Podcast Episodes

Back to Search
JavaScript for Sound Artists

JavaScript for Sound Artists



It is a guide for individuals interested in creating interactive audio applications using JavaScript within a web browser. The book introduces foundational JavaScript concepts such as variables, data…


Published on 6 hours ago

Building Your Own JavaScript Framework: Architect extensible and reusable framework systems

Building Your Own JavaScript Framework: Architect extensible and reusable framework systems



It covers various aspects of JavaScript framework development, ranging from historical context and the evolution of the ecosystem to core architectural patterns, tooling, testing, documentation, and …


Published on 6 hours ago

Visual Threat Intelligence: An Illustrated Guide For Threat Researchers

Visual Threat Intelligence: An Illustrated Guide For Threat Researchers



Beginning with fundamental concepts like the intelligence lifecycle and various gathering disciplines such as OSINT, HUMINT, GEOINT, SIGINT, and FININT. It explores identifying and profiling threat a…


Published on 1 day, 5 hours ago

12 Twisted Python Projects for Young Coders

12 Twisted Python Projects for Young Coders



Designed to teach programming to beginners in a fun and engaging way. The book focuses on using the Python language along with the guizero library to create Graphical User Interfaces (GUIs) through t…


Published on 1 day, 5 hours ago

Think Like a Software Engineering Manager

Think Like a Software Engineering Manager



Explores the fundamental role of an engineering manager (EM), contrasting it with that of an individual contributor (IC) and addressing common misconceptions about the transition. It emphasizes the c…


Published on 1 day, 18 hours ago

The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities

The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities



It explains the software vulnerability life cycle, from inception to deprecation, and discusses different types of vulnerabilities, such as cross-site scripting and SQL injection. The text also cover…


Published on 1 day, 18 hours ago

The Android Malware Handbook: Detection and Analysis by Human and Machine

The Android Malware Handbook: Detection and Analysis by Human and Machine



Offers a comprehensive guide to Android malware, covering its history and current landscape. It details various malware types, such as trojans, ransomware, and SMS fraud, and explains both static and…


Published on 2 days, 11 hours ago

Software Engineering for Games in Serious Contexts: Theories, Methods, Tools, and Experiences

Software Engineering for Games in Serious Contexts: Theories, Methods, Tools, and Experiences



Exploring the creation of serious games and gamified applications. The excerpts highlight various aspects of this field, including user experience evaluation methods, the development of content-agnos…


Published on 2 days, 12 hours ago

Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR

Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR



Focuses on SOAR solutions and their role in modern cybersecurity. It emphasizes the need for automated responses to security incidents due to the overwhelming number of alerts and the shortage of ski…


Published on 3 days, 16 hours ago

Security Testing with Raspberry Pi

Security Testing with Raspberry Pi



Focused on security testing and ethical hacking using Raspberry Pi computers. It provides practical guides on setting up a lab environment with virtual machines like Kali Linux and Metasploitable, th…


Published on 3 days, 16 hours ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate