Podcast Episodes

Back to Search
Hacking the Xbox: An Introduction to Reverse Engineering

Hacking the Xbox: An Introduction to Reverse Engineering



"Hacking the Xbox: An Introduction to Reverse Engineering" is a guide for hackers interested in learning about reverse engineering, specifically focusing on the Xbox gaming console. The book begins w…


Published on 6 months ago

Hacking Gps

Hacking Gps



This excerpt from the book "Hacking GPS" by Kathie Kingsley-Hughes covers a wide range of topics relating to Global Positioning Systems (GPS) including hardware modifications, software hacking, and d…


Published on 6 months ago

Hacking For Dummies

Hacking For Dummies



The source Book provides a comprehensive guide to understanding and mitigating information security risks. It covers a range of topics, including common hacking techniques, vulnerability assessment m…


Published on 6 months ago

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It



This excerpt is from the book "Hacking and Securing iOS Applications" by Jonathan Zdziarski. The book provides a comprehensive guide to the vulnerabilities of iOS devices and applications. It explore…


Published on 6 months ago

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous



The excerpt is from a book exploring the complex, multifaceted nature of Anonymous, a decentralized online collective known for its hacktivism and trolling activities. The author provides a detailed …


Published on 6 months ago

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition



The Book provide a comprehensive guide to ethical hacking, covering a wide range of topics from basic programming concepts to advanced techniques for exploiting vulnerabilities in various systems. Th…


Published on 6 months ago

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools



The source Book is from the book "Gray Hat C# : A Hacker's Guide to Creating and Automating Security Tools" by Brandon Perry. This book teaches readers how to write C# security tools for Windows, OS …


Published on 6 months ago

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Gray Hat Python: Python Programming for Hackers and Reverse Engineers



The provided Book are excerpts from the book "Gray Hat Python" by Justin Seitz, which aims to teach readers how to use Python for hacking and reverse engineering. The text focuses on a variety of top…


Published on 6 months ago

Google Hacking for Penetration Testers

Google Hacking for Penetration Testers



This is a guide to Google hacking, focusing on how Google can be used to find sensitive information on the internet. The book covers topics like locating exploits and targets, profiling web servers, …


Published on 6 months ago

Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo

Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo



This book, Google Cloud Certified Professional Cloud Network Engineer Guide, is a comprehensive guide to Google Cloud Platform (GCP) networking. It covers a wide range of topics, including designing,…


Published on 6 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate