Podcast Episodes

Back to Search
SQL kurz und gut

SQL kurz und gut



This summary is talking about the Book "SQL kurz und gut".

This document provides a comprehensive guide to SQL, a language used for managing and querying data in databases. It covers fundamental conce…


Published on 7 months, 1 week ago

Spring Security in Action

Spring Security in Action



This summary is talking about the Book "Spring Security in Action".

This book, Spring Security In Action, teaches Java developers how to secure their Spring applications. The text is divided into two …


Published on 7 months, 1 week ago

The PowerShell Scripting & Toolmaking Book

The PowerShell Scripting & Toolmaking Book



This summary is talking about the Book "The PowerShell Scripting & Toolmaking Book".

It is a comprehensive guide to building PowerShell tools and scripts. It covers a wide range of topics, including t…


Published on 7 months, 1 week ago

Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication

Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication



This summary is talking about the Book "Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication".

Explains the history of social engineerin…


Published on 7 months, 1 week ago

The Cybersecurity Playbook for Modern Enterprises

The Cybersecurity Playbook for Modern Enterprises



This summary is talking about the Book "The Cybersecurity Playbook for Modern Enterprises".

The source is a cybersecurity playbook for modern enterprises, aimed at preventing data breaches and cyberat…


Published on 7 months, 1 week ago

The Complete Book Of Locks And Locksmithing

The Complete Book Of Locks And Locksmithing



This summary is talking about the Book "The Complete Book Of Locks And Locksmithing".

Provides a comprehensive guide to locksmithing, covering a wide range of topics from the history of locks to moder…


Published on 7 months, 1 week ago

Ten Strategies of a World Class Cybersecurity Operations Center

Ten Strategies of a World Class Cybersecurity Operations Center



This summary is talking about the Book "Ten Strategies of a World Class Cybersecurity Operations Center".

The document, authored by Carson Zimmerman of The MITRE Corporation, is a guide for cybersecur…


Published on 7 months, 1 week ago

The Practice of Network Security Monitoring

The Practice of Network Security Monitoring



This summary is talking about the Book "The Practice of Network Security Monitoring".

The book focuses on the implementation of Network Security Monitoring (NSM) techniques to detect and respond to cy…


Published on 7 months, 1 week ago

The Nmap cookbook Beat the Beast

The Nmap cookbook Beat the Beast



This summary is talking about the Book "The Nmap cookbook Beat the Beast".

Provides a comprehensive guide to using Nmap, an open-source network scanner, for penetration testing and ethical hacking. Th…


Published on 7 months, 1 week ago

The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer (Cyber Secrets)

The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer (Cyber Secrets)



This summary is talking about the Book "The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer (Cyber Secrets)".

This collection of articles is a deep-dive into the world of digital forensics an…


Published on 7 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate