PodParley PodParley
CyberSecurity Summary cover art

All Episodes

CyberSecurity Summary — 198 episodes

#
Title
1

ITF+ CompTIA IT Fundamentals All-in-One Exam Guide, Second Edition (Exam FC0-U61)

2

CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61

3

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

4

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition

5

CCNA Certification Study Guide: Exam 200-301, Volume 2 (Sybex Study Guide)

6

Computer Networks: A Systems Approach (The Morgan Kaufmann Series in Networking)

7

Practical Guide to Security in the AWS Cloud

8

C++ For Dummies

9

Cisco Unified Contact Center Enterprise (Networking Technology: IP Communications)

10

5G Mobile and Wireless Communications Technology

11

Learn Linux Quickly: A beginner-friendly guide to getting up and running with the world's most powerful operating system

12

Cisco Voice Gateways and Gatekeepers (Networking Technology)

13

Exam Ref AZ-204 Developing Solutions for Microsoft Azure

14

Write Great Code, Volume 3: Engineering Software

15

Building Virtual Pentesting Labs for Advanced Penetration Testing

16

Building Telegram Bots: Develop Bots in 12 Programming Languages using the Telegram Bot API

17

What You Need to Know about Docker: The absolute essentials you need to get Docker up and running

18

Build Your Own Website: A Comic Guide to HTML, CSS, and WordPress

19

Azure DevOps Explained: Get started with Azure DevOps and develop your DevOps practices

20

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

21

Bash Cookbook 1st Edition

22

bash Cookbook: Solutions and Examples for bash Users 2nd Edition

23

Beginning Ethical Hacking with Python

24

Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook

25

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

26

Autonomic Computing and Networking

27

Android Cookbook: Problems and Solutions for Android Developers

28

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

29

31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam

30

31 Days Before Your CCNA Routing & Switching Exam: A Day-by-Day Review Guide for the ICND1/CCent (100-105), ICND2 (200-105)

31

Implement NLP use-cases using BERT: Top Expert-Led Coding Interview Question Bank for Python Aspirants

32

CompTIA CySA+ Practice Exams: A Time Compressed Resource to Passing the CompTIA CySA+ (CS0-002) Exam on the First Attempt

33

Demystifying Azure DevOps Services: A Guide to Architect, Deploy, and Administer DevOps Using Microsoft Azure DevOps Services

34

MongoDB Complete Guide: Develop Strong Understanding of Administering MongoDB, CRUD Operations, MongoDB Commands, MongoDB Compass

35

Wi-Fi Hacking For Everyone

36

TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS

37

Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

38

The Book of Batch Scripting: From Fundamentals to Advanced Automation

39

CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide (Certification Guide)

40

Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW)

41

Computer Security: Principles and Practice

42

Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons

43

Cybersecurity for Scada Systems

44

Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark

45

VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide (VMware Press Certification)

46

Practical Purple Teaming: The Art of Collaborative Defense

47

AWS Certified Cloud Practitioner CLF-C02 Cert Guide (Certification Guide)

48

Linux Bible

49

Malware Analysis Using Artificial Intelligence and Deep Learning

50

Huntpedia: Your Threat Hunting Knowledge Compendium

51

Architecting High-Performance Embedded Systems: Design and build high-performance real-time digital systems based on FPGAs

52

Write Great Code, Volume 1, 2nd Edition: Understanding the Machine

53

Unity Certified Programmer: Exam Guide: Expert tips and techniques to pass the Unity certification exam at the first attempt

54

Practical Microservices with Dapr and .NET: A developer's guide to building cloud-native applications using the Dapr event-driven runtime

55

Python Interview Questions: Brush up for your next Python interview with 240+ solutions on most common challenging interview questions

56

Social Engineering: The Art of Human Hacking

57

Permanent Record

58

Operating Systems: Internals and Design Principles

59

Okta Administration: Up and Running: Implement enterprise-grade identity and access management for on-premises and cloud apps

60

Microsoft Azure Administrator Exam Prep (AZ-104): Make Your Career with Microsoft Azure Platform Using Azure Administered Exam Prep

61

Buffer Overflow Attacks: Detect, Exploit, Prevent

62

Cisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners

63

Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

64

Terraform Cookbook: Recipes for Codifying Infrastructure

65

Ruby Data Structures and Algorithms

66

Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing

67

Ransomware: Penetration Testing and Contingency Planning (Cyber Shorts)

68

Build A SaaS App in Rails 7

69

Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects

70

Penetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing

71

Penetration Testing Step-By-Step Guide

72

React in Depth

73

Kubernetes for Developers

74

Inside Cyber Warfare: Mapping the Cyber Underworld

75

Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit

76

Component-Based Rails Applications: Large Domains Under Control

77

Hacker: Hack The System: The "Ethical" Python Hacking Guide

78

Ruby Programming: Building Future-proof Scalable Applications

79

Password Cracking with Kali Linux

80

Cybersecurity First Principles: A Reboot of Strategy and Tactics

81

Computer Science Distilled: Learn the Art of Solving Computational Problems (Code is Awesome)

82

Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism

83

Cisco CCNA Command Guide For Beginners And Intermediates: A Practical Step By Step Guide to Cisco CCNA Routing And Switching Command Line

84

ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills

85

CCNA Cisco Certified Network Associate Exam (200-301): Technology Workbook with Practice Questions and Labs

86

CCNA: 3 in 1: Beginners Guide+ Simple and Effective Strategies+Advanced Method and Strategies to learn Routing and Switching Essentials

87

High Performance PostgreSQL for Rails: Reliable, Scalable, Maintainable Database Applications

88

Android Application Development Cookbook: Over 100 recipes to help you solve the most common problems faced by Android Developers today

89

Prompt Engineering: Empowering Communication

90

Programming Ruby 3.3: The Pragmatic Programmers' Guide (Pragmatic Programmers; Facets of Ruby

91

Productionizing AI: How to Deliver AI B2B Solutions with Cloud and Python

92

Pro Spring Boot 3 with Kotlin: In-Depth Guide to Best Practices for Cloud-Native and Microservices Development

93

PowerShell Fast Track: Hacks for Non-Coders

94

Software Testing: A Craftsman's Approach

95

Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals

96

Android Internals::Power User's View

97

5G Mobile Core Network: Design, Deployment, Automation, and Testing Strategies

98

5G LTE Narrowband Internet of Things (NB-IoT)

99

Windows Terminal Tips, Tricks, and Productivity Hacks: Optimize your command-line usage and development processes with pro-level techniques

100

Secrets of Network Cartography: A Comprehensive Guide to Nmap

101

Pro Ember Data: Getting Ember Data to Work with Your API

102

Practical Web Scraping for Data Science: Best Practices and Examples with Python

103

Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices

104

Practical LPIC-3 300: Prepare for the Highest Level Professional Linux Certification

105

Microsoft Azure Network Security (IT Best Practices - Microsoft Press)

106

Mastering Linux Security and Hardening: Protect your Linux systems from intruders, malware attacks, and other cyber threats

107

LPIC-1 Linux Professional Institute Certification Study Guide: Exam 101-500 and Exam 102-500

108

LPIC-1 Linux Professional Institute Certification Practice Tests: Exam 101-500 and Exam 102-500

109

Linux+ and LPIC-1 Guide to Linux Certification, Loose-leaf Version (MindTap Course List)

110

Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence

111

CCNAv7: Introduction to Networks Companion Guide by Cisco

112

Introduction to Modern Cryptography: Third Edition (Chapman & Hall/CRC Cryptography and Network Security Series)

113

Introduction to Compiler Construction in a Java World

114

Hands-On Python Deep Learning for the Web: Integrating neural network architectures to build smart web apps with Flask, Django

115

Hacklog Volume 2 Web Hacking: Manuale sulla Sicurezza Informatica e Hacking Etico

116

GPEN GIAC Certified Penetration Tester All-in-One Exam Guide

117

RxJS Cookbook for Reactive Programming: Discover 40+ real-world solutions for building async, event-driven web apps

118

React Key Concepts: An in-depth guide to React's core features

119

Prompt Engineering for Generative AI

120

C++20 Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library

121

Building Web Apps with Python and Flask: Learn to Develop and Deploy Responsive RESTful Web Applications Using Flask Framework

122

Building Machine Learning Systems Using Python: Practice to Train Predictive Models and Analyze Machine Learning Results with Real Use-Cases

123

Building Enterprise Blockchain Solutions on AWS: A Developer's Guide to Build, Deploy, and Managed Apps Using Ethereum, Hyperledger Fabric

124

Building Decentralized Blockchain Applications: Learn How to Use Blockchain as the Foundation for Next-Gen Apps

125

Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs

126

Blockchain in e-Governance: Driving the next Frontier in G2C Services

127

Beginning Java MVC 1.0: Model View Controller Development to Build Web, Cloud, and Microservices Applications

128

AWS Certified Machine Learning Specialty: MLS-C01 Certification Guide: The definitive guide to passing the MLS-C01 exam on the very first

129

The Fast-Track Guide to VXLAN BGP EVPN Fabrics: Implement Today’s Multi-Tenant Software-Defined Networks

130

The Pythonic Way: An Architect’s Guide to Conventions and Best Practices for the Design, Development, Testing, and Management of Enterprise

131

Traefik API Gateway for Microservices: With Java and Python Microservices Deployed in Kubernetes

132

Systems Analysis and Design Global Ed

133

Loose Leaf for Systems Analysis and Design

134

THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker

135

Synchronizing 5G Mobile Networks

136

Statistics for Machine Learning: Implement Statistical methods used in Machine Learning using Python

137

Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks

138

Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications

139

Securing Social Networks in Cyberspace

140

Security for Telecommunications Networks (Advances in Information Security Book 40)

141

Enterprise Security Architecture: A Business-Driven Approach

142

Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications

143

Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together

144

Cybersecurity and Third-Party Risk: Third Party Threat Hunting

145

Cracking the Coding Interview: 189 Programming Questions and Solutions

146

Computer Networks, Global Edition

147

Computer Forensics: Incident Response Essentials

148

CompTIA Pentest+ (Practice Exams)

149

CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual

150

Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing

151

The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)

152

The Cybersecurity Manager's Guide: The Art of Building Your Security Program

153

Certificate of Cloud Auditing Knowledge Study Guide

154

Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime

155

Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals

156

Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator

157

Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix

158

Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions

159

UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)

160

Visual Studio Code for Python Programmers

161

Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future

162

Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra

163

Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes

164

Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark

165

IBM Watson Solutions for Machine Learning: Achieving Successful Results Across Computer Vision, Natural Language Processing and AI Projects

166

Google Analytics Kickstarter Guide: Get Tips to Boost Your Traffic and Sales Using Google Analytics

167

Cloud Native Applications with Jakarta EE: Build, Design, and Deploy Cloud-Native Applications and Microservices with Jakarta EE

168

Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing

169

Linux Device Driver Development: Everything you need to start with device driver development for Linux kernel and embedded Linux

170

Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation

171

Five Principles for Deploying and Managing Linux in the Cloud

172

Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022

173

Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success

174

Losing the Cybersecurity War And What We Can Do to Stop It

175

Mastering Go: Harness the power of Go to build professional utilities and concurrent servers and services

176

MS-900 :Microsoft 365 Fundamentals: Exam Cram Notes

177

Navigating the Cybersecurity Career Path

178

Red Hat Enterprise Linux 8 Administration: Master Linux administration skills and prepare for the RHCSA certification exam

179

Solutions Architect's Handbook: Kick-start your solutions architect career by learning architecture design principles and strategies

180

SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery)

181

Head First Go

182

HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide

183

Hands-on Pipeline as YAML with Jenkins: A Beginner's Guide to Implement CI/CD Pipelines for Mobile, Hybrid, and Web Applications

184

Hacking with Spring Boot 2.4: Classic Edition

185

Guide to Networking Essentials

186

From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband

187

Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders

188

Secure Access Service Edge (SASE) For Dummies

189

Machine Learning for High-Risk Applications: Approaches to Responsible AI

190

Reinventing ITIL in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant

191

Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect

192

Opportunistic Networks: Fundamentals, Applications and Emerging Trends

193

Open Source Security: Your Network More Secure With Open Source Tools

194

Networks

195

Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

196

Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau

197

MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)

198

Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Technique