Podcast Episodes
Back to Search
Official (ISC)2 Guide to the CISSP-ISSMP CBK
The Book is a comprehensive guide for the Information Systems Security Management Professional (ISSMP) certification, covering the core principles an…
1 year, 2 months ago
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them
This Book, "Offensive Shellcode from Scratch," provides an in-depth guide to understanding and creating shellcode, a type of malicious code used to e…
1 year, 2 months ago
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
The Book provides a comprehensive guide to analyzing leaked datasets, focusing on ethical considerations, technical skills, and practical tools for i…
1 year, 2 months ago
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
This excerpt from the book "Pentesting Azure" by Matt Burrough offers a comprehensive guide for penetration testers and security professionals who se…
1 year, 2 months ago
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
The provided Book is an excerpt from a guide to using Nmap, a free and open-source network scanner. The guide covers a wide range of topics including…
1 year, 2 months ago
NGINX Cookbook
The Book is a guide to the NGINX web server, specifically focused on NGINX Plus, a commercial edition. It covers a wide range of topics, from basic i…
1 year, 2 months ago
Networking All-in-One For Dummies
The Book provide an in-depth overview of networking concepts, covering both hardware and software aspects. From the fundamentals of network protocols…
1 year, 2 months ago
Exam 98-366 Networking Fundamentals, 2nd Edition
The Book, "Exam 98-366 Networking Fundamentals, 2nd Edition," is a textbook designed to prepare students for the Microsoft Technology Associate (MTA)…
1 year, 2 months ago
Windows Server Administration Fundamentals
This source is a book about networking fundamentals that teaches readers how to connect computers and devices to form networks. It starts with basic …
1 year, 2 months ago
Network Security: Private Communication in a Public World
This Book "Network Security: Private Communications in a Public World" (Third Edition) by Charlie Kaufman, Radia Perlman, Mike Speciner, and Ray Perl…
1 year, 2 months ago