Podcast Episodes
Back to Search
Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow
The source material explores the complex landscape of cybercrime, examining various aspects from criminal profiles and activities in the dark web, to…
1 year, 3 months ago
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
The sources present a comprehensive overview of cryptography, both classical and quantum, emphasizing its practical applications in organizations and…
1 year, 3 months ago
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
This book, Empirical Cloud Security, aims to provide a practical guide for evaluating risks and attacks in cloud environments. The second edition foc…
1 year, 3 months ago
Embedded Linux Development Using Yocto Project
This source is a Book titled "Embedded Linux Development Using Yocto Project", providing a comprehensive guide to building custom Linux systems for e…
1 year, 3 months ago
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming
This Book is a compilation of excerpts from Marijn Haverbeke's "Eloquent JavaScript: A Modern Introduction to Programming." The book explores the Jav…
1 year, 3 months ago
Eleventh Hour CISSP: Study Guide
The source is an excerpt from a Book titled "Eleventh Hour CISSP" which provides a comprehensive overview of information security concepts, principle…
1 year, 3 months ago
Reversing: Secrets of Reverse Engineering
The provided source Book is an excerpt from a Book titled "Reversing: Secrets of Reverse Engineering." The book discusses the process of reverse engi…
1 year, 3 months ago
Efficient Linux at the Command Line: Boost Your Command-Line Skills
The source is an excerpt from the book "Efficient Linux at the Command Line" by Vance Wilson, which covers advanced command-line techniques for navig…
1 year, 3 months ago
Effective Cybersecurity: A Guide to Using Best Practices and Standards
This Book, "Effective Cybersecurity: A Guide," provides a comprehensive overview of cybersecurity best practices and standards. It focuses on managin…
1 year, 3 months ago
Effective C: An Introduction to Professional C Programming
The Book source is an excerpt from "Effective C: An Introduction to Professional C Programming" by Robert C. Seacord. It covers various aspects of C …
1 year, 3 months ago