Podcast Episodes

Back to Search
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers

This is a guide to Google hacking, focusing on how Google can be used to find sensitive information on the internet. The book covers topics like loca…

1 year, 3 months ago

Short Long
View Episode
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo

This book, Google Cloud Certified Professional Cloud Network Engineer Guide, is a comprehensive guide to Google Cloud Platform (GCP) networking. It c…

1 year, 3 months ago

Short Long
View Episode
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

This excerpt from the book "Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense" by Bryson Payne is a guide to ethical hacking that …

1 year, 3 months ago

Short Long
View Episode
Go Programming Language For Dummies
Go Programming Language For Dummies

This excerpt from the book "Go Programming Language For Dummies" provides a detailed introduction to the Go programming language, focusing on core co…

1 year, 3 months ago

Short Long
View Episode
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

"Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" is Kevin Mitnick's autobiography detailing his life as a computer hacker. The t…

1 year, 3 months ago

Short Long
View Episode
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy

This is a comprehensive guide to Ghidra, a reverse engineering tool developed by the National Security Agency (NSA). The book covers a wide range of …

1 year, 3 months ago

Short Long
View Episode
Get Programming with Go
Get Programming with Go

A book that teaches the Go programming language. It provides a step-by-step guide to Go, starting with the basics, such as declaring variables and pe…

1 year, 3 months ago

Short Long
View Episode
Game Hacking: Developing Autonomous Bots for Online Games by Cano
Game Hacking: Developing Autonomous Bots for Online Games by Cano

This is a comprehensive guide on game hacking, outlining the various tools and techniques used to manipulate and modify online games. The book covers…

1 year, 3 months ago

Short Long
View Episode
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU

The Book are a combination of the preface and selected chapters from the book "Fuzzing Against The Machine" by Eduardo Blázquez and Antonio Nappa. Th…

1 year, 3 months ago

Short Long
View Episode
Fuzzing for Software Security
Fuzzing for Software Security

This excerpt from the Book "Fuzzing for Software Security Testing and Quality Assurance" by Ari Takanen, Jared DeMott, and Charlie Miller focuses on …

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us