Episodios

  • Critical Visualization: Rethinking the Representation of Data
    May 2 2025
    "Critical Visualization: Rethinking the Representation of Data" examines the power and politics embedded within data visualization. The authors argue that visualizations are not neutral; instead, they shape understanding, reinforce existing power structures, and often obscure the processes and decisions behind their creation. The book advocates for a "critical" approach, urging readers to question visualizations and consider their social, cultural, and historical contexts. It explores diverse case studies, from the "flatten the curve" pandemic graphic to historical maps and contemporary self-tracking practices, demonstrating how visualizations can both reveal and conceal, empower and disempower. Ultimately, the text champions the creation of "critical visualizations" that challenge dominant narratives and promote more equitable and informed ways of seeing the world.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Critical-Visualization-Rethinking-Representation-Data/dp/1350077232?&linkCode=ll1&tag=cvthunderx-20&linkId=2861db303425ba35e1707eba8a92d0f8&language=en_US&ref_=as_li_ss_tl

    Más Menos
    34 m
  • Data Visualization: A Practical Introduction
    May 2 2025
    "Data Visualization: A Practical Introduction" serves as a guide for individuals, even those new to R, on how to effectively visualize data using the R programming language and the ggplot2 package. The book emphasizes the principles behind creating insightful and honest graphs, going beyond mere aesthetics to focus on clear communication and accurate representation. It introduces the "grammar of graphics" implemented by ggplot2, teaching readers to build plots layer by layer by mapping data variables to visual elements. Furthermore, it covers essential R skills for data manipulation using the tidyverse, addresses common pitfalls in visualization, and explores advanced techniques like working with models and maps, always stressing the importance of reproducible code and thoughtful design choices.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Data-Visualization-Introduction-Kieran-Healy/dp/0691181624?&linkCode=ll1&tag=cvthunderx-20&linkId=adfdfdc50fa85777ac1cd26c5723cbba&language=en_US&ref_=as_li_ss_tl

    Más Menos
    24 m
  • Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue
    May 1 2025
    Cybersecurity for Business is presented as a crucial element of national security and a significant concern for organizations across sectors. The included excerpts highlight the necessity of a comprehensive, top-down approach to cybersecurity, integrating it into all levels of business operations and decision-making, including the board of directors. The text emphasizes moving beyond traditional, IT-centric views to a holistic, enterprise-wide risk management strategy that includes legal, human resources, and financial considerations. Furthermore, the material underscores the importance of understanding and quantifying cyber risk in financial terms, adapting to the evolving threat landscape that includes sophisticated attackers and the challenges of new technologies. The book also examines the roles of various stakeholders, such as the General Counsel and the board, in fostering a culture of security and effectively managing cyber risks through planning, response, and continuous improvement.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Cybersecurity-Business-Organization-Wide-Strategies-Ensure/dp/1398606146?&linkCode=ll1&tag=cvthunderx-20&linkId=ac919ca30cd9132035ab4f2f4db90ae2&language=en_US&ref_=as_li_ss_tl

    Más Menos
    21 m
  • Concurrency with Modern C++: What every professional C++ programmer should know about concurrency
    May 1 2025
    This comprehensive Book provides a detailed exploration of concurrency in modern C++, covering both fundamental concepts and advanced techniques. It explains the C++ memory model and various synchronization primitives like mutexes, locks, and condition variables, including C++20 additions such as jthread and semaphores. The text thoroughly examines concurrent data structures, offering insights into lock-based and lock-free implementations, and discusses potential challenges like data races and deadlocks. Furthermore, it introduces higher-level abstractions like futures, promises, packaged tasks, and coroutines, along with parallel algorithms from the STL and upcoming concurrency features in C++23 like executors and transactional memory. The book also presents established concurrency design patterns and best practices for writing efficient and well-defined multithreaded applications.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Concurrency-Modern-professional-programmer-concurrency/dp/B0CT41Q1FF?&linkCode=ll1&tag=cvthunderx-20&linkId=549033ab7b6e516051d7c3124aa76c03&language=en_US&ref_=as_li_ss_tl

