Podcast Episodes

Back to Search
Black Hat GraphQL: Attacking Next Generation APIs

Black Hat GraphQL: Attacking Next Generation APIs



"Black Hat GraphQL" is a guide for security professionals interested in learning how to attack GraphQL APIs. The book explains the fundamentals of GraphQL, including its schema, type system, and quer…


Published on 11 months, 3 weeks ago

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence



The Book is a compilation of research papers on cybersecurity, specifically focusing on methods to detect and classify cyber threats. These papers explore the application of machine learning techniqu…


Published on 11 months, 3 weeks ago

Big Data Forensics: Learning Hadoop Investigations

Big Data Forensics: Learning Hadoop Investigations



This book, Big Data Forensics - Learning Hadoop Investigations, is a guide for IT professionals interested in the field of digital forensics as it applies to Big Data systems. It focuses on the ident…


Published on 11 months, 3 weeks ago

Beyond the Basic Stuff with Python: Best Practices for Writing Clean Code

Beyond the Basic Stuff with Python: Best Practices for Writing Clean Code



This is a guide for intermediate Python programmers who want to expand their knowledge beyond basic syntax. The text covers advanced best practices such as choosing understandable names for variables…


Published on 11 months, 3 weeks ago

Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition

Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition



This excerpt from the book "Beyond BIOS: Developing with the Unified Extensible Firmware Interface" by Vincent Zimmer, Suresh Marisetty, and Michael Rothman, provides an in-depth look at the Unified …


Published on 11 months, 3 weeks ago

Beginning Flutter: A Hands On Guide to App Development

Beginning Flutter: A Hands On Guide to App Development



The provided text excerpts come from the book "Beginning Flutter: A Hands-On Guide to App Development" by Marco L. Napoli. The book provides a comprehensive guide for learning how to build Flutter ap…


Published on 11 months, 3 weeks ago

Beginning Security with Microsoft Technologies

Beginning Security with Microsoft Technologies



This excerpt is from the book Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data by Vasantha Lakshmi. The book focuses on securing enterprise environments using …


Published on 11 months, 3 weeks ago

Networking with MikroTik: MTCNA Study Guide

Networking with MikroTik: MTCNA Study Guide



This study guide from Manito Networks, LLC is designed to help individuals prepare for the MikroTik Certified Network Associate (MTCNA) exam. The guide covers a wide range of topics related to config…


Published on 11 months, 3 weeks ago

Becoming The Hacker

Becoming The Hacker



The source text provides a comprehensive guide to web application security from the perspective of a hacker. The text covers common web vulnerabilities, including SQL injection, Cross-Site Scripting …


Published on 11 months, 3 weeks ago

Basic Security Testing With Kali Linux, Third Edition

Basic Security Testing With Kali Linux, Third Edition



This source is a book about computer security testing, specifically focused on using Kali Linux as a platform for ethical hacking. The book covers a wide range of topics, including basic security tes…


Published on 11 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate