Podcast Episodes
Back to Search
Blockchain for Cybersecurity and Privacy
The provided Book explore the potential applications of blockchain technology in a variety of contexts, including cybersecurity, supply chain managem…
1 year, 2 months ago
Black Hat GraphQL: Attacking Next Generation APIs
"Black Hat GraphQL" is a guide for security professionals interested in learning how to attack GraphQL APIs. The book explains the fundamentals of Gr…
1 year, 2 months ago
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence
The Book is a compilation of research papers on cybersecurity, specifically focusing on methods to detect and classify cyber threats. These papers ex…
1 year, 2 months ago
Big Data Forensics: Learning Hadoop Investigations
This book, Big Data Forensics - Learning Hadoop Investigations, is a guide for IT professionals interested in the field of digital forensics as it ap…
1 year, 2 months ago
Beyond the Basic Stuff with Python: Best Practices for Writing Clean Code
This is a guide for intermediate Python programmers who want to expand their knowledge beyond basic syntax. The text covers advanced best practices s…
1 year, 2 months ago
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition
This excerpt from the book "Beyond BIOS: Developing with the Unified Extensible Firmware Interface" by Vincent Zimmer, Suresh Marisetty, and Michael …
1 year, 2 months ago
Beginning Flutter: A Hands On Guide to App Development
The provided text excerpts come from the book "Beginning Flutter: A Hands-On Guide to App Development" by Marco L. Napoli. The book provides a compre…
1 year, 2 months ago
Beginning Security with Microsoft Technologies
This excerpt is from the book Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data by Vasantha Lakshmi. The book …
1 year, 2 months ago
Networking with MikroTik: MTCNA Study Guide
This study guide from Manito Networks, LLC is designed to help individuals prepare for the MikroTik Certified Network Associate (MTCNA) exam. The gui…
1 year, 2 months ago
Becoming The Hacker
The source text provides a comprehensive guide to web application security from the perspective of a hacker. The text covers common web vulnerabiliti…
1 year, 2 months ago