1067 Avsnitt

  1. Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats

    Publicerades: 2025-01-20
  2. Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities

    Publicerades: 2025-01-19
  3. Cybersecurity Attacks - Red Team Strategies

    Publicerades: 2025-01-19
  4. Practical Web Penetration Testing

    Publicerades: 2025-01-19
  5. Network Security with pfSense

    Publicerades: 2025-01-19
  6. Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

    Publicerades: 2025-01-18
  7. Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

    Publicerades: 2025-01-18
  8. OWASP Mobile Security Testing Guide

    Publicerades: 2025-01-18
  9. Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20

    Publicerades: 2025-01-17
  10. OSSTMM 3

    Publicerades: 2025-01-17
  11. MacOS and iOS Internals, Volume III: Security & Insecurity

    Publicerades: 2025-01-17
  12. MacOS and iOS Internals, Volume I: User Mode

    Publicerades: 2025-01-17
  13. Linux System Programming: Talking Directly to the Kernel and C Library

    Publicerades: 2025-01-16
  14. Understanding the Linux Kernel

    Publicerades: 2025-01-16
  15. Operator Handbook: Red Team + OSINT + Blue Team Reference

    Publicerades: 2025-01-16
  16. Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

    Publicerades: 2025-01-15
  17. Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

    Publicerades: 2025-01-15
  18. Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

    Publicerades: 2025-01-15
  19. Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2

    Publicerades: 2025-01-15
  20. Official (ISC)2 Guide to the CISSP-ISSMP CBK

    Publicerades: 2025-01-15

26 / 54

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary

Visit the podcast's native language site