Podcast Episodes

Back to Search
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks



This book, Empirical Cloud Security, aims to provide a practical guide for evaluating risks and attacks in cloud environments. The second edition focuses on the latest cloud security research and dev…


Published on 6 months ago

Embedded Linux Development Using Yocto Project

Embedded Linux Development Using Yocto Project



This source is a Book titled "Embedded Linux Development Using Yocto Project", providing a comprehensive guide to building custom Linux systems for embedded devices using the Yocto Project. The book …


Published on 6 months ago

Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming

Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming



This Book is a compilation of excerpts from Marijn Haverbeke's "Eloquent JavaScript: A Modern Introduction to Programming." The book explores the JavaScript programming language, covering fundamental…


Published on 6 months, 1 week ago

Eleventh Hour CISSP: Study Guide

Eleventh Hour CISSP: Study Guide



The source is an excerpt from a Book titled "Eleventh Hour CISSP" which provides a comprehensive overview of information security concepts, principles, and best practices for the CISSP certification …


Published on 6 months, 1 week ago

Reversing: Secrets of Reverse Engineering

Reversing: Secrets of Reverse Engineering



The provided source Book is an excerpt from a Book titled "Reversing: Secrets of Reverse Engineering." The book discusses the process of reverse engineering, a technique used to understand and analyz…


Published on 6 months, 1 week ago

Efficient Linux at the Command Line: Boost Your Command-Line Skills

Efficient Linux at the Command Line: Boost Your Command-Line Skills



The source is an excerpt from the book "Efficient Linux at the Command Line" by Vance Wilson, which covers advanced command-line techniques for navigating the Linux operating system and manipulating …


Published on 6 months, 1 week ago

Effective Cybersecurity: A Guide to Using Best Practices and Standards

Effective Cybersecurity: A Guide to Using Best Practices and Standards



This Book, "Effective Cybersecurity: A Guide," provides a comprehensive overview of cybersecurity best practices and standards. It focuses on managing the cybersecurity function, conducting security …


Published on 6 months, 1 week ago

Effective C: An Introduction to Professional C Programming

Effective C: An Introduction to Professional C Programming



The Book source is an excerpt from "Effective C: An Introduction to Professional C Programming" by Robert C. Seacord. It covers various aspects of C programming, from basic data types and code struct…


Published on 6 months, 1 week ago

Easy Learning Design Patterns Javascript: Build Better Coding and Design Patterns

Easy Learning Design Patterns Javascript: Build Better Coding and Design Patterns



This excerpt from Easy Learning Design Patterns Javascript by Yang Hu is a beginner's guide to understanding and implementing design patterns in Javascript. The text presents a variety of common desi…


Published on 6 months, 1 week ago

Dynamically Enabled Cyber Defense

Dynamically Enabled Cyber Defense



This excerpt from the Book "Dynamically Enabled Cyber Defense" explores the evolving threat of cyberattacks and the need for more dynamic defense strategies. The book advocates for a "dynamically ena…


Published on 6 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate