CyberSecurity Summary
Un pódcast de CyberSecurity Summary
904 Episodo
-
Threat Modeling: Designing for Security
Publicado: 24/3/2025 -
Write Great Code, Volume 2, 2nd Edition: Thinking Low-Level, Writing High-Level
Publicado: 24/3/2025 -
Software Craftsman, The: Professionalism, Pragmatism, Pride
Publicado: 23/3/2025 -
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Publicado: 23/3/2025 -
The Quick Python Book, Second Edition
Publicado: 22/3/2025 -
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Publicado: 22/3/2025 -
The Official Raspberry Pi Beginner's Guide: How to use your new computer
Publicado: 21/3/2025 -
The Official CompTIA Security+ Certification Study Guide
Publicado: 21/3/2025 -
The Linux Programming Interface: A Linux and UNIX System Programming Handbook
Publicado: 20/3/2025 -
The Hacker Playbook: Practical Guide To Penetration Testing
Publicado: 20/3/2025 -
The Hacker Playbook 3: Practical Guide To Penetration Testing
Publicado: 19/3/2025 -
The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process
Publicado: 19/3/2025 -
The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World
Publicado: 18/3/2025 -
The Complete Cyber Security Course
Publicado: 18/3/2025 -
The Clean Coder: A Code of Conduct for Professional Programmers
Publicado: 17/3/2025 -
CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)
Publicado: 17/3/2025 -
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
Publicado: 16/3/2025 -
The IDA Pro Book, 2nd Edition
Publicado: 16/3/2025 -
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization
Publicado: 15/3/2025 -
The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence
Publicado: 15/3/2025
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary