Podcast Episodes

Back to Search
Secure Data Science

Secure Data Science



This Book is an excerpt from the book "Secure Data Science: Integrating Cyber Security and Data Science," which focuses on the intersection of cybersecurity and data science. It explores various aspe…


Published on 11 months, 2 weeks ago

Container Security: Fundamental Technology Concepts that Protect Containerized Applications

Container Security: Fundamental Technology Concepts that Protect Containerized Applications



This excerpt from Container Security by Liz Rice provides a detailed overview of container security best practices and technologies. It covers everything from the fundamental threats containers face …


Published on 11 months, 2 weeks ago

Computer Science Distilled: Learn the Art of Solving Computational Problems

Computer Science Distilled: Learn the Art of Solving Computational Problems



This excerpt is from a book called "Computer Science Distilled" by Wladston Ferreira Filho. It provides a concise overview of core computer science concepts, explaining topics such as computational t…


Published on 11 months, 2 weeks ago

Computer Networking and Cybersecurity

Computer Networking and Cybersecurity



The Book is guide for understanding computer networking and cybersecurity. The first source focuses on the technical aspects of computer networking, covering topics like network protocols, hardware c…


Published on 11 months, 2 weeks ago

Computer Security -- ESORICS 2013

Computer Security -- ESORICS 2013



The Book explore various aspects of computer security, including secure communication, data privacy, malware detection, and access control. The papers discuss topics like developing protocols for sec…


Published on 11 months, 2 weeks ago

Computer Graphics from Scratch: A Programmer's Introduction to 3D Rendering

Computer Graphics from Scratch: A Programmer's Introduction to 3D Rendering



A Book that explains the algorithms used in modern computer graphics. It covers topics from basic ray tracing and rasterization to more complex techniques like lighting, reflections, and texture mapp…


Published on 11 months, 2 weeks ago

Computer Forensics With Ftk

Computer Forensics With Ftk



The source Book provides a comprehensive guide to using the Forensic Toolkit (FTK) for computer forensics investigations. The text covers everything from the basics of installing and configuring FTK …


Published on 11 months, 2 weeks ago

Computer Forensics and Cyber Crime

Computer Forensics and Cyber Crime



This excerpt from the book Computer Forensics and Cyber Crime: An Introduction examines the evolution of computer crime. The text explores the history of cybercrime, from early hackers and phone phre…


Published on 11 months, 2 weeks ago

Computer and Network Security Essentials

Computer and Network Security Essentials



The source Book is a compilation of chapters from a book on computer and network security. The chapters cover a wide range of topics related to cybersecurity, from foundational concepts like malware …


Published on 11 months, 2 weeks ago

CompTIA Security+: SY0-601 Certification Guide - Second Edition: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+

CompTIA Security+: SY0-601 Certification Guide - Second Edition: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+



The Book material is a CompTIA Security+ study guide that explains the concepts and tools used in the field of cybersecurity. It covers essential topics such as security fundamentals, cryptography, i…


Published on 11 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate