Podcast Episodes

Back to Search
Implementing Cisco IP Switch Networks (300-115)
Implementing Cisco IP Switch Networks (300-115)

The Book provides a guide for implementing Cisco IP Switch Networks. The guide details configuring Cisco switches, setting up VLANS, trunk links, and…

1 year, 3 months ago

Short Long
View Episode
IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over
IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over

The Book is the IEEE Standard for Ethernet (IEEE 802.3-2018), a Book that specifies the technical details for the Ethernet network standard. The stan…

1 year, 3 months ago

Short Long
View Episode
IBM b-type Gen 7 Installation, Migration, and Best Practices Guide
IBM b-type Gen 7 Installation, Migration, and Best Practices Guide

This Book provides an extensive guide on installing, migrating, and implementing best practices for the IBM b-type Gen 7 SAN director. It covers vari…

1 year, 3 months ago

Short Long
View Episode
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud

The Book is an excerpt from the book "Hybrid Cloud Security Patterns," authored by Sreekanth Iyer and reviewed by Tony Carrato. It details various se…

1 year, 3 months ago

Short Long
View Episode
How Linux Works, 3rd Edition: What Every Superuser Should Know
How Linux Works, 3rd Edition: What Every Superuser Should Know

The Book provide an in-depth guide to understanding the workings of Linux, ranging from fundamental system concepts to practical configurations and s…

1 year, 3 months ago

Short Long
View Episode
How to Measure Anything in Cybersecurity Risk
How to Measure Anything in Cybersecurity Risk

This is an excerpt from How to Measure Anything in Cybersecurity Risk by Douglas Hubbard and Richard Seiersen, which argues for a more quantitative a…

1 year, 3 months ago

Short Long
View Episode
How to Hack Like a Legend: Breaking Windows
How to Hack Like a Legend: Breaking Windows

This excerpt from the Book "How to Hack Like a Legend" by Sparc Flow is a guide to ethical hacking techniques. The book provides a detailed step-by-s…

1 year, 3 months ago

Short Long
View Episode
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

This book, How to Catch a Phish, provides a practical guide to detecting phishing emails, which are designed to trick users into providing sensitive …

1 year, 3 months ago

Short Long
View Episode
History of REvil
History of REvil

The Book, “History of REvil”, is a detailed report that investigates the history of the REvil ransomware gang, a criminal enterprise based in Russia.…

1 year, 3 months ago

Short Long
View Episode
Hiding from the Internet: Eliminating Personal Online Information
Hiding from the Internet: Eliminating Personal Online Information

The Book, "Hiding From The Internet," is a comprehensive guide to maintaining online privacy. The author, a former government employee who experience…

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us