Podcast Episodes

Back to Search
The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence
The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence

"The Unix-Haters Handbook" compiles six years of messages from the UNIX-HATERS mailing list, expressing widespread frustration with the Unix operatin…

1 year, 1 month ago

Short Long
View Episode
The threat intelligence handbook
The threat intelligence handbook

The provided Book is an excerpt from the second edition of The Threat Intelligence Handbook, published by CyberEdge Group and primarily authored by R…

1 year, 2 months ago

Short Long
View Episode
The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications

The provided Book is a table of contents and excerpts from Michal Zalewski's book, "The Tangled Web: A Guide to Securing Modern Web Applications." Th…

1 year, 2 months ago

Short Long
View Episode
The Social Engineer's Playbook: A Practical Guide to Pretexting
The Social Engineer's Playbook: A Practical Guide to Pretexting

Jeremiah Talamantes's The Social Engineer's Playbook is a practical guide to pretexting, a form of social engineering. The book covers various social…

1 year, 2 months ago

Short Long
View Episode
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

This Book excerpt chronicles the rise of ransomware and the efforts of a unique group of cybersecurity experts, the Ransomware Hunting Team, to comba…

1 year, 2 months ago

Short Long
View Episode
The Mac Hacker's Handbook
The Mac Hacker's Handbook

This Book is an excerpt from "The Mac Hacker's Handbook," a book exploring the security vulnerabilities of Mac OS X. The book details methods for dis…

1 year, 2 months ago

Short Long
View Episode
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

This Book is an excerpt from The Hacker's Handbook, a technical manual detailing network security vulnerabilities and exploits. It systematically exp…

1 year, 2 months ago

Short Long
View Episode
The Hacker Playbook 2: Practical Guide To Penetration Testing
The Hacker Playbook 2: Practical Guide To Penetration Testing

"The Hacker Playbook 2" is a guide to penetration testing, expanding upon the first book with updated attacks and techniques. The book covers various…

1 year, 2 months ago

Short Long
View Episode
The Complete Book of Locks and Locksmithing
The Complete Book of Locks and Locksmithing

This Book is an excerpt from "The Complete Book of Locks and Locksmithing," a comprehensive guide to locks and locksmithing. It covers the history of…

1 year, 2 months ago

Short Long
View Episode
The Analytics Setup Guidebook
The Analytics Setup Guidebook

This guidebook from Holistics, a data analytics company, offers a practical framework for building modern analytics systems. It covers setting up an …

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us