Podcast Episodes

Back to Search
The Art of Mac Malware, Volume 2: Detecting Malicious Software
The Art of Mac Malware, Volume 2: Detecting Malicious Software

A technical guide focused on programmatic Mac malware detection. The content covers examining various data sources like process information, network …

9 months, 4 weeks ago

Short Long
View Episode
Radio Frequency Identification Technologies
Radio Frequency Identification Technologies

This Book is a workshop summary report from the Committee on Radio Frequency Identification Technologies under the National Research Council's Comput…

9 months, 4 weeks ago

Short Long
View Episode
CompTIA Security+ Guide to Network Security Fundamentals
CompTIA Security+ Guide to Network Security Fundamentals

Focuses on various aspects of information security, primarily serving as a guide for the CompTIA Security+ certification. It covers fundamental conce…

9 months, 4 weeks ago

Short Long
View Episode
Radio Frequency Integrated Circuits and Technologies
Radio Frequency Integrated Circuits and Technologies

A snippet from a technical resource related to the design and application of radio frequency integrated circuits. As the title suggests, it likely di…

10 months ago

Short Long
View Episode
RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200)
RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200)

A study guide for the Red Hat Certified System Administrator (RHCSA) exam, focusing on Red Hat Enterprise Linux 9 (RHEL 9). It covers foundational to…

10 months ago

Short Long
View Episode
Handbook of Smart Antennas for RFID Systems
Handbook of Smart Antennas for RFID Systems

Focuses on radio frequency identification (RFID) systems, specifically exploring smart antennas used within these systems. It discusses various aspec…

10 months ago

Short Long
View Episode
Professional C++ (Tech Today)
Professional C++ (Tech Today)

Offers a comprehensive guide to advanced C++ programming concepts and techniques, ranging from template programming, including template parameters an…

10 months ago

Short Long
View Episode
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats

Focuses on understanding and counteracting evasive malware. It begins by introducing code analysis techniques to identify malicious intent. The mater…

10 months ago

Short Long
View Episode
Darknet Master: Tor and Deep Web Secrets
Darknet Master: Tor and Deep Web Secrets

Provides an extensive overview of the Darknet and Deep Web, differentiating them from the surface web and explaining how they operate, primarily thro…

10 months ago

Short Long
View Episode
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more

A comprehensive guide for network defenders. It focuses on threat detection and network analysis using a suite of open-source tools. Key components c…

10 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us