Podcast Episodes

Back to Search
Understanding the Linux Kernel

Understanding the Linux Kernel



The Book are a collection of excerpts from "Understanding the Linux Kernel" by Daniel P. Bovet and Marco Cesati. The book provides a detailed explanation of the inner workings of the Linux kernel, fo…


Published on 4 months, 3 weeks ago

Operator Handbook: Red Team + OSINT + Blue Team Reference

Operator Handbook: Red Team + OSINT + Blue Team Reference



This Book provides a comprehensive guide for red and blue teams conducting security operations. It covers a wide range of topics including tools, techniques, and strategies for both offensive and def…


Published on 4 months, 3 weeks ago

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs



"Operationalizing Threat Intelligence" provides a comprehensive guide to building and implementing an effective threat intelligence program. The book covers a wide range of topics, including understa…


Published on 4 months, 3 weeks ago

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information



This Book is a guide for conducting open source intelligence (OSINT) investigations. It provides a detailed overview of OSINT techniques and resources, such as using search engines, social media, and…


Published on 4 months, 3 weeks ago

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information



This Book provides a comprehensive guide to Open Source Intelligence (OSINT) techniques, covering a wide range of topics from digital security and software configuration to advanced searches across s…


Published on 4 months, 3 weeks ago

Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2

Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2



This excerpt is from a Book that teaches programmers how to work with OWL ontologies using the Owlready2 Python library. The book provides a comprehensive guide to OWL ontologies, covering concepts l…


Published on 4 months, 3 weeks ago

Official (ISC)2 Guide to the CISSP-ISSMP CBK

Official (ISC)2 Guide to the CISSP-ISSMP CBK



The Book is a comprehensive guide for the Information Systems Security Management Professional (ISSMP) certification, covering the core principles and practices of information security management. Th…


Published on 4 months, 3 weeks ago

Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them

Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them



This Book, "Offensive Shellcode from Scratch," provides an in-depth guide to understanding and creating shellcode, a type of malicious code used to exploit vulnerabilities in software. It covers the …


Published on 4 months, 3 weeks ago

Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data

Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data



The Book provides a comprehensive guide to analyzing leaked datasets, focusing on ethical considerations, technical skills, and practical tools for investigating sensitive information. It explores me…


Published on 4 months, 3 weeks ago

Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments



This excerpt from the book "Pentesting Azure" by Matt Burrough offers a comprehensive guide for penetration testers and security professionals who seek to assess the security of Microsoft Azure deplo…


Published on 4 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate