Podcast Episodes

Back to Search
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

"The Security Culture Playbook" is a guide to understanding and improving organizational security culture. The book emphasizes that security culture …

1 year ago

Short Long
View Episode
The IDA Pro Book, 2nd Edition
The IDA Pro Book, 2nd Edition

This Book is an excerpt from the second edition of "The IDA Pro Book," a guide to using IDA Pro, a popular disassembler. The book covers various aspe…

1 year ago

Short Long
View Episode
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization

This Book is a technical guide to Jakarta EE security, covering its history, architecture, and implementation details. It details Jakarta Authenticat…

1 year ago

Short Long
View Episode
The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence
The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence

"The Unix-Haters Handbook" compiles six years of messages from the UNIX-HATERS mailing list, expressing widespread frustration with the Unix operatin…

1 year ago

Short Long
View Episode
The threat intelligence handbook
The threat intelligence handbook

The provided Book is an excerpt from the second edition of The Threat Intelligence Handbook, published by CyberEdge Group and primarily authored by R…

1 year ago

Short Long
View Episode
The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications

The provided Book is a table of contents and excerpts from Michal Zalewski's book, "The Tangled Web: A Guide to Securing Modern Web Applications." Th…

1 year ago

Short Long
View Episode
The Social Engineer's Playbook: A Practical Guide to Pretexting
The Social Engineer's Playbook: A Practical Guide to Pretexting

Jeremiah Talamantes's The Social Engineer's Playbook is a practical guide to pretexting, a form of social engineering. The book covers various social…

1 year ago

Short Long
View Episode
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

This Book excerpt chronicles the rise of ransomware and the efforts of a unique group of cybersecurity experts, the Ransomware Hunting Team, to comba…

1 year ago

Short Long
View Episode
The Mac Hacker's Handbook
The Mac Hacker's Handbook

This Book is an excerpt from "The Mac Hacker's Handbook," a book exploring the security vulnerabilities of Mac OS X. The book details methods for dis…

1 year ago

Short Long
View Episode
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

This Book is an excerpt from The Hacker's Handbook, a technical manual detailing network security vulnerabilities and exploits. It systematically exp…

1 year ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us