1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books Education News Arts Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1006
Years Active
2024 - 2025
Share to:
Digital Forensics Explained

Digital Forensics Explained

The Book provide a comprehensive guide to digital forensics, covering topics like incident response, report writing, social media investigations, social engineering, anti-forensics, link and visual a…
00:12:44  |   Wed 27 Nov 2024
Digital Forensics Basics: A Practical Guide Using Windows OS

Digital Forensics Basics: A Practical Guide Using Windows OS

"Digital Forensics Basics: A Practical Guide Using Windows OS" is a textbook by Nihad A. Hassan providing a comprehensive guide to digital forensics with a focus on Windows operating systems. The boo…
00:11:57  |   Wed 27 Nov 2024
Elsevier's Dictionary of Information Security

Elsevier's Dictionary of Information Security

The Elsevier’s Dictionary of Information Security is a comprehensive reference tool that defines common terms used in the field of information security. The dictionary includes definitions in English…
00:15:49  |   Wed 27 Nov 2024
DevOps and Containers Security: Security and Monitoring in Docker Containers

DevOps and Containers Security: Security and Monitoring in Docker Containers

The Book is a book excerpt about DevOps and container security. The book focuses on providing a practical and theoretical understanding of Docker containers and Kubernetes clustering, specifically in…
00:10:37  |   Wed 27 Nov 2024
DevOps Troubleshooting: Linux Server Best Practices

DevOps Troubleshooting: Linux Server Best Practices

The provided Book comes from the book "DevOps Troubleshooting Linux Server Best Practices," which aims to equip developers and QA professionals in DevOps environments with the skills and knowledge to…
00:25:16  |   Wed 27 Nov 2024
Designing Secure Software: A Guide for Developers

Designing Secure Software: A Guide for Developers

The Book provide guidance on designing and building secure software. The text focuses on building a security mindset and applying this mindset to the entire software development process, from design …
00:19:57  |   Wed 27 Nov 2024
Designing BSD Rootkits: An Introduction to Kernel Hacking

Designing BSD Rootkits: An Introduction to Kernel Hacking

"Designing BSD Rootkits" is a tutorial for programmers interested in learning about kernel-mode rootkits. It explains how to write rootkits that maintain root access after gaining access to a compute…
00:19:33  |   Wed 27 Nov 2024
Deployment CISCO SD-WAN LAB ON EVE-NG

Deployment CISCO SD-WAN LAB ON EVE-NG

This Book describes the process of building a Cisco SD-WAN lab using EVE-NG, a network simulation platform. The document details the software requirements, the deployment of different Cisco SD-WAN co…
00:10:37  |   Wed 27 Nov 2024
Demystifying Intelligent Multimode Security Systems

Demystifying Intelligent Multimode Security Systems

This excerpt from Demystifying.Intelligent.Multimode.Security.Systems.pdf focuses on the increasing complexity and security needs of intelligent multimodal security systems (IMSS). The document discu…
00:13:38  |   Wed 27 Nov 2024
Demystified Object-Oriented Programming with C++

Demystified Object-Oriented Programming with C++

This Book, Demystified Object-Oriented Programming with C++, serves as a comprehensive guide to object-oriented programming (OOP) in C++. It covers a wide range of topics, beginning with fundamental …
00:29:48  |   Wed 27 Nov 2024
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

This Book, DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance, focuses on the multifaceted threat of distributed denial-of-service (DDoS) attacks on computer networks. The author…
00:15:30  |   Tue 26 Nov 2024
Data Science Projects with Python - Second Edition

Data Science Projects with Python - Second Edition

The Book provide a comprehensive guide to data science with Python, focusing on machine learning techniques for building predictive models. The book covers data exploration, cleaning, and visualizati…
00:23:50  |   Tue 26 Nov 2024
The DataOps Revolution

The DataOps Revolution

The provided Book is an excerpt from a Book titled "The DataOps Revolution: Delivering the Data-Driven Enterprise." This book tells the story of Jennifer Watson, a data professional at Saturn Banking…
00:08:16  |   Tue 26 Nov 2024
Database Security: Problems and Solutions

Database Security: Problems and Solutions

This Book excerpts provide a comprehensive guide to database security, encompassing a broad spectrum of topics from fundamental information security principles like confidentiality, integrity, and av…
00:09:04  |   Tue 26 Nov 2024
Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime

Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime

This excerpt from the Book Data Security by T. H. Lenhard covers a wide range of data security topics, focusing on practical threats and mitigation strategies. The book explains how computers communi…
00:11:39  |   Tue 26 Nov 2024
Data Science on the Google Cloud Platform

Data Science on the Google Cloud Platform

Learn how easy it is to apply sophisticated statistical and machine learning methods to real-world problems when you build on top of the Google Cloud Platform (GCP). This hands-on guide shows develop…
00:11:13  |   Tue 26 Nov 2024
Data Science Crash Course for Beginners: Fundamentals and Practices with Python

Data Science Crash Course for Beginners: Fundamentals and Practices with Python

This excerpt is from a Book titled "Data Science Crash Course for Beginners: Fundamentals and Practices". It introduces data science concepts and explains how to apply them using Python. The book cov…
00:18:17  |   Tue 26 Nov 2024
Data Pipelines with Apache Airflow

Data Pipelines with Apache Airflow

This Book provides a comprehensive guide to Apache Airflow, a powerful open-source workflow management platform commonly used in data-intensive environments. It covers the fundamentals of Airflow, in…
00:43:47  |   Tue 26 Nov 2024
Data Communications and Networking

Data Communications and Networking

The Book provide an extensive overview of data communications and networking. The text covers fundamental concepts, such as data representation and flow, network topologies, and protocols. It then di…
00:19:43  |   Mon 25 Nov 2024
Data Center Handbook: Plan, Design, Build, and Operations of a Smart Data Center

Data Center Handbook: Plan, Design, Build, and Operations of a Smart Data Center

The Book provide a comprehensive overview of data center design, operation, and management, covering a wide range of topics. The text discusses essential aspects of planning, including site selection…
00:28:54  |   Mon 25 Nov 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.