Podcast Episodes
Back to Search
Computer Security: Principles and Practice
A comprehensive guide to information security, specifically aligning its content with the CISSP certification requirements. It examines various digit…
6 hours ago
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
Examines the transformative impact of artificial intelligence and autonomous systems on modern global security and military strategy. The authors ana…
1 day, 6 hours ago
Cybersecurity for Scada Systems
A comprehensive guide to protecting industrial control systems and critical infrastructure. The text outlines the historical transition from isolated…
2 days, 6 hours ago
Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark
A comprehensive guide to network forensics and traffic analysis using tools like Wireshark and Pyshark. The text establishes a foundation by comparin…
3 days, 6 hours ago
VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide (VMware Press Certification)
Outlines the essential technical operations for managing a vSphere 7.x environment. The documentation details critical network security policies, suc…
4 days, 6 hours ago
Practical Purple Teaming: The Art of Collaborative Defense
A comprehensive guide for improving organizational security through the collaborative integration of offensive and defensive strategies. The text det…
5 days, 6 hours ago
AWS Certified Cloud Practitioner CLF-C02 Cert Guide (Certification Guide)
A comprehensive educational resource for individuals preparing for the foundational Amazon Web Services exam. The text explores core cloud service mo…
6 days, 6 hours ago
Linux Bible
A comprehensive technical guide for mastering the Linux operating system, ranging from fundamental user skills to advanced enterprise administration.…
1 week ago
Malware Analysis Using Artificial Intelligence and Deep Learning
Focusing on its unpacking process and reflective DLL loading techniques. Using tools like capa, IDA, and Hiew, researchers identified that the malwar…
1 week, 1 day ago
Huntpedia: Your Threat Hunting Knowledge Compendium
Huntpedia serves as a comprehensive manual for cyber threat hunting, combining the expertise of several industry leaders to move beyond passive defen…
1 week, 2 days ago