Podcast Episodes

Back to Search
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide

Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide



The provided Book comes from a Nutanix Enterprise Cloud Administration (ECA) course guide. The guide outlines the various components and features of the Nutanix platform, covering topics such as clus…


Published on 11 months, 1 week ago

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time



This excerpt from "Engineering Trustworthy Systems" is a guide for cybersecurity professionals, focusing on how to design and build trustworthy systems that minimize risk to an organization's mission…


Published on 11 months, 1 week ago

Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow

Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow



The source material explores the complex landscape of cybercrime, examining various aspects from criminal profiles and activities in the dark web, to the impact of fake news on national security and …


Published on 11 months, 1 week ago

Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography



The sources present a comprehensive overview of cryptography, both classical and quantum, emphasizing its practical applications in organizations and individuals. The text explores the history and ev…


Published on 11 months, 1 week ago

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks



This book, Empirical Cloud Security, aims to provide a practical guide for evaluating risks and attacks in cloud environments. The second edition focuses on the latest cloud security research and dev…


Published on 11 months, 1 week ago

Embedded Linux Development Using Yocto Project

Embedded Linux Development Using Yocto Project



This source is a Book titled "Embedded Linux Development Using Yocto Project", providing a comprehensive guide to building custom Linux systems for embedded devices using the Yocto Project. The book …


Published on 11 months, 1 week ago

Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming

Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming



This Book is a compilation of excerpts from Marijn Haverbeke's "Eloquent JavaScript: A Modern Introduction to Programming." The book explores the JavaScript programming language, covering fundamental…


Published on 11 months, 1 week ago

Eleventh Hour CISSP: Study Guide

Eleventh Hour CISSP: Study Guide



The source is an excerpt from a Book titled "Eleventh Hour CISSP" which provides a comprehensive overview of information security concepts, principles, and best practices for the CISSP certification …


Published on 11 months, 1 week ago

Reversing: Secrets of Reverse Engineering

Reversing: Secrets of Reverse Engineering



The provided source Book is an excerpt from a Book titled "Reversing: Secrets of Reverse Engineering." The book discusses the process of reverse engineering, a technique used to understand and analyz…


Published on 11 months, 1 week ago

Efficient Linux at the Command Line: Boost Your Command-Line Skills

Efficient Linux at the Command Line: Boost Your Command-Line Skills



The source is an excerpt from the book "Efficient Linux at the Command Line" by Vance Wilson, which covers advanced command-line techniques for navigating the Linux operating system and manipulating …


Published on 11 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate