Podcast Episodes

Back to Search
Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester's Guide



This Book "Metasploit: The Penetration Tester's Guide." It is a guide for those who want to learn how to use the Metasploit Framework to test the security of computer systems and networks. The text c…


Published on 10 months ago

Memory Systems: Cache, DRAM, Disk

Memory Systems: Cache, DRAM, Disk



The Book provide a comprehensive overview of memory systems, focusing on the design, implementation, and optimization of various memory components, including caches, DRAM, and disks. The texts explor…


Published on 10 months ago

Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks

Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks



This Book, Mastering Windows Security and Hardening, is a comprehensive guide to securing Windows systems, focusing on both client and server environments. It covers a wide range of topics, including…


Published on 10 months ago

Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy

Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy



This Book is a comprehensive guide to mastering Windows Group Policy. It covers the fundamentals of Group Policy, including its role in managing users and computers in an Active Directory environment…


Published on 10 months, 1 week ago

Mastering Python Forensics

Mastering Python Forensics



The Book "Mastering Python Forensics" by Dr. Michael Spreitzenbarth and Dr. Johann Uhrmann. This book teaches readers how to use Python to perform digital forensic investigations on a variety of plat…


Published on 10 months, 1 week ago

Mastering Docker: Enhance your containerization and DevOps skills to deliver production-ready applications

Mastering Docker: Enhance your containerization and DevOps skills to deliver production-ready applications



This is a collection of excerpts from the book Mastering Docker, 4th Edition, which explores the fundamentals and advanced uses of Docker, a containerization technology that allows developers to pack…


Published on 10 months, 1 week ago

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure



This Book "Mastering Defensive Security," which covers essential concepts and techniques for securing computer systems, networks, and data. The book aims to guide IT professionals, data scientists, a…


Published on 10 months, 1 week ago

Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense



The Book "Mastering Cyber Intelligence," which aims to equip readers with the knowledge and skills necessary to develop and implement a comprehensive cyber threat intelligence program. The book explo…


Published on 10 months, 1 week ago

Mastering Azure Security: Keeping your Microsoft Azure workloads safe, 2nd Edition

Mastering Azure Security: Keeping your Microsoft Azure workloads safe, 2nd Edition



This Book Mastering Azure Security by Mustafa Toroman and Tom Janetscheck. It provides a comprehensive guide to securing Microsoft Azure workloads, covering topics like identity management, governanc…


Published on 10 months, 1 week ago

Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks

Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks



This excerpt is from "Mastering Linux Security and Hardening, 3rd Edition," a book that focuses on protecting Linux systems from cyberattacks. The text covers various security topics such as configur…


Published on 10 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate