Podcast Episodes

Back to Search
Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition

Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition



This excerpt from the book "Kali Linux 2: Assuring Security" is a comprehensive guide to using Kali Linux for penetration testing. It begins by introducing the features and installation of Kali Linux…


Published on 1 year ago

Kali Linux Wireless Penetration Testing Beginner's Guide

Kali Linux Wireless Penetration Testing Beginner's Guide



This Book is an excerpt from the book "Kali Linux Wireless Penetration Testing Beginner's Guide" by Vivek Ramachandran and Cameron Buchanan. The book teaches readers how to conduct penetration tests …


Published on 1 year ago

Kali Linux Revealed: Mastering the Penetration Testing Distribution

Kali Linux Revealed: Mastering the Penetration Testing Distribution



The Book material provides a comprehensive guide to Kali Linux, covering everything from basic system fundamentals and package management to advanced usage scenarios such as kernel recompilation, cus…


Published on 1 year ago

Kali Linux Ctf Blueprints

Kali Linux Ctf Blueprints



The source Book provides a comprehensive guide to building and utilizing penetration testing environments using Kali Linux. The document outlines specific scenarios and vulnerabilities that can be re…


Published on 1 year ago

Kali Linux

Kali Linux



The Book titled "Kali Linux". It includes the email address and professional title of Souhail Laghchim, who identifies himself as a developer. This suggests that the document might contain informatio…


Published on 1 year ago

JNCIP: Juniper Networks Certified Internet Professional Study Guide

JNCIP: Juniper Networks Certified Internet Professional Study Guide



The provided Book comes from a study guide for the Juniper Networks Certified Internet Professional (JNCIP) exam. The study guide covers key concepts and configurations necessary for the JNCIP-M prac…


Published on 1 year ago

Jumpstarting the Raspberry Pi Zero W: Control the World Around You with a $10 Computer

Jumpstarting the Raspberry Pi Zero W: Control the World Around You with a $10 Computer



This Book from “Jumpstarting the Raspberry Pi Zero W” by Akkana Peck focuses on using the Raspberry Pi Zero W to control hardware and network devices. The book provides a comprehensive introduction t…


Published on 1 year ago

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers



The Book "The Art of Intrusion" by Kevin Mitnick and William Simon, a detailed account of hacker exploits and security vulnerabilities. The text explores various methods used by hackers to penetrate …


Published on 1 year ago

(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide

(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide



The Book is an excerpt from a study guide for the Systems Security Certified Practitioner (SSCP) exam. It explains key information security concepts and best practices, including the three pillars of…


Published on 1 year ago

ISO/IEC 9899:1999, Programming languages -- C

ISO/IEC 9899:1999, Programming languages -- C



The Book material provides a comprehensive and detailed description of the C programming language, including its syntax, semantics, and standard library. It covers topics ranging from basic concepts …


Published on 1 year ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate