Podcast Episodes
Back to Search
Black Hat Bash: Creative Scripting for Hackers and Pentesters
The provided Book, primarily from "Black Hat Bash: Creative Scripting for Hackers and Pentesters" serves as a guide for security professionals and pe…
1 year ago
Applied Data Science: Data Translators Across the Disciplines
This collection of writings examines the crucial role of data translators in various fields, emphasizing the need to bridge the gap between data scie…
1 year ago
An In-Depth Guide to Mobile Device Forensics
This Book offers a comprehensive guide to mobile device forensics, beginning with foundational concepts of wireless communication, including electrom…
1 year ago
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers
This collection of Book originates from a Book titled "An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity…
1 year ago
Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security
This collection of excerpts focuses on accelerating software delivery performance through effective DevOps practices, primarily leveraging the GitHub…
1 year ago
Advanced IPv6
This Book is a training manual for a course on Advanced IPv6. It is broken down into various sections that explain IPv6 concepts, including packet fo…
1 year ago
Information Security Management Handbook, 6th Edition
The Book is a compilation of information security management principles and best practices, drawn from the Information Security Management Handbook. …
1 year ago
AZ-900: Microsoft Azure Fundamentals: Study Guide with Practice Questions & Labs
This Book is an excerpt from a study guide for the Microsoft Azure Fundamentals certification exam (AZ-900). The guide covers the fundamental concept…
1 year ago
Powershell Step-by Step
The provided Book excerpts are from the book, “Powershell Step-by-Step”, written by Brandon Shaw. This Book acts as a comprehensive guide to understa…
1 year ago
Beginner's Guide to Exploitation on ARM Vol 2
The Book, titled "Beginner's Guide to Exploitation on ARM Vol 2," is a guide to learning about exploiting security vulnerabilities in ARM-based syste…
1 year ago