Podcast Episodes

Back to Search
Introduction to Compiler Design

Introduction to Compiler Design



This excerpt from Introduction to Compiler Design by Torben Ægidius Mogensen provides a comprehensive overview of compiler design principles, focusing on the theoretical foundations and practical tec…


Published on 1 year ago

Incident Response Techniques for Ransomware Attacks

Incident Response Techniques for Ransomware Attacks



This excerpt is from a book titled "Incident Response Techniques for Ransomware Attacks", which provides a comprehensive guide to the modern ransomware landscape. The book explores the history of hum…


Published on 1 year ago

Incident Response with Threat Intelligence

Incident Response with Threat Intelligence



The Book are chapters on incident response with threat intelligence. The text covers a range of topics, including the different types of threat actors, the Cyber Kill Chain framework, MITRE ATT&CK, a…


Published on 1 year ago

Incident Response & Computer Forensics, Third Edition

Incident Response & Computer Forensics, Third Edition



Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization o…


Published on 1 year ago

Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration

Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration



This is a guide on implementing and managing VxRail HCI solutions. It explains the VxRail system architecture, software components, and licensing. The guide also provides step-by-step instructions fo…


Published on 1 year ago

Implementing Effective Code Reviews: How to Build and Maintain Clean Code

Implementing Effective Code Reviews: How to Build and Maintain Clean Code



This Book "Implementing Effective Code Reviews" by Giuliana Carullo. The book is designed to guide software engineers in writing clean and efficient code. The excerpt focuses on the importance of cod…


Published on 1 year ago

Implementing Cryptography Using Python

Implementing Cryptography Using Python



The Book titled "Implementing Cryptography Using Python" by Shannon W. Bray. It is a guide for information security professionals who want to learn how to implement cryptographic algorithms and proto…


Published on 1 year ago

Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide



This Book provides an extensive overview of Cisco networking concepts and technologies. It explores topics ranging from basic network fundamentals to advanced routing protocols, security measures, an…


Published on 1 year ago

Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,

Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,



This Book about reverse engineering, specifically focusing on the x86 architecture. The Book provides a comprehensive guide to understanding the internal workings of computing systems, assembly langu…


Published on 1 year ago

Implementing Cisco IP Switch Networks (300-115)

Implementing Cisco IP Switch Networks (300-115)



The Book provides a guide for implementing Cisco IP Switch Networks. The guide details configuring Cisco switches, setting up VLANS, trunk links, and utilizing various security protocols. The documen…


Published on 1 year ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate