CyberSecurity Summary Podcast Por CyberSecurity Summary arte de portada

CyberSecurity Summary

CyberSecurity Summary

De: CyberSecurity Summary
Escúchala gratis

Acerca de esta escucha

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Copyright CyberSecurity Summary
Arte Historia y Crítica Literaria Política y Gobierno
Episodios
  • Practical Julia: A Hands-On Introduction for Scientific Minds
    May 14 2025
    This Book provides a comprehensive introduction to the Julia programming language, designed particularly for scientists and engineers. It covers foundational concepts like data types, operators, control flow (loops and conditionals), and functions, along with more advanced topics such as multiple dispatch, metaprogramming, plotting, and working with various data structures. The text also explores Julia's application in specific scientific domains, including physics simulations (using Oceananigans and DifferentialEquations), statistics (with DataFrames and StatsPlots), biology (agent-based modeling), and signal/image processing, highlighting the language's composability and efficiency for numerical and scientific computing. It also touches on topics like unit handling (Unitful), symbolic mathematics (Symbolics and SymPy), and techniques for concurrency and parallelism.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Practical-Julia-Lee-Phillips/dp/1718502761?&linkCode=ll1&tag=cvthunderx-20&linkId=79a161e0382d545ef973c1dc5f393d57&language=en_US&ref_=as_li_ss_tl
    Más Menos
    25 m
  • Practical Ansible: Learn how to automate infrastructure, manage configuration, and deploy applications
    May 14 2025
    These excerpts provide an in-depth look at Ansible automation, detailing fundamental concepts and practical applications. Key areas covered include installing and configuring Ansible, managing inventories, and creating playbooks and roles. The text also explains how to work with modules and plugins, build collections, and utilize command-line arguments and variables. Advanced topics like conditional logic, debugging, and integrating with cloud platforms such as AWS, Azure, GCP, and OpenStack are also explored, alongside methods for version control and best practices for coding. Furthermore, the document introduces AWX and execution environments for scaling and managing automation.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Practical-Ansible-infrastructure-configuration-applications/dp/180512997X?&linkCode=ll1&tag=cvthunderx-20&linkId=c8f75918c464bc540840ffc73b31ee10&language=en_US&ref_=as_li_ss_tl

    Más Menos
    26 m
  • Offensive Countermeasures: The Art of Active Defense
    May 12 2025
    This excerpt explores "Offensive Countermeasures - The Art Of Active Defense," a publication challenging traditional passive cybersecurity methods. The author, John Strand of Black Hills Information Security, advocates for proactive defensive strategies, arguing that current approaches are often inadequate. The text discusses legal considerations and case studies related to "hacking back," emphasizing the need for careful, legal actions and avoiding illegal retaliatory strikes like denial-of-service attacks. It highlights the importance of attribution in understanding attackers and details various tools and techniques for active defense, such as honeypots, web traps, and methods for identifying attacker locations and activity. Ultimately, the book aims to initiate a broader discussion on implementing offensive tactics within a defensive framework to create a less favorable environment for attackers.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Offensive-Countermeasures-Art-Active-Defense-ebook/dp/B0753MCJV8?&linkCode=ll1&tag=cvthunderx-20&linkId=d464d3b8f5e65fb441894051f8bb5ae4&language=en_US&ref_=as_li_ss_tl

    Más Menos
    23 m
adbl_web_global_use_to_activate_T1_webcro805_stickypopup
Todavía no hay opiniones