Podcast Episodes

Back to Search
CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)

CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)



The provided Book is an excerpt from The CERT Oracle Secure Coding Standard for Java, a guide to secure coding practices in Java. It details numerous rules categorized by topic (e.g., input validatio…


Published on 7 months, 3 weeks ago

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer



"The Security Culture Playbook" is a guide to understanding and improving organizational security culture. The book emphasizes that security culture is measurable and manageable, not just a buzzword,…


Published on 7 months, 3 weeks ago

The IDA Pro Book, 2nd Edition

The IDA Pro Book, 2nd Edition



This Book is an excerpt from the second edition of "The IDA Pro Book," a guide to using IDA Pro, a popular disassembler. The book covers various aspects of reverse engineering, including navigating a…


Published on 7 months, 3 weeks ago

The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization

The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization



This Book is a technical guide to Jakarta EE security, covering its history, architecture, and implementation details. It details Jakarta Authentication, Authorization, and Security APIs, explaining …


Published on 7 months, 3 weeks ago

The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence

The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence



"The Unix-Haters Handbook" compiles six years of messages from the UNIX-HATERS mailing list, expressing widespread frustration with the Unix operating system. The book covers various aspects of Unix,…


Published on 7 months, 3 weeks ago

The threat intelligence handbook

The threat intelligence handbook



The provided Book is an excerpt from the second edition of The Threat Intelligence Handbook, published by CyberEdge Group and primarily authored by Recorded Future employees. The handbook explains th…


Published on 7 months, 3 weeks ago

The Tangled Web: A Guide to Securing Modern Web Applications

The Tangled Web: A Guide to Securing Modern Web Applications



The provided Book is a table of contents and excerpts from Michal Zalewski's book, "The Tangled Web: A Guide to Securing Modern Web Applications." The book explores the complexities of web applicatio…


Published on 7 months, 3 weeks ago

The Social Engineer's Playbook: A Practical Guide to Pretexting

The Social Engineer's Playbook: A Practical Guide to Pretexting



Jeremiah Talamantes's The Social Engineer's Playbook is a practical guide to pretexting, a form of social engineering. The book covers various social engineering techniques, including phishing, baiti…


Published on 7 months, 4 weeks ago

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime



This Book excerpt chronicles the rise of ransomware and the efforts of a unique group of cybersecurity experts, the Ransomware Hunting Team, to combat it. The team, composed of individuals with diver…


Published on 7 months, 4 weeks ago

The Mac Hacker's Handbook

The Mac Hacker's Handbook



This Book is an excerpt from "The Mac Hacker's Handbook," a book exploring the security vulnerabilities of Mac OS X. The book details methods for discovering and exploiting vulnerabilities in Mac OS …


Published on 8 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate