Podcast Episodes

Back to Search
Windows Kernel Programming

Windows Kernel Programming



This Book excerpts Windows kernel programming, covering Windows internals and kernel development. It explains process and thread structures, including memory management and handle tables. The book de…


Published on 1 month, 4 weeks ago

Windows Internals, Part 2 (Developer Reference)

Windows Internals, Part 2 (Developer Reference)



This Book is an excerpt from the seventh edition of "Windows Internals, Part 2," a technical book detailing the inner workings of the Windows operating system. It covers a wide array of low-level sys…


Published on 1 month, 4 weeks ago

Windows and Linux Penetration Testing from Scratch

Windows and Linux Penetration Testing from Scratch



This Book is an excerpt from a penetration testing manual, focusing on techniques for compromising Windows and Linux systems. The book details various methods of information gathering, including OSIN…


Published on 1 month, 4 weeks ago

Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure



The Book is an excerpt on securing Windows 8 and Windows Server 2012 systems. The Book discusses various aspects of network security, including general network settings, remote access, Internet conne…


Published on 1 month, 4 weeks ago

Web Application Advanced Hacking

Web Application Advanced Hacking



Maor Tal's "Web Application Advanced Hacking" is a hands-on guide to advanced web application hacking techniques for security researchers and bug bounty hunters. The book covers a range of topics, in…


Published on 1 month, 4 weeks ago

You Don't Know JS: this & Object Prototypes

You Don't Know JS: this & Object Prototypes



This Book provides excerpts from Kyle Simpson's Book, "You Don't Know JS: this & Object Prototypes," which explores JavaScript's often-misunderstood this keyword and object prototypes. The Book expla…


Published on 2 months ago

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The Shellcoder's Handbook: Discovering and Exploiting Security Holes



The provided Book is a compilation of excerpts from "The Shellcoder’s Handbook, Second Edition," a book focusing on software exploitation. It details various methods of exploiting software vulnerabil…


Published on 2 months ago

Web Hacking 101

Web Hacking 101



"Web Hacking 101" is a guide to ethical hacking, focusing on real-world examples of vulnerability reports that yielded bug bounties. The book covers various web vulnerabilities, including HTML inject…


Published on 2 months ago

Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs

Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs



This Book is a table of contents and excerpts from the "Zed Attack Proxy Cookbook," a guide to using the OWASP ZAP tool for web application security testing. The book covers various web application v…


Published on 2 months ago

Zero Trust Networks: Building Secure Systems in Untrusted Networks

Zero Trust Networks: Building Secure Systems in Untrusted Networks



Zero Trust Networks, by Evan Gilman and Doug Barth, explores building secure systems in untrusted networks. The book critiques the limitations of perimeter-based security, arguing that assuming inter…


Published on 2 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate