Podcast Episodes
Back to Search
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW)
A comprehensive technical guide for configuring and managing Cisco Firepower Threat Defense (FTD) and the Firepower Management Center (FMC). It outli…
1 month, 2 weeks ago
Computer Security: Principles and Practice
A comprehensive guide to information security, specifically aligning its content with the CISSP certification requirements. It examines various digit…
1 month, 2 weeks ago
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
Examines the transformative impact of artificial intelligence and autonomous systems on modern global security and military strategy. The authors ana…
1 month, 3 weeks ago
Cybersecurity for Scada Systems
A comprehensive guide to protecting industrial control systems and critical infrastructure. The text outlines the historical transition from isolated…
1 month, 3 weeks ago
Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark
A comprehensive guide to network forensics and traffic analysis using tools like Wireshark and Pyshark. The text establishes a foundation by comparin…
1 month, 3 weeks ago
VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide (VMware Press Certification)
Outlines the essential technical operations for managing a vSphere 7.x environment. The documentation details critical network security policies, suc…
1 month, 3 weeks ago
Practical Purple Teaming: The Art of Collaborative Defense
A comprehensive guide for improving organizational security through the collaborative integration of offensive and defensive strategies. The text det…
1 month, 3 weeks ago
AWS Certified Cloud Practitioner CLF-C02 Cert Guide (Certification Guide)
A comprehensive educational resource for individuals preparing for the foundational Amazon Web Services exam. The text explores core cloud service mo…
1 month, 3 weeks ago
Linux Bible
A comprehensive technical guide for mastering the Linux operating system, ranging from fundamental user skills to advanced enterprise administration.…
1 month, 3 weeks ago
Malware Analysis Using Artificial Intelligence and Deep Learning
Focusing on its unpacking process and reflective DLL loading techniques. Using tools like capa, IDA, and Hiew, researchers identified that the malwar…
1 month, 4 weeks ago