Podcast Episodes
Back to Search
The Hacker Playbook 2: Practical Guide To Penetration Testing
"The Hacker Playbook 2" is a guide to penetration testing, expanding upon the first book with updated attacks and techniques. The book covers various…
1 year ago
The Complete Book of Locks and Locksmithing
This Book is an excerpt from "The Complete Book of Locks and Locksmithing," a comprehensive guide to locks and locksmithing. It covers the history of…
1 year ago
The Analytics Setup Guidebook
This guidebook from Holistics, a data analytics company, offers a practical framework for building modern analytics systems. It covers setting up an …
1 year ago
Testing and Securing Android Studio Applications
This Book is the preface and table of contents from a book titled Testing and Securing Android Studio Applications. The book guides Android developer…
1 year ago
TCP/IP Protocol Suite
The provided Book is a table of contents and excerpts from Behrouz Forouzan's "TCP/IP Protocol Suite, 4th Edition," covering various networking conce…
1 year ago
Take Control of Wi-Fi Networking and Security
Glenn Fleishman's Take Control of Wi-Fi Networking and Security is a comprehensive guide to setting up and securing Wi-Fi networks. The book covers f…
1 year ago
SwiftUI Essentials - iOS 14 Edition: Learn to Develop iOS Apps Using SwiftUI, Swift 5 and Xcode 12
This Book is a table of contents and excerpts from a book teaching iOS app development using SwiftUI. It covers fundamental Swift programming concept…
1 year ago
Cryptography: Theory and Practice
The provided Book is an excerpt from a cryptography textbook, specifically focusing on the theory and practice of various cryptographic systems. It c…
1 year ago
Cryptography And Network Security: Principles and Practices
This Book is an excerpt from a cryptography and network security textbook. It covers various security mechanisms, including encryption algorithms (sy…
1 year ago
Cryptography and Network Security: Principles and Practice
This Book is excerpt from William Stallings' book, Cryptography and Network Security: Principles and Practice, seventh edition. The excerpt covers a …
1 year ago