PodcastsArteCyberSecurity Summary

CyberSecurity Summary

CyberSecurity Summary
CyberSecurity Summary
Último episódio

Episódios Disponíveis

5 de 1053
  • Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks
    A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (MVC), design patterns, and memory management. The later sections progress into core iOS UI development topics like Auto Layout, protocols, the delegate pattern, and an introduction to the declarative UI framework SwiftUI.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Swift-30-Days-Learning-SwiftUI/dp/9391030106?&linkCode=ll1&tag=cvthunderx-20&linkId=3a2deef167e53e41372bfca9a9750ba0&language=en_US&ref_=as_li_ss_tlDiscover our free courses in tech and cybersecurity, Start learning today:https://linktr.ee/cybercode_academy
    --------  
    18:00
  • Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
    A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data using Kinesis Data Streams (KDS), including capacity, monitoring, and security. Significant portions discuss Kinesis Data Firehose (KDF) for data delivery to destinations like Amazon S3 and Redshift, and Kinesis Data Analytics (KDA) for processing streaming data using both SQL and Apache Flink engines. Finally, the text explores integrations with other AWS services like Amazon SQS, SNS, EventBridge, and third-party solutions such as Splunk, often utilizing a hypothetical "SmartCity bike-share" use case as an example.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Scalable-Data-Streaming-Amazon-Kinesis-ebook/dp/B08YM1RJLT?&linkCode=ll1&tag=cvthunderx-20&linkId=2d54df77a132afa1484a2db5a5d96357&language=en_US&ref_=as_li_ss_tlDiscover our free courses in tech and cybersecurity, Start learning today:https://linktr.ee/cybercode_academy
    --------  
    19:54
  • Securing Social Networks in Cyberspace
    Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated to cybersecurity threats and countermeasures, detailing the use of steganography and Markov chains to create covert botnet command and control channels on platforms like Twitter, and addressing cross-site scripting (XSS) attacks. Furthermore, the book examines automated content classification for moderation purposes and analyzes the growing problem of cyberbullying severity detection, particularly among neurodiverse learners, while also providing an overview of securing mobile social networks and user profiling techniques.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Securing-Social-Networks-Cyberspace-Al-Sakib/dp/0367681730?&linkCode=ll1&tag=cvthunderx-20&linkId=b6f16b7ad5639a2b10555d8b877ea1fa&language=en_US&ref_=as_li_ss_tlDiscover our free courses in tech and cybersecurity, Start learning today:https://linktr.ee/cybercode_academy
    --------  
    20:39
  • Security for Telecommunications Networks (Advances in Information Security Book 40)
    An extensive overview of security in telecommunications networks, particularly focusing on cellular systems and their convergence with the Internet. The text first establishes core security concepts and cryptographic principles before thoroughly examining vulnerabilities in both traditional voice networks and modern cellular data services like GSM and GPRS. A significant portion is dedicated to analyzing the impact and mitigation of Denial of Service (DoS) attacks via Short Messaging Service (SMS) and cellular data teardown mechanisms, demonstrating how network rigidities create exploitable weaknesses. Finally, the text explores the architecture and security challenges of Voice over IP (VoIP), contrasting its open, packet-switched nature with the circuit-switched design of traditional telephony systems.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Security-Telecommunications-Networks-Advances-Information-ebook/dp/B002C73P2E?&linkCode=ll1&tag=cvthunderx-20&linkId=06f3f684c83b009971360ebb99dd2032&language=en_US&ref_=as_li_ss_tlDiscover our free courses in tech and cybersecurity, Start learning today:https://linktr.ee/cybercode_academy
    --------  
    14:50
  • Enterprise Security Architecture: A Business-Driven Approach
    An extensive overview of enterprise security architecture, emphasizing a business-driven approach. It introduces the SABSA Model, a six-layer framework for developing security architectures, and explains how it guides the entire process from contextual business requirements to operational security. The text covers critical concepts like risk management, compliance, and the importance of a holistic approach to security, moving beyond isolated technical solutions. It details various security mechanisms, logical services, and physical implementations, alongside strategies for managing operational security, people, and processes within an organization. Ultimately, the source aims to equip readers with the knowledge and tools to design, implement, and manage robust enterprise-wide security architectures that align with business objectives and ensure long-term value.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Enterprise-Security-Architecture-Business-Driven-Approach/dp/157820318X?&linkCode=ll1&tag=cvthunderx-20&linkId=fc218ce2cb063817bb982157327744fa&language=en_US&ref_=as_li_ss_tlDiscover our free courses in tech and cybersecurity, Start learning today:https://linktr.ee/cybercode_academy
    --------  
    19:43

Mais podcasts de Arte

Sobre CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary
Sítio Web de podcast

Ouve CyberSecurity Summary, Refeitório e muitos outros podcasts de todo o mundo com a aplicação radio.pt

Obtenha a aplicação gratuita radio.pt

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções
Informação legal
Aplicações
Social
v8.1.2 | © 2007-2025 radio.de GmbH
Generated: 12/14/2025 - 11:16:45 AM