Podcast Episodes

Back to Search
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing

Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing



This Book is a technical manual on IT security that focuses on Red Hat products and solutions. The text covers basic network protocols, Linux system administration, hybrid cloud infrastructure, Red H…


Published on 5 months, 2 weeks ago

Learning iOS Forensics

Learning iOS Forensics



This is a technical book about iOS forensics for investigators. The book begins with an overview of iOS devices and how to identify them, then explains how to acquire data from iOS devices. The book …


Published on 5 months, 2 weeks ago

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking



This Book is a guide for performing security testing with Kali Linux. It explores essential tools and techniques for vulnerability identification and exploitation, covering network security testing, …


Published on 5 months, 2 weeks ago

Learning Java by Building Android Games

Learning Java by Building Android Games



The Book provide a comprehensive guide to Android game development using Java, starting with basic concepts and gradually progressing to more advanced topics. The book uses a practical approach by bu…


Published on 5 months, 2 weeks ago

Learning the vi and Vim Editors: Text Processing at Maximum Speed and Power

Learning the vi and Vim Editors: Text Processing at Maximum Speed and Power



The Book provides a comprehensive guide to the vi text editor, a powerful tool for Unix-based systems, and its various clones such as Vim, nvi, elvis, and vile. The text explains the fundamental comm…


Published on 5 months, 2 weeks ago

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing



This Book provides an in-depth guide to using Nessus, a popular vulnerability assessment and penetration testing tool. The book begins by defining vulnerability assessment and penetration testing, ou…


Published on 5 months, 2 weeks ago

Learning Metasploit Exploitation and Development

Learning Metasploit Exploitation and Development



The source Book provides a comprehensive guide to the Metasploit Framework, a powerful tool used by penetration testers to find and exploit security vulnerabilities. The book walks readers through a …


Published on 5 months, 2 weeks ago

Learning Linux Binary Analysis

Learning Linux Binary Analysis



"Learning Linux Binary Analysis" is a technical guide for computer security researchers and software engineers who want to learn about binary analysis and reverse engineering on Linux systems. The bo…


Published on 5 months, 2 weeks ago

Learning DevOps - Second Edition

Learning DevOps - Second Edition



This book, Learning DevOps, Second Edition, is a comprehensive guide to DevOps practices and principles, focusing on practical application and implementation. It covers various essential tools and te…


Published on 5 months, 2 weeks ago

Learn to Program with Kotlin: From the Basics to Projects with Text and Image Processing

Learn to Program with Kotlin: From the Basics to Projects with Text and Image Processing



A book that teaches Kotlin programming through the creation of interesting projects. It begins with a basic introduction to programming and Kotlin, then progresses through text analysis, image manipu…


Published on 5 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate