1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books Education News Arts Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1006
Years Active
2024 - 2025
Share to:
Cyber Crime Investigator's Field Guide

Cyber Crime Investigator's Field Guide

The Book text is an excerpt from the Cyber Crime Investigator’s Field Guide, which provides a comprehensive guide for cybercrime investigators. The guide explores various aspects of cybercrime, cover…
00:45:10  |   Fri 22 Nov 2024
Cuckoo Malware Analysis

Cuckoo Malware Analysis

The provided Book is an excerpt from the book "Cuckoo Malware Analysis" by Digit Oktavianto and Iqbal Muhardianto. The excerpt primarily focuses on Cuckoo Sandbox, an open-source automated malware an…
00:15:35  |   Fri 22 Nov 2024
Cryptography and Network Security: Principles and Practice

Cryptography and Network Security: Principles and Practice

The source Book provides a comprehensive overview of cryptography and network security. It starts with fundamental computer security concepts, covering security attacks, services, and mechanisms, bef…
00:25:06  |   Fri 22 Nov 2024
SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition

SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition

The provided Book comes from a book titled "CSSLP Certification All-in-One Exam Guide, Third Edition," which is a comprehensive guide for individuals preparing for the Certified Secure Software Lifec…
00:11:43  |   Fri 22 Nov 2024
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

The sources are from a book titled "Hands-On Cryptography with Python" by Samuel Bowne. This book aims to teach readers about cryptography and how to use Python to encrypt and decrypt data. It covers…
00:14:46  |   Fri 22 Nov 2024
Cryptography and Network Security

Cryptography and Network Security

This Book excerpt comes from the book "Cryptography and Network Security" by Marcelo S. Alencar. The book, intended for both graduate and undergraduate students, is a comprehensive resource covering …
00:06:37  |   Fri 22 Nov 2024
The Security Risk Assessment Handbook

The Security Risk Assessment Handbook

The provided Book is an excerpt from a comprehensive guide to information security risk assessment, outlining a methodical approach to identifying, analyzing, and mitigating risks to an organization'…
00:17:14  |   Fri 22 Nov 2024
The Art of Linux Kernel Design

The Art of Linux Kernel Design

This Book provides a deep dive into the design and implementation of the Linux 0.11 operating system. It examines key concepts like memory management, process creation, and inter-process communicatio…
00:23:14  |   Thu 21 Nov 2024
Secure Data Science

Secure Data Science

This Book is an excerpt from the book "Secure Data Science: Integrating Cyber Security and Data Science," which focuses on the intersection of cybersecurity and data science. It explores various aspe…
00:13:40  |   Thu 21 Nov 2024
Container Security: Fundamental Technology Concepts that Protect Containerized Applications

Container Security: Fundamental Technology Concepts that Protect Containerized Applications

This excerpt from Container Security by Liz Rice provides a detailed overview of container security best practices and technologies. It covers everything from the fundamental threats containers face …
00:37:11  |   Thu 21 Nov 2024
Computer Science Distilled: Learn the Art of Solving Computational Problems

Computer Science Distilled: Learn the Art of Solving Computational Problems

This excerpt is from a book called "Computer Science Distilled" by Wladston Ferreira Filho. It provides a concise overview of core computer science concepts, explaining topics such as computational t…
00:35:28  |   Thu 21 Nov 2024
Computer Networking and Cybersecurity

Computer Networking and Cybersecurity

The Book is guide for understanding computer networking and cybersecurity. The first source focuses on the technical aspects of computer networking, covering topics like network protocols, hardware c…
00:24:19  |   Thu 21 Nov 2024
Computer Security -- ESORICS 2013

Computer Security -- ESORICS 2013

The Book explore various aspects of computer security, including secure communication, data privacy, malware detection, and access control. The papers discuss topics like developing protocols for sec…
00:16:24  |   Thu 21 Nov 2024
Computer Graphics from Scratch: A Programmer's Introduction to 3D Rendering

Computer Graphics from Scratch: A Programmer's Introduction to 3D Rendering

A Book that explains the algorithms used in modern computer graphics. It covers topics from basic ray tracing and rasterization to more complex techniques like lighting, reflections, and texture mapp…
00:28:36  |   Thu 21 Nov 2024
Computer Forensics With Ftk

Computer Forensics With Ftk

The source Book provides a comprehensive guide to using the Forensic Toolkit (FTK) for computer forensics investigations. The text covers everything from the basics of installing and configuring FTK …
00:17:38  |   Thu 21 Nov 2024
Computer Forensics and Cyber Crime

Computer Forensics and Cyber Crime

This excerpt from the book Computer Forensics and Cyber Crime: An Introduction examines the evolution of computer crime. The text explores the history of cybercrime, from early hackers and phone phre…
00:12:21  |   Thu 21 Nov 2024
Computer and Network Security Essentials

Computer and Network Security Essentials

The source Book is a compilation of chapters from a book on computer and network security. The chapters cover a wide range of topics related to cybersecurity, from foundational concepts like malware …
00:27:59  |   Wed 20 Nov 2024
CompTIA Security+: SY0-601 Certification Guide - Second Edition: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+

CompTIA Security+: SY0-601 Certification Guide - Second Edition: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+

The Book material is a CompTIA Security+ study guide that explains the concepts and tools used in the field of cybersecurity. It covers essential topics such as security fundamentals, cryptography, i…
00:20:02  |   Wed 20 Nov 2024
CompTIA Security+ Certification Practice Exams, Fourth Edition

CompTIA Security+ Certification Practice Exams, Fourth Edition

This Book, CompTIA Security+ Certification Practice Exams, provides practice questions to help readers prepare for the CompTIA Security+ exam. The book is broken down into chapters, each focusing on …
00:51:17  |   Wed 20 Nov 2024
CompTIA Network+ N10_007 Practice Exam Questions

CompTIA Network+ N10_007 Practice Exam Questions

The Book is a study guide for the CompTIA Network+ N10-007 certification exam. It includes practice exam questions, explanations of answers, and an overview of networking concepts, infrastructure, ne…
00:19:28  |   Wed 20 Nov 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.