Podcast Episodes

Back to Search
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence



This Book "Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence", a Book written by Kevin Cardwell. It focuses on using the network analysis…


Published on 11 months, 3 weeks ago

The Car Hacker's Handbook: A Guide for the Penetration Tester

The Car Hacker's Handbook: A Guide for the Penetration Tester



"The Car Hacker's Handbook" is a guide for penetration testers focused on automotive security. It teaches readers how to assess vulnerabilities in modern cars, which are becoming increasingly compute…


Published on 11 months, 3 weeks ago

C++20: Get the Details

C++20: Get the Details



The Book is a detailed explanation of the new features in C++20, including the Ranges library, Coroutines, Concepts, and Modules. The document also provides an overview of upcoming features in C++23,…


Published on 11 months, 3 weeks ago

C How to Program

C How to Program



The Book provide an extensive overview of the C programming language, encompassing its fundamental concepts, syntax, and practical applications. The text covers topics such as data types, operators, …


Published on 11 months, 3 weeks ago

Building an Effective Security Program

Building an Effective Security Program



This Book presents a comprehensive guide to building an effective cybersecurity program, covering all aspects from identifying threats and vulnerabilities to measuring performance and responding to i…


Published on 11 months, 3 weeks ago

Building Mobile Apps at Scale: 39 Engineering Challenges

Building Mobile Apps at Scale: 39 Engineering Challenges



The Book is a collection of excerpts from "Building Mobile Apps at Scale," which provides advice and insights on the complexities and challenges of building and maintaining mobile apps at scale. The …


Published on 11 months, 3 weeks ago

Bug Bounty Automation With Python

Bug Bounty Automation With Python



This excerpt from the book Bug Bounty Automation With Python: The Secrets of Bug Hunting provides a comprehensive introduction to automating bug bounty hunting using Python. The author, a security en…


Published on 11 months, 3 weeks ago

Cybersecurity Blue Team Strategies

Cybersecurity Blue Team Strategies



The Book provides a detailed guide to building and managing a cybersecurity blue team. It covers a range of topics, including the roles and responsibilities of different blue team members, the import…


Published on 11 months, 3 weeks ago

Blockchains for Network Security: Principles, technologies and applications

Blockchains for Network Security: Principles, technologies and applications



The book chapter excerpt that focuses on the integration of blockchain technology with various applications, specifically in the context of network security, Internet of Things (IoT), Geographic Info…


Published on 11 months, 3 weeks ago

Blockchain for Cybersecurity and Privacy

Blockchain for Cybersecurity and Privacy



The provided Book explore the potential applications of blockchain technology in a variety of contexts, including cybersecurity, supply chain management, healthcare, digital forensics, real estate tr…


Published on 11 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate