Podcast Episodes

Back to Search
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition



The Book provide a comprehensive guide to ethical hacking, covering a wide range of topics from basic programming concepts to advanced techniques for exploiting vulnerabilities in various systems. Th…


Published on 11 months ago

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools



The source Book is from the book "Gray Hat C# : A Hacker's Guide to Creating and Automating Security Tools" by Brandon Perry. This book teaches readers how to write C# security tools for Windows, OS …


Published on 11 months ago

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Gray Hat Python: Python Programming for Hackers and Reverse Engineers



The provided Book are excerpts from the book "Gray Hat Python" by Justin Seitz, which aims to teach readers how to use Python for hacking and reverse engineering. The text focuses on a variety of top…


Published on 11 months ago

Google Hacking for Penetration Testers

Google Hacking for Penetration Testers



This is a guide to Google hacking, focusing on how Google can be used to find sensitive information on the internet. The book covers topics like locating exploits and targets, profiling web servers, …


Published on 11 months ago

Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo

Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo



This book, Google Cloud Certified Professional Cloud Network Engineer Guide, is a comprehensive guide to Google Cloud Platform (GCP) networking. It covers a wide range of topics, including designing,…


Published on 11 months ago

Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense



This excerpt from the book "Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense" by Bryson Payne is a guide to ethical hacking that teaches readers about common cyber attacks and how…


Published on 11 months ago

Go Programming Language For Dummies

Go Programming Language For Dummies



This excerpt from the book "Go Programming Language For Dummies" provides a detailed introduction to the Go programming language, focusing on core concepts such as data types, variables, control flow…


Published on 11 months ago

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker



"Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" is Kevin Mitnick's autobiography detailing his life as a computer hacker. The text provides excerpts from his book where Mitnick …


Published on 11 months ago

Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy

Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy



This is a comprehensive guide to Ghidra, a reverse engineering tool developed by the National Security Agency (NSA). The book covers a wide range of topics, including Ghidra's installation and setup,…


Published on 11 months ago

Get Programming with Go

Get Programming with Go



A book that teaches the Go programming language. It provides a step-by-step guide to Go, starting with the basics, such as declaring variables and performing math operations, and moving on to more ad…


Published on 11 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate