Podcast Episodes
Back to Search
The Art of Mac Malware, Volume 2: Detecting Malicious Software
A technical guide focused on programmatic Mac malware detection. The content covers examining various data sources like process information, network …
9 months, 4 weeks ago
Radio Frequency Identification Technologies
This Book is a workshop summary report from the Committee on Radio Frequency Identification Technologies under the National Research Council's Comput…
9 months, 4 weeks ago
CompTIA Security+ Guide to Network Security Fundamentals
Focuses on various aspects of information security, primarily serving as a guide for the CompTIA Security+ certification. It covers fundamental conce…
9 months, 4 weeks ago
Radio Frequency Integrated Circuits and Technologies
A snippet from a technical resource related to the design and application of radio frequency integrated circuits. As the title suggests, it likely di…
10 months ago
RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200)
A study guide for the Red Hat Certified System Administrator (RHCSA) exam, focusing on Red Hat Enterprise Linux 9 (RHEL 9). It covers foundational to…
10 months ago
Handbook of Smart Antennas for RFID Systems
Focuses on radio frequency identification (RFID) systems, specifically exploring smart antennas used within these systems. It discusses various aspec…
10 months ago
Professional C++ (Tech Today)
Offers a comprehensive guide to advanced C++ programming concepts and techniques, ranging from template programming, including template parameters an…
10 months ago
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Focuses on understanding and counteracting evasive malware. It begins by introducing code analysis techniques to identify malicious intent. The mater…
10 months ago
Darknet Master: Tor and Deep Web Secrets
Provides an extensive overview of the Darknet and Deep Web, differentiating them from the surface web and explaining how they operate, primarily thro…
10 months ago
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more
A comprehensive guide for network defenders. It focuses on threat detection and network analysis using a suite of open-source tools. Key components c…
10 months ago