Podcast Episodes
Back to Search
Build A SaaS App in Rails 7
A comprehensive guide to building a Software as a Service (SaaS) application using Ruby on Rails 7. It begins with setting up the development environ…
23 hours ago
Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects
Explores the multifaceted domain of practical cybersecurity architecture, focusing on the strategic design, implementation, and ongoing management of…
1 day, 23 hours ago
Penetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing
Outlines comprehensive mobile penetration testing, covering Android and iOS application security. It describes essential methodologies like reconnais…
2 days, 23 hours ago
Penetration Testing Step-By-Step Guide
A practical, step-by-step guide to penetration testing, designed for individuals new to ethical hacking. It covers a comprehensive range of topics, s…
3 days, 23 hours ago
React in Depth
Offers an in-depth exploration of React development, focusing on advanced concepts and practical application. It covers core React patterns such as P…
4 days, 23 hours ago
Kubernetes for Developers
Focusing on Google Kubernetes Engine (GKE), the book serves as a practical guide for developers to understand and utilize Kubernetes for application …
5 days, 23 hours ago
Inside Cyber Warfare: Mapping the Cyber Underworld
A comprehensive analysis of the evolving landscape of cyber warfare, information warfare, and artificial intelligence. It examines how these domains …
6 days, 23 hours ago
Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit
Focusing heavily on web application security and the powerful Metasploit Framework. It covers essential stages of penetration testing, including reco…
1 week ago
Component-Based Rails Applications: Large Domains Under Control
It details how to extract, refactor, and manage components using Rails engines, addressing dependency management, database migration, and continuous …
1 week, 1 day ago
Hacker: Hack The System: The "Ethical" Python Hacking Guide
An educational guide on ethical hacking and cybersecurity. The content focuses on utilizing Python for various security-related tasks, including expl…
1 week, 2 days ago