Podcast Episodes

Back to Search
Security Automation with Ansible 2
Security Automation with Ansible 2

This Book is a table of contents and excerpts from Security Automation with Ansible 2, a book detailing how to automate security tasks using Ansible.…

1 year, 2 months ago

Short Long
View Episode
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

"Securing VoIP Networks" is a technical Book examining the security challenges of Voice over Internet Protocol (VoIP) systems. The book details vario…

1 year, 2 months ago

Short Long
View Episode
Secure Programming with Static Analysis
Secure Programming with Static Analysis

Secure Programming with Static Analysis is a Book detailing how to write secure software using static analysis tools. It focuses on common coding err…

1 year, 2 months ago

Short Long
View Episode
Secure PHP Development: Building 50 Practical Applications
Secure PHP Development: Building 50 Practical Applications

This Book excerpt details the creation of numerous PHP applications, focusing on secure coding practices and a reusable application framework. The au…

1 year, 2 months ago

Short Long
View Episode
Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML
Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML

This Book is an excerpt from Dennis Sawyers' Book, "Automated Machine Learning with Microsoft Azure," which provides a comprehensive guide to using a…

1 year, 2 months ago

Short Long
View Episode
Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language
Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language

This Book is a table of contents and excerpts from a Book teaching Rust web programming. It covers fundamental Rust concepts like memory management a…

1 year, 2 months ago

Short Long
View Episode
Modern Vulnerability Management: Predictive Cybersecurity
Modern Vulnerability Management: Predictive Cybersecurity

Modern Vulnerability Management: Predictive Cybersecurity is a Book by Roytman and Bellis that offers a data-driven approach to vulnerability managem…

1 year, 2 months ago

Short Long
View Episode
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

This Book explores the inner workings of various malware, including the TDL3 and TDL4 rootkits and the Festi, Rovnix, Gapz, and Olmasco bootkits. The…

1 year, 2 months ago

Short Long
View Episode
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel

Rootkits, as explained in "Rootkits - Subverting the Windows Kernel," are powerful hacking tools that enable attackers to maintain virtually undetect…

1 year, 2 months ago

Short Long
View Episode
RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)
RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)

This Book excerpt is a training guide and exam preparation manual for the Red Hat Certified System Administrator (RHCSA) exam on Red Hat Enterprise L…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us