Podcast Episodes

Back to Search
Elsevier's Dictionary of Information Security

Elsevier's Dictionary of Information Security



The Elsevier’s Dictionary of Information Security is a comprehensive reference tool that defines common terms used in the field of information security. The dictionary includes definitions in English…


Published on 6 months, 1 week ago

DevOps and Containers Security: Security and Monitoring in Docker Containers

DevOps and Containers Security: Security and Monitoring in Docker Containers



The Book is a book excerpt about DevOps and container security. The book focuses on providing a practical and theoretical understanding of Docker containers and Kubernetes clustering, specifically in…


Published on 6 months, 1 week ago

DevOps Troubleshooting: Linux Server Best Practices

DevOps Troubleshooting: Linux Server Best Practices



The provided Book comes from the book "DevOps Troubleshooting Linux Server Best Practices," which aims to equip developers and QA professionals in DevOps environments with the skills and knowledge to…


Published on 6 months, 1 week ago

Designing Secure Software: A Guide for Developers

Designing Secure Software: A Guide for Developers



The Book provide guidance on designing and building secure software. The text focuses on building a security mindset and applying this mindset to the entire software development process, from design …


Published on 6 months, 1 week ago

Designing BSD Rootkits: An Introduction to Kernel Hacking

Designing BSD Rootkits: An Introduction to Kernel Hacking



"Designing BSD Rootkits" is a tutorial for programmers interested in learning about kernel-mode rootkits. It explains how to write rootkits that maintain root access after gaining access to a compute…


Published on 6 months, 1 week ago

Deployment CISCO SD-WAN LAB ON EVE-NG

Deployment CISCO SD-WAN LAB ON EVE-NG



This Book describes the process of building a Cisco SD-WAN lab using EVE-NG, a network simulation platform. The document details the software requirements, the deployment of different Cisco SD-WAN co…


Published on 6 months, 1 week ago

Demystifying Intelligent Multimode Security Systems

Demystifying Intelligent Multimode Security Systems



This excerpt from Demystifying.Intelligent.Multimode.Security.Systems.pdf focuses on the increasing complexity and security needs of intelligent multimodal security systems (IMSS). The document discu…


Published on 6 months, 1 week ago

Demystified Object-Oriented Programming with C++

Demystified Object-Oriented Programming with C++



This Book, Demystified Object-Oriented Programming with C++, serves as a comprehensive guide to object-oriented programming (OOP) in C++. It covers a wide range of topics, beginning with fundamental …


Published on 6 months, 1 week ago

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance



This Book, DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance, focuses on the multifaceted threat of distributed denial-of-service (DDoS) attacks on computer networks. The author…


Published on 6 months, 1 week ago

Data Science Projects with Python - Second Edition

Data Science Projects with Python - Second Edition



The Book provide a comprehensive guide to data science with Python, focusing on machine learning techniques for building predictive models. The book covers data exploration, cleaning, and visualizati…


Published on 6 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate