensive guide to bug bounty hunti…
00:15:32  |   Sun 04 May 2025
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing

Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing

The provided Book from "Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing" explores the inner workings of Windows security mechanisms, primarily focusin…
00:42:29  |   Sat 03 May 2025
Data Science and Analytics Strategy: An Emergent Design Approach

Data Science and Analytics Strategy: An Emergent Design Approach

This Book, titled "Data Science and Analytics Strategy: An Emergent Design Approach" offers guidance on establishing data science and analytics capabilities within organizations. It emphasizes an eme…
00:14:45  |   Sat 03 May 2025
Critical Visualization: Rethinking the Representation of Data

Critical Visualization: Rethinking the Representation of Data

"Critical Visualization: Rethinking the Representation of Data" examines the power and politics embedded within data visualization. The authors argue that visualizations are not neutral; instead, the…
00:33:41  |   Fri 02 May 2025
Data Visualization: A Practical Introduction

Data Visualization: A Practical Introduction

"Data Visualization: A Practical Introduction" serves as a guide for individuals, even those new to R, on how to effectively visualize data using the R programming language and the ggplot2 package. T…
00:23:42  |   Fri 02 May 2025
Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue

Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue

Cybersecurity for Business is presented as a crucial element of national security and a significant concern for organizations across sectors. The included excerpts highlight the necessity of a compre…
00:21:07  |   Thu 01 May 2025
Concurrency with Modern C++: What every professional C++ programmer should know about concurrency

Concurrency with Modern C++: What every professional C++ programmer should know about concurrency

This comprehensive Book provides a detailed exploration of concurrency in modern C++, covering both fundamental concepts and advanced techniques. It explains the C++ memory model and various synchron…
00:41:47  |   Thu 01 May 2025
Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications

Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications

This excerpt from "Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications" by Kim Crawley serves as a comprehensive guide to penetration testing within major clo…
00:21:39  |   Wed 30 Apr 2025
C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor

C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor

The provided Book is primarily from a book titled "C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor" offering compre…
00:19:47  |   Wed 30 Apr 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.