Podcast Episodes

Back to Search
Security in Computing

Security in Computing



This excerpt from Charles P. Pfleeger's "Security in Computing" (5th edition) is a textbook chapter on computer security. It examines various threats to computer systems, including malicious attacks …


Published on 3 months, 1 week ago

Security Warrior: Know Your Enemy

Security Warrior: Know Your Enemy



Security Warrior is a technical manual focusing on network security, reverse engineering, and attack techniques. It covers various operating systems (Windows, Linux) and their vulnerabilities, explor…


Published on 3 months, 1 week ago

Security Testing with Kali NetHunter

Security Testing with Kali NetHunter



This Book is an excerpt from a Book about security testing with Kali NetHunter, a mobile penetration testing platform for Android. The excerpt covers installing and setting up a testing lab using vir…


Published on 3 months, 1 week ago

Security Engineering: A Guide to Building Dependable Distributed Systems

Security Engineering: A Guide to Building Dependable Distributed Systems



Ross Anderson's "Security Engineering: A Guide to Building Dependable Distributed Systems" explores various facets of security, from cryptographic vulnerabilities and attacks to access control mechan…


Published on 3 months, 1 week ago

Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments

Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments



Luigi Aversa's Security for Containers and Kubernetes is a comprehensive guide to securing containerized environments. The book covers container stack security, image and registry security, and Kuber…


Published on 3 months, 1 week ago

Security Strategies in Linux Platforms and Applications

Security Strategies in Linux Platforms and Applications



This Book excerpt details Linux security strategies, covering threats, vulnerabilities, and hardening techniques. It explains Linux's architecture, including the kernel and its role in security. The …


Published on 3 months, 1 week ago

Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges



This Book is a technical Book excerpt focusing on network security, specifically detailing secure proxies and their role in modern threat detection and mitigation. It explores various security techno…


Published on 3 months, 1 week ago

Security Automation with Ansible 2

Security Automation with Ansible 2



This Book is a table of contents and excerpts from Security Automation with Ansible 2, a book detailing how to automate security tasks using Ansible. The book covers Ansible fundamentals, integrating…


Published on 3 months, 1 week ago

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures



"Securing VoIP Networks" is a technical Book examining the security challenges of Voice over Internet Protocol (VoIP) systems. The book details various threats and attacks against VoIP, including eav…


Published on 3 months, 2 weeks ago

Secure Programming with Static Analysis

Secure Programming with Static Analysis



Secure Programming with Static Analysis is a Book detailing how to write secure software using static analysis tools. It focuses on common coding errors in C and Java that lead to security vulnerabil…


Published on 3 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate