Podcast Episodes

Back to Search
Hands-On Penetration Testing with Kali NetHunter

Hands-On Penetration Testing with Kali NetHunter



This excerpt is from a book that teaches ethical hacking and penetration testing using Kali Linux, specifically the NetHunter edition, designed for mobile devices. The text explains various technique…


Published on 10 months, 4 weeks ago

Handbook for CTFers

Handbook for CTFers



The Book is a handbook for CTF competitors, a type of cybersecurity competition. It provides information about various security vulnerabilities and attack techniques that are commonly used in CTF com…


Published on 11 months ago

Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook

Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook



The provided Book excerpts from "Hacklog: Volume 1" are a handbook on anonymity, IT security, and ethical hacking. The book guides readers on how to protect their privacy online, covering various top…


Published on 11 months ago

Hacking: The Art of Exploitation, 2nd Edition

Hacking: The Art of Exploitation, 2nd Edition



This Book material is an excerpt from a book titled "Hacking: The Art of Exploitation." It explores the art of hacking through a combination of practical programming examples and theoretical explanat…


Published on 11 months ago

Hacking Android

Hacking Android



The Book provides a comprehensive guide to hacking and securing Android applications, covering both static and dynamic analysis techniques. The source details various Android security vulnerabilities…


Published on 11 months ago

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Hacking the Hacker: Learn From the Experts Who Take Down Hackers



This Book is a comprehensive guide to computer hacking, written by Roger A. Grimes, a seasoned computer security professional with decades of experience. The book delves into the various methods empl…


Published on 11 months ago

Hacking Kubernetes: Threat-Driven Analysis and Defense

Hacking Kubernetes: Threat-Driven Analysis and Defense



This excerpt from the book "Hacking Kubernetes" by Andrew Martin and Michael Hausenblas is a guide for cybersecurity professionals working with Kubernetes. It covers the fundamentals of securing Kube…


Published on 11 months ago

Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future

Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future



The provided Book, excerpts from "Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future" explores the relationship between cybersecurity and the humanities. T…


Published on 11 months ago

Hacking Exposed: Malware & Rootkits Secrets & Solutions

Hacking Exposed: Malware & Rootkits Secrets & Solutions



The Book "Hacking Exposed: Malware & Rootkits provides a comprehensive examination of modern malware and rootkits, exploring their evolution, techniques, and countermeasures. The book explores how th…


Published on 11 months ago

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur



The Book "Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security," written by Gary Hall and Erin Watson. The book is a guide to understanding hacking techniques, includin…


Published on 11 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate