Podcast Episodes

Back to Search
Foundations of ARM64 Linux Debugging, Disassembling, and Reversing: Analyze Code, Understand Stack Memory Usage, and Reconstruct Original

Foundations of ARM64 Linux Debugging, Disassembling, and Reversing: Analyze Code, Understand Stack Memory Usage, and Reconstruct Original



Dmitry Vostokov's Book, Foundations of ARM64 Linux Debugging, Disassembling, and Reversing, provides a practical guide to understanding ARM64 assembly language and its relationship to C/C++ code. The…


Published on 7 months, 1 week ago

Viruses, Hardware and Software Trojans: Attacks and Countermeasures

Viruses, Hardware and Software Trojans: Attacks and Countermeasures



This Book explores the threats of hardware and software Trojans, particularly in critical infrastructure like telecommunications and nuclear power plants. It details the historical use of such Trojan…


Published on 7 months, 1 week ago

Unleashing the Art of Digital Forensics

Unleashing the Art of Digital Forensics



"Unleashing the Art of Digital Forensics" is a Book covering various aspects of digital forensics, including techniques, challenges, and legal considerations. It explores specific areas like steganog…


Published on 7 months, 1 week ago

UNIX and Linux System Administration Handbook, 4th Edition

UNIX and Linux System Administration Handbook, 4th Edition



This Book is an excerpt from the UNIX and Linux System Administration Handbook, covering various aspects of system administration. Sections detail software management, including scripting with Perl a…


Published on 7 months, 1 week ago

UNIX: The Textbook, Third Edition

UNIX: The Textbook, Third Edition



This Book chapter provides a "Quick Start" guide to the UNIX operating system, covering fundamental commands for file management, text editing (vi, vim, emacs), and shell scripting (Bourne and C shel…


Published on 7 months, 1 week ago

Understanding Network Hacks: Attack and Defense with Python 3

Understanding Network Hacks: Attack and Defense with Python 3



This Book is an excerpt from a book titled "Understanding Network Hacks Attack and Defense with Python 3," which teaches network security concepts and hacking techniques using Python. The book covers…


Published on 7 months, 1 week ago

Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program

Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program



This Book is from a cybersecurity risk management book, offering a practical, three-part framework for building a sustainable program. The book emphasizes understanding risk by defining critical asse…


Published on 7 months, 1 week ago

Ubuntu Unleashed 2019: Covering 18.04, 18.10, 19.04, and 19.10

Ubuntu Unleashed 2019: Covering 18.04, 18.10, 19.04, and 19.10



This Book excerpt details Ubuntu Linux, focusing on installation, system administration, and software management. It covers using both the graphical user interface and command-line interface, explori…


Published on 7 months, 1 week ago

Troubleshooting & Maintaining PCs All-in-One For Dummies

Troubleshooting & Maintaining PCs All-in-One For Dummies



This Book is an excerpt from the fourth edition of Troubleshooting & Maintaining Your PC All-in-One For Dummies. The book offers comprehensive guidance on resolving various PC problems. It's divided …


Published on 7 months, 1 week ago

Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership

Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership



This Book is an excerpt from Tribe of Hackers: Security Leaders, a book offering cybersecurity leadership strategies. The excerpt features interviews with numerous cybersecurity professionals, who sh…


Published on 7 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate