Podcast Episodes

Back to Search
SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition

SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition



The provided Book comes from a book titled "CSSLP Certification All-in-One Exam Guide, Third Edition," which is a comprehensive guide for individuals preparing for the Certified Secure Software Lifec…


Published on 1 year, 1 month ago

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data



The sources are from a book titled "Hands-On Cryptography with Python" by Samuel Bowne. This book aims to teach readers about cryptography and how to use Python to encrypt and decrypt data. It covers…


Published on 1 year, 1 month ago

Cryptography and Network Security

Cryptography and Network Security



This Book excerpt comes from the book "Cryptography and Network Security" by Marcelo S. Alencar. The book, intended for both graduate and undergraduate students, is a comprehensive resource covering …


Published on 1 year, 1 month ago

The Security Risk Assessment Handbook

The Security Risk Assessment Handbook



The provided Book is an excerpt from a comprehensive guide to information security risk assessment, outlining a methodical approach to identifying, analyzing, and mitigating risks to an organization'…


Published on 1 year, 1 month ago

The Art of Linux Kernel Design

The Art of Linux Kernel Design



This Book provides a deep dive into the design and implementation of the Linux 0.11 operating system. It examines key concepts like memory management, process creation, and inter-process communicatio…


Published on 1 year, 1 month ago

Secure Data Science

Secure Data Science



This Book is an excerpt from the book "Secure Data Science: Integrating Cyber Security and Data Science," which focuses on the intersection of cybersecurity and data science. It explores various aspe…


Published on 1 year, 1 month ago

Container Security: Fundamental Technology Concepts that Protect Containerized Applications

Container Security: Fundamental Technology Concepts that Protect Containerized Applications



This excerpt from Container Security by Liz Rice provides a detailed overview of container security best practices and technologies. It covers everything from the fundamental threats containers face …


Published on 1 year, 1 month ago

Computer Science Distilled: Learn the Art of Solving Computational Problems

Computer Science Distilled: Learn the Art of Solving Computational Problems



This excerpt is from a book called "Computer Science Distilled" by Wladston Ferreira Filho. It provides a concise overview of core computer science concepts, explaining topics such as computational t…


Published on 1 year, 1 month ago

Computer Networking and Cybersecurity

Computer Networking and Cybersecurity



The Book is guide for understanding computer networking and cybersecurity. The first source focuses on the technical aspects of computer networking, covering topics like network protocols, hardware c…


Published on 1 year, 1 month ago

Computer Security -- ESORICS 2013

Computer Security -- ESORICS 2013



The Book explore various aspects of computer security, including secure communication, data privacy, malware detection, and access control. The papers discuss topics like developing protocols for sec…


Published on 1 year, 1 month ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate