Podcast Episodes

Back to Search
Accelerated Windows Memory Dump Analysis

Accelerated Windows Memory Dump Analysis



This summary is talking about the Book "Accelerated Windows Memory Dump Analysis".

The provided text excerpts are from a training manual for software diagnostics, which focuses on pattern-oriented met…


Published on 1 year ago

Raspberry Pi Cookbook: Software and Hardware Problems and Solutions

Raspberry Pi Cookbook: Software and Hardware Problems and Solutions



This summary is talking about the Book "Raspberry Pi Cookbook: Software and Hardware Problems and Solutions".

The source text provides a comprehensive guide to programming and using the Raspberry Pi, …


Published on 1 year ago

Practical Security for Agile and DevOps

Practical Security for Agile and DevOps



This summary is talking about the Book "Practical Security for Agile and DevOps".

This text comes from the book "Practical Security for Agile and DevOps" by Mark S. Merkow. It is a guide for software …


Published on 1 year ago

6800 assembly language programming

6800 assembly language programming



This summary is talking about the Book "6800 assembly language programming".

The book, "6800 Assembly Language Programming," by Lance A. Leventhal, explores the fundamentals of assembly language progr…


Published on 1 year ago

101 Labs - CompTIA Network+

101 Labs - CompTIA Network+



This summary is talking about the Book "101 Labs - CompTIA Network+".

The sources are a compilation of labs from the "101 Labs – CompTIA Network+.pdf" publication designed to provide hands-on training…


Published on 1 year ago

55 Ways to Have Fun With Google

55 Ways to Have Fun With Google



This summary is talking about the Book "55 Ways to Have Fun With Google".

The source is a book called "55 Ways to Have Fun With Google" by Philipp Lenssen. It describes a variety of playful and someti…


Published on 1 year ago

The Art of Deception: Controlling the Human Element of Security

The Art of Deception: Controlling the Human Element of Security



This summary is talking about the Book "The Art of Deception: Controlling the Human Element of Security".

Kevin Mitnick's The Art of Deception is a comprehensive guide to the tactics of social enginee…


Published on 1 year ago

Practical Forensic Analysis of Artifacts on iOS and Android Devices

Practical Forensic Analysis of Artifacts on iOS and Android Devices



This summary is talking about the Book "Practical Forensic Analysis of Artifacts on iOS and Android Devices".

This is a textbook excerpt outlining the fundamentals of mobile forensics, exploring the p…


Published on 1 year ago

Practical Linux System Administration

Practical Linux System Administration



This summary is talking about the Book "Practical Linux System Administration".

The document is an excerpt from an O'Reilly book about practical Linux system administration. It covers the fundamentals…


Published on 1 year ago

Practical Security Automation

Practical Security Automation



This summary is talking about the Book "Practical Security Automation".

The sources provide a comprehensive guide to automating security testing for software development and deployment. The primary fo…


Published on 1 year ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate