Podcast Episodes
Back to Search
Data Privacy: A runbook for engineers
This Book, Data Privacy: A Runbook for Engineers, is a guide for technology professionals navigating the complexities of data privacy in a rapidly ev…
1 year, 4 months ago
Data Analysis with Python and PySpark
This Book is an excerpt from the book Data Analysis with Python and PySpark by Jonathan Rioux. The book is a comprehensive guide to using PySpark, a …
1 year, 4 months ago
Data Analysis And Visualization
The provided Book excerpts from "Data Analysis and Visualization" cover the fundamental concepts of probability and statistics. It begins by explaini…
1 year, 4 months ago
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
This Book is from a chapter on secure random number generation in a book on secure programming in C and C++. It discusses the importance of high-qual…
1 year, 4 months ago
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
This excerpt from Bruce Schneier's A Hacker's Mind explores how individuals and organizations exploit vulnerabilities in various systems—from compute…
1 year, 4 months ago
Scratch 3 Programming Playground: Learn to Program by Making Cool Games
"Scratch 3 Programming Playground: Learn to Program by Making Cool Games" by Al Sweigart is a comprehensive guide to creating video games using the S…
1 year, 4 months ago
Data Center Handbook
This Book is a collection of excerpts from the Data Center Handbook, a comprehensive guide to the design, construction, and operation of data centers…
1 year, 4 months ago
Cyberwarfare: Threats to Critical Infrastructure
The Book material explores the complex world of cyberwarfare, particularly its threats to critical infrastructure. It details the vulnerabilities of …
1 year, 4 months ago
Cybersecurity Fundamentals
The source is a Book titled "Cybersecurity Fundamentals: A Real-World Perspective" by Kutub Thakur. This text focuses on providing a comprehensive un…
1 year, 4 months ago
Cybersecurity for Beginners: How to prevent Phishing & Social Engineering Attacks
This Book excerpt is from a cybersecurity Book that explains the concepts of social engineering and phishing attacks, focusing on how to recognize an…
1 year, 4 months ago