1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

"The Security Culture Playbook" is a guide to understanding and improving organizational security culture. The book emphasizes that security culture is measurable and manageable, not just a buzzword,…
00:18:06  |   Sun 16 Mar 2025
The IDA Pro Book, 2nd Edition

The IDA Pro Book, 2nd Edition

This Book is an excerpt from the second edition of "The IDA Pro Book," a guide to using IDA Pro, a popular disassembler. The book covers various aspects of reverse engineering, including navigating a…
00:15:15  |   Sun 16 Mar 2025
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization

The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization

This Book is a technical guide to Jakarta EE security, covering its history, architecture, and implementation details. It details Jakarta Authentication, Authorization, and Security APIs, explaining …
00:22:13  |   Sat 15 Mar 2025
The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence

The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence

"The Unix-Haters Handbook" compiles six years of messages from the UNIX-HATERS mailing list, expressing widespread frustration with the Unix operating system. The book covers various aspects of Unix,…
00:20:46  |   Sat 15 Mar 2025
The threat intelligence handbook

The threat intelligence handbook

The provided Book is an excerpt from the second edition of The Threat Intelligence Handbook, published by CyberEdge Group and primarily authored by Recorded Future employees. The handbook explains th…
00:35:33  |   Fri 14 Mar 2025
The Tangled Web: A Guide to Securing Modern Web Applications

The Tangled Web: A Guide to Securing Modern Web Applications

The provided Book is a table of contents and excerpts from Michal Zalewski's book, "The Tangled Web: A Guide to Securing Modern Web Applications." The book explores the complexities of web applicatio…
00:15:20  |   Fri 14 Mar 2025
The Social Engineer's Playbook: A Practical Guide to Pretexting

The Social Engineer's Playbook: A Practical Guide to Pretexting

Jeremiah Talamantes's The Social Engineer's Playbook is a practical guide to pretexting, a form of social engineering. The book covers various social engineering techniques, including phishing, baiti…
00:34:16  |   Wed 12 Mar 2025
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

This Book excerpt chronicles the rise of ransomware and the efforts of a unique group of cybersecurity experts, the Ransomware Hunting Team, to combat it. The team, composed of individuals with diver…
00:30:52  |   Wed 12 Mar 2025
The Mac Hacker's Handbook

The Mac Hacker's Handbook

This Book is an excerpt from "The Mac Hacker's Handbook," a book exploring the security vulnerabilities of Mac OS X. The book details methods for discovering and exploiting vulnerabilities in Mac OS …
00:22:46  |   Mon 10 Mar 2025
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

This Book is an excerpt from The Hacker's Handbook, a technical manual detailing network security vulnerabilities and exploits. It systematically explores various protocols (TCP/IP, SMTP, HTTP, DNS, …
00:21:52  |   Mon 10 Mar 2025
The Hacker Playbook 2: Practical Guide To Penetration Testing

The Hacker Playbook 2: Practical Guide To Penetration Testing

"The Hacker Playbook 2" is a guide to penetration testing, expanding upon the first book with updated attacks and techniques. The book covers various attack vectors, including network scanning, web a…
00:16:13  |   Sun 09 Mar 2025
The Complete Book of Locks and Locksmithing

The Complete Book of Locks and Locksmithing

This Book is an excerpt from "The Complete Book of Locks and Locksmithing," a comprehensive guide to locks and locksmithing. It covers the history of locks, various lock mechanisms (including pin tum…
00:14:49  |   Sun 09 Mar 2025
The Analytics Setup Guidebook

The Analytics Setup Guidebook

This guidebook from Holistics, a data analytics company, offers a practical framework for building modern analytics systems. It covers setting up an analytics stack, emphasizing the ELT (Extract, Loa…
00:41:01  |   Sat 08 Mar 2025
Testing and Securing Android Studio Applications

Testing and Securing Android Studio Applications

This Book is the preface and table of contents from a book titled Testing and Securing Android Studio Applications. The book guides Android developers on debugging and securing their apps using Andro…
00:20:49  |   Sat 08 Mar 2025
TCP/IP Protocol Suite

TCP/IP Protocol Suite

The provided Book is a table of contents and excerpts from Behrouz Forouzan's "TCP/IP Protocol Suite, 4th Edition," covering various networking concepts. It details the TCP/IP protocol suite's archit…
00:34:31  |   Fri 07 Mar 2025
Take Control of Wi-Fi Networking and Security

Take Control of Wi-Fi Networking and Security

Glenn Fleishman's Take Control of Wi-Fi Networking and Security is a comprehensive guide to setting up and securing Wi-Fi networks. The book covers fundamental concepts like Wi-Fi standards and spect…
00:33:03  |   Fri 07 Mar 2025
SwiftUI Essentials - iOS 14 Edition: Learn to Develop iOS Apps Using SwiftUI, Swift 5 and Xcode 12

SwiftUI Essentials - iOS 14 Edition: Learn to Develop iOS Apps Using SwiftUI, Swift 5 and Xcode 12

This Book is a table of contents and excerpts from a book teaching iOS app development using SwiftUI. It covers fundamental Swift programming concepts, including data types, operators, control flow, …
00:31:13  |   Thu 06 Mar 2025
Cryptography: Theory and Practice

Cryptography: Theory and Practice

The provided Book is an excerpt from a cryptography textbook, specifically focusing on the theory and practice of various cryptographic systems. It covers fundamental concepts like secret-key and pub…
00:28:18  |   Thu 06 Mar 2025
Cryptography And Network Security: Principles and Practices

Cryptography And Network Security: Principles and Practices

This Book is an excerpt from a cryptography and network security textbook. It covers various security mechanisms, including encryption algorithms (symmetric and asymmetric), hashing functions, and di…
00:17:32  |   Wed 05 Mar 2025
Cryptography and Network Security: Principles and Practice

Cryptography and Network Security: Principles and Practice

This Book is excerpt from William Stallings' book, Cryptography and Network Security: Principles and Practice, seventh edition. The excerpt covers a broad range of cryptographic concepts and techniqu…
00:13:54  |   Wed 05 Mar 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.