Podcast Episodes

Back to Search
Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications
Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications

This excerpt from "Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications" by Kim Crawley serves as a comprehen…

10 months, 4 weeks ago

Short Long
View Episode
C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor
C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor

The provided Book is primarily from a book titled "C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and ser…

10 months, 4 weeks ago

Short Long
View Episode
Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot
Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot

The provided Book is primarily from the Book "Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot", whic…

10 months, 4 weeks ago

Short Long
View Episode
Black Hat Bash: Creative Scripting for Hackers and Pentesters
Black Hat Bash: Creative Scripting for Hackers and Pentesters

The provided Book, primarily from "Black Hat Bash: Creative Scripting for Hackers and Pentesters" serves as a guide for security professionals and pe…

10 months, 4 weeks ago

Short Long
View Episode
Applied Data Science: Data Translators Across the Disciplines
Applied Data Science: Data Translators Across the Disciplines

This collection of writings examines the crucial role of data translators in various fields, emphasizing the need to bridge the gap between data scie…

11 months ago

Short Long
View Episode
An In-Depth Guide to Mobile Device Forensics
An In-Depth Guide to Mobile Device Forensics

This Book offers a comprehensive guide to mobile device forensics, beginning with foundational concepts of wireless communication, including electrom…

11 months ago

Short Long
View Episode
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers

This collection of Book originates from a Book titled "An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity…

11 months ago

Short Long
View Episode
Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security
Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security

This collection of excerpts focuses on accelerating software delivery performance through effective DevOps practices, primarily leveraging the GitHub…

11 months ago

Short Long
View Episode
Advanced IPv6
Advanced IPv6

This Book is a training manual for a course on Advanced IPv6. It is broken down into various sections that explain IPv6 concepts, including packet fo…

11 months ago

Short Long
View Episode
Information Security Management Handbook, 6th Edition
Information Security Management Handbook, 6th Edition

The Book is a compilation of information security management principles and best practices, drawn from the Information Security Management Handbook. …

11 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us