Podcast Episodes

Back to Search
Hacking APIs: Breaking Web Application Programming Interfaces

Hacking APIs: Breaking Web Application Programming Interfaces



This is an excerpt from "Hacking APIs: Breaking Web Application Programming Interfaces". The book provides a comprehensive guide to hacking APIs, covering topics like API discovery, endpoint analysis…


Published on 11 months ago

Hacking SaaS: An Insider's Guide to Managing Software Business Success

Hacking SaaS: An Insider's Guide to Managing Software Business Success



The Book is an excerpt from "Hacking SaaS: An Insider’s Guide to Managing Software Business Success," a book written by Eric Mersch, an experienced CFO with a long career in the subscription software…


Published on 11 months ago

Hacking Multifactor Authentication

Hacking Multifactor Authentication



This excerpt from the book "Hacking Multifactor Authentication" provides a comprehensive look at the various ways attackers can bypass multifactor authentication (MFA). The book explores different ty…


Published on 11 months ago

HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX

HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX



This excerpt from a hacking guidebook provides comprehensive information about ethical hacking, penetration testing, and cybersecurity. It delves into different types of hackers, including black hat,…


Published on 11 months ago

Hacking VoIP: Protocols, Attacks, and Countermeasures

Hacking VoIP: Protocols, Attacks, and Countermeasures



The Book, "Hacking VoIP: Protocols, Attacks, and Countermeasures" by Himanshu Dwivedi, is a book that details the security vulnerabilities of Voice over Internet Protocol (VoIP) networks. The book co…


Published on 11 months ago

Hacking the Xbox: An Introduction to Reverse Engineering

Hacking the Xbox: An Introduction to Reverse Engineering



"Hacking the Xbox: An Introduction to Reverse Engineering" is a guide for hackers interested in learning about reverse engineering, specifically focusing on the Xbox gaming console. The book begins w…


Published on 11 months ago

Hacking Gps

Hacking Gps



This excerpt from the book "Hacking GPS" by Kathie Kingsley-Hughes covers a wide range of topics relating to Global Positioning Systems (GPS) including hardware modifications, software hacking, and d…


Published on 11 months ago

Hacking For Dummies

Hacking For Dummies



The source Book provides a comprehensive guide to understanding and mitigating information security risks. It covers a range of topics, including common hacking techniques, vulnerability assessment m…


Published on 11 months ago

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It



This excerpt is from the book "Hacking and Securing iOS Applications" by Jonathan Zdziarski. The book provides a comprehensive guide to the vulnerabilities of iOS devices and applications. It explore…


Published on 11 months ago

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous



The excerpt is from a book exploring the complex, multifaceted nature of Anonymous, a decentralized online collective known for its hacktivism and trolling activities. The author provides a detailed …


Published on 11 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate