Podcast Episodes

Back to Search
Game Hacking: Developing Autonomous Bots for Online Games by Cano
Game Hacking: Developing Autonomous Bots for Online Games by Cano

This is a comprehensive guide on game hacking, outlining the various tools and techniques used to manipulate and modify online games. The book covers…

1 year, 2 months ago

Short Long
View Episode
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU

The Book are a combination of the preface and selected chapters from the book "Fuzzing Against The Machine" by Eduardo Blázquez and Antonio Nappa. Th…

1 year, 2 months ago

Short Long
View Episode
Fuzzing for Software Security
Fuzzing for Software Security

This excerpt from the Book "Fuzzing for Software Security Testing and Quality Assurance" by Ari Takanen, Jared DeMott, and Charlie Miller focuses on …

1 year, 2 months ago

Short Long
View Episode
Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL
Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL

The Book provide a comprehensive guide to building a full-stack web application using React, TypeScript, Node.js, Express, and GraphQL. The book "Ful…

1 year, 2 months ago

Short Long
View Episode
Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL
Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL

The provided Book excerpts are from the book "Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL" by Nader Dabit. Thi…

1 year, 2 months ago

Short Long
View Episode
Full Stack Python Security: Cryptography, TLS, and attack resistance
Full Stack Python Security: Cryptography, TLS, and attack resistance

The Book provide a comprehensive guide to securing Python-based web applications. The text covers fundamental cryptographic concepts, such as hashing…

1 year, 2 months ago

Short Long
View Episode
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

The source Book provides a guide to security testing. It explains the different types of security tests, including black box, white box, and gray box…

1 year, 2 months ago

Short Long
View Episode
Foundational Java: Key Elements and Practical Programming
Foundational Java: Key Elements and Practical Programming

This excerpt from the book "Foundational Java" provides an overview of object-oriented programming in Java. It explores key concepts such as classes,…

1 year, 2 months ago

Short Long
View Episode
Linux All-In-One For Dummies
Linux All-In-One For Dummies

The source Book provides a comprehensive guide to understanding and using Linux, covering a wide range of topics from basic installation and system a…

1 year, 2 months ago

Short Long
View Episode
Flutter for Beginners
Flutter for Beginners

The provided Book excerpts come from the book "Flutter for Beginners" by Alessandro Biessek, offering a comprehensive guide to Flutter app developmen…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us