Podcast Episodes
Back to Search
Linux For Hacking - Install Test And Hack
This Book, an excerpt from "Linux For Hacking", is a guide for Linux system administrators on how to secure their systems from hackers. The guide cov…
1 year, 3 months ago
Linux: Embedded Development
This excerpt from the book "Linux Embedded Development" provides a comprehensive guide to embedded Linux development. It begins by introducing fundam…
1 year, 3 months ago
Linux Command Line and Shell Scripting Bible
The Book provide a comprehensive guide to the Linux command line and shell scripting. The text covers a wide range of topics, including basic command…
1 year, 3 months ago
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
This Book is a technical manual on IT security that focuses on Red Hat products and solutions. The text covers basic network protocols, Linux system …
1 year, 3 months ago
Learning iOS Forensics
This is a technical book about iOS forensics for investigators. The book begins with an overview of iOS devices and how to identify them, then explai…
1 year, 3 months ago
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
This Book is a guide for performing security testing with Kali Linux. It explores essential tools and techniques for vulnerability identification and…
1 year, 3 months ago
Learning Java by Building Android Games
The Book provide a comprehensive guide to Android game development using Java, starting with basic concepts and gradually progressing to more advance…
1 year, 3 months ago
Learning the vi and Vim Editors: Text Processing at Maximum Speed and Power
The Book provides a comprehensive guide to the vi text editor, a powerful tool for Unix-based systems, and its various clones such as Vim, nvi, elvis…
1 year, 3 months ago
Learning Nessus for Penetration Testing
This Book provides an in-depth guide to using Nessus, a popular vulnerability assessment and penetration testing tool. The book begins by defining vu…
1 year, 3 months ago
Learning Metasploit Exploitation and Development
The source Book provides a comprehensive guide to the Metasploit Framework, a powerful tool used by penetration testers to find and exploit security …
1 year, 3 months ago