Podcast Episodes

Back to Search
OWASP Web Security Testing Guide WSTG

OWASP Web Security Testing Guide WSTG



This summary is talking about the Book "OWASP Web Security Testing Guide WSTG".

The OWASP Web Security Testing Guide v4.2 provides a comprehensive framework for testing the security of web application…


Published on 1 year, 1 month ago

Warez: The Infrastructure and Aesthetics of Piracy

Warez: The Infrastructure and Aesthetics of Piracy



This summary is talking about the Book "Warez: The Infrastructure and Aesthetics of Piracy".

Explores the history and culture of the Warez Scene, a global network of pirates who distribute copyrighted…


Published on 1 year, 1 month ago

Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid

Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid



This summary is talking about the Book "Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid".

This text provides an overview of reactive programming using R…


Published on 1 year, 1 month ago

Ransomware and Cybercrime

Ransomware and Cybercrime



This summary is talking about the Book "Ransomware and Cybercrime".

The excerpt from Ransomware and Cybercrime by Andrew Jenkinson focuses on the rising threat of ransomware and cybercrime. It examine…


Published on 1 year, 1 month ago

Unauthorised Access: Physical Penetration Testing For IT Security Teams

Unauthorised Access: Physical Penetration Testing For IT Security Teams



This summary is talking about the Book "Unauthorised Access: Physical Penetration Testing For IT Security Teams".

The sources are a compilation of excerpts from a book titled "Unauthorized Access", wh…


Published on 1 year, 1 month ago

Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic

Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic



This summary is talking about the Book "Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic".

The sources provide a comprehensive guide to Wireshark, an open-source netw…


Published on 1 year, 1 month ago

Response Evidence Preservation and Collection

Response Evidence Preservation and Collection



This summary is talking about the Book "Response Evidence Preservation and Collection".

The provided text is a collection of excerpts from a PDF document about digital evidence preservation and collec…


Published on 1 year, 1 month ago

RTFM - Red Team Field Manual v2

RTFM - Red Team Field Manual v2



This summary is talking about the Book "RTFM - Red Team Field Manual v2".

This document, titled "RTFM - Red Team Field Manual," serves as a comprehensive guide for cybersecurity professionals conducti…


Published on 1 year, 1 month ago

Real-World Bug Hunting: A Field Guide to Web Hacking

Real-World Bug Hunting: A Field Guide to Web Hacking



This summary is talking about the Book "Real-World Bug Hunting: A Field Guide to Web Hacking".

This book is a comprehensive guide to web hacking, focusing on finding and exploiting security vulnerabil…


Published on 1 year, 1 month ago

Red Team Guide A Practical Guide For Red Team And Offensive Security

Red Team Guide A Practical Guide For Red Team And Offensive Security



This summary is talking about the Book "Red Team Guide A Practical Guide For Red Team And Offensive Security".

The provided text is an excerpt from a "Red Team Guide," which serves as a practical manu…


Published on 1 year, 1 month ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate