Podcast Episodes

Back to Search
Digital Forensics Explained
Digital Forensics Explained

The Book provide a comprehensive guide to digital forensics, covering topics like incident response, report writing, social media investigations, soc…

1 year, 3 months ago

Short Long
View Episode
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

"Digital Forensics Basics: A Practical Guide Using Windows OS" is a textbook by Nihad A. Hassan providing a comprehensive guide to digital forensics …

1 year, 3 months ago

Short Long
View Episode
Elsevier's Dictionary of Information Security
Elsevier's Dictionary of Information Security

The Elsevier’s Dictionary of Information Security is a comprehensive reference tool that defines common terms used in the field of information securi…

1 year, 3 months ago

Short Long
View Episode
DevOps and Containers Security: Security and Monitoring in Docker Containers
DevOps and Containers Security: Security and Monitoring in Docker Containers

The Book is a book excerpt about DevOps and container security. The book focuses on providing a practical and theoretical understanding of Docker con…

1 year, 3 months ago

Short Long
View Episode
DevOps Troubleshooting: Linux Server Best Practices
DevOps Troubleshooting: Linux Server Best Practices

The provided Book comes from the book "DevOps Troubleshooting Linux Server Best Practices," which aims to equip developers and QA professionals in De…

1 year, 3 months ago

Short Long
View Episode
Designing Secure Software: A Guide for Developers
Designing Secure Software: A Guide for Developers

The Book provide guidance on designing and building secure software. The text focuses on building a security mindset and applying this mindset to the…

1 year, 3 months ago

Short Long
View Episode
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits: An Introduction to Kernel Hacking

"Designing BSD Rootkits" is a tutorial for programmers interested in learning about kernel-mode rootkits. It explains how to write rootkits that main…

1 year, 3 months ago

Short Long
View Episode
Deployment CISCO SD-WAN LAB ON EVE-NG
Deployment CISCO SD-WAN LAB ON EVE-NG

This Book describes the process of building a Cisco SD-WAN lab using EVE-NG, a network simulation platform. The document details the software require…

1 year, 3 months ago

Short Long
View Episode
Demystifying Intelligent Multimode Security Systems
Demystifying Intelligent Multimode Security Systems

This excerpt from Demystifying.Intelligent.Multimode.Security.Systems.pdf focuses on the increasing complexity and security needs of intelligent mult…

1 year, 3 months ago

Short Long
View Episode
Demystified Object-Oriented Programming with C++
Demystified Object-Oriented Programming with C++

This Book, Demystified Object-Oriented Programming with C++, serves as a comprehensive guide to object-oriented programming (OOP) in C++. It covers a…

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us