This excerpt from Charles P. Pfleeger's "Security in Computing" (5th edition) is a textbook chapter on computer security. It examines various threats to computer systems, including malicious attacks …
Published on 3 months, 1 week ago
Security Warrior is a technical manual focusing on network security, reverse engineering, and attack techniques. It covers various operating systems (Windows, Linux) and their vulnerabilities, explor…
Published on 3 months, 1 week ago
This Book is an excerpt from a Book about security testing with Kali NetHunter, a mobile penetration testing platform for Android. The excerpt covers installing and setting up a testing lab using vir…
Published on 3 months, 1 week ago
Ross Anderson's "Security Engineering: A Guide to Building Dependable Distributed Systems" explores various facets of security, from cryptographic vulnerabilities and attacks to access control mechan…
Published on 3 months, 1 week ago
Luigi Aversa's Security for Containers and Kubernetes is a comprehensive guide to securing containerized environments. The book covers container stack security, image and registry security, and Kuber…
Published on 3 months, 1 week ago
This Book excerpt details Linux security strategies, covering threats, vulnerabilities, and hardening techniques. It explains Linux's architecture, including the kernel and its role in security. The …
Published on 3 months, 1 week ago
This Book is a technical Book excerpt focusing on network security, specifically detailing secure proxies and their role in modern threat detection and mitigation. It explores various security techno…
Published on 3 months, 1 week ago
This Book is a table of contents and excerpts from Security Automation with Ansible 2, a book detailing how to automate security tasks using Ansible. The book covers Ansible fundamentals, integrating…
Published on 3 months, 1 week ago
"Securing VoIP Networks" is a technical Book examining the security challenges of Voice over Internet Protocol (VoIP) systems. The book details various threats and attacks against VoIP, including eav…
Published on 3 months, 2 weeks ago
Secure Programming with Static Analysis is a Book detailing how to write secure software using static analysis tools. It focuses on common coding errors in C and Java that lead to security vulnerabil…
Published on 3 months, 2 weeks ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate