Podcast Episodes

Back to Search
The Social Engineer's Playbook: A Practical Guide to Pretexting

The Social Engineer's Playbook: A Practical Guide to Pretexting



Jeremiah Talamantes's The Social Engineer's Playbook is a practical guide to pretexting, a form of social engineering. The book covers various social engineering techniques, including phishing, baiti…


Published on 2 months, 3 weeks ago

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime



This Book excerpt chronicles the rise of ransomware and the efforts of a unique group of cybersecurity experts, the Ransomware Hunting Team, to combat it. The team, composed of individuals with diver…


Published on 2 months, 3 weeks ago

The Mac Hacker's Handbook

The Mac Hacker's Handbook



This Book is an excerpt from "The Mac Hacker's Handbook," a book exploring the security vulnerabilities of Mac OS X. The book details methods for discovering and exploiting vulnerabilities in Mac OS …


Published on 2 months, 4 weeks ago

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks



This Book is an excerpt from The Hacker's Handbook, a technical manual detailing network security vulnerabilities and exploits. It systematically explores various protocols (TCP/IP, SMTP, HTTP, DNS, …


Published on 2 months, 4 weeks ago

The Hacker Playbook 2: Practical Guide To Penetration Testing

The Hacker Playbook 2: Practical Guide To Penetration Testing



"The Hacker Playbook 2" is a guide to penetration testing, expanding upon the first book with updated attacks and techniques. The book covers various attack vectors, including network scanning, web a…


Published on 2 months, 4 weeks ago

The Complete Book of Locks and Locksmithing

The Complete Book of Locks and Locksmithing



This Book is an excerpt from "The Complete Book of Locks and Locksmithing," a comprehensive guide to locks and locksmithing. It covers the history of locks, various lock mechanisms (including pin tum…


Published on 2 months, 4 weeks ago

The Analytics Setup Guidebook

The Analytics Setup Guidebook



This guidebook from Holistics, a data analytics company, offers a practical framework for building modern analytics systems. It covers setting up an analytics stack, emphasizing the ELT (Extract, Loa…


Published on 2 months, 4 weeks ago

Testing and Securing Android Studio Applications

Testing and Securing Android Studio Applications



This Book is the preface and table of contents from a book titled Testing and Securing Android Studio Applications. The book guides Android developers on debugging and securing their apps using Andro…


Published on 2 months, 4 weeks ago

TCP/IP Protocol Suite

TCP/IP Protocol Suite



The provided Book is a table of contents and excerpts from Behrouz Forouzan's "TCP/IP Protocol Suite, 4th Edition," covering various networking concepts. It details the TCP/IP protocol suite's archit…


Published on 3 months ago

Take Control of Wi-Fi Networking and Security

Take Control of Wi-Fi Networking and Security



Glenn Fleishman's Take Control of Wi-Fi Networking and Security is a comprehensive guide to setting up and securing Wi-Fi networks. The book covers fundamental concepts like Wi-Fi standards and spect…


Published on 3 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate