Podcast Episodes
Back to Search
Designing Secure Software: A Guide for Developers
The Book provide guidance on designing and building secure software. The text focuses on building a security mindset and applying this mindset to the…
1 year, 5 months ago
Designing BSD Rootkits: An Introduction to Kernel Hacking
"Designing BSD Rootkits" is a tutorial for programmers interested in learning about kernel-mode rootkits. It explains how to write rootkits that main…
1 year, 5 months ago
Deployment CISCO SD-WAN LAB ON EVE-NG
This Book describes the process of building a Cisco SD-WAN lab using EVE-NG, a network simulation platform. The document details the software require…
1 year, 5 months ago
Demystifying Intelligent Multimode Security Systems
This excerpt from Demystifying.Intelligent.Multimode.Security.Systems.pdf focuses on the increasing complexity and security needs of intelligent mult…
1 year, 5 months ago
Demystified Object-Oriented Programming with C++
This Book, Demystified Object-Oriented Programming with C++, serves as a comprehensive guide to object-oriented programming (OOP) in C++. It covers a…
1 year, 5 months ago
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance
This Book, DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance, focuses on the multifaceted threat of distributed denial-of-servi…
1 year, 5 months ago
Data Science Projects with Python - Second Edition
The Book provide a comprehensive guide to data science with Python, focusing on machine learning techniques for building predictive models. The book …
1 year, 5 months ago
The DataOps Revolution
The provided Book is an excerpt from a Book titled "The DataOps Revolution: Delivering the Data-Driven Enterprise." This book tells the story of Jenn…
1 year, 5 months ago
Database Security: Problems and Solutions
This Book excerpts provide a comprehensive guide to database security, encompassing a broad spectrum of topics from fundamental information security …
1 year, 5 months ago
Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime
This excerpt from the Book Data Security by T. H. Lenhard covers a wide range of data security topics, focusing on practical threats and mitigation s…
1 year, 5 months ago