Podcast Episodes
Back to Search
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them
This Book, "Offensive Shellcode from Scratch," provides an in-depth guide to understanding and creating shellcode, a type of malicious code used to e…
1 year, 2 months ago
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
The Book provides a comprehensive guide to analyzing leaked datasets, focusing on ethical considerations, technical skills, and practical tools for i…
1 year, 2 months ago
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
This excerpt from the book "Pentesting Azure" by Matt Burrough offers a comprehensive guide for penetration testers and security professionals who se…
1 year, 2 months ago
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
The provided Book is an excerpt from a guide to using Nmap, a free and open-source network scanner. The guide covers a wide range of topics including…
1 year, 2 months ago
NGINX Cookbook
The Book is a guide to the NGINX web server, specifically focused on NGINX Plus, a commercial edition. It covers a wide range of topics, from basic i…
1 year, 2 months ago
Networking All-in-One For Dummies
The Book provide an in-depth overview of networking concepts, covering both hardware and software aspects. From the fundamentals of network protocols…
1 year, 2 months ago
Exam 98-366 Networking Fundamentals, 2nd Edition
The Book, "Exam 98-366 Networking Fundamentals, 2nd Edition," is a textbook designed to prepare students for the Microsoft Technology Associate (MTA)…
1 year, 2 months ago
Windows Server Administration Fundamentals
This source is a book about networking fundamentals that teaches readers how to connect computers and devices to form networks. It starts with basic …
1 year, 2 months ago
Network Security: Private Communication in a Public World
This Book "Network Security: Private Communications in a Public World" (Third Edition) by Charlie Kaufman, Radia Perlman, Mike Speciner, and Ray Perl…
1 year, 2 months ago
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
This excerpt from the book "Network Security Monitoring" by Chris Fry and Martin Nystrom provides guidance on how to monitor network security effecti…
1 year, 2 months ago