Podcast Episodes

Back to Search
Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists

Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists



Provides practical instruction for electronics enthusiasts. The book covers fundamental concepts such as voltage, current, resistance, and power, explaining them with relatable analogies. Readers lea…


Published on 5 months, 1 week ago

Hacking (Compact Research: The Internet)

Hacking (Compact Research: The Internet)



Serves as a comprehensive guide for information security professionals and forensic examiners. It offers detailed methodologies for conducting digital investigations across various operating systems,…


Published on 5 months, 1 week ago

Hacking: Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing

Hacking: Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing



Serves as a comprehensive manual for individuals interested in creating and modifying electronic devices, emphasizing practical, hands-on learning. It covers fundamental concepts such as current, vol…


Published on 5 months, 1 week ago

Hack Attacks Testing: How to Conduct Your Own Security Audit

Hack Attacks Testing: How to Conduct Your Own Security Audit



Offers a detailed examination of computer hacking, its history, methods, and implications, particularly within the context of the internet. It explores various facets of hacking, including its evolut…


Published on 5 months, 1 week ago

Game Theory and Machine Learning for Cyber Security

Game Theory and Machine Learning for Cyber Security



Offers an extensive overview of computer hacking, basic security, and penetration testing. The book aims to equip readers with the knowledge of how hacking operates, enabling them to protect their sy…


Published on 5 months, 1 week ago

Fundamentals of Quantum Computing: Theory and Practice

Fundamentals of Quantum Computing: Theory and Practice



Serves as a practical guide for building and operating a "Tiger Box," a system designed to identify and analyze network security vulnerabilities. It covers installation and configuration details for …


Published on 5 months, 1 week ago

From Hacking to Report Writing: An Introduction to Security and Penetration Testing

From Hacking to Report Writing: An Introduction to Security and Penetration Testing



Provides an introduction to security and penetration testing, offering practical guidance from initial setup to report writing. It covers various types of security tests, including black, white, and …


Published on 5 months, 1 week ago

Foundations of Information Security: A Straightforward Introduction

Foundations of Information Security: A Straightforward Introduction



Serves as a comprehensive guide to fundamental information security concepts, suitable for beginners and professionals alike. It covers a broad spectrum of topics, including authentication, authoriza…


Published on 5 months, 1 week ago

Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro

Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro



Serves as a comprehensive guide to ethical hacking and penetration testing using Kali Linux. It outlines the fundamental concepts of Linux, various software and hardware recommendations for security …


Published on 5 months, 2 weeks ago

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide



Provides a structured approach to understanding and executing security assessments. The book details a four-step methodology that covers planning, information gathering, attacking, and reporting, ali…


Published on 5 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate