Podcast Episodes

Back to Search
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

This is a Book that explains how to investigate covert communications and analyzes the tools and methods that criminals use to hide their communicati…

1 year, 3 months ago

Short Long
View Episode
Hash Crack: Password Cracking Manual v.3
Hash Crack: Password Cracking Manual v.3

This Book, "HASH CRACK Password Cracking Manual v.3" is a comprehensive guide for cracking password hashes, written for network defenders and penetra…

1 year, 3 months ago

Short Long
View Episode
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

The Book is an early access excerpt from the Hardware Hacking Handbook by Jasper van Woudenberg and Colin O'Flynn. This excerpt focuses on embedded s…

1 year, 3 months ago

Short Long
View Episode
Hardware Security: A Hands-on Learning Approach
Hardware Security: A Hands-on Learning Approach

This Book, "Hardware Security A Hands-on Learning Approach," is a comprehensive guide to hardware security. It focuses on the vulnerabilities and att…

1 year, 3 months ago

Short Long
View Episode
Hands-On Penetration Testing on Windows
Hands-On Penetration Testing on Windows

The Book called "Hands-On Penetration Testing on Windows," which explains penetration testing concepts and techniques for those with intermediate to …

1 year, 3 months ago

Short Long
View Episode
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

The Book "Hands-On Dark Web Analysis" by Sion Retzkin. The book provides a comprehensive guide for understanding and navigating the Deep Web and Dark…

1 year, 3 months ago

Short Long
View Episode
Hands-On Chatbots and Conversational UI Development
Hands-On Chatbots and Conversational UI Development

The Book "Hands-On Chatbots and Conversational UI Development," which is a guide for building chatbots and voice user interfaces. The book covers a r…

1 year, 3 months ago

Short Long
View Episode
Hands-On Penetration Testing with Kali NetHunter
Hands-On Penetration Testing with Kali NetHunter

This excerpt is from a book that teaches ethical hacking and penetration testing using Kali Linux, specifically the NetHunter edition, designed for m…

1 year, 3 months ago

Short Long
View Episode
Handbook for CTFers
Handbook for CTFers

The Book is a handbook for CTF competitors, a type of cybersecurity competition. It provides information about various security vulnerabilities and a…

1 year, 3 months ago

Short Long
View Episode
Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook
Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook

The provided Book excerpts from "Hacklog: Volume 1" are a handbook on anonymity, IT security, and ethical hacking. The book guides readers on how to …

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us