Podcast Episodes

Back to Search
Linux System Programming: Talking Directly to the Kernel and C Library
Linux System Programming: Talking Directly to the Kernel and C Library

The provided Book "OReilly.Linux System Programming 2nd.Edition" and cover various aspects of Linux system programming, including file I/O, process m…

1 year, 3 months ago

Short Long
View Episode
Understanding the Linux Kernel
Understanding the Linux Kernel

The Book are a collection of excerpts from "Understanding the Linux Kernel" by Daniel P. Bovet and Marco Cesati. The book provides a detailed explana…

1 year, 3 months ago

Short Long
View Episode
Operator Handbook: Red Team + OSINT + Blue Team Reference
Operator Handbook: Red Team + OSINT + Blue Team Reference

This Book provides a comprehensive guide for red and blue teams conducting security operations. It covers a wide range of topics including tools, tec…

1 year, 3 months ago

Short Long
View Episode
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

"Operationalizing Threat Intelligence" provides a comprehensive guide to building and implementing an effective threat intelligence program. The book…

1 year, 3 months ago

Short Long
View Episode
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

This Book is a guide for conducting open source intelligence (OSINT) investigations. It provides a detailed overview of OSINT techniques and resource…

1 year, 3 months ago

Short Long
View Episode
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

This Book provides a comprehensive guide to Open Source Intelligence (OSINT) techniques, covering a wide range of topics from digital security and so…

1 year, 3 months ago

Short Long
View Episode
Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2
Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2

This excerpt is from a Book that teaches programmers how to work with OWL ontologies using the Owlready2 Python library. The book provides a comprehe…

1 year, 3 months ago

Short Long
View Episode
Official (ISC)2 Guide to the CISSP-ISSMP CBK
Official (ISC)2 Guide to the CISSP-ISSMP CBK

The Book is a comprehensive guide for the Information Systems Security Management Professional (ISSMP) certification, covering the core principles an…

1 year, 4 months ago

Short Long
View Episode
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them

This Book, "Offensive Shellcode from Scratch," provides an in-depth guide to understanding and creating shellcode, a type of malicious code used to e…

1 year, 4 months ago

Short Long
View Episode
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data

The Book provides a comprehensive guide to analyzing leaked datasets, focusing on ethical considerations, technical skills, and practical tools for i…

1 year, 4 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us