The Book titled "Implementing Cryptography Using Python" by Shannon W. Bray. It is a guide for information security professionals who want to learn how to implement cryptographic algorithms and proto…
Published on 10 months, 3 weeks ago
This Book provides an extensive overview of Cisco networking concepts and technologies. It explores topics ranging from basic network fundamentals to advanced routing protocols, security measures, an…
Published on 10 months, 3 weeks ago
This Book about reverse engineering, specifically focusing on the x86 architecture. The Book provides a comprehensive guide to understanding the internal workings of computing systems, assembly langu…
Published on 10 months, 3 weeks ago
The Book provides a guide for implementing Cisco IP Switch Networks. The guide details configuring Cisco switches, setting up VLANS, trunk links, and utilizing various security protocols. The documen…
Published on 10 months, 3 weeks ago
The Book is the IEEE Standard for Ethernet (IEEE 802.3-2018), a Book that specifies the technical details for the Ethernet network standard. The standard covers a wide range of topics including the p…
Published on 10 months, 3 weeks ago
This Book provides an extensive guide on installing, migrating, and implementing best practices for the IBM b-type Gen 7 SAN director. It covers various topics, including the autonomous SAN, automati…
Published on 10 months, 3 weeks ago
The Book is an excerpt from the book "Hybrid Cloud Security Patterns," authored by Sreekanth Iyer and reviewed by Tony Carrato. It details various security patterns and best practices for securing hy…
Published on 10 months, 3 weeks ago
The Book provide an in-depth guide to understanding the workings of Linux, ranging from fundamental system concepts to practical configurations and scripting techniques. The book, "How Linux Works," …
Published on 10 months, 3 weeks ago
This is an excerpt from How to Measure Anything in Cybersecurity Risk by Douglas Hubbard and Richard Seiersen, which argues for a more quantitative approach to cybersecurity risk management. The auth…
Published on 10 months, 3 weeks ago
This excerpt from the Book "How to Hack Like a Legend" by Sparc Flow is a guide to ethical hacking techniques. The book provides a detailed step-by-step plan on how to penetrate a company's network, …
Published on 10 months, 3 weeks ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate