Podcast Episodes

Back to Search
Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy

Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy



The Microsoft Identity and Access Administrator Exam Guide, written by Dwayne Natwick and reviewed by industry experts, offers a comprehensive guide to implementing Identity and Access Management (IA…


Published on 5 months ago

Microprocessor 5: Software and Hardware Aspects of Development, Debugging and Testing - The Microcomputer

Microprocessor 5: Software and Hardware Aspects of Development, Debugging and Testing - The Microcomputer



The source Book provides a detailed overview of microprocessor systems, covering their software and hardware aspects. It examines topics such as assembly language, debugging and testing techniques, d…


Published on 5 months ago

Microprocessor 2: Communication in a Digital System

Microprocessor 2: Communication in a Digital System



The first source, "Microprocessor 2: Core Concepts ─ Communication in a Digital System" by Philippe Darche, is a detailed technical guide exploring various aspects of microprocessor communication wit…


Published on 5 months ago

Microprocessor 1: Prolegomena - Calculation and Storage Functions - Models of Computation and Computer Architecture

Microprocessor 1: Prolegomena - Calculation and Storage Functions - Models of Computation and Computer Architecture



The Book focusing on the microprocessor, a key component in modern computers. The first volume in the series introduces foundational concepts related to computation, storage, and computer architectur…


Published on 5 months ago

Python 101: 2nd Edition

Python 101: 2nd Edition



The Book is a comprehensive guide to Python programming, covering fundamental concepts, practical applications, and advanced techniques. It delves into core data structures like strings, lists, tuple…


Published on 5 months ago

Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester's Guide



This Book "Metasploit: The Penetration Tester's Guide." It is a guide for those who want to learn how to use the Metasploit Framework to test the security of computer systems and networks. The text c…


Published on 5 months ago

Memory Systems: Cache, DRAM, Disk

Memory Systems: Cache, DRAM, Disk



The Book provide a comprehensive overview of memory systems, focusing on the design, implementation, and optimization of various memory components, including caches, DRAM, and disks. The texts explor…


Published on 5 months ago

Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks

Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks



This Book, Mastering Windows Security and Hardening, is a comprehensive guide to securing Windows systems, focusing on both client and server environments. It covers a wide range of topics, including…


Published on 5 months ago

Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy

Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy



This Book is a comprehensive guide to mastering Windows Group Policy. It covers the fundamentals of Group Policy, including its role in managing users and computers in an Active Directory environment…


Published on 5 months ago

Mastering Python Forensics

Mastering Python Forensics



The Book "Mastering Python Forensics" by Dr. Michael Spreitzenbarth and Dr. Johann Uhrmann. This book teaches readers how to use Python to perform digital forensic investigations on a variety of plat…


Published on 5 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate