Podcast Episodes

Back to Search
CompTIA Security+ Guide to Network Security Fundamentals
CompTIA Security+ Guide to Network Security Fundamentals

Focuses on various aspects of information security, primarily serving as a guide for the CompTIA Security+ certification. It covers fundamental conce…

11 months, 2 weeks ago

Short Long
View Episode
Radio Frequency Integrated Circuits and Technologies
Radio Frequency Integrated Circuits and Technologies

A snippet from a technical resource related to the design and application of radio frequency integrated circuits. As the title suggests, it likely di…

11 months, 2 weeks ago

Short Long
View Episode
RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200)
RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200)

A study guide for the Red Hat Certified System Administrator (RHCSA) exam, focusing on Red Hat Enterprise Linux 9 (RHEL 9). It covers foundational to…

11 months, 2 weeks ago

Short Long
View Episode
Handbook of Smart Antennas for RFID Systems
Handbook of Smart Antennas for RFID Systems

Focuses on radio frequency identification (RFID) systems, specifically exploring smart antennas used within these systems. It discusses various aspec…

11 months, 2 weeks ago

Short Long
View Episode
Professional C++ (Tech Today)
Professional C++ (Tech Today)

Offers a comprehensive guide to advanced C++ programming concepts and techniques, ranging from template programming, including template parameters an…

11 months, 2 weeks ago

Short Long
View Episode
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats

Focuses on understanding and counteracting evasive malware. It begins by introducing code analysis techniques to identify malicious intent. The mater…

11 months, 2 weeks ago

Short Long
View Episode
Darknet Master: Tor and Deep Web Secrets
Darknet Master: Tor and Deep Web Secrets

Provides an extensive overview of the Darknet and Deep Web, differentiating them from the surface web and explaining how they operate, primarily thro…

11 months, 2 weeks ago

Short Long
View Episode
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more

A comprehensive guide for network defenders. It focuses on threat detection and network analysis using a suite of open-source tools. Key components c…

11 months, 2 weeks ago

Short Long
View Episode
Cryptography and Network Security: Principles and Practice, Global Ed
Cryptography and Network Security: Principles and Practice, Global Ed

Cover fundamental aspects of cryptography and network security, outlining concepts like divisibility, modular arithmetic, and prime numbers as mathem…

11 months, 2 weeks ago

Short Long
View Episode
Cryptography: Algorithms, Protocols, and Standards for Computer Security
Cryptography: Algorithms, Protocols, and Standards for Computer Security

Provide a broad overview of cryptographic concepts and techniques. The sources discuss various types of cryptographic primitives, including hash func…

11 months, 3 weeks ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us