Podcast Episodes

Back to Search
Introduction to Computer Organization
Introduction to Computer Organization

The Book provide an introductory overview of computer organization, covering the fundamental concepts of hardware and software. The sources explore t…

1 year, 3 months ago

Short Long
View Episode
Introduction to Compiler Design
Introduction to Compiler Design

This excerpt from Introduction to Compiler Design by Torben Ægidius Mogensen provides a comprehensive overview of compiler design principles, focusin…

1 year, 3 months ago

Short Long
View Episode
Incident Response Techniques for Ransomware Attacks
Incident Response Techniques for Ransomware Attacks

This excerpt is from a book titled "Incident Response Techniques for Ransomware Attacks", which provides a comprehensive guide to the modern ransomwa…

1 year, 3 months ago

Short Long
View Episode
Incident Response with Threat Intelligence
Incident Response with Threat Intelligence

The Book are chapters on incident response with threat intelligence. The text covers a range of topics, including the different types of threat actor…

1 year, 3 months ago

Short Long
View Episode
Incident Response & Computer Forensics, Third Edition
Incident Response & Computer Forensics, Third Edition

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with t…

1 year, 3 months ago

Short Long
View Episode
Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration
Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration

This is a guide on implementing and managing VxRail HCI solutions. It explains the VxRail system architecture, software components, and licensing. Th…

1 year, 3 months ago

Short Long
View Episode
Implementing Effective Code Reviews: How to Build and Maintain Clean Code
Implementing Effective Code Reviews: How to Build and Maintain Clean Code

This Book "Implementing Effective Code Reviews" by Giuliana Carullo. The book is designed to guide software engineers in writing clean and efficient …

1 year, 3 months ago

Short Long
View Episode
Implementing Cryptography Using Python
Implementing Cryptography Using Python

The Book titled "Implementing Cryptography Using Python" by Shannon W. Bray. It is a guide for information security professionals who want to learn h…

1 year, 3 months ago

Short Long
View Episode
Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide
Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

This Book provides an extensive overview of Cisco networking concepts and technologies. It explores topics ranging from basic network fundamentals to…

1 year, 3 months ago

Short Long
View Episode
Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,
Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,

This Book about reverse engineering, specifically focusing on the x86 architecture. The Book provides a comprehensive guide to understanding the inte…

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us