Podcast Episodes
Back to Search
Security Automation with Ansible 2
This Book is a table of contents and excerpts from Security Automation with Ansible 2, a book detailing how to automate security tasks using Ansible.…
1 year, 2 months ago
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
"Securing VoIP Networks" is a technical Book examining the security challenges of Voice over Internet Protocol (VoIP) systems. The book details vario…
1 year, 2 months ago
Secure Programming with Static Analysis
Secure Programming with Static Analysis is a Book detailing how to write secure software using static analysis tools. It focuses on common coding err…
1 year, 2 months ago
Secure PHP Development: Building 50 Practical Applications
This Book excerpt details the creation of numerous PHP applications, focusing on secure coding practices and a reusable application framework. The au…
1 year, 2 months ago
Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML
This Book is an excerpt from Dennis Sawyers' Book, "Automated Machine Learning with Microsoft Azure," which provides a comprehensive guide to using a…
1 year, 2 months ago
Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language
This Book is a table of contents and excerpts from a Book teaching Rust web programming. It covers fundamental Rust concepts like memory management a…
1 year, 2 months ago
Modern Vulnerability Management: Predictive Cybersecurity
Modern Vulnerability Management: Predictive Cybersecurity is a Book by Roytman and Bellis that offers a data-driven approach to vulnerability managem…
1 year, 2 months ago
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
This Book explores the inner workings of various malware, including the TDL3 and TDL4 rootkits and the Festi, Rovnix, Gapz, and Olmasco bootkits. The…
1 year, 2 months ago
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
Rootkits, as explained in "Rootkits - Subverting the Windows Kernel," are powerful hacking tools that enable attackers to maintain virtually undetect…
1 year, 2 months ago
RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)
This Book excerpt is a training guide and exam preparation manual for the Red Hat Certified System Administrator (RHCSA) exam on Red Hat Enterprise L…
1 year, 2 months ago