878 Odcinki

  1. The Official Raspberry Pi Beginner's Guide: How to use your new computer

    Opublikowany: 21.03.2025
  2. The Official CompTIA Security+ Certification Study Guide

    Opublikowany: 21.03.2025
  3. The Linux Programming Interface: A Linux and UNIX System Programming Handbook

    Opublikowany: 20.03.2025
  4. The Hacker Playbook: Practical Guide To Penetration Testing

    Opublikowany: 20.03.2025
  5. The Hacker Playbook 3: Practical Guide To Penetration Testing

    Opublikowany: 19.03.2025
  6. The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process

    Opublikowany: 19.03.2025
  7. The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World

    Opublikowany: 18.03.2025
  8. The Complete Cyber Security Course

    Opublikowany: 18.03.2025
  9. The Clean Coder: A Code of Conduct for Professional Programmers

    Opublikowany: 17.03.2025
  10. CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)

    Opublikowany: 17.03.2025
  11. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

    Opublikowany: 16.03.2025
  12. The IDA Pro Book, 2nd Edition

    Opublikowany: 16.03.2025
  13. The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization

    Opublikowany: 15.03.2025
  14. The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence

    Opublikowany: 15.03.2025
  15. The threat intelligence handbook

    Opublikowany: 14.03.2025
  16. The Tangled Web: A Guide to Securing Modern Web Applications

    Opublikowany: 14.03.2025
  17. The Social Engineer's Playbook: A Practical Guide to Pretexting

    Opublikowany: 12.03.2025
  18. The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

    Opublikowany: 12.03.2025
  19. The Mac Hacker's Handbook

    Opublikowany: 10.03.2025
  20. The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

    Opublikowany: 10.03.2025

11 / 44

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary

Visit the podcast's native language site