Podcast Episodes

Back to Search
Certified Blackhat: Methodology to Unethical Hacking

Certified Blackhat: Methodology to Unethical Hacking



This Book is a guide for ethical hacking written by a cybersecurity professional. It aims to teach readers how to understand hacking methodologies, including techniques like footprinting, gaining acc…


Published on 1 year, 1 month ago

Carrier sense multiple access  with collision detection (CSMA/CD)  access method and physical layer  specifications

Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications



This Book, IEEE Std 802.3-2002, is a standard for local and metropolitan area networks (LANs) that defines the specifications for the Physical and Data Link layers of the Open Systems Interconnection…


Published on 1 year, 1 month ago

CCNP R&S Practical Workbook

CCNP R&S Practical Workbook



This Book"CCNP R&S Practical Workbook" provides a comprehensive guide for configuring and troubleshooting networking technologies, specifically focusing on routing protocols such as EIGRP, OSPF, and …


Published on 1 year, 1 month ago

CCNA Voice Lab Manual

CCNA Voice Lab Manual



The Book is a lab manual for Cisco's CCNA Voice certification, covering the configuration and troubleshooting of Cisco Unified Communications Manager Express (CUCME) and Cisco Unified Communications …


Published on 1 year, 1 month ago

CC Certified in Cybersecurity All-in-One Exam Guide

CC Certified in Cybersecurity All-in-One Exam Guide



This excerpt from the Certified in Cybersecurity All-in-One Exam Guide details the foundational knowledge needed for individuals pursuing the Certified in Cybersecurity (CC) credential. The text expl…


Published on 1 year, 1 month ago

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence



This Book "Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence", a Book written by Kevin Cardwell. It focuses on using the network analysis…


Published on 1 year, 1 month ago

The Car Hacker's Handbook: A Guide for the Penetration Tester

The Car Hacker's Handbook: A Guide for the Penetration Tester



"The Car Hacker's Handbook" is a guide for penetration testers focused on automotive security. It teaches readers how to assess vulnerabilities in modern cars, which are becoming increasingly compute…


Published on 1 year, 1 month ago

C++20: Get the Details

C++20: Get the Details



The Book is a detailed explanation of the new features in C++20, including the Ranges library, Coroutines, Concepts, and Modules. The document also provides an overview of upcoming features in C++23,…


Published on 1 year, 1 month ago

C How to Program

C How to Program



The Book provide an extensive overview of the C programming language, encompassing its fundamental concepts, syntax, and practical applications. The text covers topics such as data types, operators, …


Published on 1 year, 1 month ago

Building an Effective Security Program

Building an Effective Security Program



This Book presents a comprehensive guide to building an effective cybersecurity program, covering all aspects from identifying threats and vulnerabilities to measuring performance and responding to i…


Published on 1 year, 1 month ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate