Podcast Episodes

Back to Search
Programming Linux Anti-Reversing Technique
Programming Linux Anti-Reversing Technique

This Book excerpt details Linux anti-reversing techniques, focusing on compiler options and file format manipulation to hinder reverse engineering ef…

1 year, 3 months ago

Short Long
View Episode
Programming and Automating Cisco Networks: A guide to network programmability and automation in the data center, campus, and WAN
Programming and Automating Cisco Networks: A guide to network programmability and automation in the data center, campus, and WAN

This Book provides a comprehensive guide to network programmability and automation, covering foundational skills and specific applications in Cisco D…

1 year, 3 months ago

Short Long
View Episode
Professor Messer's CompTIA A+ 220-901 and 220-902 Course Notes
Professor Messer's CompTIA A+ 220-901 and 220-902 Course Notes

Professor Messer's CompTIA 220-1001 Core 1 A+ Course Notes is a comprehensive study guide covering various aspects of computer hardware and networkin…

1 year, 3 months ago

Short Long
View Episode
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

It explores the process of red teaming, including shaping the engagement scope, establishing rules of engagement, executing the assessment, and repor…

1 year, 3 months ago

Short Long
View Episode
Pro Ember Data: Getting Ember Data to Work with Your API
Pro Ember Data: Getting Ember Data to Work with Your API

David Tang's "Pro Ember Data" is a guide to using Ember Data with custom APIs. The book explains Ember Data's architecture, including the store, adap…

1 year, 3 months ago

Short Long
View Episode
Privacy in Practice (Security, Audit and Leadership Series)
Privacy in Practice (Security, Audit and Leadership Series)

This Book is a table of contents and excerpts from a book on global privacy practices, authored by Dr. Alan Tang. The book comprehensively covers var…

1 year, 3 months ago

Short Long
View Episode
Preventing Ransomware: Understand, prevent, and remediate ransomware attacks
Preventing Ransomware: Understand, prevent, and remediate ransomware attacks

The provided Book "Preventing Ransomware," published by Packt Publishing. The excerpt details various aspects of malware and ransomware, including th…

1 year, 3 months ago

Short Long
View Episode
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century

"Practical Intrusion Analysis" is a comprehensive guide to intrusion detection, expanding beyond traditional vendor-specific focuses. The book covers…

1 year, 3 months ago

Short Long
View Episode
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

The Book excerpts are from a book on practical binary analysis. It explains the challenges of analyzing binaries, such as the lack of high-level abst…

1 year, 3 months ago

Short Long
View Episode
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs

This Book excerpt for the WebdriverIO automation framework, written for software testers. It covers installation and configuration, locating elements…

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us