Podcast Episodes
Back to Search
IBM b-type Gen 7 Installation, Migration, and Best Practices Guide
This Book provides an extensive guide on installing, migrating, and implementing best practices for the IBM b-type Gen 7 SAN director. It covers vari…
1 year, 4 months ago
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud
The Book is an excerpt from the book "Hybrid Cloud Security Patterns," authored by Sreekanth Iyer and reviewed by Tony Carrato. It details various se…
1 year, 4 months ago
How Linux Works, 3rd Edition: What Every Superuser Should Know
The Book provide an in-depth guide to understanding the workings of Linux, ranging from fundamental system concepts to practical configurations and s…
1 year, 4 months ago
How to Measure Anything in Cybersecurity Risk
This is an excerpt from How to Measure Anything in Cybersecurity Risk by Douglas Hubbard and Richard Seiersen, which argues for a more quantitative a…
1 year, 4 months ago
How to Hack Like a Legend: Breaking Windows
This excerpt from the Book "How to Hack Like a Legend" by Sparc Flow is a guide to ethical hacking techniques. The book provides a detailed step-by-s…
1 year, 5 months ago
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
This book, How to Catch a Phish, provides a practical guide to detecting phishing emails, which are designed to trick users into providing sensitive …
1 year, 5 months ago
History of REvil
The Book, “History of REvil”, is a detailed report that investigates the history of the REvil ransomware gang, a criminal enterprise based in Russia.…
1 year, 5 months ago
Hiding from the Internet: Eliminating Personal Online Information
The Book, "Hiding From The Internet," is a comprehensive guide to maintaining online privacy. The author, a former government employee who experience…
1 year, 5 months ago
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
This is a Book that explains how to investigate covert communications and analyzes the tools and methods that criminals use to hide their communicati…
1 year, 5 months ago
Hash Crack: Password Cracking Manual v.3
This Book, "HASH CRACK Password Cracking Manual v.3" is a comprehensive guide for cracking password hashes, written for network defenders and penetra…
1 year, 5 months ago