Podcast Episodes

Back to Search
Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud

Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud



Provides an in-depth guide to Active Directory administration, covering a wide array of practical "recipes" for managing both on-premises and Azure Active Directory environments. It details fundament…


Published on 3 months, 3 weeks ago

The Ghidra Book: The Definitive Guide

The Ghidra Book: The Definitive Guide



Serves as the definitive resource for mastering the Ghidra platform, a powerful open-source tool developed by the NSA for reverse engineering. The book covers a vast array of Ghidra's functionalities…


Published on 3 months, 3 weeks ago

The Ultimate iOS Interview Playbook: Conquer Swift, frameworks, design patterns, and app architecture for your dream job

The Ultimate iOS Interview Playbook: Conquer Swift, frameworks, design patterns, and app architecture for your dream job



A comprehensive guide aimed at helping iOS developers succeed in job interviews. The book covers a wide array of topics crucial for iOS development roles, ranging from developer branding and resume b…


Published on 3 months, 3 weeks ago

Red Hat Certified Engineer (RHCE) Ansible Automation Study Guide: In-Depth Guidance and Practice

Red Hat Certified Engineer (RHCE) Ansible Automation Study Guide: In-Depth Guidance and Practice



Prepares individuals for the Red Hat Certified Engineer (RHCE) Ansible Automation (EX294) exam. The book explores Ansible's core functionalities, covering everything from installation and configurati…


Published on 3 months, 3 weeks ago

systemd for Linux SysAdmins: All You Need to Know About the systemd Suite for Linux Users

systemd for Linux SysAdmins: All You Need to Know About the systemd Suite for Linux Users



Provides an in-depth guide for Linux system administrators on managing their systems using the systemd suite of tools. Authored by David Both and technically reviewed by Seth Kenlon, the publication,…


Published on 3 months, 3 weeks ago

Advanced Front-End Development: Building Scalable and High-Performance Web Applications with React

Advanced Front-End Development: Building Scalable and High-Performance Web Applications with React



A comprehensive guide to modern React development. The book covers fundamental concepts such as components, props, and state, alongside crucial aspects like JSX and element rendering, event handling,…


Published on 3 months, 3 weeks ago

Alice and Bob Learn Secure Coding

Alice and Bob Learn Secure Coding



A comprehensive guide to secure software development. It covers fundamental security concepts like authentication, authorization, and data protection, emphasizing proactive measures throughout the so…


Published on 3 months, 3 weeks ago

Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing



A comprehensive guide to ethical hacking. It covers a wide array of topics, beginning with setting up a lab environment using VirtualBox and Kali Linux, then progressing through network penetration t…


Published on 3 months, 3 weeks ago

Zero Trust in Resilient Cloud and Network Architectures (Networking Technology)

Zero Trust in Resilient Cloud and Network Architectures (Networking Technology)



Offers an in-depth look at implementing zero trust architectures in modern IT environments, encompassing on-premises, cloud, and hybrid infrastructures. It covers various aspects, including network a…


Published on 3 months, 3 weeks ago

Wireless Hacking with Kali Linux: LEARN FAST HOW TO HACK ANY WIRELESS NETWORKS PENETRATION TESTING IMPLEMENTATION GUIDE

Wireless Hacking with Kali Linux: LEARN FAST HOW TO HACK ANY WIRELESS NETWORKS PENETRATION TESTING IMPLEMENTATION GUIDE



A comprehensive guide for aspiring IT security professionals interested in wireless penetration testing. It covers various wireless attack methodologies, including password attacks, man-in-the-middle…


Published on 3 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate