Podcast Episodes
Back to Search
Efficient Linux at the Command Line: Boost Your Command-Line Skills
The source is an excerpt from the book "Efficient Linux at the Command Line" by Vance Wilson, which covers advanced command-line techniques for navig…
1 year, 2 months ago
Effective Cybersecurity: A Guide to Using Best Practices and Standards
This Book, "Effective Cybersecurity: A Guide," provides a comprehensive overview of cybersecurity best practices and standards. It focuses on managin…
1 year, 2 months ago
Effective C: An Introduction to Professional C Programming
The Book source is an excerpt from "Effective C: An Introduction to Professional C Programming" by Robert C. Seacord. It covers various aspects of C …
1 year, 2 months ago
Easy Learning Design Patterns Javascript: Build Better Coding and Design Patterns
This excerpt from Easy Learning Design Patterns Javascript by Yang Hu is a beginner's guide to understanding and implementing design patterns in Java…
1 year, 2 months ago
Dynamically Enabled Cyber Defense
This excerpt from the Book "Dynamically Enabled Cyber Defense" explores the evolving threat of cyberattacks and the need for more dynamic defense str…
1 year, 2 months ago
Drones to Go: A Crash Course for Scientists and Makers
This Book is a textbook on drone design, modeling, and control. It aims to teach makers and scientists how to build and program drones, particularly …
1 year, 2 months ago
Docker Cookbook: Solutions and Examples for Building Distributed Applications
The Book "Docker Cookbook" by Sébastien Goasguen. The Book provides practical recipes and solutions for building and managing distributed application…
1 year, 2 months ago
Docker in Practice
The Book titled "Docker.in.Practice," which offers a comprehensive guide to utilizing Docker, a containerization platform. The Book explores fundamen…
1 year, 2 months ago
Cyber Intelligence Report: 2020 Quarter 1: Dive Into the 5th Domain: Threat Intelligence
This Book is a guide for using CSI Linux, a free and open-source Linux distribution designed for digital forensics and incident response investigatio…
1 year, 2 months ago
Distributed Denial of Service Attacks: Real-world Detection and Mitigation
This Book is an academic textbook exploring the nature of Distributed Denial of Service (DDoS) attacks. It examines various types of DDoS attacks, in…
1 year, 2 months ago