Podcast Episodes

Back to Search
Python Made Simple: Full Beginner’s Guide to Mastering Python
Python Made Simple: Full Beginner’s Guide to Mastering Python

"Python & Hacking" is a comprehensive guide for beginners to learn Python programming. It starts with the basics of Python syntax, data types, and op…

1 year, 1 month ago

Short Long
View Episode
Protective Security: Creating Military-Grade Defenses for Your Digital Business
Protective Security: Creating Military-Grade Defenses for Your Digital Business

The Book, "Protective Security: Creating Military-Grade Defenses for Your Digital Business," written by Jim Seaman, draws on the author's experiences…

1 year, 1 month ago

Short Long
View Episode
Pro PHP Security
Pro PHP Security

This Book, Pro PHP Security, focuses on the practical aspects of building secure PHP applications. It emphasizes understanding and preventing common …

1 year, 1 month ago

Short Long
View Episode
Programming Linux Anti-Reversing Technique
Programming Linux Anti-Reversing Technique

This Book excerpt details Linux anti-reversing techniques, focusing on compiler options and file format manipulation to hinder reverse engineering ef…

1 year, 1 month ago

Short Long
View Episode
Programming and Automating Cisco Networks: A guide to network programmability and automation in the data center, campus, and WAN
Programming and Automating Cisco Networks: A guide to network programmability and automation in the data center, campus, and WAN

This Book provides a comprehensive guide to network programmability and automation, covering foundational skills and specific applications in Cisco D…

1 year, 1 month ago

Short Long
View Episode
Professor Messer's CompTIA A+ 220-901 and 220-902 Course Notes
Professor Messer's CompTIA A+ 220-901 and 220-902 Course Notes

Professor Messer's CompTIA 220-1001 Core 1 A+ Course Notes is a comprehensive study guide covering various aspects of computer hardware and networkin…

1 year, 1 month ago

Short Long
View Episode
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

It explores the process of red teaming, including shaping the engagement scope, establishing rules of engagement, executing the assessment, and repor…

1 year, 1 month ago

Short Long
View Episode
Pro Ember Data: Getting Ember Data to Work with Your API
Pro Ember Data: Getting Ember Data to Work with Your API

David Tang's "Pro Ember Data" is a guide to using Ember Data with custom APIs. The book explains Ember Data's architecture, including the store, adap…

1 year, 1 month ago

Short Long
View Episode
Privacy in Practice (Security, Audit and Leadership Series)
Privacy in Practice (Security, Audit and Leadership Series)

This Book is a table of contents and excerpts from a book on global privacy practices, authored by Dr. Alan Tang. The book comprehensively covers var…

1 year, 1 month ago

Short Long
View Episode
Preventing Ransomware: Understand, prevent, and remediate ransomware attacks
Preventing Ransomware: Understand, prevent, and remediate ransomware attacks

The provided Book "Preventing Ransomware," published by Packt Publishing. The excerpt details various aspects of malware and ransomware, including th…

1 year, 1 month ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us