Podcast Episodes
Back to Search
Introduction to Computer Organization
The Book provide an introductory overview of computer organization, covering the fundamental concepts of hardware and software. The sources explore t…
1 year, 3 months ago
Introduction to Compiler Design
This excerpt from Introduction to Compiler Design by Torben Ægidius Mogensen provides a comprehensive overview of compiler design principles, focusin…
1 year, 3 months ago
Incident Response Techniques for Ransomware Attacks
This excerpt is from a book titled "Incident Response Techniques for Ransomware Attacks", which provides a comprehensive guide to the modern ransomwa…
1 year, 3 months ago
Incident Response with Threat Intelligence
The Book are chapters on incident response with threat intelligence. The text covers a range of topics, including the different types of threat actor…
1 year, 3 months ago
Incident Response & Computer Forensics, Third Edition
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with t…
1 year, 3 months ago
Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration
This is a guide on implementing and managing VxRail HCI solutions. It explains the VxRail system architecture, software components, and licensing. Th…
1 year, 3 months ago
Implementing Effective Code Reviews: How to Build and Maintain Clean Code
This Book "Implementing Effective Code Reviews" by Giuliana Carullo. The book is designed to guide software engineers in writing clean and efficient …
1 year, 3 months ago
Implementing Cryptography Using Python
The Book titled "Implementing Cryptography Using Python" by Shannon W. Bray. It is a guide for information security professionals who want to learn h…
1 year, 3 months ago
Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide
This Book provides an extensive overview of Cisco networking concepts and technologies. It explores topics ranging from basic network fundamentals to…
1 year, 3 months ago
Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,
This Book about reverse engineering, specifically focusing on the x86 architecture. The Book provides a comprehensive guide to understanding the inte…
1 year, 3 months ago