1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books Education News Arts Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1006
Years Active
2024 - 2025
Share to:
Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow

Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow

The source material explores the complex landscape of cybercrime, examining various aspects from criminal profiles and activities in the dark web, to the impact of fake news on national security and …
00:14:16  |   Mon 02 Dec 2024
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

The sources present a comprehensive overview of cryptography, both classical and quantum, emphasizing its practical applications in organizations and individuals. The text explores the history and ev…
00:19:11  |   Mon 02 Dec 2024
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

This book, Empirical Cloud Security, aims to provide a practical guide for evaluating risks and attacks in cloud environments. The second edition focuses on the latest cloud security research and dev…
00:38:39  |   Mon 02 Dec 2024
Embedded Linux Development Using Yocto Project

Embedded Linux Development Using Yocto Project

This source is a Book titled "Embedded Linux Development Using Yocto Project", providing a comprehensive guide to building custom Linux systems for embedded devices using the Yocto Project. The book …
00:42:12  |   Mon 02 Dec 2024
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming

Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming

This Book is a compilation of excerpts from Marijn Haverbeke's "Eloquent JavaScript: A Modern Introduction to Programming." The book explores the JavaScript programming language, covering fundamental…
00:18:22  |   Sun 01 Dec 2024
Eleventh Hour CISSP: Study Guide

Eleventh Hour CISSP: Study Guide

The source is an excerpt from a Book titled "Eleventh Hour CISSP" which provides a comprehensive overview of information security concepts, principles, and best practices for the CISSP certification …
00:44:05  |   Sun 01 Dec 2024
Reversing: Secrets of Reverse Engineering

Reversing: Secrets of Reverse Engineering

The provided source Book is an excerpt from a Book titled "Reversing: Secrets of Reverse Engineering." The book discusses the process of reverse engineering, a technique used to understand and analyz…
00:18:14  |   Sun 01 Dec 2024
Efficient Linux at the Command Line: Boost Your Command-Line Skills

Efficient Linux at the Command Line: Boost Your Command-Line Skills

The source is an excerpt from the book "Efficient Linux at the Command Line" by Vance Wilson, which covers advanced command-line techniques for navigating the Linux operating system and manipulating …
00:23:43  |   Sun 01 Dec 2024
Effective Cybersecurity: A Guide to Using Best Practices and Standards

Effective Cybersecurity: A Guide to Using Best Practices and Standards

This Book, "Effective Cybersecurity: A Guide," provides a comprehensive overview of cybersecurity best practices and standards. It focuses on managing the cybersecurity function, conducting security …
00:33:07  |   Sun 01 Dec 2024
Effective C: An Introduction to Professional C Programming

Effective C: An Introduction to Professional C Programming

The Book source is an excerpt from "Effective C: An Introduction to Professional C Programming" by Robert C. Seacord. It covers various aspects of C programming, from basic data types and code struct…
00:52:32  |   Sun 01 Dec 2024
Easy Learning Design Patterns Javascript: Build Better Coding and Design Patterns

Easy Learning Design Patterns Javascript: Build Better Coding and Design Patterns

This excerpt from Easy Learning Design Patterns Javascript by Yang Hu is a beginner's guide to understanding and implementing design patterns in Javascript. The text presents a variety of common desi…
00:16:49  |   Sun 01 Dec 2024
Dynamically Enabled Cyber Defense

Dynamically Enabled Cyber Defense

This excerpt from the Book "Dynamically Enabled Cyber Defense" explores the evolving threat of cyberattacks and the need for more dynamic defense strategies. The book advocates for a "dynamically ena…
00:21:57  |   Thu 28 Nov 2024
Drones to Go: A Crash Course for Scientists and Makers

Drones to Go: A Crash Course for Scientists and Makers

This Book is a textbook on drone design, modeling, and control. It aims to teach makers and scientists how to build and program drones, particularly multicopters like quadcopters. The book begins wit…
00:33:38  |   Thu 28 Nov 2024
Docker Cookbook: Solutions and Examples for Building Distributed Applications

Docker Cookbook: Solutions and Examples for Building Distributed Applications

The Book "Docker Cookbook" by Sébastien Goasguen. The Book provides practical recipes and solutions for building and managing distributed applications with Docker. It covers topics like Docker instal…
00:16:30  |   Thu 28 Nov 2024
Docker in Practice

Docker in Practice

The Book titled "Docker.in.Practice," which offers a comprehensive guide to utilizing Docker, a containerization platform. The Book explores fundamental concepts like container architecture and the D…
00:23:13  |   Thu 28 Nov 2024
Cyber Intelligence Report: 2020 Quarter 1: Dive Into the 5th Domain: Threat Intelligence

Cyber Intelligence Report: 2020 Quarter 1: Dive Into the 5th Domain: Threat Intelligence

This Book is a guide for using CSI Linux, a free and open-source Linux distribution designed for digital forensics and incident response investigations. It provides instructions on how to install and…
00:38:43  |   Thu 28 Nov 2024
Distributed Denial of Service Attacks: Real-world Detection and Mitigation

Distributed Denial of Service Attacks: Real-world Detection and Mitigation

This Book is an academic textbook exploring the nature of Distributed Denial of Service (DDoS) attacks. It examines various types of DDoS attacks, including the vulnerabilities they exploit and the t…
00:27:41  |   Thu 28 Nov 2024
Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats

Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats

The source Book provides a comprehensive guide to digital forensics and incident response. It covers foundational elements of incident response and digital forensics, including the incident response …
00:35:29  |   Thu 28 Nov 2024
Digital Security: Cyber Terror and Cyber Security

Digital Security: Cyber Terror and Cyber Security

This Book excerpt, from "Digital Security: Cyber Terror and Cyber Security," focuses on the relationship between the real world and the digital world, primarily how the latter can be used to threaten…
00:33:14  |   Thu 28 Nov 2024
Digital Forensics in the Era of Artificial Intelligence

Digital Forensics in the Era of Artificial Intelligence

This collection of Book excerpts explores the use of artificial intelligence, particularly machine learning and deep learning, in digital forensics. It examines the fundamental principles and advance…
00:21:15  |   Thu 28 Nov 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.