The Book Practical Automation with PowerShell focuses on building automations in a secure and reliable manner. It explains concepts like using secure objects for sensitive data, creating data-driven …
Published on 6 months, 3 weeks ago
The Book titled "Penetration Testing with Shellcode" by Hamza Megahed. This book provides a comprehensive guide to detecting, exploiting, and securing network-level and operating system vulnerabiliti…
Published on 6 months, 3 weeks ago
This book, "Agile Security Operations," provides a comprehensive guide to modern cybersecurity practices, focusing on an approach that integrates active defense, incident response, and threat intelli…
Published on 6 months, 3 weeks ago
The provided Book is from a book titled "Cisco Networks," which appears to be a guide to networking concepts and technologies, specifically focusing on Cisco products and technologies. The text cover…
Published on 6 months, 3 weeks ago
This Book, written by a team of Cisco engineers, aims to introduce the Cisco Catalyst 9000 family of switches. It highlights the new era of intent-based networking, outlining the Catalyst 9000's key …
Published on 6 months, 3 weeks ago
The Book is a portion of a review manual for the Certified Information Systems Auditor (CISA) exam. It covers various aspects of information systems auditing and assurance, including IT governance, i…
Published on 6 months, 3 weeks ago
The provided Book is an excerpt from the CISA Review Manual, 26th Edition, a study guide that prepares individuals for the Certified Information Systems Auditor (CISA) exam. The CISA exam tests an in…
Published on 6 months, 3 weeks ago
This Book is a textbook for the Certified Application Security Engineer (CASE) exam, focusing specifically on Java technology. The book covers a wide range of topics related to application security, …
Published on 6 months, 3 weeks ago
The Book are chapters from a guidebook about cloud computing security, providing in-depth information for security professionals. They cover a wide range of cloud security topics, including cloud con…
Published on 6 months, 3 weeks ago
This Book is a guide for ethical hacking written by a cybersecurity professional. It aims to teach readers how to understand hacking methodologies, including techniques like footprinting, gaining acc…
Published on 6 months, 3 weeks ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate