Podcast Episodes
Back to Search
Reverse Engineering Questions and Answers - George Duckett
This Stack Exchange Q&A thread centers on reverse engineering, covering various aspects like disassembling binaries (ARM, x86), identifying compilers…
1 year, 2 months ago
Red Team Development and Operations: A practical guide
This Book is a practical guide to red teaming in cybersecurity, written by Joe Vest and James Tubberville. It explains the methodology of red teaming…
1 year, 2 months ago
Red Hat Linux Security and Optimization
This is an excerpt from Red Hat Linux Security and Optimization, a technical manual authored by Mohammed J. Kabir. The book extensively covers system…
1 year, 2 months ago
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
This Book is an excerpt from a study guide for the Red Hat Certified Engineer (RHCE) exam, focusing on Ansible automation. It covers Ansible's fundam…
1 year, 2 months ago
The Red Team Handbook - The Army's Guide To Making Better Decisions
The "Red Team Handbook" produced by the TRADOC G-2 Operational Environment Enterprise outlines the U.S. Army's approach to Red Teaming, a flexible co…
1 year, 2 months ago
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)
This Book is a collection of chapters exploring security, privacy, and trust issues in the Internet of Things (IoT) and Cyber-Physical Systems (CPS),…
1 year, 2 months ago
Real-World Python: A Hacker's Guide to Solving Problems with Code
This Book is a collection of excerpts from Real-World Python: A Hacker’s Guide to Solving Problems with Code, by Lee Vaughan. The excerpts detail num…
1 year, 2 months ago
Raspberry Pi Assembly Language Programming: ARM Processor Coding
This Book is from a Book on Raspberry Pi assembly language programming. It covers fundamental assembly instructions, memory management, and control f…
1 year, 2 months ago
Ransomware and Cyber Extortion: Response and Prevention
This Book is from a Book titled "Ransomware and Cyber Extortion Response and Prevention," which provides a comprehensive guide to understanding, resp…
1 year, 2 months ago
Racket Programming the Fun Way: From Strings to Turing Machines
This Book is a table of contents and excerpts from the Book "Racket Programming the Fun Way" a tutorial teaching the Racket programming language. The…
1 year, 2 months ago