Podcast Episodes

Back to Search
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network

This book, Network Security Assessment, provides a comprehensive guide to penetration testing methods and techniques. The author covers a wide range …

1 year, 2 months ago

Short Long
View Episode
Network Security and Cryptography
Network Security and Cryptography

This Book is about computer network security and cryptography. It covers classical and modern cryptography, Internet security services such as IPSec …

1 year, 2 months ago

Short Long
View Episode
Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI
Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI

This excerpt from "Network Programmability with YANG.pdf" explains the YANG language, which is designed for network configuration and management. It …

1 year, 2 months ago

Short Long
View Episode
Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace

The source Book provides a comprehensive overview of network forensics, covering topics like evidence acquisition, packet analysis, intrusion detecti…

1 year, 2 months ago

Short Long
View Episode
Network Design Cookbook: Architecting Cisco Networks
Network Design Cookbook: Architecting Cisco Networks

This Book "Network Design Cookbook_Architecting Cisco Networks" guide. The guide aims to teach network design best practices and methodologies using …

1 year, 2 months ago

Short Long
View Episode
Network Connectivity: Concepts, Computation, and Optimization
Network Connectivity: Concepts, Computation, and Optimization

This Book investigate the concept of network connectivity, a measure of how well-connected nodes are within a network. They explore connectivity meas…

1 year, 2 months ago

Short Long
View Episode
National Cyber Summit (NCS) Research Track 2020
National Cyber Summit (NCS) Research Track 2020

The provided Book explore various facets of cybersecurity, including education, risk assessment, and security solutions for specific technologies. Th…

1 year, 2 months ago

Short Long
View Episode
MSSQL Penetration Testing - Metasploit
MSSQL Penetration Testing - Metasploit

The provided Book is a guide on how to use Metasploit to penetrate and test Microsoft SQL Server (MSSQL) databases. The guide covers various steps, b…

1 year, 2 months ago

Short Long
View Episode
MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410
MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410

The Book  provide a comprehensive guide to installing, configuring, and managing Microsoft Windows Server 2012/R2. The text covers a wide range of to…

1 year, 2 months ago

Short Long
View Episode
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security

The Book  is an excerpt from a certification guidebook intended for individuals seeking to become Microsoft Security Operations Analysts. The guidebo…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us