This Book excerpt, from "Digital Security: Cyber Terror and Cyber Security," focuses on the relationship between the real world and the digital world, primarily how the latter can be used to threaten…
Published on 11 months, 1 week ago
This collection of Book excerpts explores the use of artificial intelligence, particularly machine learning and deep learning, in digital forensics. It examines the fundamental principles and advance…
Published on 11 months, 1 week ago
The Book provide a comprehensive guide to digital forensics, covering topics like incident response, report writing, social media investigations, social engineering, anti-forensics, link and visual a…
Published on 11 months, 1 week ago
"Digital Forensics Basics: A Practical Guide Using Windows OS" is a textbook by Nihad A. Hassan providing a comprehensive guide to digital forensics with a focus on Windows operating systems. The boo…
Published on 11 months, 1 week ago
The Elsevier’s Dictionary of Information Security is a comprehensive reference tool that defines common terms used in the field of information security. The dictionary includes definitions in English…
Published on 11 months, 1 week ago
The Book is a book excerpt about DevOps and container security. The book focuses on providing a practical and theoretical understanding of Docker containers and Kubernetes clustering, specifically in…
Published on 11 months, 1 week ago
The provided Book comes from the book "DevOps Troubleshooting Linux Server Best Practices," which aims to equip developers and QA professionals in DevOps environments with the skills and knowledge to…
Published on 11 months, 1 week ago
The Book provide guidance on designing and building secure software. The text focuses on building a security mindset and applying this mindset to the entire software development process, from design …
Published on 11 months, 1 week ago
"Designing BSD Rootkits" is a tutorial for programmers interested in learning about kernel-mode rootkits. It explains how to write rootkits that maintain root access after gaining access to a compute…
Published on 11 months, 1 week ago
This Book describes the process of building a Cisco SD-WAN lab using EVE-NG, a network simulation platform. The document details the software requirements, the deployment of different Cisco SD-WAN co…
Published on 11 months, 1 week ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate