Podcast Episodes

Back to Search
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks

This Book provides a comprehensive guide to SQL injection, covering both offensive and defensive strategies. Part one introduces SQL, database system…

1 year ago

Short Long
View Episode
Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes
Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes

This Book is on simplifying React application testing. It covers using the React Testing Library for unit and integration tests, emphasizing user-cen…

1 year ago

Short Long
View Episode
Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide
Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide

This Book is a lab guide for a self-paced Silver Peak Advanced SDWAN course. It provides step-by-step instructions for configuring various networking…

1 year ago

Short Long
View Episode
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals

This Book is excerpt from Jon Westfall's 2021 Book, "Set Up and Manage Your Virtual Private Server." The book guides readers through setting up and a…

1 year ago

Short Long
View Episode
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud

This Book is a comprehensive guide to serverless security, focusing on the implementation of secure practices across AWS, Azure, and Google Cloud pla…

1 year ago

Short Long
View Episode
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

This Book is a detailed guide to modern cryptography, covering both theoretical concepts and practical implementations. The book explores various cry…

1 year ago

Short Long
View Episode
Security in Computing
Security in Computing

This excerpt from Charles P. Pfleeger's "Security in Computing" (5th edition) is a textbook chapter on computer security. It examines various threats…

1 year, 1 month ago

Short Long
View Episode
Security Warrior: Know Your Enemy
Security Warrior: Know Your Enemy

Security Warrior is a technical manual focusing on network security, reverse engineering, and attack techniques. It covers various operating systems …

1 year, 1 month ago

Short Long
View Episode
Security Testing with Kali NetHunter
Security Testing with Kali NetHunter

This Book is an excerpt from a Book about security testing with Kali NetHunter, a mobile penetration testing platform for Android. The excerpt covers…

1 year, 1 month ago

Short Long
View Episode
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems

Ross Anderson's "Security Engineering: A Guide to Building Dependable Distributed Systems" explores various facets of security, from cryptographic vu…

1 year, 1 month ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us