Podcast Episodes

Back to Search
Full Stack Python Security: Cryptography, TLS, and attack resistance

Full Stack Python Security: Cryptography, TLS, and attack resistance



The Book provide a comprehensive guide to securing Python-based web applications. The text covers fundamental cryptographic concepts, such as hashing and encryption, and then applies these concepts t…


Published on 6 months ago

From Hacking to Report Writing: An Introduction to Security and Penetration Testing

From Hacking to Report Writing: An Introduction to Security and Penetration Testing



The source Book provides a guide to security testing. It explains the different types of security tests, including black box, white box, and gray box, and how to execute them. The text then explores …


Published on 6 months ago

Foundational Java: Key Elements and Practical Programming

Foundational Java: Key Elements and Practical Programming



This excerpt from the book "Foundational Java" provides an overview of object-oriented programming in Java. It explores key concepts such as classes, objects, inheritance, and polymorphism, along wit…


Published on 6 months ago

Linux All-In-One For Dummies

Linux All-In-One For Dummies



The source Book provides a comprehensive guide to understanding and using Linux, covering a wide range of topics from basic installation and system administration to advanced scripting and network se…


Published on 6 months ago

Flutter for Beginners

Flutter for Beginners



The provided Book excerpts come from the book "Flutter for Beginners" by Alessandro Biessek, offering a comprehensive guide to Flutter app development. The text covers a wide range of topics, includi…


Published on 6 months ago

FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES

FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES



The Book provide an extensive guide to cybersecurity and privacy, using an analogy of a medieval castle to explain the importance of building strong defenses against cyber threats. The book details h…


Published on 6 months ago

Finding Beacons in the Dark

Finding Beacons in the Dark



This research Book explores the Cobalt Strike framework, a popular tool used by both red teams and malicious actors for penetration testing and cyberattacks. The authors present a comprehensive analy…


Published on 6 months ago

Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!

Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!



This excerpt is from a book that teaches aspiring ethical hackers how to conduct penetration tests. The book provides a framework for ethical hacking, which involves performing simulated cyberattacks…


Published on 6 months ago

Ethical Hacker's Certification Guide (CEHv11)

Ethical Hacker's Certification Guide (CEHv11)



This excerpt is from a book on ethical hacking and penetration testing, specifically geared toward preparing individuals for the Certified Ethical Hacker (CEH) certification. The book is divided into…


Published on 6 months ago

Ethical Hacking-Joe Grant

Ethical Hacking-Joe Grant



This Book is an introduction to ethical hacking, using the Kali Linux operating system. It covers a range of topics related to information security, including network reconnaissance, vulnerability sc…


Published on 6 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate