880 Avsnitt

  1. Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats

    Publicerades: 2025-05-26
  2. Darknet Master: Tor and Deep Web Secrets

    Publicerades: 2025-05-26
  3. A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more

    Publicerades: 2025-05-25
  4. Cryptography and Network Security: Principles and Practice, Global Ed

    Publicerades: 2025-05-25
  5. Cryptography: Algorithms, Protocols, and Standards for Computer Security

    Publicerades: 2025-05-24
  6. Writing a C Compiler: Build a Real Programming Language from Scratch

    Publicerades: 2025-05-24
  7. Windows 10 System Programming, Part 2

    Publicerades: 2025-05-23
  8. Windows 10 System Programming, Part 1

    Publicerades: 2025-05-23
  9. Windows APT Warfare: Identify and prevent Windows APT attacks effectively

    Publicerades: 2025-05-22
  10. Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

    Publicerades: 2025-05-22
  11. JavaScript for Sound Artists

    Publicerades: 2025-05-21
  12. Building Your Own JavaScript Framework: Architect extensible and reusable framework systems

    Publicerades: 2025-05-21
  13. Visual Threat Intelligence: An Illustrated Guide For Threat Researchers

    Publicerades: 2025-05-20
  14. 12 Twisted Python Projects for Young Coders

    Publicerades: 2025-05-20
  15. Think Like a Software Engineering Manager

    Publicerades: 2025-05-19
  16. The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities

    Publicerades: 2025-05-19
  17. The Android Malware Handbook: Detection and Analysis by Human and Machine

    Publicerades: 2025-05-19
  18. Software Engineering for Games in Serious Contexts: Theories, Methods, Tools, and Experiences

    Publicerades: 2025-05-19
  19. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR

    Publicerades: 2025-05-17
  20. Security Testing with Raspberry Pi

    Publicerades: 2025-05-17

5 / 44

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary

Visit the podcast's native language site