Podcast Episodes
Back to Search
CC Certified in Cybersecurity All-in-One Exam Guide
This excerpt from the Certified in Cybersecurity All-in-One Exam Guide details the foundational knowledge needed for individuals pursuing the Certifi…
1 year, 2 months ago
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence
This Book "Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence", a Book written by Kevin …
1 year, 2 months ago
The Car Hacker's Handbook: A Guide for the Penetration Tester
"The Car Hacker's Handbook" is a guide for penetration testers focused on automotive security. It teaches readers how to assess vulnerabilities in mo…
1 year, 2 months ago
C++20: Get the Details
The Book is a detailed explanation of the new features in C++20, including the Ranges library, Coroutines, Concepts, and Modules. The document also p…
1 year, 2 months ago
C How to Program
The Book provide an extensive overview of the C programming language, encompassing its fundamental concepts, syntax, and practical applications. The …
1 year, 2 months ago
Building an Effective Security Program
This Book presents a comprehensive guide to building an effective cybersecurity program, covering all aspects from identifying threats and vulnerabil…
1 year, 2 months ago
Building Mobile Apps at Scale: 39 Engineering Challenges
The Book is a collection of excerpts from "Building Mobile Apps at Scale," which provides advice and insights on the complexities and challenges of b…
1 year, 2 months ago
Bug Bounty Automation With Python
This excerpt from the book Bug Bounty Automation With Python: The Secrets of Bug Hunting provides a comprehensive introduction to automating bug boun…
1 year, 2 months ago
Cybersecurity Blue Team Strategies
The Book provides a detailed guide to building and managing a cybersecurity blue team. It covers a range of topics, including the roles and responsib…
1 year, 2 months ago
Blockchains for Network Security: Principles, technologies and applications
The book chapter excerpt that focuses on the integration of blockchain technology with various applications, specifically in the context of network s…
1 year, 2 months ago