Podcast Episodes

Back to Search
Linux For Hacking - Install Test And Hack
Linux For Hacking - Install Test And Hack

This Book, an excerpt from "Linux For Hacking", is a guide for Linux system administrators on how to secure their systems from hackers. The guide cov…

1 year, 3 months ago

Short Long
View Episode
Linux: Embedded Development
Linux: Embedded Development

This excerpt from the book "Linux Embedded Development" provides a comprehensive guide to embedded Linux development. It begins by introducing fundam…

1 year, 3 months ago

Short Long
View Episode
Linux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible

The Book provide a comprehensive guide to the Linux command line and shell scripting. The text covers a wide range of topics, including basic command…

1 year, 3 months ago

Short Long
View Episode
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing

This Book is a technical manual on IT security that focuses on Red Hat products and solutions. The text covers basic network protocols, Linux system …

1 year, 3 months ago

Short Long
View Episode
Learning iOS Forensics
Learning iOS Forensics

This is a technical book about iOS forensics for investigators. The book begins with an overview of iOS devices and how to identify them, then explai…

1 year, 3 months ago

Short Long
View Episode
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

This Book is a guide for performing security testing with Kali Linux. It explores essential tools and techniques for vulnerability identification and…

1 year, 3 months ago

Short Long
View Episode
Learning Java by Building Android Games
Learning Java by Building Android Games

The Book provide a comprehensive guide to Android game development using Java, starting with basic concepts and gradually progressing to more advance…

1 year, 3 months ago

Short Long
View Episode
Learning the vi and Vim Editors: Text Processing at Maximum Speed and Power
Learning the vi and Vim Editors: Text Processing at Maximum Speed and Power

The Book provides a comprehensive guide to the vi text editor, a powerful tool for Unix-based systems, and its various clones such as Vim, nvi, elvis…

1 year, 3 months ago

Short Long
View Episode
Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

This Book provides an in-depth guide to using Nessus, a popular vulnerability assessment and penetration testing tool. The book begins by defining vu…

1 year, 3 months ago

Short Long
View Episode
Learning Metasploit Exploitation and Development
Learning Metasploit Exploitation and Development

The source Book provides a comprehensive guide to the Metasploit Framework, a powerful tool used by penetration testers to find and exploit security …

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us