Podcast Episodes
Back to Search
Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL
The Book provide a comprehensive guide to building a full-stack web application using React, TypeScript, Node.js, Express, and GraphQL. The book "Ful…
1 year, 3 months ago
Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL
The provided Book excerpts are from the book "Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL" by Nader Dabit. Thi…
1 year, 3 months ago
Full Stack Python Security: Cryptography, TLS, and attack resistance
The Book provide a comprehensive guide to securing Python-based web applications. The text covers fundamental cryptographic concepts, such as hashing…
1 year, 3 months ago
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
The source Book provides a guide to security testing. It explains the different types of security tests, including black box, white box, and gray box…
1 year, 3 months ago
Foundational Java: Key Elements and Practical Programming
This excerpt from the book "Foundational Java" provides an overview of object-oriented programming in Java. It explores key concepts such as classes,…
1 year, 3 months ago
Linux All-In-One For Dummies
The source Book provides a comprehensive guide to understanding and using Linux, covering a wide range of topics from basic installation and system a…
1 year, 3 months ago
Flutter for Beginners
The provided Book excerpts come from the book "Flutter for Beginners" by Alessandro Biessek, offering a comprehensive guide to Flutter app developmen…
1 year, 3 months ago
FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES
The Book provide an extensive guide to cybersecurity and privacy, using an analogy of a medieval castle to explain the importance of building strong …
1 year, 3 months ago
Finding Beacons in the Dark
This research Book explores the Cobalt Strike framework, a popular tool used by both red teams and malicious actors for penetration testing and cyber…
1 year, 3 months ago
Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!
This excerpt is from a book that teaches aspiring ethical hackers how to conduct penetration tests. The book provides a framework for ethical hacking…
1 year, 3 months ago