Podcast Episodes
Back to Search
Wireless Network Security
This Book is a technical manual focused on wireless network security. It covers various wireless technologies, including WLAN, infrared, and near-fie…
1 year, 1 month ago
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel
This Book, "Windows Ransomware Detection and Protection," provides a comprehensive guide to understanding and mitigating ransomware threats. Experts …
1 year, 1 month ago
Windows Malware Analysis Essentials: Master the Fundamentals of Malware Analysis for the Windows Platform and Enhance Your Anti-malware
"Windows Malware Analysis Essentials" is a technical Book authored by Victor Marak that provides a comprehensive guide to malware analysis on the Win…
1 year, 1 month ago
Windows Kernel Programming
This Book excerpts Windows kernel programming, covering Windows internals and kernel development. It explains process and thread structures, includin…
1 year, 1 month ago
Windows Internals, Part 2 (Developer Reference)
This Book is an excerpt from the seventh edition of "Windows Internals, Part 2," a technical book detailing the inner workings of the Windows operati…
1 year, 1 month ago
Windows and Linux Penetration Testing from Scratch
This Book is an excerpt from a penetration testing manual, focusing on techniques for compromising Windows and Linux systems. The book details variou…
1 year, 1 month ago
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure
The Book is an excerpt on securing Windows 8 and Windows Server 2012 systems. The Book discusses various aspects of network security, including gener…
1 year, 1 month ago
Web Application Advanced Hacking
Maor Tal's "Web Application Advanced Hacking" is a hands-on guide to advanced web application hacking techniques for security researchers and bug bou…
1 year, 1 month ago
You Don't Know JS: this & Object Prototypes
This Book provides excerpts from Kyle Simpson's Book, "You Don't Know JS: this & Object Prototypes," which explores JavaScript's often-misunderstood …
1 year, 1 month ago
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The provided Book is a compilation of excerpts from "The Shellcoder’s Handbook, Second Edition," a book focusing on software exploitation. It details…
1 year, 1 month ago