Podcast Episodes

Back to Search
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders

Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders



Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leade…


Published on 1 month, 4 weeks ago

Secure Access Service Edge (SASE) For Dummies

Secure Access Service Edge (SASE) For Dummies



Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for …


Published on 2 months ago

Machine Learning for High-Risk Applications: Approaches to Responsible AI

Machine Learning for High-Risk Applications: Approaches to Responsible AI



A field guide for designing, building, and assessing machine learning and AI systems. The book addresses the risks of AI failures, such as algorithmic discrimination and data privacy violations, whic…


Published on 2 months ago

Reinventing ITIL in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant

Reinventing ITIL in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant



Explores the integration of ITIL (Information Technology Infrastructure Library) principles with DevOps methodologies, offering innovative techniques for their combined application. It provides an in…


Published on 2 months ago

Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect

Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect



An introductory guide to cybersecurity and ethical hacking using Python. It covers fundamental concepts such as network basics, the CIA triad (Confidentiality, Integrity, and Availability), and diffe…


Published on 2 months ago

Opportunistic Networks: Fundamentals, Applications and Emerging Trends

Opportunistic Networks: Fundamentals, Applications and Emerging Trends



Explores various facets of opportunistic networks (OppNets), which are dynamic, infrastructure-less wireless networks leveraging mobile device interactions for data transfer, often via a "store-carry…


Published on 2 months ago

Open Source Security: Your Network More Secure With Open Source Tools

Open Source Security: Your Network More Secure With Open Source Tools



A comprehensive guide to enhancing network security using open-source tools. It begins by emphasizing the importance of strong password management and multi-factor authentication, before moving into …


Published on 2 months ago

Networks

Networks



Explores the multifaceted field of network science, detailing various network types such as social, biological, and technological systems like the Internet and telephone networks. It examines fundame…


Published on 2 months ago

Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools



Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security co…


Published on 2 months, 1 week ago

Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau

Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau



An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, inc…


Published on 2 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate