Podcast Episodes

Back to Search
MacOS and iOS Internals, Volume III: Security & Insecurity
MacOS and iOS Internals, Volume III: Security & Insecurity

The provided Book is an excerpt from a book titled "OS Internals Volume III: Security & Insecurity" by Jonathan Levin. This book describes security t…

1 year, 2 months ago

Short Long
View Episode
MacOS and iOS Internals, Volume I: User Mode
MacOS and iOS Internals, Volume I: User Mode

The Book provide an in-depth look at the inner workings of the Apple operating systems, MacOS X and iOS, from the perspective of an operating system …

1 year, 2 months ago

Short Long
View Episode
Linux System Programming: Talking Directly to the Kernel and C Library
Linux System Programming: Talking Directly to the Kernel and C Library

The provided Book "OReilly.Linux System Programming 2nd.Edition" and cover various aspects of Linux system programming, including file I/O, process m…

1 year, 2 months ago

Short Long
View Episode
Understanding the Linux Kernel
Understanding the Linux Kernel

The Book are a collection of excerpts from "Understanding the Linux Kernel" by Daniel P. Bovet and Marco Cesati. The book provides a detailed explana…

1 year, 2 months ago

Short Long
View Episode
Operator Handbook: Red Team + OSINT + Blue Team Reference
Operator Handbook: Red Team + OSINT + Blue Team Reference

This Book provides a comprehensive guide for red and blue teams conducting security operations. It covers a wide range of topics including tools, tec…

1 year, 2 months ago

Short Long
View Episode
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

"Operationalizing Threat Intelligence" provides a comprehensive guide to building and implementing an effective threat intelligence program. The book…

1 year, 2 months ago

Short Long
View Episode
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

This Book is a guide for conducting open source intelligence (OSINT) investigations. It provides a detailed overview of OSINT techniques and resource…

1 year, 2 months ago

Short Long
View Episode
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

This Book provides a comprehensive guide to Open Source Intelligence (OSINT) techniques, covering a wide range of topics from digital security and so…

1 year, 2 months ago

Short Long
View Episode
Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2
Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2

This excerpt is from a Book that teaches programmers how to work with OWL ontologies using the Owlready2 Python library. The book provides a comprehe…

1 year, 2 months ago

Short Long
View Episode
Official (ISC)2 Guide to the CISSP-ISSMP CBK
Official (ISC)2 Guide to the CISSP-ISSMP CBK

The Book is a comprehensive guide for the Information Systems Security Management Professional (ISSMP) certification, covering the core principles an…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us