Podcast Episodes

Back to Search
Digital Security: Cyber Terror and Cyber Security

Digital Security: Cyber Terror and Cyber Security



This Book excerpt, from "Digital Security: Cyber Terror and Cyber Security," focuses on the relationship between the real world and the digital world, primarily how the latter can be used to threaten…


Published on 11 months, 1 week ago

Digital Forensics in the Era of Artificial Intelligence

Digital Forensics in the Era of Artificial Intelligence



This collection of Book excerpts explores the use of artificial intelligence, particularly machine learning and deep learning, in digital forensics. It examines the fundamental principles and advance…


Published on 11 months, 1 week ago

Digital Forensics Explained

Digital Forensics Explained



The Book provide a comprehensive guide to digital forensics, covering topics like incident response, report writing, social media investigations, social engineering, anti-forensics, link and visual a…


Published on 11 months, 1 week ago

Digital Forensics Basics: A Practical Guide Using Windows OS

Digital Forensics Basics: A Practical Guide Using Windows OS



"Digital Forensics Basics: A Practical Guide Using Windows OS" is a textbook by Nihad A. Hassan providing a comprehensive guide to digital forensics with a focus on Windows operating systems. The boo…


Published on 11 months, 1 week ago

Elsevier's Dictionary of Information Security

Elsevier's Dictionary of Information Security



The Elsevier’s Dictionary of Information Security is a comprehensive reference tool that defines common terms used in the field of information security. The dictionary includes definitions in English…


Published on 11 months, 1 week ago

DevOps and Containers Security: Security and Monitoring in Docker Containers

DevOps and Containers Security: Security and Monitoring in Docker Containers



The Book is a book excerpt about DevOps and container security. The book focuses on providing a practical and theoretical understanding of Docker containers and Kubernetes clustering, specifically in…


Published on 11 months, 1 week ago

DevOps Troubleshooting: Linux Server Best Practices

DevOps Troubleshooting: Linux Server Best Practices



The provided Book comes from the book "DevOps Troubleshooting Linux Server Best Practices," which aims to equip developers and QA professionals in DevOps environments with the skills and knowledge to…


Published on 11 months, 1 week ago

Designing Secure Software: A Guide for Developers

Designing Secure Software: A Guide for Developers



The Book provide guidance on designing and building secure software. The text focuses on building a security mindset and applying this mindset to the entire software development process, from design …


Published on 11 months, 1 week ago

Designing BSD Rootkits: An Introduction to Kernel Hacking

Designing BSD Rootkits: An Introduction to Kernel Hacking



"Designing BSD Rootkits" is a tutorial for programmers interested in learning about kernel-mode rootkits. It explains how to write rootkits that maintain root access after gaining access to a compute…


Published on 11 months, 1 week ago

Deployment CISCO SD-WAN LAB ON EVE-NG

Deployment CISCO SD-WAN LAB ON EVE-NG



This Book describes the process of building a Cisco SD-WAN lab using EVE-NG, a network simulation platform. The document details the software requirements, the deployment of different Cisco SD-WAN co…


Published on 11 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate