Podcast Episodes

Back to Search
Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy
Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy

The Microsoft Identity and Access Administrator Exam Guide, written by Dwayne Natwick and reviewed by industry experts, offers a comprehensive guide …

1 year, 4 months ago

Short Long
View Episode
Microprocessor 5: Software and Hardware Aspects of Development, Debugging and Testing - The Microcomputer
Microprocessor 5: Software and Hardware Aspects of Development, Debugging and Testing - The Microcomputer

The source Book provides a detailed overview of microprocessor systems, covering their software and hardware aspects. It examines topics such as asse…

1 year, 4 months ago

Short Long
View Episode
Microprocessor 2: Communication in a Digital System
Microprocessor 2: Communication in a Digital System

The first source, "Microprocessor 2: Core Concepts ─ Communication in a Digital System" by Philippe Darche, is a detailed technical guide exploring v…

1 year, 4 months ago

Short Long
View Episode
Microprocessor 1: Prolegomena - Calculation and Storage Functions - Models of Computation and Computer Architecture
Microprocessor 1: Prolegomena - Calculation and Storage Functions - Models of Computation and Computer Architecture

The Book focusing on the microprocessor, a key component in modern computers. The first volume in the series introduces foundational concepts related…

1 year, 4 months ago

Short Long
View Episode
Python 101: 2nd Edition
Python 101: 2nd Edition

The Book is a comprehensive guide to Python programming, covering fundamental concepts, practical applications, and advanced techniques. It delves in…

1 year, 4 months ago

Short Long
View Episode
Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide

This Book "Metasploit: The Penetration Tester's Guide." It is a guide for those who want to learn how to use the Metasploit Framework to test the sec…

1 year, 4 months ago

Short Long
View Episode
Memory Systems: Cache, DRAM, Disk
Memory Systems: Cache, DRAM, Disk

The Book provide a comprehensive overview of memory systems, focusing on the design, implementation, and optimization of various memory components, i…

1 year, 4 months ago

Short Long
View Episode
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks

This Book, Mastering Windows Security and Hardening, is a comprehensive guide to securing Windows systems, focusing on both client and server environ…

1 year, 4 months ago

Short Long
View Episode
Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy
Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy

This Book is a comprehensive guide to mastering Windows Group Policy. It covers the fundamentals of Group Policy, including its role in managing user…

1 year, 4 months ago

Short Long
View Episode
Mastering Python Forensics
Mastering Python Forensics

The Book "Mastering Python Forensics" by Dr. Michael Spreitzenbarth and Dr. Johann Uhrmann. This book teaches readers how to use Python to perform di…

1 year, 4 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us