CyberSecurity Summary
A podcast by CyberSecurity Summary
915 Episoade
-
Security Automation with Ansible 2
Publicat: 25.02.2025 -
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Publicat: 24.02.2025 -
Secure Programming with Static Analysis
Publicat: 24.02.2025 -
Secure PHP Development: Building 50 Practical Applications
Publicat: 23.02.2025 -
Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML
Publicat: 23.02.2025 -
Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language
Publicat: 22.02.2025 -
Modern Vulnerability Management: Predictive Cybersecurity
Publicat: 22.02.2025 -
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
Publicat: 21.02.2025 -
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
Publicat: 21.02.2025 -
RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)
Publicat: 20.02.2025 -
Reverse Engineering Questions and Answers - George Duckett
Publicat: 20.02.2025 -
Red Team Development and Operations: A practical guide
Publicat: 19.02.2025 -
Red Hat Linux Security and Optimization
Publicat: 19.02.2025 -
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
Publicat: 18.02.2025 -
The Red Team Handbook - The Army's Guide To Making Better Decisions
Publicat: 18.02.2025 -
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)
Publicat: 18.02.2025 -
Real-World Python: A Hacker's Guide to Solving Problems with Code
Publicat: 17.02.2025 -
Raspberry Pi Assembly Language Programming: ARM Processor Coding
Publicat: 17.02.2025 -
Ransomware and Cyber Extortion: Response and Prevention
Publicat: 17.02.2025 -
Racket Programming the Fun Way: From Strings to Turing Machines
Publicat: 15.02.2025
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary