898 Episodo

  1. Distributed Denial of Service Attacks: Real-world Detection and Mitigation

    Publicado: 7/7/2025
  2. Distributed Artificial Intelligence: A Modern Approach (Internet of Everything (IoE))

    Publicado: 7/7/2025
  3. Deep Reinforcement Learning with Python: Master classic RL, deep RL, distributional RL, inverse RL, and more with OpenAI Gym and TensorFlow

    Publicado: 6/7/2025
  4. Deep Learning with PyTorch 1.x: Implement deep learning techniques and neural network architecture variants using Python

    Publicado: 6/7/2025
  5. Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

    Publicado: 5/7/2025
  6. Cyber-Security Threats, Actors, and Dynamic Mitigation

    Publicado: 5/7/2025
  7. Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques

    Publicado: 4/7/2025
  8. Cyber Security: Threats and Responses for Government and Business

    Publicado: 4/7/2025
  9. Cyber Security: The CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief Information Security

    Publicado: 3/7/2025
  10. Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices)

    Publicado: 3/7/2025
  11. Cyber Victimology: Decoding Cyber-Crime Victimisation

    Publicado: 2/7/2025
  12. Cyber Arms

    Publicado: 2/7/2025
  13. Create Graphical User Interfaces with Python: How to build windows, buttons, and widgets for your Python projects

    Publicado: 1/7/2025
  14. C++ Primer (5th Edition)

    Publicado: 1/7/2025
  15. Computer Networking: A Top-Down Approach

    Publicado: 30/6/2025
  16. Classic Computer Science Problems in Python

    Publicado: 30/6/2025
  17. Building Computer Vision Applications Using Artificial Neural Networks: With Step-by-Step Examples in OpenCV and TensorFlow with Python

    Publicado: 29/6/2025
  18. Building Android Apps in Python Using Kivy with Android Studio: With Pyjnius, Plyer, and Buildozer

    Publicado: 29/6/2025
  19. Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications

    Publicado: 28/6/2025
  20. The Little Black Book of Computer Viruses: The Basic Technology

    Publicado: 28/6/2025

2 / 45

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary

Visit the podcast's native language site