Podcast Episodes

Back to Search
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

The sources provide an extensive overview of enterprise integration patterns, focusing on the use of messaging systems for connecting applications. I…

1 year, 2 months ago

Short Long
View Episode
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide

The provided Book comes from a Nutanix Enterprise Cloud Administration (ECA) course guide. The guide outlines the various components and features of …

1 year, 2 months ago

Short Long
View Episode
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

This excerpt from "Engineering Trustworthy Systems" is a guide for cybersecurity professionals, focusing on how to design and build trustworthy syste…

1 year, 2 months ago

Short Long
View Episode
Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow
Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow

The source material explores the complex landscape of cybercrime, examining various aspects from criminal profiles and activities in the dark web, to…

1 year, 2 months ago

Short Long
View Episode
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

The sources present a comprehensive overview of cryptography, both classical and quantum, emphasizing its practical applications in organizations and…

1 year, 2 months ago

Short Long
View Episode
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

This book, Empirical Cloud Security, aims to provide a practical guide for evaluating risks and attacks in cloud environments. The second edition foc…

1 year, 2 months ago

Short Long
View Episode
Embedded Linux Development Using Yocto Project
Embedded Linux Development Using Yocto Project

This source is a Book titled "Embedded Linux Development Using Yocto Project", providing a comprehensive guide to building custom Linux systems for e…

1 year, 2 months ago

Short Long
View Episode
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming

This Book is a compilation of excerpts from Marijn Haverbeke's "Eloquent JavaScript: A Modern Introduction to Programming." The book explores the Jav…

1 year, 2 months ago

Short Long
View Episode
Eleventh Hour CISSP: Study Guide
Eleventh Hour CISSP: Study Guide

The source is an excerpt from a Book titled "Eleventh Hour CISSP" which provides a comprehensive overview of information security concepts, principle…

1 year, 2 months ago

Short Long
View Episode
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering

The provided source Book is an excerpt from a Book titled "Reversing: Secrets of Reverse Engineering." The book discusses the process of reverse engi…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us