Podcast Episodes
Back to Search
Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats
The source Book provides a comprehensive guide to digital forensics and incident response. It covers foundational elements of incident response and d…
1 year, 2 months ago
Digital Security: Cyber Terror and Cyber Security
This Book excerpt, from "Digital Security: Cyber Terror and Cyber Security," focuses on the relationship between the real world and the digital world…
1 year, 2 months ago
Digital Forensics in the Era of Artificial Intelligence
This collection of Book excerpts explores the use of artificial intelligence, particularly machine learning and deep learning, in digital forensics. …
1 year, 2 months ago
Digital Forensics Explained
The Book provide a comprehensive guide to digital forensics, covering topics like incident response, report writing, social media investigations, soc…
1 year, 2 months ago
Digital Forensics Basics: A Practical Guide Using Windows OS
"Digital Forensics Basics: A Practical Guide Using Windows OS" is a textbook by Nihad A. Hassan providing a comprehensive guide to digital forensics …
1 year, 2 months ago
Elsevier's Dictionary of Information Security
The Elsevier’s Dictionary of Information Security is a comprehensive reference tool that defines common terms used in the field of information securi…
1 year, 2 months ago
DevOps and Containers Security: Security and Monitoring in Docker Containers
The Book is a book excerpt about DevOps and container security. The book focuses on providing a practical and theoretical understanding of Docker con…
1 year, 2 months ago
DevOps Troubleshooting: Linux Server Best Practices
The provided Book comes from the book "DevOps Troubleshooting Linux Server Best Practices," which aims to equip developers and QA professionals in De…
1 year, 2 months ago
Designing Secure Software: A Guide for Developers
The Book provide guidance on designing and building secure software. The text focuses on building a security mindset and applying this mindset to the…
1 year, 2 months ago
Designing BSD Rootkits: An Introduction to Kernel Hacking
"Designing BSD Rootkits" is a tutorial for programmers interested in learning about kernel-mode rootkits. It explains how to write rootkits that main…
1 year, 2 months ago