Podcast Episodes

Back to Search
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing

This Book is a technical manual on IT security that focuses on Red Hat products and solutions. The text covers basic network protocols, Linux system …

1 year, 4 months ago

Short Long
View Episode
Learning iOS Forensics
Learning iOS Forensics

This is a technical book about iOS forensics for investigators. The book begins with an overview of iOS devices and how to identify them, then explai…

1 year, 4 months ago

Short Long
View Episode
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

This Book is a guide for performing security testing with Kali Linux. It explores essential tools and techniques for vulnerability identification and…

1 year, 4 months ago

Short Long
View Episode
Learning Java by Building Android Games
Learning Java by Building Android Games

The Book provide a comprehensive guide to Android game development using Java, starting with basic concepts and gradually progressing to more advance…

1 year, 4 months ago

Short Long
View Episode
Learning the vi and Vim Editors: Text Processing at Maximum Speed and Power
Learning the vi and Vim Editors: Text Processing at Maximum Speed and Power

The Book provides a comprehensive guide to the vi text editor, a powerful tool for Unix-based systems, and its various clones such as Vim, nvi, elvis…

1 year, 4 months ago

Short Long
View Episode
Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

This Book provides an in-depth guide to using Nessus, a popular vulnerability assessment and penetration testing tool. The book begins by defining vu…

1 year, 4 months ago

Short Long
View Episode
Learning Metasploit Exploitation and Development
Learning Metasploit Exploitation and Development

The source Book provides a comprehensive guide to the Metasploit Framework, a powerful tool used by penetration testers to find and exploit security …

1 year, 4 months ago

Short Long
View Episode
Learning Linux Binary Analysis
Learning Linux Binary Analysis

"Learning Linux Binary Analysis" is a technical guide for computer security researchers and software engineers who want to learn about binary analysi…

1 year, 4 months ago

Short Long
View Episode
Learning DevOps - Second Edition
Learning DevOps - Second Edition

This book, Learning DevOps, Second Edition, is a comprehensive guide to DevOps practices and principles, focusing on practical application and implem…

1 year, 4 months ago

Short Long
View Episode
Learn to Program with Kotlin: From the Basics to Projects with Text and Image Processing
Learn to Program with Kotlin: From the Basics to Projects with Text and Image Processing

A book that teaches Kotlin programming through the creation of interesting projects. It begins with a basic introduction to programming and Kotlin, t…

1 year, 4 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us