Podcast Episodes
Back to Search
Permanent Record
In the memoir Permanent Record, Edward Snowden chronicles his journey from a technology-obsessed youth to a disillusioned intelligence officer. The n…
1 day, 1 hour ago
Operating Systems: Internals and Design Principles
A comprehensive textbook on operating system internals, covering the fundamental principles of computer architecture and software management. It expl…
2 days, 1 hour ago
Okta Administration: Up and Running: Implement enterprise-grade identity and access management for on-premises and cloud apps
A comprehensive technical guide for managing Okta, a leading Identity and Access Management (IAM) platform designed for modern cloud and hybrid envir…
3 days, 1 hour ago
Microsoft Azure Administrator Exam Prep (AZ-104): Make Your Career with Microsoft Azure Platform Using Azure Administered Exam Prep
A comprehensive technical guide for Microsoft Azure administration, specifically tailored for the AZ-104 exam. It provides step-by-step instructions …
4 days, 1 hour ago
Buffer Overflow Attacks: Detect, Exploit, Prevent
Provides an in-depth analysis of buffer overflow attacks, covering their identification, exploitation, and prevention. The text features contribution…
5 days, 1 hour ago
Cisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners
A comprehensive resource for Cisco Certified Networking Associate (CCNA) exam preparation, focusing on Cisco Routing & Switching. It systematically b…
6 days, 1 hour ago
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
Focusing on deploying and utilizing Wazuh for enhanced cybersecurity. Authored by Rajneesh Gupta, a seasoned expert, and endorsed by Santiago Bassett…
1 week ago
Terraform Cookbook: Recipes for Codifying Infrastructure
A thorough overview of Terraform. It covers foundational concepts like installation, configuration, and basic syntax, progressing to advanced techniq…
1 week, 1 day ago
Ruby Data Structures and Algorithms
A comprehensive textbook or guide focusing on the implementation and analysis of fundamental data structures and algorithms using the Ruby programmin…
1 week, 2 days ago
Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing
Explores the application of Reinforcement Learning (RL) to cyber operations, particularly penetration testing. It begins by outlining the foundations…
1 week, 3 days ago