    Más Menos
    42 m
  • Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications
    Apr 30 2025
    This excerpt from "Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications" by Kim Crawley serves as a comprehensive guide to penetration testing within major cloud platforms. It covers essential concepts, security implications, and practical techniques for assessing the security of applications and networks hosted on AWS, Azure, and GCP. The text details cloud-specific challenges, attack methodologies, and the shared responsibility model. It introduces various native and third-party tools for vulnerability scanning and exploitation within these environments, along with best practices for conducting tests and reporting findings, including the importance of purple teaming. Ultimately, the book aims to equip cybersecurity professionals with the knowledge to effectively perform red team engagements in cloud environments.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Cloud-Penetration-Testing-Red-Teamers/dp/1803248483?&linkCode=ll1&tag=cvthunderx-20&linkId=b7efce2ab212083c7859a1861568caab&language=en_US&ref_=as_li_ss_tl
    Más Menos
    22 m
  • C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor
    Apr 30 2025
    The provided Book is primarily from a book titled "C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor" offering comprehensive instruction on developing applications using the latest versions of C# and the .NET platform. It covers fundamental object-oriented programming concepts like interfaces and inheritance, as well as practical aspects such as packaging and deploying .NET applications across different operating systems. The text introduces the C# development environment, including Visual Studio 2022 and Visual Studio Code with the C# Dev Kit extension, and explains the compilation process to Intermediate Language (IL) and its execution by the .NET runtime. Furthermore, it explores the syntax, grammar, and vocabulary of C#, including data types, operators, control flow, functions, and exception handling. Advanced topics like generics, delegates, events, and working with null values are discussed, alongside guidance on inheriting and extending existing .NET types and utilizing features like extension methods. The material also touches upon .NET Standard and different .NET versions, managing projects with the .NET CLI, and basic debugging and logging techniques. Later chapters introduce working with strings, collections, LINQ, file systems, streams, serialization, and environment variables. Finally, the text transitions to web development with ASP.NET Core, including Minimal APIs, Web API services, and Blazor, providing an introduction to building modern web applications and services.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/12-NET-Cross-Platform-Development-Fundamentals-ebook/dp/B0CGZVT568?&linkCode=ll1&tag=cvthunderx-20&linkId=a313f756d43a73bfde5aa0c6a39f22e6&language=en_US&ref_=as_li_ss_tl

    Más Menos
    20 m
  • Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot
    Apr 29 2025
    The provided Book is primarily from the Book "Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot", which guides readers through the concepts and practical implementation of such systems. The initial chapters lay the groundwork by defining real-time analytics, its benefits, and the necessary ecosystem of tools and technologies. Later sections introduce a case study involving a pizza delivery service to illustrate the building of various real-time analytics applications, including internal dashboards, tracking product changes using change data capture, and handling evolving data with upserts. The book also explores production considerations like data partitioning, replication, and deployment platforms, and concludes with real-world use case examples and a look at the future trends in the field.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Building-Real-Time-Analytics-Systems-Insights/dp/1098138791?&linkCode=ll1&tag=cvthunderx-20&linkId=f6e7b36b7ad5bc2f9b38f355165e543c&language=en_US&ref_=as_li_ss_tl

    Más Menos
    17 m
  • Black Hat Bash: Creative Scripting for Hackers and Pentesters
    Apr 29 2025
    The provided Book, primarily from "Black Hat Bash: Creative Scripting for Hackers and Pentesters" serves as a guide for security professionals and penetration testers looking to leverage the Bash scripting language for various tasks. It begins by introducing fundamental Bash concepts, including syntax, environment setup, and basic commands. The text then progresses to more advanced topics such as flow control, functions, and text manipulation within Bash scripts. Furthermore, it details the process of setting up a hacking lab environment using virtual machines and Docker for practicing penetration testing techniques. Finally, the material covers reconnaissance activities like host discovery, port scanning, banner grabbing, and vulnerability scanning, demonstrating how Bash can be used to automate and enhance these security assessments.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Black-Hat-Bash-Scripting-Pentesters/dp/1718503741?&linkCode=ll1&tag=cvthunderx-20&linkId=fb63b994a5e276eea9590f11d11d77be&language=en_US&ref_=as_li_ss_tl
    Más Menos
    12 m
adbl_web_global_use_to_activate_webcro805_stickypopup