Podcast Episodes

Back to Search
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)

Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)



This Book is an excerpt from a study guide for the Red Hat Certified Engineer (RHCE) exam, focusing on Ansible automation. It covers Ansible's fundamentals, including configuration, inventory managem…


Published on 3 months, 2 weeks ago

The Red Team Handbook - The Army's Guide To Making Better Decisions

The Red Team Handbook - The Army's Guide To Making Better Decisions



The "Red Team Handbook" produced by the TRADOC G-2 Operational Environment Enterprise outlines the U.S. Army's approach to Red Teaming, a flexible cognitive approach to decision-making. It emphasizes…


Published on 3 months, 2 weeks ago

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)



This Book is a collection of chapters exploring security, privacy, and trust issues in the Internet of Things (IoT) and Cyber-Physical Systems (CPS), focusing on the integration of cloud computing an…


Published on 3 months, 2 weeks ago

Real-World Python: A Hacker's Guide to Solving Problems with Code

Real-World Python: A Hacker's Guide to Solving Problems with Code



This Book is a collection of excerpts from Real-World Python: A Hacker’s Guide to Solving Problems with Code, by Lee Vaughan. The excerpts detail numerous Python programming projects, focusing on pra…


Published on 3 months, 3 weeks ago

Raspberry Pi Assembly Language Programming: ARM Processor Coding

Raspberry Pi Assembly Language Programming: ARM Processor Coding



This Book is from a Book on Raspberry Pi assembly language programming. It covers fundamental assembly instructions, memory management, and control flow, progressing to more advanced topics like func…


Published on 3 months, 3 weeks ago

Ransomware and Cyber Extortion: Response and Prevention

Ransomware and Cyber Extortion: Response and Prevention



This Book is from a Book titled "Ransomware and Cyber Extortion Response and Prevention," which provides a comprehensive guide to understanding, responding to, and preventing ransomware and cyber ext…


Published on 3 months, 3 weeks ago

Racket Programming the Fun Way: From Strings to Turing Machines

Racket Programming the Fun Way: From Strings to Turing Machines



This Book is a table of contents and excerpts from the Book "Racket Programming the Fun Way" a tutorial teaching the Racket programming language. The book covers fundamental concepts, including data …


Published on 3 months, 3 weeks ago

Python for Data Analysis: Data Wrangling with pandas, NumPy, and Jupyter

Python for Data Analysis: Data Wrangling with pandas, NumPy, and Jupyter



This Book excerpt is from the Book Python for Data Analysis by Wes McKinney. The book focuses on how to perform data analysis using Python, specifically with the libraries pandas, NumPy, and Jupyter.…


Published on 3 months, 3 weeks ago

Python: Penetration Testing for Developers

Python: Penetration Testing for Developers



This Book is a textbook excerpt from "Python Penetration Testing for Developers" and provides a comprehensive guide to penetration testing using Python. It covers a wide range of topics, from the fun…


Published on 3 months, 3 weeks ago

Python Hacking Essentials

Python Hacking Essentials



This excerpt from the Book "Python Network Hacking Essentials" provides a comprehensive guide for beginners interested in network hacking. It starts with a basic introduction to Python programming, i…


Published on 3 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate