Podcast Episodes
Back to Search
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
"The Security Culture Playbook" is a guide to understanding and improving organizational security culture. The book emphasizes that security culture …
1 year ago
The IDA Pro Book, 2nd Edition
This Book is an excerpt from the second edition of "The IDA Pro Book," a guide to using IDA Pro, a popular disassembler. The book covers various aspe…
1 year ago
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization
This Book is a technical guide to Jakarta EE security, covering its history, architecture, and implementation details. It details Jakarta Authenticat…
1 year ago
The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence
"The Unix-Haters Handbook" compiles six years of messages from the UNIX-HATERS mailing list, expressing widespread frustration with the Unix operatin…
1 year ago
The threat intelligence handbook
The provided Book is an excerpt from the second edition of The Threat Intelligence Handbook, published by CyberEdge Group and primarily authored by R…
1 year ago
The Tangled Web: A Guide to Securing Modern Web Applications
The provided Book is a table of contents and excerpts from Michal Zalewski's book, "The Tangled Web: A Guide to Securing Modern Web Applications." Th…
1 year ago
The Social Engineer's Playbook: A Practical Guide to Pretexting
Jeremiah Talamantes's The Social Engineer's Playbook is a practical guide to pretexting, a form of social engineering. The book covers various social…
1 year ago
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
This Book excerpt chronicles the rise of ransomware and the efforts of a unique group of cybersecurity experts, the Ransomware Hunting Team, to comba…
1 year ago
The Mac Hacker's Handbook
This Book is an excerpt from "The Mac Hacker's Handbook," a book exploring the security vulnerabilities of Mac OS X. The book details methods for dis…
1 year ago
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
This Book is an excerpt from The Hacker's Handbook, a technical manual detailing network security vulnerabilities and exploits. It systematically exp…
1 year ago