Podcast Episodes

Back to Search
Beginner's Guide to Exploitation on ARM Vol 1
Beginner's Guide to Exploitation on ARM Vol 1

This Book is a beginner's guide to exploiting vulnerabilities on ARM systems, which are commonly used in mobile devices. The book guides the reader t…

1 year ago

Short Long
View Episode
5G/5G-Advanced: The New Generation Wireless Access Technology
5G/5G-Advanced: The New Generation Wireless Access Technology

This Book is a technical overview of the 5G NR (New Radio) standard, focusing on the technical aspects of the radio interface, including the physical…

1 year ago

Short Long
View Episode
5G for Dummies
5G for Dummies

This is an excerpt from a Book titled "5G for Dummies" a special edition for Sprint Business. The text provides an overview of 5G technology, its his…

1 year ago

Short Long
View Episode
Cisco CCNA Command Guide: Tips and Tricks to Learn Cisco CCNA Command Guide
Cisco CCNA Command Guide: Tips and Tricks to Learn Cisco CCNA Command Guide

The Book provide a comprehensive guide to the Cisco Certified Network Associate (CCNA) Routing and Switching certification. It details the history of…

1 year ago

Short Long
View Episode
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools

It covers various hacking techniques, including network scanning, post-exploitation, and ethical hacking. The second source is a collection of cybers…

1 year ago

Short Long
View Episode
Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform
Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform

This excerpt from the Book "Inside Azure Management" provides a comprehensive overview of Azure management and monitoring tools. It highlights the ev…

1 year ago

Short Long
View Episode
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld

The Book is an excerpt from the book "Inside Cyber Warfare: Mapping the Cyber Underworld" by Jeffrey Carr. The book explores the complex world of cyb…

1 year ago

Short Long
View Episode
Cryptography & Network Security
Cryptography & Network Security

The Book provide an overview of cryptography and network security. defines mathematical symbols and notation used in cryptography and network securit…

1 year ago

Short Long
View Episode
Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud
Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud

This excerpt from the Book "Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud" is a comprehe…

1 year ago

Short Long
View Episode
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)

Intelligent Mobile Malware Detection is a book that provides a comprehensive overview of Android malware detection mechanisms. The book begins by int…

1 year ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us