Podcast Episodes

Back to Search
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

This Book titled "Practical Reverse Engineering." It provides a comprehensive guide to reverse engineering techniques for x86, x64, and ARM architect…

1 year, 1 month ago

Short Long
View Episode
Practical Linux Security Cookbook
Practical Linux Security Cookbook

The Book "Practical Linux Security Cookbook," which provides a guide to configuring and implementing security measures on Linux systems. It covers to…

1 year, 1 month ago

Short Long
View Episode
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

This Book, "Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things" provides a comprehensive guide to the security vulnerabi…

1 year, 2 months ago

Short Long
View Episode
PowerShell for Sysadmins: Workflow Automation Made Easy
PowerShell for Sysadmins: Workflow Automation Made Easy

The provided Book "PowerShell for Sysadmins: Workflow Automation Made Easy" by Adam Bertram. The excerpt is a guide to using PowerShell for automatin…

1 year, 2 months ago

Short Long
View Episode
PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems
PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems

The provided Book is an excerpt from a book titled "PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems," focu…

1 year, 2 months ago

Short Long
View Episode
Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language
Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language

The Book provides a comprehensive guide to Microsoft Power BI, a powerful business intelligence tool. It begins with a basic overview of Power BI's c…

1 year, 2 months ago

Short Long
View Episode
PoC or GTFO, Volume 2
PoC or GTFO, Volume 2

This Book, "PoC or GTFO, Volume 2," is a compilation of articles written by a variety of authors on the subject of software exploitation. The article…

1 year, 2 months ago

Short Long
View Episode
PoC or GTFO, Volume 3
PoC or GTFO, Volume 3

The Book titled "PoC or GTFO, Volume 3" which contains various articles discussing "Proof of Concept" exploits for a wide range of systems and device…

1 year, 2 months ago

Short Long
View Episode
PoC or GTFO, Volume 1
PoC or GTFO, Volume 1

The Book, "PoC or GTFO, Volume 1" is a collection of articles and essays from various authors on the topic of computer security and reverse engineeri…

1 year, 2 months ago

Short Long
View Episode
Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology
Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology

The Book, Physical Red Team Operations: Physical Penetration Testing, is a guide for security professionals on how to plan and execute physical red t…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us