Podcast Episodes

Back to Search
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure



The Book is an excerpt on securing Windows 8 and Windows Server 2012 systems. The Book discusses various aspects of network security, including general network settings, remote access, Internet conne…


Published on 7 months ago

Web Application Advanced Hacking

Web Application Advanced Hacking



Maor Tal's "Web Application Advanced Hacking" is a hands-on guide to advanced web application hacking techniques for security researchers and bug bounty hunters. The book covers a range of topics, in…


Published on 7 months ago

You Don't Know JS: this & Object Prototypes

You Don't Know JS: this & Object Prototypes



This Book provides excerpts from Kyle Simpson's Book, "You Don't Know JS: this & Object Prototypes," which explores JavaScript's often-misunderstood this keyword and object prototypes. The Book expla…


Published on 7 months ago

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The Shellcoder's Handbook: Discovering and Exploiting Security Holes



The provided Book is a compilation of excerpts from "The Shellcoder’s Handbook, Second Edition," a book focusing on software exploitation. It details various methods of exploiting software vulnerabil…


Published on 7 months ago

Web Hacking 101

Web Hacking 101



"Web Hacking 101" is a guide to ethical hacking, focusing on real-world examples of vulnerability reports that yielded bug bounties. The book covers various web vulnerabilities, including HTML inject…


Published on 7 months ago

Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs

Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs



This Book is a table of contents and excerpts from the "Zed Attack Proxy Cookbook," a guide to using the OWASP ZAP tool for web application security testing. The book covers various web application v…


Published on 7 months ago

Zero Trust Networks: Building Secure Systems in Untrusted Networks

Zero Trust Networks: Building Secure Systems in Untrusted Networks



Zero Trust Networks, by Evan Gilman and Doug Barth, explores building secure systems in untrusted networks. The book critiques the limitations of perimeter-based security, arguing that assuming inter…


Published on 7 months ago

You Don't Know JS: Types & Grammar

You Don't Know JS: Types & Grammar



Kyle Simpson's You Don't Know JS: Types & Grammar is a guide to mastering JavaScript's intricacies. The book thoroughly explains JavaScript's seven built-in types, addressing common misunderstandings…


Published on 7 months, 1 week ago

You Don't Know JS: Up & Going

You Don't Know JS: Up & Going



Kyle Simpson's "You Don't Know JS" Book series offers an in-depth exploration of JavaScript, challenging the common practice of only learning a superficial subset. The first book, "Up & Going," provi…


Published on 7 months, 1 week ago

Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code

Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code



Dmitry Vostokov's Book, Foundations of Linux Debugging, Disassembling, and Reversing, teaches readers to analyze binary code, understand stack memory usage, and reconstruct C/C++ code using Intel x64…


Published on 7 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate