Podcast Episodes

Back to Search
Network Forensics: Tracking Hackers through Cyberspace

Network Forensics: Tracking Hackers through Cyberspace



The source Book provides a comprehensive overview of network forensics, covering topics like evidence acquisition, packet analysis, intrusion detection, malware forensics, and wireless security. It d…


Published on 4 months, 4 weeks ago

Network Design Cookbook: Architecting Cisco Networks

Network Design Cookbook: Architecting Cisco Networks



This Book "Network Design Cookbook_Architecting Cisco Networks" guide. The guide aims to teach network design best practices and methodologies using Cisco technologies. It provides a step-by-step app…


Published on 4 months, 4 weeks ago

Network Connectivity: Concepts, Computation, and Optimization

Network Connectivity: Concepts, Computation, and Optimization



This Book investigate the concept of network connectivity, a measure of how well-connected nodes are within a network. They explore connectivity measures including path capacity, triangle capacity, a…


Published on 4 months, 4 weeks ago

National Cyber Summit (NCS) Research Track 2020

National Cyber Summit (NCS) Research Track 2020



The provided Book explore various facets of cybersecurity, including education, risk assessment, and security solutions for specific technologies. The papers discuss the development of cybersecurity …


Published on 4 months, 4 weeks ago

MSSQL Penetration Testing - Metasploit

MSSQL Penetration Testing - Metasploit



The provided Book is a guide on how to use Metasploit to penetrate and test Microsoft SQL Server (MSSQL) databases. The guide covers various steps, beginning with locating MSSQL servers on a network …


Published on 4 months, 4 weeks ago

MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410

MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410



The Book  provide a comprehensive guide to installing, configuring, and managing Microsoft Windows Server 2012/R2. The text covers a wide range of topics including server installation, storage config…


Published on 4 months, 4 weeks ago

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security



The Book  is an excerpt from a certification guidebook intended for individuals seeking to become Microsoft Security Operations Analysts. The guidebook focuses on the Microsoft Security Stack, which …


Published on 4 months, 4 weeks ago

ModSecurity Handbook

ModSecurity Handbook



The Book is a manual for ModSecurity, an open-source web application firewall. The manual covers a wide range of topics, including installation, configuration, rule writing, persistent storage, and a…


Published on 5 months ago

Modern System Administration: Managing Reliable and Sustainable Systems

Modern System Administration: Managing Reliable and Sustainable Systems



This Book titled Modern System Administration: Building and Maintaining Reliable Systems, explores the evolving role of system administrators in the context of modern, cloud-based computing. The auth…


Published on 5 months ago

Modern Full-Stack Development: Using TypeScript, React, Node.js, Webpack, and Docker

Modern Full-Stack Development: Using TypeScript, React, Node.js, Webpack, and Docker



The provided Book "Modern Full-Stack Development Using TypeScript, React, Node.js," which aims to guide readers through building web applications using modern technologies. The book begins by introdu…


Published on 5 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate