Podcast Episodes

Back to Search
Secure PHP Development: Building 50 Practical Applications

Secure PHP Development: Building 50 Practical Applications



This Book excerpt details the creation of numerous PHP applications, focusing on secure coding practices and a reusable application framework. The author, Mohammed J. Kabir, presents 50 practical app…


Published on 3 months, 2 weeks ago

Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML

Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML



This Book is an excerpt from Dennis Sawyers' Book, "Automated Machine Learning with Microsoft Azure," which provides a comprehensive guide to using automated machine learning (AutoML) on Microsoft's …


Published on 3 months, 2 weeks ago

Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language

Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language



This Book is a table of contents and excerpts from a Book teaching Rust web programming. It covers fundamental Rust concepts like memory management and ownership, then progresses to building web appl…


Published on 3 months, 2 weeks ago

Modern Vulnerability Management: Predictive Cybersecurity

Modern Vulnerability Management: Predictive Cybersecurity



Modern Vulnerability Management: Predictive Cybersecurity is a Book by Roytman and Bellis that offers a data-driven approach to vulnerability management. It emphasizes risk-based vulnerability manage…


Published on 3 months, 2 weeks ago

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats



This Book explores the inner workings of various malware, including the TDL3 and TDL4 rootkits and the Festi, Rovnix, Gapz, and Olmasco bootkits. The text details the infection techniques used by the…


Published on 3 months, 2 weeks ago

Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel

Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel



Rootkits, as explained in "Rootkits - Subverting the Windows Kernel," are powerful hacking tools that enable attackers to maintain virtually undetectable access to compromised systems. The book provi…


Published on 3 months, 2 weeks ago

RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)

RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)



This Book excerpt is a training guide and exam preparation manual for the Red Hat Certified System Administrator (RHCSA) exam on Red Hat Enterprise Linux (RHEL) 8. It covers a wide range of topics, i…


Published on 3 months, 2 weeks ago

Reverse Engineering Questions and Answers - George Duckett

Reverse Engineering Questions and Answers - George Duckett



This Stack Exchange Q&A thread centers on reverse engineering, covering various aspects like disassembling binaries (ARM, x86), identifying compilers, analyzing function calls and stack frames (using…


Published on 3 months, 2 weeks ago

Red Team Development and Operations: A practical guide

Red Team Development and Operations: A practical guide



This Book is a practical guide to red teaming in cybersecurity, written by Joe Vest and James Tubberville. It explains the methodology of red teaming, which involves simulating real-world threats to …


Published on 3 months, 2 weeks ago

Red Hat Linux Security and Optimization

Red Hat Linux Security and Optimization



This is an excerpt from Red Hat Linux Security and Optimization, a technical manual authored by Mohammed J. Kabir. The book extensively covers system and network performance tuning for Red Hat Linux,…


Published on 3 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate