Podcast Episodes
Back to Search
Linux System Programming: Talking Directly to the Kernel and C Library
The provided Book "OReilly.Linux System Programming 2nd.Edition" and cover various aspects of Linux system programming, including file I/O, process m…
1 year, 3 months ago
Understanding the Linux Kernel
The Book are a collection of excerpts from "Understanding the Linux Kernel" by Daniel P. Bovet and Marco Cesati. The book provides a detailed explana…
1 year, 3 months ago
Operator Handbook: Red Team + OSINT + Blue Team Reference
This Book provides a comprehensive guide for red and blue teams conducting security operations. It covers a wide range of topics including tools, tec…
1 year, 3 months ago
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
"Operationalizing Threat Intelligence" provides a comprehensive guide to building and implementing an effective threat intelligence program. The book…
1 year, 3 months ago
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
This Book is a guide for conducting open source intelligence (OSINT) investigations. It provides a detailed overview of OSINT techniques and resource…
1 year, 3 months ago
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
This Book provides a comprehensive guide to Open Source Intelligence (OSINT) techniques, covering a wide range of topics from digital security and so…
1 year, 3 months ago
Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2
This excerpt is from a Book that teaches programmers how to work with OWL ontologies using the Owlready2 Python library. The book provides a comprehe…
1 year, 3 months ago
Official (ISC)2 Guide to the CISSP-ISSMP CBK
The Book is a comprehensive guide for the Information Systems Security Management Professional (ISSMP) certification, covering the core principles an…
1 year, 4 months ago
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them
This Book, "Offensive Shellcode from Scratch," provides an in-depth guide to understanding and creating shellcode, a type of malicious code used to e…
1 year, 4 months ago
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
The Book provides a comprehensive guide to analyzing leaked datasets, focusing on ethical considerations, technical skills, and practical tools for i…
1 year, 4 months ago