Podcast Episodes

Back to Search
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense



This excerpt from the book "Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense" by Bryson Payne is a guide to ethical hacking that teaches readers about common cyber attacks and how…


Published on 6 months ago

Go Programming Language For Dummies

Go Programming Language For Dummies



This excerpt from the book "Go Programming Language For Dummies" provides a detailed introduction to the Go programming language, focusing on core concepts such as data types, variables, control flow…


Published on 6 months ago

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker



"Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" is Kevin Mitnick's autobiography detailing his life as a computer hacker. The text provides excerpts from his book where Mitnick …


Published on 6 months ago

Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy

Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy



This is a comprehensive guide to Ghidra, a reverse engineering tool developed by the National Security Agency (NSA). The book covers a wide range of topics, including Ghidra's installation and setup,…


Published on 6 months ago

Get Programming with Go

Get Programming with Go



A book that teaches the Go programming language. It provides a step-by-step guide to Go, starting with the basics, such as declaring variables and performing math operations, and moving on to more ad…


Published on 6 months ago

Game Hacking: Developing Autonomous Bots for Online Games by Cano

Game Hacking: Developing Autonomous Bots for Online Games by Cano



This is a comprehensive guide on game hacking, outlining the various tools and techniques used to manipulate and modify online games. The book covers memory scanning, debugging, code injection, hooki…


Published on 6 months ago

Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU

Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU



The Book are a combination of the preface and selected chapters from the book "Fuzzing Against The Machine" by Eduardo Blázquez and Antonio Nappa. The book focuses on teaching readers how to use fuzz…


Published on 6 months ago

Fuzzing for Software Security

Fuzzing for Software Security



This excerpt from the Book "Fuzzing for Software Security Testing and Quality Assurance" by Ari Takanen, Jared DeMott, and Charlie Miller focuses on explaining fuzzing techniques used to find securit…


Published on 6 months ago

Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL

Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL



The Book provide a comprehensive guide to building a full-stack web application using React, TypeScript, Node.js, Express, and GraphQL. The book "Full-Stack React, TypeScript, and Node" by David Choi…


Published on 6 months ago

Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL

Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL



The provided Book excerpts are from the book "Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL" by Nader Dabit. This book is a comprehensive guide to building full s…


Published on 6 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate