Podcast Episodes

Back to Search
IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over

IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over



The Book is the IEEE Standard for Ethernet (IEEE 802.3-2018), a Book that specifies the technical details for the Ethernet network standard. The standard covers a wide range of topics including the p…


Published on 1 year ago

IBM b-type Gen 7 Installation, Migration, and Best Practices Guide

IBM b-type Gen 7 Installation, Migration, and Best Practices Guide



This Book provides an extensive guide on installing, migrating, and implementing best practices for the IBM b-type Gen 7 SAN director. It covers various topics, including the autonomous SAN, automati…


Published on 1 year ago

Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud

Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud



The Book is an excerpt from the book "Hybrid Cloud Security Patterns," authored by Sreekanth Iyer and reviewed by Tony Carrato. It details various security patterns and best practices for securing hy…


Published on 1 year ago

How Linux Works, 3rd Edition: What Every Superuser Should Know

How Linux Works, 3rd Edition: What Every Superuser Should Know



The Book provide an in-depth guide to understanding the workings of Linux, ranging from fundamental system concepts to practical configurations and scripting techniques. The book, "How Linux Works," …


Published on 1 year ago

How to Measure Anything in Cybersecurity Risk

How to Measure Anything in Cybersecurity Risk



This is an excerpt from How to Measure Anything in Cybersecurity Risk by Douglas Hubbard and Richard Seiersen, which argues for a more quantitative approach to cybersecurity risk management. The auth…


Published on 1 year ago

How to Hack Like a Legend: Breaking Windows

How to Hack Like a Legend: Breaking Windows



This excerpt from the Book "How to Hack Like a Legend" by Sparc Flow is a guide to ethical hacking techniques. The book provides a detailed step-by-step plan on how to penetrate a company's network, …


Published on 1 year ago

How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

How to Catch a Phish: A Practical Guide to Detecting Phishing Emails



This book, How to Catch a Phish, provides a practical guide to detecting phishing emails, which are designed to trick users into providing sensitive information or downloading malicious software. The…


Published on 1 year ago

History of REvil

History of REvil



The Book, “History of REvil”, is a detailed report that investigates the history of the REvil ransomware gang, a criminal enterprise based in Russia. The Book outlines the group's origins as an affil…


Published on 1 year ago

Hiding from the Internet: Eliminating Personal Online Information

Hiding from the Internet: Eliminating Personal Online Information



The Book, "Hiding From The Internet," is a comprehensive guide to maintaining online privacy. The author, a former government employee who experienced a personal data breach, provides detailed instru…


Published on 1 year ago

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis



This is a Book that explains how to investigate covert communications and analyzes the tools and methods that criminals use to hide their communications. The book covers a broad landscape of technica…


Published on 1 year ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate