Podcast Episodes
Back to Search
Beginner's Guide to Exploitation on ARM Vol 1
This Book is a beginner's guide to exploiting vulnerabilities on ARM systems, which are commonly used in mobile devices. The book guides the reader t…
1 year ago
5G/5G-Advanced: The New Generation Wireless Access Technology
This Book is a technical overview of the 5G NR (New Radio) standard, focusing on the technical aspects of the radio interface, including the physical…
1 year ago
5G for Dummies
This is an excerpt from a Book titled "5G for Dummies" a special edition for Sprint Business. The text provides an overview of 5G technology, its his…
1 year ago
Cisco CCNA Command Guide: Tips and Tricks to Learn Cisco CCNA Command Guide
The Book provide a comprehensive guide to the Cisco Certified Network Associate (CCNA) Routing and Switching certification. It details the history of…
1 year ago
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools
It covers various hacking techniques, including network scanning, post-exploitation, and ethical hacking. The second source is a collection of cybers…
1 year ago
Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform
This excerpt from the Book "Inside Azure Management" provides a comprehensive overview of Azure management and monitoring tools. It highlights the ev…
1 year ago
Inside Cyber Warfare: Mapping the Cyber Underworld
The Book is an excerpt from the book "Inside Cyber Warfare: Mapping the Cyber Underworld" by Jeffrey Carr. The book explores the complex world of cyb…
1 year ago
Cryptography & Network Security
The Book provide an overview of cryptography and network security. defines mathematical symbols and notation used in cryptography and network securit…
1 year ago
Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud
This excerpt from the Book "Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud" is a comprehe…
1 year ago
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
Intelligent Mobile Malware Detection is a book that provides a comprehensive overview of Android malware detection mechanisms. The book begins by int…
1 year ago