Podcast Episodes
Back to Search
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
A comprehensive guide for individuals interested in information security. It begins by defining the core principles of cybersecurity—confidentiality,…
1 month ago
Bash Cookbook 1st Edition
A comprehensive manual for users of the GNU Bourne Again Shell. It provides practical solutions for system administrators, programmers, and enthusias…
1 month ago
bash Cookbook: Solutions and Examples for bash Users 2nd Edition
A comprehensive technical guide designed to help users solve practical problems through shell scripting. Serving as a "how-to" resource, the text pro…
1 month ago
Beginning Ethical Hacking with Python
An introductory guide to ethical hacking using the Python 3 programming language, specifically for those with no prior experience. It outlines the le…
1 month ago
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
A comprehensive technical guide designed to help security professionals understand and mirror the tactics used by malicious actors. The authors, who …
1 month ago
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking: The Ethical Hacker’s Handbook, Third Edition serves as a comprehensive technical guide for security professionals and researchers. …
1 month ago
Autonomic Computing and Networking
Introduces a general-purpose autonomic computing framework designed to create self-managing IT systems that function without human intervention. The …
1 month ago
Android Cookbook: Problems and Solutions for Android Developers
A comprehensive technical guide designed to assist developers in building and refining mobile applications. This second edition specifically addresse…
1 month, 1 week ago
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
A technical guide focused on identifying digital threats within Windows, Linux, and Mac operating systems. The authors, who are pioneers in the field…
1 month, 1 week ago
31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam
A comprehensive study resource for the CCNA Security certification, offering a structured 31-day review of critical network defense concepts. It cove…
1 month, 1 week ago