Podcast Episodes

Back to Search
Certified Application Security Engineer | JAVA: Technology Workbook
Certified Application Security Engineer | JAVA: Technology Workbook

This Book is a textbook for the Certified Application Security Engineer (CASE) exam, focusing specifically on Java technology. The book covers a wide…

1 year, 4 months ago

Short Long
View Episode
The Official (ISC)2 CCSP CBK Reference
The Official (ISC)2 CCSP CBK Reference

The Book are chapters from a guidebook about cloud computing security, providing in-depth information for security professionals. They cover a wide r…

1 year, 4 months ago

Short Long
View Episode
Certified Blackhat: Methodology to Unethical Hacking
Certified Blackhat: Methodology to Unethical Hacking

This Book is a guide for ethical hacking written by a cybersecurity professional. It aims to teach readers how to understand hacking methodologies, i…

1 year, 4 months ago

Short Long
View Episode
Carrier sense multiple access  with collision detection (CSMA/CD)  access method and physical layer  specifications
Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications

This Book, IEEE Std 802.3-2002, is a standard for local and metropolitan area networks (LANs) that defines the specifications for the Physical and Da…

1 year, 4 months ago

Short Long
View Episode
CCNP R&S Practical Workbook
CCNP R&S Practical Workbook

This Book"CCNP R&S Practical Workbook" provides a comprehensive guide for configuring and troubleshooting networking technologies, specifically focus…

1 year, 4 months ago

Short Long
View Episode
CCNA Voice Lab Manual
CCNA Voice Lab Manual

The Book is a lab manual for Cisco's CCNA Voice certification, covering the configuration and troubleshooting of Cisco Unified Communications Manager…

1 year, 4 months ago

Short Long
View Episode
CC Certified in Cybersecurity All-in-One Exam Guide
CC Certified in Cybersecurity All-in-One Exam Guide

This excerpt from the Certified in Cybersecurity All-in-One Exam Guide details the foundational knowledge needed for individuals pursuing the Certifi…

1 year, 4 months ago

Short Long
View Episode
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

This Book "Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence", a Book written by Kevin …

1 year, 4 months ago

Short Long
View Episode
The Car Hacker's Handbook: A Guide for the Penetration Tester
The Car Hacker's Handbook: A Guide for the Penetration Tester

"The Car Hacker's Handbook" is a guide for penetration testers focused on automotive security. It teaches readers how to assess vulnerabilities in mo…

1 year, 4 months ago

Short Long
View Episode
C++20: Get the Details
C++20: Get the Details

The Book is a detailed explanation of the new features in C++20, including the Ranges library, Coroutines, Concepts, and Modules. The document also p…

1 year, 4 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us