Podcast Episodes

Back to Search
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

The Book provide a comprehensive guide to ethical hacking, covering a wide range of topics from basic programming concepts to advanced techniques for…

1 year, 2 months ago

Short Long
View Episode
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

The source Book is from the book "Gray Hat C# : A Hacker's Guide to Creating and Automating Security Tools" by Brandon Perry. This book teaches reade…

1 year, 2 months ago

Short Long
View Episode
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

The provided Book are excerpts from the book "Gray Hat Python" by Justin Seitz, which aims to teach readers how to use Python for hacking and reverse…

1 year, 2 months ago

Short Long
View Episode
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers

This is a guide to Google hacking, focusing on how Google can be used to find sensitive information on the internet. The book covers topics like loca…

1 year, 2 months ago

Short Long
View Episode
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo

This book, Google Cloud Certified Professional Cloud Network Engineer Guide, is a comprehensive guide to Google Cloud Platform (GCP) networking. It c…

1 year, 2 months ago

Short Long
View Episode
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

This excerpt from the book "Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense" by Bryson Payne is a guide to ethical hacking that …

1 year, 2 months ago

Short Long
View Episode
Go Programming Language For Dummies
Go Programming Language For Dummies

This excerpt from the book "Go Programming Language For Dummies" provides a detailed introduction to the Go programming language, focusing on core co…

1 year, 2 months ago

Short Long
View Episode
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

"Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" is Kevin Mitnick's autobiography detailing his life as a computer hacker. The t…

1 year, 2 months ago

Short Long
View Episode
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy

This is a comprehensive guide to Ghidra, a reverse engineering tool developed by the National Security Agency (NSA). The book covers a wide range of …

1 year, 2 months ago

Short Long
View Episode
Get Programming with Go
Get Programming with Go

A book that teaches the Go programming language. It provides a step-by-step guide to Go, starting with the basics, such as declaring variables and pe…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us