Podcast Episodes

Back to Search
Reverse Engineering Questions and Answers - George Duckett
Reverse Engineering Questions and Answers - George Duckett

This Stack Exchange Q&A thread centers on reverse engineering, covering various aspects like disassembling binaries (ARM, x86), identifying compilers…

1 year, 2 months ago

Short Long
View Episode
Red Team Development and Operations: A practical guide
Red Team Development and Operations: A practical guide

This Book is a practical guide to red teaming in cybersecurity, written by Joe Vest and James Tubberville. It explains the methodology of red teaming…

1 year, 2 months ago

Short Long
View Episode
Red Hat Linux Security and Optimization
Red Hat Linux Security and Optimization

This is an excerpt from Red Hat Linux Security and Optimization, a technical manual authored by Mohammed J. Kabir. The book extensively covers system…

1 year, 2 months ago

Short Long
View Episode
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)

This Book is an excerpt from a study guide for the Red Hat Certified Engineer (RHCE) exam, focusing on Ansible automation. It covers Ansible's fundam…

1 year, 2 months ago

Short Long
View Episode
The Red Team Handbook - The Army's Guide To Making Better Decisions
The Red Team Handbook - The Army's Guide To Making Better Decisions

The "Red Team Handbook" produced by the TRADOC G-2 Operational Environment Enterprise outlines the U.S. Army's approach to Red Teaming, a flexible co…

1 year, 2 months ago

Short Long
View Episode
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

This Book is a collection of chapters exploring security, privacy, and trust issues in the Internet of Things (IoT) and Cyber-Physical Systems (CPS),…

1 year, 2 months ago

Short Long
View Episode
Real-World Python: A Hacker's Guide to Solving Problems with Code
Real-World Python: A Hacker's Guide to Solving Problems with Code

This Book is a collection of excerpts from Real-World Python: A Hacker’s Guide to Solving Problems with Code, by Lee Vaughan. The excerpts detail num…

1 year, 2 months ago

Short Long
View Episode
Raspberry Pi Assembly Language Programming: ARM Processor Coding
Raspberry Pi Assembly Language Programming: ARM Processor Coding

This Book is from a Book on Raspberry Pi assembly language programming. It covers fundamental assembly instructions, memory management, and control f…

1 year, 2 months ago

Short Long
View Episode
Ransomware and Cyber Extortion: Response and Prevention
Ransomware and Cyber Extortion: Response and Prevention

This Book is from a Book titled "Ransomware and Cyber Extortion Response and Prevention," which provides a comprehensive guide to understanding, resp…

1 year, 2 months ago

Short Long
View Episode
Racket Programming the Fun Way: From Strings to Turing Machines
Racket Programming the Fun Way: From Strings to Turing Machines

This Book is a table of contents and excerpts from the Book "Racket Programming the Fun Way" a tutorial teaching the Racket programming language. The…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us