Podcast Episodes

Back to Search
Deep Reinforcement Learning with Python: Master classic RL, deep RL, distributional RL, inverse RL, and more with OpenAI Gym and TensorFlow

Deep Reinforcement Learning with Python: Master classic RL, deep RL, distributional RL, inverse RL, and more with OpenAI Gym and TensorFlow



Explores various aspects of reinforcement learning (RL) and deep reinforcement learning (DRL), covering both foundational concepts and advanced algorithms. Authored by Sudharsan Ravichandiran, a data…


Published on 3 hours ago

Deep Learning with PyTorch 1.x: Implement deep learning techniques and neural network architecture variants using Python

Deep Learning with PyTorch 1.x: Implement deep learning techniques and neural network architecture variants using Python



Provides a comprehensive guide to implementing deep learning techniques and neural network architectures using Python and the PyTorch framework. Authored by Laura Mitchell Sri. Yogesh K. and Vishnu S…


Published on 3 hours ago

Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics



Offers a comprehensive guide to cybersecurity, focusing on attack and defense strategies for infrastructure security. It explores the current threat landscape, detailing various attack methodologies …


Published on 1 day, 7 hours ago

Cyber-Security Threats, Actors, and Dynamic Mitigation

Cyber-Security Threats, Actors, and Dynamic Mitigation



Explores various facets of cybersecurity, ranging from system and network threats to cryptographic vulnerabilities. It examines cyber-attack methodologies, including reconnaissance, malware, and deni…


Published on 1 day, 7 hours ago

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques



Provides an extensive overview of cybersecurity strategies, detailing both attack and defense methodologies. It covers the lifecycle of cyberattacks, from initial reconnaissance using various tools a…


Published on 2 days, 9 hours ago

Cyber Security: Threats and Responses for Government and Business

Cyber Security: Threats and Responses for Government and Business



Provides an extensive overview of cybersecurity threats and responses, highlighting the dynamic and evolving nature of the cyber domain. It examines how the Internet, while a powerful tool for societ…


Published on 2 days, 9 hours ago

Cyber Security: The CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief Information Security

Cyber Security: The CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief Information Security



Introduces ESORMA, an Enterprise Security Operations Risk Management Architecture. This guide provides a practical, eight-domain framework—Scope, Priority, Evaluate, Enable, Harden, Monitor, Operatio…


Published on 3 days, 7 hours ago

Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices)

Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices)



Explores various facets of cybersecurity. It covers threats to computer networks, cyber-physical systems, and the Internet of Things (IoT), alongside defensive strategies. The text discusses lightwei…


Published on 3 days, 7 hours ago

Cyber Victimology: Decoding Cyber-Crime Victimisation

Cyber Victimology: Decoding Cyber-Crime Victimisation



Examines the evolution of victimology to include cybercrime, discussing various patterns of cyber victimization affecting individuals, companies, and governments. The book explores the roles of victi…


Published on 4 days, 9 hours ago

Cyber Arms

Cyber Arms



Explores the multifaceted evolution and implications of cyber warfare and cybersecurity. It traces the history of malicious code from simple pranks to sophisticated cyber weapons, highlighting signif…


Published on 4 days, 9 hours ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate