Podcast Episodes
Back to Search
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS
A comprehensive technical exploration of the Transport Layer Security protocol and the foundational cryptographic primitives that sustain it. The tex…
14 hours ago
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
A guide that bridges the gap between theoretical encryption and practical security implementation. The source details the evolution of cryptographic …
1 day, 14 hours ago
The Book of Batch Scripting: From Fundamentals to Advanced Automation
A comprehensive guide to mastering the Windows command-line language, moving from basic file creation to sophisticated automation techniques. The boo…
2 days, 14 hours ago
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide (Certification Guide)
This comprehensive study guide prepares networking professionals for the CCNP and CCIE Security Core SCOR 350-701 certification exam. It covers funda…
3 days, 14 hours ago
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW)
A comprehensive technical guide for configuring and managing Cisco Firepower Threat Defense (FTD) and the Firepower Management Center (FMC). It outli…
4 days, 14 hours ago
Computer Security: Principles and Practice
A comprehensive guide to information security, specifically aligning its content with the CISSP certification requirements. It examines various digit…
5 days, 14 hours ago
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
Examines the transformative impact of artificial intelligence and autonomous systems on modern global security and military strategy. The authors ana…
6 days, 14 hours ago
Cybersecurity for Scada Systems
A comprehensive guide to protecting industrial control systems and critical infrastructure. The text outlines the historical transition from isolated…
1 week ago
Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark
A comprehensive guide to network forensics and traffic analysis using tools like Wireshark and Pyshark. The text establishes a foundation by comparin…
1 week, 1 day ago
VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide (VMware Press Certification)
Outlines the essential technical operations for managing a vSphere 7.x environment. The documentation details critical network security policies, suc…
1 week, 2 days ago