Podcast Episodes

Back to Search
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity



This Book comprises excerpts from Tribe of Hackers Red Team, a book by Marcus J. Carey and Jennifer Jin. The excerpts feature interviews with numerous cybersecurity professionals, primarily red teame…


Published on 7 months, 2 weeks ago

Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity

Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity



This Book excerpt features interviews with numerous cybersecurity professionals, collectively offering insights into effective blue team strategies. The experts discuss crucial capabilities like netw…


Published on 7 months, 2 weeks ago

Tor And The Deep Web 2020: A Beginner's Guide to Staying Anonymous, Dark Net Journey on How to Be Anonymous Online

Tor And The Deep Web 2020: A Beginner's Guide to Staying Anonymous, Dark Net Journey on How to Be Anonymous Online



This beginner's guide to the dark web explains how Tor and onion routing mask a user's IP address, creating anonymity. It details the three-layered system of Tor nodes, contrasting it with standard H…


Published on 7 months, 2 weeks ago

TLS Mastery: Tux edition

TLS Mastery: Tux edition



The Book provide a comprehensive guide to Transport Layer Security (TLS), a fundamental technology for securing internet communications. The text covers a wide range of topics including cryptography …


Published on 7 months, 2 weeks ago

Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks

Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks



This Book is about threat hunting in cloud environments, specifically AWS and Azure. The authors, experienced cybersecurity professionals, present a framework for multi-cloud threat hunting using the…


Published on 7 months, 2 weeks ago

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security



This Book about threat modeling, a process for identifying and mitigating security risks in software. The book explains various threat modeling strategies, including asset-centric, attacker-centric, …


Published on 7 months, 2 weeks ago

Write Great Code, Volume 2, 2nd Edition: Thinking Low-Level, Writing High-Level

Write Great Code, Volume 2, 2nd Edition: Thinking Low-Level, Writing High-Level



This Book is an excerpt from a Book on writing efficient high-level language (HLL) code by leveraging low-level understanding. It explores compiler optimization techniques, including constant folding…


Published on 7 months, 2 weeks ago

Software Craftsman, The: Professionalism, Pragmatism, Pride

Software Craftsman, The: Professionalism, Pragmatism, Pride



Sandro Mancuso's The Software Craftsman advocates for professionalism and pride in software development, contrasting outdated notions of seniority with modern demands. The book details the Software C…


Published on 7 months, 2 weeks ago

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The Shellcoder's Handbook: Discovering and Exploiting Security Holes



The provided Book is an excerpt from "The Shellcoder’s Handbook," a book detailing the exploitation of software security vulnerabilities. The book focuses on practical, hands-on techniques for discov…


Published on 7 months, 2 weeks ago

The Quick Python Book, Second Edition

The Quick Python Book, Second Edition



This Book is from the second edition of The Quick Python Book, a programming tutorial. The book covers fundamental Python concepts, including syntax, control flow, and data structures. It then progre…


Published on 7 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate