Podcast Episodes
Back to Search
The Hacker Playbook: Practical Guide To Penetration Testing
"The Hacker Playbook: Practical Guide to Penetration Testing" is a manual providing a hands-on approach to penetration testing. The book details vari…
1 year, 1 month ago
The Hacker Playbook 3: Practical Guide To Penetration Testing
"The Hacker Playbook 3" is a guide to penetration testing and red teaming, focusing on advanced techniques to simulate real-world attacks. The book c…
1 year, 1 month ago
The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process
This Book comprises excerpts from "The Docker Workshop," a guide to building and deploying applications using Docker. The book covers Dockerfiles, im…
1 year, 1 month ago
The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World
The Decision Intelligence Handbook by Pratt and Malcolm is a practical guide to Decision Intelligence (DI), a methodology for improving decision-maki…
1 year, 1 month ago
The Complete Cyber Security Course
The provided Book is a collection of excerpts from a cybersecurity course. The course, "The Complete Cyber Security Course Volume I Hackers Exposed,"…
1 year, 1 month ago
The Clean Coder: A Code of Conduct for Professional Programmers
This Book is an excerpt from Robert C. Martin's "The Clean Coder," a book focused on professionalism in software development. It explores various asp…
1 year, 1 month ago
CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)
The provided Book is an excerpt from The CERT Oracle Secure Coding Standard for Java, a guide to secure coding practices in Java. It details numerous…
1 year, 1 month ago
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
"The Security Culture Playbook" is a guide to understanding and improving organizational security culture. The book emphasizes that security culture …
1 year, 1 month ago
The IDA Pro Book, 2nd Edition
This Book is an excerpt from the second edition of "The IDA Pro Book," a guide to using IDA Pro, a popular disassembler. The book covers various aspe…
1 year, 1 month ago
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization
This Book is a technical guide to Jakarta EE security, covering its history, architecture, and implementation details. It details Jakarta Authenticat…
1 year, 1 month ago