Podcast Episodes

Back to Search
Modern Vulnerability Management: Predictive Cybersecurity

Modern Vulnerability Management: Predictive Cybersecurity



Modern Vulnerability Management: Predictive Cybersecurity is a Book by Roytman and Bellis that offers a data-driven approach to vulnerability management. It emphasizes risk-based vulnerability manage…


Published on 8 months, 2 weeks ago

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats



This Book explores the inner workings of various malware, including the TDL3 and TDL4 rootkits and the Festi, Rovnix, Gapz, and Olmasco bootkits. The text details the infection techniques used by the…


Published on 8 months, 2 weeks ago

Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel

Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel



Rootkits, as explained in "Rootkits - Subverting the Windows Kernel," are powerful hacking tools that enable attackers to maintain virtually undetectable access to compromised systems. The book provi…


Published on 8 months, 2 weeks ago

RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)

RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)



This Book excerpt is a training guide and exam preparation manual for the Red Hat Certified System Administrator (RHCSA) exam on Red Hat Enterprise Linux (RHEL) 8. It covers a wide range of topics, i…


Published on 8 months, 3 weeks ago

Reverse Engineering Questions and Answers - George Duckett

Reverse Engineering Questions and Answers - George Duckett



This Stack Exchange Q&A thread centers on reverse engineering, covering various aspects like disassembling binaries (ARM, x86), identifying compilers, analyzing function calls and stack frames (using…


Published on 8 months, 3 weeks ago

Red Team Development and Operations: A practical guide

Red Team Development and Operations: A practical guide



This Book is a practical guide to red teaming in cybersecurity, written by Joe Vest and James Tubberville. It explains the methodology of red teaming, which involves simulating real-world threats to …


Published on 8 months, 3 weeks ago

Red Hat Linux Security and Optimization

Red Hat Linux Security and Optimization



This is an excerpt from Red Hat Linux Security and Optimization, a technical manual authored by Mohammed J. Kabir. The book extensively covers system and network performance tuning for Red Hat Linux,…


Published on 8 months, 3 weeks ago

Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)

Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)



This Book is an excerpt from a study guide for the Red Hat Certified Engineer (RHCE) exam, focusing on Ansible automation. It covers Ansible's fundamentals, including configuration, inventory managem…


Published on 8 months, 3 weeks ago

The Red Team Handbook - The Army's Guide To Making Better Decisions

The Red Team Handbook - The Army's Guide To Making Better Decisions



The "Red Team Handbook" produced by the TRADOC G-2 Operational Environment Enterprise outlines the U.S. Army's approach to Red Teaming, a flexible cognitive approach to decision-making. It emphasizes…


Published on 8 months, 3 weeks ago

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)



This Book is a collection of chapters exploring security, privacy, and trust issues in the Internet of Things (IoT) and Cyber-Physical Systems (CPS), focusing on the integration of cloud computing an…


Published on 8 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate