Podcast Episodes

Back to Search
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats

Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats



Focuses on understanding and counteracting evasive malware. It begins by introducing code analysis techniques to identify malicious intent. The material then details how malware employs context aware…


Published on 6 days, 3 hours ago

Darknet Master: Tor and Deep Web Secrets

Darknet Master: Tor and Deep Web Secrets



Provides an extensive overview of the Darknet and Deep Web, differentiating them from the surface web and explaining how they operate, primarily through Tor (The Onion Router) for anonymous browsing …


Published on 6 days, 3 hours ago

A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more

A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more



A comprehensive guide for network defenders. It focuses on threat detection and network analysis using a suite of open-source tools. Key components covered include the installation and configuration …


Published on 6 days, 19 hours ago

Cryptography and Network Security: Principles and Practice, Global Ed

Cryptography and Network Security: Principles and Practice, Global Ed



Cover fundamental aspects of cryptography and network security, outlining concepts like divisibility, modular arithmetic, and prime numbers as mathematical underpinnings. They explore symmetric ciphe…


Published on 6 days, 19 hours ago

Cryptography: Algorithms, Protocols, and Standards for Computer Security

Cryptography: Algorithms, Protocols, and Standards for Computer Security



Provide a broad overview of cryptographic concepts and techniques. The sources discuss various types of cryptographic primitives, including hash functions, message authentication codes, digital signa…


Published on 1 week, 1 day ago

Writing a C Compiler: Build a Real Programming Language from Scratch

Writing a C Compiler: Build a Real Programming Language from Scratch



It  walk the reader through the stages of compilation, beginning with basic steps like lexical analysis and parsing using techniques like recursive descent and precedence climbing. The sources introd…


Published on 1 week, 1 day ago

Windows 10 System Programming, Part 2

Windows 10 System Programming, Part 2



These excerpts, primarily from the second part of a book on Windows 10 System Programming, explore various facets of system-level programming using the Windows API. The text covers diverse topics inc…


Published on 1 week, 2 days ago

Windows 10 System Programming, Part 1

Windows 10 System Programming, Part 1



These Book offer an in-depth look at Windows system programming, primarily focusing on processes, threads, memory management, and file I/O. They explain fundamental concepts like what a process is, h…


Published on 1 week, 2 days ago

Windows APT Warfare: Identify and prevent Windows APT attacks effectively

Windows APT Warfare: Identify and prevent Windows APT attacks effectively



The Book is a technical guide focused on understanding and countering advanced persistent threats (APTs) targeting Windows systems. It explores concepts from reverse engineering, compilers, and opera…


Published on 1 week, 3 days ago

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting



A practical guide to modern web penetration testing authored by Rafay Baloch and published by CRC Press in 2025. The content covers a wide range of web security topics, beginning with fundamentals of…


Published on 1 week, 3 days ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate