Podcast Episodes

Back to Search
Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform

Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform



This excerpt from the Book "Inside Azure Management" provides a comprehensive overview of Azure management and monitoring tools. It highlights the evolution of Azure management services, particularly…


Published on 1 month, 2 weeks ago

Inside Cyber Warfare: Mapping the Cyber Underworld

Inside Cyber Warfare: Mapping the Cyber Underworld



The Book is an excerpt from the book "Inside Cyber Warfare: Mapping the Cyber Underworld" by Jeffrey Carr. The book explores the complex world of cyber warfare, examining the motivations and tactics …


Published on 1 month, 2 weeks ago

Cryptography & Network Security

Cryptography & Network Security



The Book provide an overview of cryptography and network security. defines mathematical symbols and notation used in cryptography and network security. The second source, the contents section from th…


Published on 1 month, 2 weeks ago

Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud

Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud



This excerpt from the Book "Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud" is a comprehensive guide to using Python for computer science a…


Published on 1 month, 2 weeks ago

Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)

Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)



Intelligent Mobile Malware Detection is a book that provides a comprehensive overview of Android malware detection mechanisms. The book begins by introducing the Android operating system and outlinin…


Published on 1 month, 2 weeks ago

Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security

Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security



This Book presents threat hunting playbooks aligned with MITRE ATT&CK tactics. Each playbook focuses on a specific attack phase (e.g., reconnaissance, execution, exfiltration), outlining data sources…


Published on 1 month, 2 weeks ago

You Don't Know JS: Scope & Closures

You Don't Know JS: Scope & Closures



This Book is an excerpt from Kyle Simpson's book, "You Don't Know JS: Scope & Closures" which comprehensively explains JavaScript scope and closures. The excerpt includes a foreword and preface discu…


Published on 1 month, 3 weeks ago

You Don't Know JS: ES6 & Beyond

You Don't Know JS: ES6 & Beyond



Kyle Simpson's "You Don't Know JS: ES6 & Beyond" is a programming textbook covering JavaScript's ES6 (ECMAScript 2015) update and future features. The book thoroughly explains new syntax, including b…


Published on 1 month, 3 weeks ago

You Don't Know JS: Async & Performance

You Don't Know JS: Async & Performance



This Book is from Kyle Simpson's "You Don't Know JS: Async & Performance," exploring JavaScript's asynchronous nature. It contrasts the limitations of callbacks, highlighting their impact on code rea…


Published on 1 month, 3 weeks ago

Writing Security Tools and Exploits

Writing Security Tools and Exploits



This Book excerpt on writing security exploits and tools. It covers various software vulnerabilities, such as buffer overflows (stack and heap), format string vulnerabilities, and integer bugs. The t…


Published on 1 month, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate