Podcast Episodes

Back to Search
Warez: The Infrastructure and Aesthetics of Piracy

Warez: The Infrastructure and Aesthetics of Piracy



This summary is talking about the Book "Warez: The Infrastructure and Aesthetics of Piracy".

Explores the history and culture of the Warez Scene, a global network of pirates who distribute copyrighted…


Published on 7 months ago

Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid

Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid



This summary is talking about the Book "Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid".

This text provides an overview of reactive programming using R…


Published on 7 months ago

Ransomware and Cybercrime

Ransomware and Cybercrime



This summary is talking about the Book "Ransomware and Cybercrime".

The excerpt from Ransomware and Cybercrime by Andrew Jenkinson focuses on the rising threat of ransomware and cybercrime. It examine…


Published on 7 months ago

Unauthorised Access: Physical Penetration Testing For IT Security Teams

Unauthorised Access: Physical Penetration Testing For IT Security Teams



This summary is talking about the Book "Unauthorised Access: Physical Penetration Testing For IT Security Teams".

The sources are a compilation of excerpts from a book titled "Unauthorized Access", wh…


Published on 7 months ago

Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic

Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic



This summary is talking about the Book "Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic".

The sources provide a comprehensive guide to Wireshark, an open-source netw…


Published on 7 months ago

Response Evidence Preservation and Collection

Response Evidence Preservation and Collection



This summary is talking about the Book "Response Evidence Preservation and Collection".

The provided text is a collection of excerpts from a PDF document about digital evidence preservation and collec…


Published on 7 months ago

RTFM - Red Team Field Manual v2

RTFM - Red Team Field Manual v2



This summary is talking about the Book "RTFM - Red Team Field Manual v2".

This document, titled "RTFM - Red Team Field Manual," serves as a comprehensive guide for cybersecurity professionals conducti…


Published on 7 months ago

Real-World Bug Hunting: A Field Guide to Web Hacking

Real-World Bug Hunting: A Field Guide to Web Hacking



This summary is talking about the Book "Real-World Bug Hunting: A Field Guide to Web Hacking".

This book is a comprehensive guide to web hacking, focusing on finding and exploiting security vulnerabil…


Published on 7 months, 1 week ago

Red Team Guide A Practical Guide For Red Team And Offensive Security

Red Team Guide A Practical Guide For Red Team And Offensive Security



This summary is talking about the Book "Red Team Guide A Practical Guide For Red Team And Offensive Security".

The provided text is an excerpt from a "Red Team Guide," which serves as a practical manu…


Published on 7 months, 1 week ago

Seeking the Truth from Mobile Evidence

Seeking the Truth from Mobile Evidence



This summary is talking about the Book "Seeking the Truth from Mobile Evidence".

This text comes from the book Seeking the Truth from Mobile Evidence, which is a guide for forensic examiners on how to…


Published on 7 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate