Podcast Episodes

Back to Search
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks



The Book is an early access excerpt from the Hardware Hacking Handbook by Jasper van Woudenberg and Colin O'Flynn. This excerpt focuses on embedded security, particularly the vulnerabilities in the h…


Published on 5 months, 3 weeks ago

Hardware Security: A Hands-on Learning Approach

Hardware Security: A Hands-on Learning Approach



This Book, "Hardware Security A Hands-on Learning Approach," is a comprehensive guide to hardware security. It focuses on the vulnerabilities and attacks that threaten hardware systems, including tho…


Published on 5 months, 3 weeks ago

Hands-On Penetration Testing on Windows

Hands-On Penetration Testing on Windows



The Book called "Hands-On Penetration Testing on Windows," which explains penetration testing concepts and techniques for those with intermediate to advanced skills. It covers a broad range of topics…


Published on 5 months, 4 weeks ago

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it



The Book "Hands-On Dark Web Analysis" by Sion Retzkin. The book provides a comprehensive guide for understanding and navigating the Deep Web and Dark Web, covering topics such as the origins of the i…


Published on 5 months, 4 weeks ago

Hands-On Chatbots and Conversational UI Development

Hands-On Chatbots and Conversational UI Development



The Book "Hands-On Chatbots and Conversational UI Development," which is a guide for building chatbots and voice user interfaces. The book covers a range of topics including the history and architect…


Published on 5 months, 4 weeks ago

Hands-On Penetration Testing with Kali NetHunter

Hands-On Penetration Testing with Kali NetHunter



This excerpt is from a book that teaches ethical hacking and penetration testing using Kali Linux, specifically the NetHunter edition, designed for mobile devices. The text explains various technique…


Published on 5 months, 4 weeks ago

Handbook for CTFers

Handbook for CTFers



The Book is a handbook for CTF competitors, a type of cybersecurity competition. It provides information about various security vulnerabilities and attack techniques that are commonly used in CTF com…


Published on 5 months, 4 weeks ago

Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook

Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook



The provided Book excerpts from "Hacklog: Volume 1" are a handbook on anonymity, IT security, and ethical hacking. The book guides readers on how to protect their privacy online, covering various top…


Published on 5 months, 4 weeks ago

Hacking: The Art of Exploitation, 2nd Edition

Hacking: The Art of Exploitation, 2nd Edition



This Book material is an excerpt from a book titled "Hacking: The Art of Exploitation." It explores the art of hacking through a combination of practical programming examples and theoretical explanat…


Published on 5 months, 4 weeks ago

Hacking Android

Hacking Android



The Book provides a comprehensive guide to hacking and securing Android applications, covering both static and dynamic analysis techniques. The source details various Android security vulnerabilities…


Published on 5 months, 4 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate