Podcast Episodes

Back to Search
Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20

Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20



This is a comprehensive guide to software architecture using C++. It covers key concepts like architectural styles, requirements, system design, performance, security, and deployment. The book delves…


Published on 9 months, 3 weeks ago

OSSTMM 3

OSSTMM 3



The OSSTMM (Open Source Security Testing Methodology Manual) is a framework for conducting comprehensive security audits. This methodology emphasizes testing the actual security of operational proces…


Published on 9 months, 3 weeks ago

MacOS and iOS Internals, Volume III: Security & Insecurity

MacOS and iOS Internals, Volume III: Security & Insecurity



The provided Book is an excerpt from a book titled "OS Internals Volume III: Security & Insecurity" by Jonathan Levin. This book describes security techniques and vulnerabilities in Apple's operating…


Published on 9 months, 3 weeks ago

MacOS and iOS Internals, Volume I: User Mode

MacOS and iOS Internals, Volume I: User Mode



The Book provide an in-depth look at the inner workings of the Apple operating systems, MacOS X and iOS, from the perspective of an operating system developer, Jonathan Levin. The book, OS Internals,…


Published on 9 months, 3 weeks ago

Linux System Programming: Talking Directly to the Kernel and C Library

Linux System Programming: Talking Directly to the Kernel and C Library



The provided Book "OReilly.Linux System Programming 2nd.Edition" and cover various aspects of Linux system programming, including file I/O, process management, memory management, signals, and time ma…


Published on 9 months, 3 weeks ago

Understanding the Linux Kernel

Understanding the Linux Kernel



The Book are a collection of excerpts from "Understanding the Linux Kernel" by Daniel P. Bovet and Marco Cesati. The book provides a detailed explanation of the inner workings of the Linux kernel, fo…


Published on 9 months, 3 weeks ago

Operator Handbook: Red Team + OSINT + Blue Team Reference

Operator Handbook: Red Team + OSINT + Blue Team Reference



This Book provides a comprehensive guide for red and blue teams conducting security operations. It covers a wide range of topics including tools, techniques, and strategies for both offensive and def…


Published on 9 months, 3 weeks ago

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs



"Operationalizing Threat Intelligence" provides a comprehensive guide to building and implementing an effective threat intelligence program. The book covers a wide range of topics, including understa…


Published on 9 months, 3 weeks ago

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information



This Book is a guide for conducting open source intelligence (OSINT) investigations. It provides a detailed overview of OSINT techniques and resources, such as using search engines, social media, and…


Published on 9 months, 3 weeks ago

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information



This Book provides a comprehensive guide to Open Source Intelligence (OSINT) techniques, covering a wide range of topics from digital security and software configuration to advanced searches across s…


Published on 9 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate