Podcast Episodes

Back to Search
Black Hat Bash: Creative Scripting for Hackers and Pentesters
Black Hat Bash: Creative Scripting for Hackers and Pentesters

The provided Book, primarily from "Black Hat Bash: Creative Scripting for Hackers and Pentesters" serves as a guide for security professionals and pe…

1 year ago

Short Long
View Episode
Applied Data Science: Data Translators Across the Disciplines
Applied Data Science: Data Translators Across the Disciplines

This collection of writings examines the crucial role of data translators in various fields, emphasizing the need to bridge the gap between data scie…

1 year ago

Short Long
View Episode
An In-Depth Guide to Mobile Device Forensics
An In-Depth Guide to Mobile Device Forensics

This Book offers a comprehensive guide to mobile device forensics, beginning with foundational concepts of wireless communication, including electrom…

1 year ago

Short Long
View Episode
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers

This collection of Book originates from a Book titled "An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity…

1 year ago

Short Long
View Episode
Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security
Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security

This collection of excerpts focuses on accelerating software delivery performance through effective DevOps practices, primarily leveraging the GitHub…

1 year ago

Short Long
View Episode
Advanced IPv6
Advanced IPv6

This Book is a training manual for a course on Advanced IPv6. It is broken down into various sections that explain IPv6 concepts, including packet fo…

1 year ago

Short Long
View Episode
Information Security Management Handbook, 6th Edition
Information Security Management Handbook, 6th Edition

The Book is a compilation of information security management principles and best practices, drawn from the Information Security Management Handbook. …

1 year ago

Short Long
View Episode
AZ-900: Microsoft Azure Fundamentals: Study Guide with Practice Questions & Labs
AZ-900: Microsoft Azure Fundamentals: Study Guide with Practice Questions & Labs

This Book is an excerpt from a study guide for the Microsoft Azure Fundamentals certification exam (AZ-900). The guide covers the fundamental concept…

1 year ago

Short Long
View Episode
Powershell Step-by Step
Powershell Step-by Step

The provided Book excerpts are from the book, “Powershell Step-by-Step”, written by Brandon Shaw. This Book acts as a comprehensive guide to understa…

1 year ago

Short Long
View Episode
Beginner's Guide to Exploitation on ARM Vol 2
Beginner's Guide to Exploitation on ARM Vol 2

The Book, titled "Beginner's Guide to Exploitation on ARM Vol 2," is a guide to learning about exploiting security vulnerabilities in ARM-based syste…

1 year ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us