Podcast Episodes

Back to Search
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

How to Catch a Phish: A Practical Guide to Detecting Phishing Emails



This book, How to Catch a Phish, provides a practical guide to detecting phishing emails, which are designed to trick users into providing sensitive information or downloading malicious software. The…


Published on 10 months, 3 weeks ago

History of REvil

History of REvil



The Book, “History of REvil”, is a detailed report that investigates the history of the REvil ransomware gang, a criminal enterprise based in Russia. The Book outlines the group's origins as an affil…


Published on 10 months, 3 weeks ago

Hiding from the Internet: Eliminating Personal Online Information

Hiding from the Internet: Eliminating Personal Online Information



The Book, "Hiding From The Internet," is a comprehensive guide to maintaining online privacy. The author, a former government employee who experienced a personal data breach, provides detailed instru…


Published on 10 months, 3 weeks ago

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis



This is a Book that explains how to investigate covert communications and analyzes the tools and methods that criminals use to hide their communications. The book covers a broad landscape of technica…


Published on 10 months, 4 weeks ago

Hash Crack: Password Cracking Manual v.3

Hash Crack: Password Cracking Manual v.3



This Book, "HASH CRACK Password Cracking Manual v.3" is a comprehensive guide for cracking password hashes, written for network defenders and penetration testers. It provides a broad overview of the …


Published on 10 months, 4 weeks ago

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks



The Book is an early access excerpt from the Hardware Hacking Handbook by Jasper van Woudenberg and Colin O'Flynn. This excerpt focuses on embedded security, particularly the vulnerabilities in the h…


Published on 10 months, 4 weeks ago

Hardware Security: A Hands-on Learning Approach

Hardware Security: A Hands-on Learning Approach



This Book, "Hardware Security A Hands-on Learning Approach," is a comprehensive guide to hardware security. It focuses on the vulnerabilities and attacks that threaten hardware systems, including tho…


Published on 10 months, 4 weeks ago

Hands-On Penetration Testing on Windows

Hands-On Penetration Testing on Windows



The Book called "Hands-On Penetration Testing on Windows," which explains penetration testing concepts and techniques for those with intermediate to advanced skills. It covers a broad range of topics…


Published on 10 months, 4 weeks ago

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it



The Book "Hands-On Dark Web Analysis" by Sion Retzkin. The book provides a comprehensive guide for understanding and navigating the Deep Web and Dark Web, covering topics such as the origins of the i…


Published on 10 months, 4 weeks ago

Hands-On Chatbots and Conversational UI Development

Hands-On Chatbots and Conversational UI Development



The Book "Hands-On Chatbots and Conversational UI Development," which is a guide for building chatbots and voice user interfaces. The book covers a range of topics including the history and architect…


Published on 10 months, 4 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate