Podcast Episodes

Back to Search
Network Security: Private Communication in a Public World

Network Security: Private Communication in a Public World



This Book "Network Security: Private Communications in a Public World" (Third Edition) by Charlie Kaufman, Radia Perlman, Mike Speciner, and Ray Perlner. The Book covers a wide range of topics relate…


Published on 9 months, 4 weeks ago

Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks

Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks



This excerpt from the book "Network Security Monitoring" by Chris Fry and Martin Nystrom provides guidance on how to monitor network security effectively. The book focuses on targeted monitoring, whi…


Published on 9 months, 4 weeks ago

Network Security Assessment: Know Your Network

Network Security Assessment: Know Your Network



This book, Network Security Assessment, provides a comprehensive guide to penetration testing methods and techniques. The author covers a wide range of topics, including network reconnaissance, vulne…


Published on 9 months, 4 weeks ago

Network Security and Cryptography

Network Security and Cryptography



This Book is about computer network security and cryptography. It covers classical and modern cryptography, Internet security services such as IPSec and SSL, and systems security, including intrusion…


Published on 9 months, 4 weeks ago

Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI

Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI



This excerpt from "Network Programmability with YANG.pdf" explains the YANG language, which is designed for network configuration and management. It describes how YANG models work and how to create t…


Published on 9 months, 4 weeks ago

Network Forensics: Tracking Hackers through Cyberspace

Network Forensics: Tracking Hackers through Cyberspace



The source Book provides a comprehensive overview of network forensics, covering topics like evidence acquisition, packet analysis, intrusion detection, malware forensics, and wireless security. It d…


Published on 10 months ago

Network Design Cookbook: Architecting Cisco Networks

Network Design Cookbook: Architecting Cisco Networks



This Book "Network Design Cookbook_Architecting Cisco Networks" guide. The guide aims to teach network design best practices and methodologies using Cisco technologies. It provides a step-by-step app…


Published on 10 months ago

Network Connectivity: Concepts, Computation, and Optimization

Network Connectivity: Concepts, Computation, and Optimization



This Book investigate the concept of network connectivity, a measure of how well-connected nodes are within a network. They explore connectivity measures including path capacity, triangle capacity, a…


Published on 10 months ago

National Cyber Summit (NCS) Research Track 2020

National Cyber Summit (NCS) Research Track 2020



The provided Book explore various facets of cybersecurity, including education, risk assessment, and security solutions for specific technologies. The papers discuss the development of cybersecurity …


Published on 10 months ago

MSSQL Penetration Testing - Metasploit

MSSQL Penetration Testing - Metasploit



The provided Book is a guide on how to use Metasploit to penetrate and test Microsoft SQL Server (MSSQL) databases. The guide covers various steps, beginning with locating MSSQL servers on a network …


Published on 10 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate