1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Malware Forensics Field Guide for Windows Systems

Malware Forensics Field Guide for Windows Systems

The Book "Malware Forensics Field Guide for Windows Systems" by Cameron H. Malin and Eoghan Casey. The book is a guide for digital forensic investigators who are investigating malware incidents on Wi…
00:20:00  |   Mon 30 Dec 2024
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

The Book called "Malware Analyst's Cookbook," which is a guide for anyone who works with or against malicious software. The book covers a wide range of topics related to malware analysis, from identi…
00:50:13  |   Mon 30 Dec 2024
Machine Learning Mastery With Python: Understand Your Data, Create Accurate Models and Work Projects End-To-End

Machine Learning Mastery With Python: Understand Your Data, Create Accurate Models and Work Projects End-To-End

The Book from "Machine Learning Mastery With Python: Understand Your Data, Create Accurate Models and Work Projects End-To-End" is a comprehensive guide to machine learning using the Python ecosystem…
00:18:08  |   Mon 30 Dec 2024
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions

Machine Learning for Cybersecurity: Innovative Deep Learning Solutions

The Book present a series of studies exploring the use of machine learning techniques for detecting and preventing cybersecurity threats. One source focuses on the application of machine learning for…
00:12:40  |   Sun 29 Dec 2024
LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202

LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202

This Book is a study guide for the LPIC-2 certification exam, focusing on advanced Linux administration topics. It provides detailed explanations of exam objectives, includes example questions, flash…
00:32:33  |   Sun 29 Dec 2024
Lock Picking for Beginners: A Complete Step-by-Step Visual Guide on How to Pick Locks with Simple Tools Using Quick and Effective Techniques

Lock Picking for Beginners: A Complete Step-by-Step Visual Guide on How to Pick Locks with Simple Tools Using Quick and Effective Techniques

This book, "Lock Picking for Beginners: A Complete Step-by-Step Visual Guide," is a comprehensive guide to the art of lock picking. The book begins by defining what a lock is and the different types …
00:06:14  |   Sun 29 Dec 2024
LOCK PICKING EQUIPMENT FOR BEGINNERS

LOCK PICKING EQUIPMENT FOR BEGINNERS

The Book is a guide to lock picking for beginners. The author explains the workings of pin tumbler locks, detailing the components and mechanisms involved. They then outline various techniques for pi…
00:09:43  |   Sun 29 Dec 2024
LOCK PICKING: The Complete Guide for Beginners to Master the Art of Lock Picking Skills and Avoid Beginner  Mistakes

LOCK PICKING: The Complete Guide for Beginners to Master the Art of Lock Picking Skills and Avoid Beginner Mistakes

This is an excerpt from a book that provides a comprehensive guide to the art of lock picking for beginners. It covers the different types of locks and the internal mechanisms of lock cylinders, expl…
00:11:55  |   Sat 28 Dec 2024
LLVM Essentials: Become familiar with the LLVM infrastructure and start using LLVM libraries to design a compiler

LLVM Essentials: Become familiar with the LLVM infrastructure and start using LLVM libraries to design a compiler

This book is a guide for LLVM, an open-source compiler infrastructure. The text focuses on teaching readers how to write compilers for custom architectures and languages. It covers a wide range of LL…
00:27:57  |   Sat 28 Dec 2024
Linux 101 hacks

Linux 101 hacks

The Book is a guide for Linux users called "Linux 101 Hacks". It covers a wide range of topics, from essential commands to more advanced system administration tasks. Each "hack" is a practical tip de…
00:38:04  |   Sat 28 Dec 2024
Linux Command Line and Shell Scripting Bible

Linux Command Line and Shell Scripting Bible

The Book provide a comprehensive guide to Linux command-line tools and shell scripting. They cover fundamental concepts like navigating the file system, managing files and directories, and understand…
00:27:38  |   Sat 28 Dec 2024
Linux System Administration for the 2020s

Linux System Administration for the 2020s

The Book provide a comprehensive guide for system administrators working with Linux in the 2020s, covering various aspects of administration, from basic concepts to advanced troubleshooting and secur…
00:07:26  |   Sat 28 Dec 2024
Linux Hardening in Hostile Networks

Linux Hardening in Hostile Networks

This excerpt from the ebook "Linux Hardening in Hostile Networks" details various security measures that can be applied to Linux systems. It starts by discussing general security principles and then …
00:50:41  |   Fri 27 Dec 2024
Linux Firewalls: Enhancing Security with nftables and Beyond: Enhancing Security with nftables and Beyond

Linux Firewalls: Enhancing Security with nftables and Beyond: Enhancing Security with nftables and Beyond

This Book is a chapter from a book on Linux firewalls. It discusses the fundamentals of packet filtering, security measures, and the implementation of firewalls using both the traditional iptables pr…
00:16:16  |   Fri 27 Dec 2024
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort

This Book, Linux Firewalls: Attack Detection, is a comprehensive guide to securing Linux systems by using iptables to detect and respond to network attacks. The book provides a detailed exploration o…
00:34:15  |   Fri 27 Dec 2024
Linux System Administration: Solve Real-life Linux Problems Quickly

Linux System Administration: Solve Real-life Linux Problems Quickly

This Book is an excerpt from the book "Linux System Administration" by Tom Adelstein and Bill Lubanovic. It is a comprehensive guide to Linux system administration, covering a wide range of topics, i…
00:24:00  |   Fri 27 Dec 2024
Linux Server Security: Hack and Defend

Linux Server Security: Hack and Defend

The provided Book comes from the book "Linux Server Security: Hack and Defend" by Chris Binnie. The book aims to provide a broad overview of system and network security threats, discussing a variety …
00:42:17  |   Fri 27 Dec 2024
Linux Kernel Debugging: Leverage proven tools and advanced techniques to effectively debug Linux kernels and kernel modules

Linux Kernel Debugging: Leverage proven tools and advanced techniques to effectively debug Linux kernels and kernel modules

This Book provides a comprehensive guide to debugging the Linux kernel, covering various methods and tools. The book begins by defining what debugging is and explores the different types of bugs, inc…
00:44:07  |   Wed 25 Dec 2024
Linux Inside

Linux Inside

The provided Book excerpts come from a series of blog posts about the Linux kernel for the x86_64 architecture. The posts aim to explain the kernel's booting and initialization processes in detail, s…
00:18:57  |   Wed 25 Dec 2024
Linux Fundamentals

Linux Fundamentals

The Book "Linux Fundamentals, 2nd Edition" that explores various aspects of the Linux operating system. It covers topics such as the Linux kernel, GNU utilities, user interfaces, desktop and server a…
00:28:22  |   Wed 25 Dec 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.