Podcast Episodes

Back to Search
Android Security: Attacks and Defenses

Android Security: Attacks and Defenses



This summary is talking about the Book "Android Security: Attacks and Defenses".

This excerpt from the book "Android Security: Attacks and Defenses" by Abhishek Dubey and Anmol Misra focuses on the se…


Published on 6 months, 4 weeks ago

Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software

Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software



This summary is talking about the Book "Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software".

This is a technical book on how to bypass …


Published on 6 months, 4 weeks ago

Anti-Hacker Tool Kit, Fourth Edition

Anti-Hacker Tool Kit, Fourth Edition



This summary is talking about the Book "Anti-Hacker Tool Kit, Fourth Edition".

The provided text is an excerpt from the book "Anti-Hacker Tool Kit, 4th Edition" by Mike Shema. The book aims to equip r…


Published on 6 months, 4 weeks ago

Amazon Connect - Up and Running

Amazon Connect - Up and Running



This summary is talking about the Book "Amazon Connect - Up and Running".

The provided text is an excerpt from the book "Amazon Connect: Up and Running" by Jeff Armstrong. This book is a comprehensive…


Published on 6 months, 4 weeks ago

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Android Forensics: Investigation, Analysis and Mobile Security for Google Android



This summary is talking about the Book "Android Forensics: Investigation, Analysis and Mobile Security for Google Android".

The source material provides a comprehensive guide to Android forensics, cov…


Published on 6 months, 4 weeks ago

Aligning Security Operations with the MITRE ATT&CK Framework

Aligning Security Operations with the MITRE ATT&CK Framework



This summary is talking about the Book "Aligning Security Operations with the MITRE ATT&CK Framework".

This excerpt is from a book that explains how to use the MITRE ATT&CK framework in a security ope…


Published on 6 months, 4 weeks ago

Alice and Bob Learn Application Security

Alice and Bob Learn Application Security



This summary is talking about the Book "Alice and Bob Learn Application Security".

The provided text excerpts come from the book "Alice and Bob Learn Application Security," which aims to educate reade…


Published on 6 months, 4 weeks ago

AI Self-Driving Cars Divulgement: Practical Advances In Artificial Intelligence And Machine Learning

AI Self-Driving Cars Divulgement: Practical Advances In Artificial Intelligence And Machine Learning



This summary is talking about the Book "AI Self-Driving Cars Divulgement: Practical Advances In Artificial Intelligence And Machine Learning".

The sources explore the complex relationship between arti…


Published on 7 months ago

Advanced API Security

Advanced API Security



This summary is talking about the Book "Advanced API Security".

This is an excerpt from a book titled "Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE." The book disc…


Published on 7 months ago

Advanced Apple Debugging & Reverse Engineering

Advanced Apple Debugging & Reverse Engineering



This summary is talking about the Book "Advanced Apple Debugging & Reverse Engineering".

This text provides an extensive guide to advanced debugging and reverse engineering techniques for Apple platfo…


Published on 7 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate