Podcast Episodes
Back to Search
Hacking: The Art of Exploitation, 2nd Edition
This Book material is an excerpt from a book titled "Hacking: The Art of Exploitation." It explores the art of hacking through a combination of pract…
1 year, 3 months ago
Hacking Android
The Book provides a comprehensive guide to hacking and securing Android applications, covering both static and dynamic analysis techniques. The sourc…
1 year, 3 months ago
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
This Book is a comprehensive guide to computer hacking, written by Roger A. Grimes, a seasoned computer security professional with decades of experie…
1 year, 3 months ago
Hacking Kubernetes: Threat-Driven Analysis and Defense
This excerpt from the book "Hacking Kubernetes" by Andrew Martin and Michael Hausenblas is a guide for cybersecurity professionals working with Kuber…
1 year, 3 months ago
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future
The provided Book, excerpts from "Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future" explores the relati…
1 year, 3 months ago
Hacking Exposed: Malware & Rootkits Secrets & Solutions
The Book "Hacking Exposed: Malware & Rootkits provides a comprehensive examination of modern malware and rootkits, exploring their evolution, techniq…
1 year, 3 months ago
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
The Book "Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security," written by Gary Hall and Erin Watson. The book is a g…
1 year, 3 months ago
Hacking APIs: Breaking Web Application Programming Interfaces
This is an excerpt from "Hacking APIs: Breaking Web Application Programming Interfaces". The book provides a comprehensive guide to hacking APIs, cov…
1 year, 3 months ago
Hacking SaaS: An Insider's Guide to Managing Software Business Success
The Book is an excerpt from "Hacking SaaS: An Insider’s Guide to Managing Software Business Success," a book written by Eric Mersch, an experienced C…
1 year, 3 months ago
Hacking Multifactor Authentication
This excerpt from the book "Hacking Multifactor Authentication" provides a comprehensive look at the various ways attackers can bypass multifactor au…
1 year, 3 months ago