Podcast Episodes
Back to Search
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks
This Book provides a comprehensive guide to SQL injection, covering both offensive and defensive strategies. Part one introduces SQL, database system…
1 year ago
Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes
This Book is on simplifying React application testing. It covers using the React Testing Library for unit and integration tests, emphasizing user-cen…
1 year ago
Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide
This Book is a lab guide for a self-paced Silver Peak Advanced SDWAN course. It provides step-by-step instructions for configuring various networking…
1 year ago
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
This Book is excerpt from Jon Westfall's 2021 Book, "Set Up and Manage Your Virtual Private Server." The book guides readers through setting up and a…
1 year ago
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
This Book is a comprehensive guide to serverless security, focusing on the implementation of secure practices across AWS, Azure, and Google Cloud pla…
1 year ago
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
This Book is a detailed guide to modern cryptography, covering both theoretical concepts and practical implementations. The book explores various cry…
1 year ago
Security in Computing
This excerpt from Charles P. Pfleeger's "Security in Computing" (5th edition) is a textbook chapter on computer security. It examines various threats…
1 year, 1 month ago
Security Warrior: Know Your Enemy
Security Warrior is a technical manual focusing on network security, reverse engineering, and attack techniques. It covers various operating systems …
1 year, 1 month ago
Security Testing with Kali NetHunter
This Book is an excerpt from a Book about security testing with Kali NetHunter, a mobile penetration testing platform for Android. The excerpt covers…
1 year, 1 month ago
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross Anderson's "Security Engineering: A Guide to Building Dependable Distributed Systems" explores various facets of security, from cryptographic vu…
1 year, 1 month ago