Podcast Episodes

Back to Search
Cryptography and Network Security: Principles and Practice

Cryptography and Network Security: Principles and Practice



This Book is excerpt from William Stallings' book, Cryptography and Network Security: Principles and Practice, seventh edition. The excerpt covers a broad range of cryptographic concepts and techniqu…


Published on 8 months ago

SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks

SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks



This Book provides a comprehensive guide to SQL injection, covering both offensive and defensive strategies. Part one introduces SQL, database systems, and the theoretical underpinnings of SQL inject…


Published on 8 months ago

Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes

Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes



This Book is on simplifying React application testing. It covers using the React Testing Library for unit and integration tests, emphasizing user-centric testing over implementation details. The book…


Published on 8 months ago

Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide

Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide



This Book is a lab guide for a self-paced Silver Peak Advanced SDWAN course. It provides step-by-step instructions for configuring various networking elements within the Silver Peak Orchestrator, suc…


Published on 8 months, 1 week ago

Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals

Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals



This Book is excerpt from Jon Westfall's 2021 Book, "Set Up and Manage Your Virtual Private Server." The book guides readers through setting up and administering a virtual private server (VPS), cover…


Published on 8 months, 1 week ago

Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud

Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud



This Book is a comprehensive guide to serverless security, focusing on the implementation of secure practices across AWS, Azure, and Google Cloud platforms. It covers various aspects, including secur…


Published on 8 months, 1 week ago

Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption



This Book is a detailed guide to modern cryptography, covering both theoretical concepts and practical implementations. The book explores various cryptographic primitives, including stream ciphers, h…


Published on 8 months, 1 week ago

Security in Computing

Security in Computing



This excerpt from Charles P. Pfleeger's "Security in Computing" (5th edition) is a textbook chapter on computer security. It examines various threats to computer systems, including malicious attacks …


Published on 8 months, 1 week ago

Security Warrior: Know Your Enemy

Security Warrior: Know Your Enemy



Security Warrior is a technical manual focusing on network security, reverse engineering, and attack techniques. It covers various operating systems (Windows, Linux) and their vulnerabilities, explor…


Published on 8 months, 1 week ago

Security Testing with Kali NetHunter

Security Testing with Kali NetHunter



This Book is an excerpt from a Book about security testing with Kali NetHunter, a mobile penetration testing platform for Android. The excerpt covers installing and setting up a testing lab using vir…


Published on 8 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate