882 Episodes

  1. Incident Response & Computer Forensics, Third Edition

    Published: 12/15/2024
  2. Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration

    Published: 12/15/2024
  3. Implementing Effective Code Reviews: How to Build and Maintain Clean Code

    Published: 12/15/2024
  4. Implementing Cryptography Using Python

    Published: 12/15/2024
  5. Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

    Published: 12/15/2024
  6. Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,

    Published: 12/15/2024
  7. Implementing Cisco IP Switch Networks (300-115)

    Published: 12/15/2024
  8. IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over

    Published: 12/15/2024
  9. IBM b-type Gen 7 Installation, Migration, and Best Practices Guide

    Published: 12/15/2024
  10. Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud

    Published: 12/15/2024
  11. How Linux Works, 3rd Edition: What Every Superuser Should Know

    Published: 12/15/2024
  12. How to Measure Anything in Cybersecurity Risk

    Published: 12/15/2024
  13. How to Hack Like a Legend: Breaking Windows

    Published: 12/13/2024
  14. How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

    Published: 12/13/2024
  15. History of REvil

    Published: 12/13/2024
  16. Hiding from the Internet: Eliminating Personal Online Information

    Published: 12/13/2024
  17. Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

    Published: 12/12/2024
  18. Hash Crack: Password Cracking Manual v.3

    Published: 12/12/2024
  19. The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

    Published: 12/12/2024
  20. Hardware Security: A Hands-on Learning Approach

    Published: 12/12/2024

24 / 45

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary