Podcast Episodes

Back to Search
Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow
Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow

The source material explores the complex landscape of cybercrime, examining various aspects from criminal profiles and activities in the dark web, to…

1 year, 3 months ago

Short Long
View Episode
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

The sources present a comprehensive overview of cryptography, both classical and quantum, emphasizing its practical applications in organizations and…

1 year, 3 months ago

Short Long
View Episode
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

This book, Empirical Cloud Security, aims to provide a practical guide for evaluating risks and attacks in cloud environments. The second edition foc…

1 year, 3 months ago

Short Long
View Episode
Embedded Linux Development Using Yocto Project
Embedded Linux Development Using Yocto Project

This source is a Book titled "Embedded Linux Development Using Yocto Project", providing a comprehensive guide to building custom Linux systems for e…

1 year, 3 months ago

Short Long
View Episode
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming

This Book is a compilation of excerpts from Marijn Haverbeke's "Eloquent JavaScript: A Modern Introduction to Programming." The book explores the Jav…

1 year, 3 months ago

Short Long
View Episode
Eleventh Hour CISSP: Study Guide
Eleventh Hour CISSP: Study Guide

The source is an excerpt from a Book titled "Eleventh Hour CISSP" which provides a comprehensive overview of information security concepts, principle…

1 year, 3 months ago

Short Long
View Episode
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering

The provided source Book is an excerpt from a Book titled "Reversing: Secrets of Reverse Engineering." The book discusses the process of reverse engi…

1 year, 3 months ago

Short Long
View Episode
Efficient Linux at the Command Line: Boost Your Command-Line Skills
Efficient Linux at the Command Line: Boost Your Command-Line Skills

The source is an excerpt from the book "Efficient Linux at the Command Line" by Vance Wilson, which covers advanced command-line techniques for navig…

1 year, 3 months ago

Short Long
View Episode
Effective Cybersecurity: A Guide to Using Best Practices and Standards
Effective Cybersecurity: A Guide to Using Best Practices and Standards

This Book, "Effective Cybersecurity: A Guide," provides a comprehensive overview of cybersecurity best practices and standards. It focuses on managin…

1 year, 3 months ago

Short Long
View Episode
Effective C: An Introduction to Professional C Programming
Effective C: An Introduction to Professional C Programming

The Book source is an excerpt from "Effective C: An Introduction to Professional C Programming" by Robert C. Seacord. It covers various aspects of C …

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us