Podcast Episodes

Back to Search
Cuckoo Malware Analysis
Cuckoo Malware Analysis

The provided Book is an excerpt from the book "Cuckoo Malware Analysis" by Digit Oktavianto and Iqbal Muhardianto. The excerpt primarily focuses on C…

1 year, 4 months ago

Short Long
View Episode
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice

The source Book provides a comprehensive overview of cryptography and network security. It starts with fundamental computer security concepts, coveri…

1 year, 4 months ago

Short Long
View Episode
SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition
SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition

The provided Book comes from a book titled "CSSLP Certification All-in-One Exam Guide, Third Edition," which is a comprehensive guide for individuals…

1 year, 4 months ago

Short Long
View Episode
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

The sources are from a book titled "Hands-On Cryptography with Python" by Samuel Bowne. This book aims to teach readers about cryptography and how to…

1 year, 4 months ago

Short Long
View Episode
Cryptography and Network Security
Cryptography and Network Security

This Book excerpt comes from the book "Cryptography and Network Security" by Marcelo S. Alencar. The book, intended for both graduate and undergradua…

1 year, 4 months ago

Short Long
View Episode
The Security Risk Assessment Handbook
The Security Risk Assessment Handbook

The provided Book is an excerpt from a comprehensive guide to information security risk assessment, outlining a methodical approach to identifying, a…

1 year, 4 months ago

Short Long
View Episode
The Art of Linux Kernel Design
The Art of Linux Kernel Design

This Book provides a deep dive into the design and implementation of the Linux 0.11 operating system. It examines key concepts like memory management…

1 year, 4 months ago

Short Long
View Episode
Secure Data Science
Secure Data Science

This Book is an excerpt from the book "Secure Data Science: Integrating Cyber Security and Data Science," which focuses on the intersection of cybers…

1 year, 4 months ago

Short Long
View Episode
Container Security: Fundamental Technology Concepts that Protect Containerized Applications
Container Security: Fundamental Technology Concepts that Protect Containerized Applications

This excerpt from Container Security by Liz Rice provides a detailed overview of container security best practices and technologies. It covers everyt…

1 year, 4 months ago

Short Long
View Episode
Computer Science Distilled: Learn the Art of Solving Computational Problems
Computer Science Distilled: Learn the Art of Solving Computational Problems

This excerpt is from a book called "Computer Science Distilled" by Wladston Ferreira Filho. It provides a concise overview of core computer science c…

1 year, 4 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us