Podcast Episodes

Back to Search
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

This Book is a comprehensive guide to computer hacking, written by Roger A. Grimes, a seasoned computer security professional with decades of experie…

1 year, 5 months ago

Short Long
View Episode
Hacking Kubernetes: Threat-Driven Analysis and Defense
Hacking Kubernetes: Threat-Driven Analysis and Defense

This excerpt from the book "Hacking Kubernetes" by Andrew Martin and Michael Hausenblas is a guide for cybersecurity professionals working with Kuber…

1 year, 5 months ago

Short Long
View Episode
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future

The provided Book, excerpts from "Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future" explores the relati…

1 year, 5 months ago

Short Long
View Episode
Hacking Exposed: Malware & Rootkits Secrets & Solutions
Hacking Exposed: Malware & Rootkits Secrets & Solutions

The Book "Hacking Exposed: Malware & Rootkits provides a comprehensive examination of modern malware and rootkits, exploring their evolution, techniq…

1 year, 5 months ago

Short Long
View Episode
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

The Book "Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security," written by Gary Hall and Erin Watson. The book is a g…

1 year, 5 months ago

Short Long
View Episode
Hacking APIs: Breaking Web Application Programming Interfaces
Hacking APIs: Breaking Web Application Programming Interfaces

This is an excerpt from "Hacking APIs: Breaking Web Application Programming Interfaces". The book provides a comprehensive guide to hacking APIs, cov…

1 year, 5 months ago

Short Long
View Episode
Hacking SaaS: An Insider's Guide to Managing Software Business Success
Hacking SaaS: An Insider's Guide to Managing Software Business Success

The Book is an excerpt from "Hacking SaaS: An Insider’s Guide to Managing Software Business Success," a book written by Eric Mersch, an experienced C…

1 year, 5 months ago

Short Long
View Episode
Hacking Multifactor Authentication
Hacking Multifactor Authentication

This excerpt from the book "Hacking Multifactor Authentication" provides a comprehensive look at the various ways attackers can bypass multifactor au…

1 year, 5 months ago

Short Long
View Episode
HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX
HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX

This excerpt from a hacking guidebook provides comprehensive information about ethical hacking, penetration testing, and cybersecurity. It delves int…

1 year, 5 months ago

Short Long
View Episode
Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

The Book, "Hacking VoIP: Protocols, Attacks, and Countermeasures" by Himanshu Dwivedi, is a book that details the security vulnerabilities of Voice o…

1 year, 5 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us