Podcast Episodes
Back to Search
Google Hacking for Penetration Testers
This is a guide to Google hacking, focusing on how Google can be used to find sensitive information on the internet. The book covers topics like loca…
1 year, 3 months ago
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo
This book, Google Cloud Certified Professional Cloud Network Engineer Guide, is a comprehensive guide to Google Cloud Platform (GCP) networking. It c…
1 year, 3 months ago
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
This excerpt from the book "Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense" by Bryson Payne is a guide to ethical hacking that …
1 year, 3 months ago
Go Programming Language For Dummies
This excerpt from the book "Go Programming Language For Dummies" provides a detailed introduction to the Go programming language, focusing on core co…
1 year, 3 months ago
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
"Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" is Kevin Mitnick's autobiography detailing his life as a computer hacker. The t…
1 year, 3 months ago
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy
This is a comprehensive guide to Ghidra, a reverse engineering tool developed by the National Security Agency (NSA). The book covers a wide range of …
1 year, 3 months ago
Get Programming with Go
A book that teaches the Go programming language. It provides a step-by-step guide to Go, starting with the basics, such as declaring variables and pe…
1 year, 3 months ago
Game Hacking: Developing Autonomous Bots for Online Games by Cano
This is a comprehensive guide on game hacking, outlining the various tools and techniques used to manipulate and modify online games. The book covers…
1 year, 3 months ago
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
The Book are a combination of the preface and selected chapters from the book "Fuzzing Against The Machine" by Eduardo Blázquez and Antonio Nappa. Th…
1 year, 3 months ago
Fuzzing for Software Security
This excerpt from the Book "Fuzzing for Software Security Testing and Quality Assurance" by Ari Takanen, Jared DeMott, and Charlie Miller focuses on …
1 year, 3 months ago