Podcast Episodes

Back to Search
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers

An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers



This collection of Book originates from a Book titled "An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and government…


Published on 7 months, 2 weeks ago

Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security

Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security



This collection of excerpts focuses on accelerating software delivery performance through effective DevOps practices, primarily leveraging the GitHub platform. Key areas explored include team collabo…


Published on 7 months, 2 weeks ago

Advanced IPv6

Advanced IPv6



This Book is a training manual for a course on Advanced IPv6. It is broken down into various sections that explain IPv6 concepts, including packet format, routing basics, OSPFv3, BGP, host configurat…


Published on 7 months, 2 weeks ago

Information Security Management Handbook, 6th Edition

Information Security Management Handbook, 6th Edition



The Book is a compilation of information security management principles and best practices, drawn from the Information Security Management Handbook. The book covers a wide range of topics, including …


Published on 7 months, 2 weeks ago

AZ-900: Microsoft Azure Fundamentals: Study Guide with Practice Questions & Labs

AZ-900: Microsoft Azure Fundamentals: Study Guide with Practice Questions & Labs



This Book is an excerpt from a study guide for the Microsoft Azure Fundamentals certification exam (AZ-900). The guide covers the fundamental concepts of Azure, including cloud concepts like Infrastr…


Published on 7 months, 2 weeks ago

Powershell Step-by Step

Powershell Step-by Step



The provided Book excerpts are from the book, “Powershell Step-by-Step”, written by Brandon Shaw. This Book acts as a comprehensive guide to understanding PowerShell, a scripting language developed b…


Published on 7 months, 2 weeks ago

Beginner's Guide to Exploitation on ARM Vol 2

Beginner's Guide to Exploitation on ARM Vol 2



The Book, titled "Beginner's Guide to Exploitation on ARM Vol 2," is a guide to learning about exploiting security vulnerabilities in ARM-based systems. It is a continuation of the previous volume an…


Published on 7 months, 2 weeks ago

Beginner's Guide to Exploitation on ARM Vol 1

Beginner's Guide to Exploitation on ARM Vol 1



This Book is a beginner's guide to exploiting vulnerabilities on ARM systems, which are commonly used in mobile devices. The book guides the reader through the process of reverse engineering ARM bina…


Published on 7 months, 2 weeks ago

5G/5G-Advanced: The New Generation Wireless Access Technology

5G/5G-Advanced: The New Generation Wireless Access Technology



This Book is a technical overview of the 5G NR (New Radio) standard, focusing on the technical aspects of the radio interface, including the physical layer, radio resource control, and radio resource…


Published on 7 months, 2 weeks ago

5G for Dummies

5G for Dummies



This is an excerpt from a Book titled "5G for Dummies" a special edition for Sprint Business. The text provides an overview of 5G technology, its history, and potential applications. The book explain…


Published on 7 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate