Podcast Episodes

Back to Search
Building Your Own JavaScript Framework: Architect extensible and reusable framework systems

Building Your Own JavaScript Framework: Architect extensible and reusable framework systems



It covers various aspects of JavaScript framework development, ranging from historical context and the evolution of the ecosystem to core architectural patterns, tooling, testing, documentation, and …


Published on 5 months, 2 weeks ago

Visual Threat Intelligence: An Illustrated Guide For Threat Researchers

Visual Threat Intelligence: An Illustrated Guide For Threat Researchers



Beginning with fundamental concepts like the intelligence lifecycle and various gathering disciplines such as OSINT, HUMINT, GEOINT, SIGINT, and FININT. It explores identifying and profiling threat a…


Published on 5 months, 3 weeks ago

12 Twisted Python Projects for Young Coders

12 Twisted Python Projects for Young Coders



Designed to teach programming to beginners in a fun and engaging way. The book focuses on using the Python language along with the guizero library to create Graphical User Interfaces (GUIs) through t…


Published on 5 months, 3 weeks ago

Think Like a Software Engineering Manager

Think Like a Software Engineering Manager



Explores the fundamental role of an engineering manager (EM), contrasting it with that of an individual contributor (IC) and addressing common misconceptions about the transition. It emphasizes the c…


Published on 5 months, 3 weeks ago

The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities

The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities



It explains the software vulnerability life cycle, from inception to deprecation, and discusses different types of vulnerabilities, such as cross-site scripting and SQL injection. The text also cover…


Published on 5 months, 3 weeks ago

The Android Malware Handbook: Detection and Analysis by Human and Machine

The Android Malware Handbook: Detection and Analysis by Human and Machine



Offers a comprehensive guide to Android malware, covering its history and current landscape. It details various malware types, such as trojans, ransomware, and SMS fraud, and explains both static and…


Published on 5 months, 3 weeks ago

Software Engineering for Games in Serious Contexts: Theories, Methods, Tools, and Experiences

Software Engineering for Games in Serious Contexts: Theories, Methods, Tools, and Experiences



Exploring the creation of serious games and gamified applications. The excerpts highlight various aspects of this field, including user experience evaluation methods, the development of content-agnos…


Published on 5 months, 3 weeks ago

Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR

Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR



Focuses on SOAR solutions and their role in modern cybersecurity. It emphasizes the need for automated responses to security incidents due to the overwhelming number of alerts and the shortage of ski…


Published on 5 months, 3 weeks ago

Security Testing with Raspberry Pi

Security Testing with Raspberry Pi



Focused on security testing and ethical hacking using Raspberry Pi computers. It provides practical guides on setting up a lab environment with virtual machines like Kali Linux and Metasploitable, th…


Published on 5 months, 3 weeks ago

Securing Cloud Applications

Securing Cloud Applications



This Book offer an introduction to application security, covering fundamental concepts such as integrity, authentication, confidentiality, and non-repudiation. They discuss the importance of Transpor…


Published on 5 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate