Powered by RND
PodcastsArteCyberSecurity Summary

CyberSecurity Summary

CyberSecurity Summary
CyberSecurity Summary
Último episódio

Episódios Disponíveis

5 de 144
  • The Secret Life of Programs: Understand Computers -- Craft Better Code
    A detailed guide to foundational computer concepts, aimed at programmers seeking a deeper understanding. The book covers a vast array of topics, beginning with the fundamental components of computer hardware like bits, Boolean operations, and integrated circuits, and progressing to how software interacts with this hardware, including programming languages, data structures, and operating systems. Furthermore, it explores historical and contemporary solutions to technological challenges, encompassing areas like networking, security, and machine intelligence, offering insights into the evolution and underlying principles of computing.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Secret-Life-Programs-Understand-Computers/dp/1593279701?&linkCode=ll1&tag=cvthunderx-20&linkId=24539305a2bc41ac82e35efca851f7f4&language=en_US&ref_=as_li_ss_tl
    --------  
    39:33
  • RFID Security: Techniques, Protocols and System-On-Chip Design
    A comprehensive overview of Radio Frequency Identification (RFID) technology, detailing its fundamental components, such as transponders, transceivers, and application systems, and exploring its various operating frequencies and powering techniques. It extensively discusses RFID applications, ranging from supply chain management and animal identification to electronic payments and anti-counterfeiting measures for banknotes and passports. A significant portion of the text addresses security and privacy concerns within RFID systems, examining vulnerabilities like tracking and cloning, and proposing cryptographic solutions and hardware implementations to enhance data integrity and user anonymity. The source also presents various protocols designed to improve security, including hash-based and public-key encryption schemes, and explores design trade-offs for low-cost, low-power RFID tag security.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/RFID-Security-Techniques-System-Chip/dp/0387764801?&linkCode=ll1&tag=cvthunderx-20&linkId=8ba276e5505375d258f01b3e6ff2d0ac&language=en_US&ref_=as_li_ss_tl
    --------  
    19:09
  • RFID Security and Privacy: Concepts, Protocols, and Architectures
    Explores various facets of Radio-Frequency Identification (RFID) technology, beginning with its fundamental principles and components, such as tags (also called transponders), readers, and backend systems. A significant portion addresses the security and privacy implications of ubiquitous computing and RFID systems, defining concepts like confidentiality, integrity, availability, and the evolving notion of privacy. The author then discusses different attacker capabilities and attack types specific to RFID, emphasizing the importance of system security in mitigating their impact. Furthermore, the source details cryptographic primitives and protocols designed to enhance RFID security, including hash-based identifier modification and pseudonymization infrastructures for scalable and privacy-preserving operations. Finally, the text presents advanced RFID system models that incorporate untrusted reading entities and personal managers to manage user data and privacy policies, culminating in the ID-Zone Architecture as a robust framework for secure and privacy-aware RFID deployments.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/RFID-Security-Privacy-Architectures-Engineering-ebook/dp/B001BY7L6A?&linkCode=ll1&tag=cvthunderx-20&linkId=f6b4bb544fb5ee72486f2f340ca93b35&language=en_US&ref_=as_li_ss_tl
    --------  
    17:15
  • Kotlin: The Ultimate Beginner's Guide to Learn kotlin Programming
    Offers a comprehensive guide to Kotlin programming, covering its syntax, features, and best practices. It establishes Kotlin's relationship with Java and Scala, highlighting its improvements in conciseness and functional programming capabilities, while also acknowledging similarities to Scala. The source details fundamental data types, class and object-oriented programming concepts including inheritance and constructors, and advanced topics like delegated properties and type checking. Furthermore, it provides extensive guidelines on code formatting, naming conventions, and source file organization, ultimately presenting Kotlin as a powerful and practical language for various application developments, including server-side programming.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary
    --------  
    20:28
  • The Full Stack Developer: Your Essential Guide to the Everyday Skills Expected of a Modern Full Stack Web Developer
    A comprehensive guide for modern web development, particularly focusing on the role of a full stack developer. It explores various facets of building web applications, from planning work using agile methodologies like Scrum and Kanban, to designing user experiences (UX) and understanding information architecture. The text also covers essential technical aspects such as front-end technologies (HTML, CSS, JavaScript), designing scalable systems with patterns like microservices, and implementing robust security measures and data storage solutions. Finally, it emphasizes the importance of continuous integration and delivery (CI/CD), deployment strategies, and the ongoing need for constant learning in the rapidly evolving digital landscape.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/-/en/Full-Stack-Developer-Essential-Everyday/dp/1484241517?&linkCode=ll1&tag=cvthunderx-20&linkId=148f446e22d1a782e6ddce946cccc56f&language=en_US&ref_=as_li_ss_tl
    --------  
    50:19

Mais podcasts de Arte

Sobre CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary
Site de podcast

Ouça CyberSecurity Summary, 451 MHz e muitos outros podcasts de todo o mundo com o aplicativo o radio.net

Obtenha o aplicativo gratuito radio.net

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções
Aplicações
Social
v7.22.0 | © 2007-2025 radio.de GmbH
Generated: 8/10/2025 - 6:45:31 AM