Podcast Episodes
Back to Search
Cryptography and Network Security: Principles and Practice, Global Ed
Cover fundamental aspects of cryptography and network security, outlining concepts like divisibility, modular arithmetic, and prime numbers as mathem…
10 months ago
Cryptography: Algorithms, Protocols, and Standards for Computer Security
Provide a broad overview of cryptographic concepts and techniques. The sources discuss various types of cryptographic primitives, including hash func…
10 months ago
Writing a C Compiler: Build a Real Programming Language from Scratch
It walk the reader through the stages of compilation, beginning with basic steps like lexical analysis and parsing using techniques like recursive d…
10 months ago
Windows 10 System Programming, Part 2
These excerpts, primarily from the second part of a book on Windows 10 System Programming, explore various facets of system-level programming using t…
10 months ago
Windows 10 System Programming, Part 1
These Book offer an in-depth look at Windows system programming, primarily focusing on processes, threads, memory management, and file I/O. They expl…
10 months ago
Windows APT Warfare: Identify and prevent Windows APT attacks effectively
The Book is a technical guide focused on understanding and countering advanced persistent threats (APTs) targeting Windows systems. It explores conce…
10 months, 1 week ago
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
A practical guide to modern web penetration testing authored by Rafay Baloch and published by CRC Press in 2025. The content covers a wide range of w…
10 months, 1 week ago
JavaScript for Sound Artists
It is a guide for individuals interested in creating interactive audio applications using JavaScript within a web browser. The book introduces founda…
10 months, 1 week ago
Building Your Own JavaScript Framework: Architect extensible and reusable framework systems
It covers various aspects of JavaScript framework development, ranging from historical context and the evolution of the ecosystem to core architectur…
10 months, 1 week ago
Visual Threat Intelligence: An Illustrated Guide For Threat Researchers
Beginning with fundamental concepts like the intelligence lifecycle and various gathering disciplines such as OSINT, HUMINT, GEOINT, SIGINT, and FINI…
10 months, 1 week ago