Podcast Episodes

Back to Search
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

This excerpt from the book "Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense" by Bryson Payne is a guide to ethical hacking that …

1 year, 5 months ago

Short Long
View Episode
Go Programming Language For Dummies
Go Programming Language For Dummies

This excerpt from the book "Go Programming Language For Dummies" provides a detailed introduction to the Go programming language, focusing on core co…

1 year, 5 months ago

Short Long
View Episode
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

"Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" is Kevin Mitnick's autobiography detailing his life as a computer hacker. The t…

1 year, 5 months ago

Short Long
View Episode
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy

This is a comprehensive guide to Ghidra, a reverse engineering tool developed by the National Security Agency (NSA). The book covers a wide range of …

1 year, 5 months ago

Short Long
View Episode
Get Programming with Go
Get Programming with Go

A book that teaches the Go programming language. It provides a step-by-step guide to Go, starting with the basics, such as declaring variables and pe…

1 year, 5 months ago

Short Long
View Episode
Game Hacking: Developing Autonomous Bots for Online Games by Cano
Game Hacking: Developing Autonomous Bots for Online Games by Cano

This is a comprehensive guide on game hacking, outlining the various tools and techniques used to manipulate and modify online games. The book covers…

1 year, 5 months ago

Short Long
View Episode
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU

The Book are a combination of the preface and selected chapters from the book "Fuzzing Against The Machine" by Eduardo Blázquez and Antonio Nappa. Th…

1 year, 5 months ago

Short Long
View Episode
Fuzzing for Software Security
Fuzzing for Software Security

This excerpt from the Book "Fuzzing for Software Security Testing and Quality Assurance" by Ari Takanen, Jared DeMott, and Charlie Miller focuses on …

1 year, 5 months ago

Short Long
View Episode
Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL
Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL

The Book provide a comprehensive guide to building a full-stack web application using React, TypeScript, Node.js, Express, and GraphQL. The book "Ful…

1 year, 5 months ago

Short Long
View Episode
Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL
Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL

The provided Book excerpts are from the book "Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL" by Nader Dabit. Thi…

1 year, 5 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us