Podcast Episodes
Back to Search
Ethical Hacker's Certification Guide (CEHv11)
This excerpt is from a book on ethical hacking and penetration testing, specifically geared toward preparing individuals for the Certified Ethical Ha…
1 year, 3 months ago
Ethical Hacking-Joe Grant
This Book is an introduction to ethical hacking, using the Kali Linux operating system. It covers a range of topics related to information security, …
1 year, 3 months ago
Ethical Hacking: Techniques, Tools, and Countermeasures
The source Book provides a comprehensive overview of ethical hacking techniques, tools, and countermeasures for information security professionals. T…
1 year, 3 months ago
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
The Book are chapters from a book titled "Essential Cybersecurity Science" by Josiah Dykstra, which explores the application of the scientific method…
1 year, 3 months ago
Essential Of Artificial Intelligence
The Book provide an extensive overview of Python fundamentals, covering the basics of programming using Python, including data types, operators, func…
1 year, 3 months ago
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
The source is a book excerpt on enterprise-level security. It focuses on a security model called ELS (Enterprise Level Security) and its practical im…
1 year, 3 months ago
Enterprise Level Security 1 & 2
The Book is a comprehensive guide to enterprise-level security for information systems. It explains principles, architectures, and techniques for sec…
1 year, 3 months ago
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
The sources provide an extensive overview of enterprise integration patterns, focusing on the use of messaging systems for connecting applications. I…
1 year, 3 months ago
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide
The provided Book comes from a Nutanix Enterprise Cloud Administration (ECA) course guide. The guide outlines the various components and features of …
1 year, 3 months ago
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
This excerpt from "Engineering Trustworthy Systems" is a guide for cybersecurity professionals, focusing on how to design and build trustworthy syste…
1 year, 3 months ago