Podcast Episodes

Back to Search
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Hacking the Hacker: Learn From the Experts Who Take Down Hackers



This Book is a comprehensive guide to computer hacking, written by Roger A. Grimes, a seasoned computer security professional with decades of experience. The book delves into the various methods empl…


Published on 6 months ago

Hacking Kubernetes: Threat-Driven Analysis and Defense

Hacking Kubernetes: Threat-Driven Analysis and Defense



This excerpt from the book "Hacking Kubernetes" by Andrew Martin and Michael Hausenblas is a guide for cybersecurity professionals working with Kubernetes. It covers the fundamentals of securing Kube…


Published on 6 months ago

Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future

Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future



The provided Book, excerpts from "Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future" explores the relationship between cybersecurity and the humanities. T…


Published on 6 months ago

Hacking Exposed: Malware & Rootkits Secrets & Solutions

Hacking Exposed: Malware & Rootkits Secrets & Solutions



The Book "Hacking Exposed: Malware & Rootkits provides a comprehensive examination of modern malware and rootkits, exploring their evolution, techniques, and countermeasures. The book explores how th…


Published on 6 months ago

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur



The Book "Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security," written by Gary Hall and Erin Watson. The book is a guide to understanding hacking techniques, includin…


Published on 6 months ago

Hacking APIs: Breaking Web Application Programming Interfaces

Hacking APIs: Breaking Web Application Programming Interfaces



This is an excerpt from "Hacking APIs: Breaking Web Application Programming Interfaces". The book provides a comprehensive guide to hacking APIs, covering topics like API discovery, endpoint analysis…


Published on 6 months ago

Hacking SaaS: An Insider's Guide to Managing Software Business Success

Hacking SaaS: An Insider's Guide to Managing Software Business Success



The Book is an excerpt from "Hacking SaaS: An Insider’s Guide to Managing Software Business Success," a book written by Eric Mersch, an experienced CFO with a long career in the subscription software…


Published on 6 months ago

Hacking Multifactor Authentication

Hacking Multifactor Authentication



This excerpt from the book "Hacking Multifactor Authentication" provides a comprehensive look at the various ways attackers can bypass multifactor authentication (MFA). The book explores different ty…


Published on 6 months ago

HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX

HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX



This excerpt from a hacking guidebook provides comprehensive information about ethical hacking, penetration testing, and cybersecurity. It delves into different types of hackers, including black hat,…


Published on 6 months ago

Hacking VoIP: Protocols, Attacks, and Countermeasures

Hacking VoIP: Protocols, Attacks, and Countermeasures



The Book, "Hacking VoIP: Protocols, Attacks, and Countermeasures" by Himanshu Dwivedi, is a book that details the security vulnerabilities of Voice over Internet Protocol (VoIP) networks. The book co…


Published on 6 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate