Podcast Episodes

Back to Search
Blockchain for Cybersecurity and Privacy
Blockchain for Cybersecurity and Privacy

The provided Book explore the potential applications of blockchain technology in a variety of contexts, including cybersecurity, supply chain managem…

1 year, 2 months ago

Short Long
View Episode
Black Hat GraphQL: Attacking Next Generation APIs
Black Hat GraphQL: Attacking Next Generation APIs

"Black Hat GraphQL" is a guide for security professionals interested in learning how to attack GraphQL APIs. The book explains the fundamentals of Gr…

1 year, 2 months ago

Short Long
View Episode
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

The Book is a compilation of research papers on cybersecurity, specifically focusing on methods to detect and classify cyber threats. These papers ex…

1 year, 2 months ago

Short Long
View Episode
Big Data Forensics: Learning Hadoop Investigations
Big Data Forensics: Learning Hadoop Investigations

This book, Big Data Forensics - Learning Hadoop Investigations, is a guide for IT professionals interested in the field of digital forensics as it ap…

1 year, 2 months ago

Short Long
View Episode
Beyond the Basic Stuff with Python: Best Practices for Writing Clean Code
Beyond the Basic Stuff with Python: Best Practices for Writing Clean Code

This is a guide for intermediate Python programmers who want to expand their knowledge beyond basic syntax. The text covers advanced best practices s…

1 year, 2 months ago

Short Long
View Episode
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition

This excerpt from the book "Beyond BIOS: Developing with the Unified Extensible Firmware Interface" by Vincent Zimmer, Suresh Marisetty, and Michael …

1 year, 2 months ago

Short Long
View Episode
Beginning Flutter: A Hands On Guide to App Development
Beginning Flutter: A Hands On Guide to App Development

The provided text excerpts come from the book "Beginning Flutter: A Hands-On Guide to App Development" by Marco L. Napoli. The book provides a compre…

1 year, 2 months ago

Short Long
View Episode
Beginning Security with Microsoft Technologies
Beginning Security with Microsoft Technologies

This excerpt is from the book Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data by Vasantha Lakshmi. The book …

1 year, 2 months ago

Short Long
View Episode
Networking with MikroTik: MTCNA Study Guide
Networking with MikroTik: MTCNA Study Guide

This study guide from Manito Networks, LLC is designed to help individuals prepare for the MikroTik Certified Network Associate (MTCNA) exam. The gui…

1 year, 2 months ago

Short Long
View Episode
Becoming The Hacker
Becoming The Hacker

The source text provides a comprehensive guide to web application security from the perspective of a hacker. The text covers common web vulnerabiliti…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us