Podcast Episodes
Back to Search
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
The sources provide an extensive overview of enterprise integration patterns, focusing on the use of messaging systems for connecting applications. I…
1 year, 2 months ago
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide
The provided Book comes from a Nutanix Enterprise Cloud Administration (ECA) course guide. The guide outlines the various components and features of …
1 year, 2 months ago
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
This excerpt from "Engineering Trustworthy Systems" is a guide for cybersecurity professionals, focusing on how to design and build trustworthy syste…
1 year, 2 months ago
Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow
The source material explores the complex landscape of cybercrime, examining various aspects from criminal profiles and activities in the dark web, to…
1 year, 2 months ago
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
The sources present a comprehensive overview of cryptography, both classical and quantum, emphasizing its practical applications in organizations and…
1 year, 2 months ago
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
This book, Empirical Cloud Security, aims to provide a practical guide for evaluating risks and attacks in cloud environments. The second edition foc…
1 year, 2 months ago
Embedded Linux Development Using Yocto Project
This source is a Book titled "Embedded Linux Development Using Yocto Project", providing a comprehensive guide to building custom Linux systems for e…
1 year, 2 months ago
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming
This Book is a compilation of excerpts from Marijn Haverbeke's "Eloquent JavaScript: A Modern Introduction to Programming." The book explores the Jav…
1 year, 2 months ago
Eleventh Hour CISSP: Study Guide
The source is an excerpt from a Book titled "Eleventh Hour CISSP" which provides a comprehensive overview of information security concepts, principle…
1 year, 2 months ago
Reversing: Secrets of Reverse Engineering
The provided source Book is an excerpt from a Book titled "Reversing: Secrets of Reverse Engineering." The book discusses the process of reverse engi…
1 year, 2 months ago