Podcast Episodes

Back to Search
The Pentester BluePrint: Starting a Career as an Ethical Hacker

The Pentester BluePrint: Starting a Career as an Ethical Hacker



"The Pentester Blueprint" is a guide to becoming an ethical hacker (pentester). The book covers the necessary technical skills, including operating systems, networking, and programming, as well as th…


Published on 7 months, 2 weeks ago

The Official Raspberry Pi Beginner's Guide: How to use your new computer

The Official Raspberry Pi Beginner's Guide: How to use your new computer



This Book provides a comprehensive introduction to the Raspberry Pi 4 Model B, covering its components, setup, and programming using Scratch and Python. It details the Raspbian operating system, demo…


Published on 7 months, 2 weeks ago

The Official CompTIA Security+ Certification Study Guide

The Official CompTIA Security+ Certification Study Guide



This Book is an excerpt from a CompTIA Security+ study guide that provides information about network security. The guide explores topics such as risk assessment, malware identification, network attac…


Published on 7 months, 2 weeks ago

The Linux Programming Interface: A Linux and UNIX System Programming Handbook

The Linux Programming Interface: A Linux and UNIX System Programming Handbook



The provided Book is a collection of excerpts from Michael Kerrisk's "The Linux Programming Interface," a comprehensive guide to Linux and UNIX system programming. The excerpts cover various aspects …


Published on 7 months, 3 weeks ago

The Hacker Playbook: Practical Guide To Penetration Testing

The Hacker Playbook: Practical Guide To Penetration Testing



"The Hacker Playbook: Practical Guide to Penetration Testing" is a manual providing a hands-on approach to penetration testing. The book details various techniques for network and web application sec…


Published on 7 months, 3 weeks ago

The Hacker Playbook 3: Practical Guide To Penetration Testing

The Hacker Playbook 3: Practical Guide To Penetration Testing



"The Hacker Playbook 3" is a guide to penetration testing and red teaming, focusing on advanced techniques to simulate real-world attacks. The book covers various attack vectors, including web applic…


Published on 7 months, 3 weeks ago

The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process

The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process



This Book comprises excerpts from "The Docker Workshop," a guide to building and deploying applications using Docker. The book covers Dockerfiles, image management, container orchestration with Docke…


Published on 7 months, 3 weeks ago

The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World

The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World



The Decision Intelligence Handbook by Pratt and Malcolm is a practical guide to Decision Intelligence (DI), a methodology for improving decision-making using data and technology. The book outlines ni…


Published on 7 months, 3 weeks ago

The Complete Cyber Security Course

The Complete Cyber Security Course



The provided Book is a collection of excerpts from a cybersecurity course. The course, "The Complete Cyber Security Course Volume I Hackers Exposed," by Nathan House, focuses on practical techniques …


Published on 7 months, 3 weeks ago

The Clean Coder: A Code of Conduct for Professional Programmers

The Clean Coder: A Code of Conduct for Professional Programmers



This Book is an excerpt from Robert C. Martin's "The Clean Coder," a book focused on professionalism in software development. It explores various aspects of a professional programmer's conduct, inclu…


Published on 7 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate