Podcast Episodes
Back to Search
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
This Book is excerpt from Jon Westfall's 2021 Book, "Set Up and Manage Your Virtual Private Server." The book guides readers through setting up and a…
1 year, 2 months ago
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
This Book is a comprehensive guide to serverless security, focusing on the implementation of secure practices across AWS, Azure, and Google Cloud pla…
1 year, 2 months ago
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
This Book is a detailed guide to modern cryptography, covering both theoretical concepts and practical implementations. The book explores various cry…
1 year, 2 months ago
Security in Computing
This excerpt from Charles P. Pfleeger's "Security in Computing" (5th edition) is a textbook chapter on computer security. It examines various threats…
1 year, 2 months ago
Security Warrior: Know Your Enemy
Security Warrior is a technical manual focusing on network security, reverse engineering, and attack techniques. It covers various operating systems …
1 year, 2 months ago
Security Testing with Kali NetHunter
This Book is an excerpt from a Book about security testing with Kali NetHunter, a mobile penetration testing platform for Android. The excerpt covers…
1 year, 2 months ago
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross Anderson's "Security Engineering: A Guide to Building Dependable Distributed Systems" explores various facets of security, from cryptographic vu…
1 year, 2 months ago
Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments
Luigi Aversa's Security for Containers and Kubernetes is a comprehensive guide to securing containerized environments. The book covers container stac…
1 year, 2 months ago
Security Strategies in Linux Platforms and Applications
This Book excerpt details Linux security strategies, covering threats, vulnerabilities, and hardening techniques. It explains Linux's architecture, i…
1 year, 2 months ago
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
This Book is a technical Book excerpt focusing on network security, specifically detailing secure proxies and their role in modern threat detection a…
1 year, 2 months ago