Podcast Episodes

Back to Search
Nmap Network Exploration and Security Auditing Cookbook

Nmap Network Exploration and Security Auditing Cookbook



This summary is talking about the Book "Nmap Network Exploration and Security Auditing Cookbook".

The provided text is an excerpt from the book Nmap: Network Exploration and Security Auditing Cookbook…


Published on 1 year ago

Network Protocols for Security Professionals

Network Protocols for Security Professionals



This summary is talking about the Book "Network Protocols for Security Professionals".

The text provides a comprehensive guide to network security protocols, outlining their structures and functionali…


Published on 1 year ago

The Road to React with Firebase: Your journey to master advanced React for business web applications

The Road to React with Firebase: Your journey to master advanced React for business web applications



This summary is talking about the Book "The Road to React with Firebase: Your journey to master advanced React for business web applications".

This document is an excerpt from the ebook "The Road to R…


Published on 1 year ago

Reactive Programming with RxJS 5

Reactive Programming with RxJS 5



This summary is talking about the Book "Reactive Programming with RxJS 5".

The first source is an excerpt from the book "Reactive Programming with RxJS 5" by Sergi Mansilla. The book explains the reac…


Published on 1 year ago

Practical Social Engineering: A Primer for the Ethical Hacker

Practical Social Engineering: A Primer for the Ethical Hacker



This summary is talking about the Book "Practical Social Engineering: A Primer for the Ethical Hacker".

This is a text excerpt from a guide for ethical hackers called "Practical Social Engineering: A …


Published on 1 year ago

A Python Guide for Web Scraping

A Python Guide for Web Scraping



This summary is talking about the Book "A Python Guide for Web Scraping".

The text is a book excerpt that provides a comprehensive guide to web scraping using Python. It starts with a detailed introdu…


Published on 1 year ago

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools



This summary is talking about the Book "Practical Forensic Imaging: Securing Digital Evidence with Linux Tools".

The source is an excerpt from the book "Practical Forensic Imaging: Securing Digital Ev…


Published on 1 year ago

Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory

Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory



This summary is talking about the Book "Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory".

This book, "Practical Memory Forensics," is a comprehensive guide to memo…


Published on 1 year ago

Python for Cybersecurity: Using Python for Cyber Offense and Defense

Python for Cybersecurity: Using Python for Cyber Offense and Defense



This summary is talking about the Book "Python for Cybersecurity: Using Python for Cyber Offense and Defense".

This book demonstrates how to use Python for various cybersecurity tasks related to the M…


Published on 1 year ago

Practical SQL, 2nd Edition: A Beginner's Guide to Storytelling with Data

Practical SQL, 2nd Edition: A Beginner's Guide to Storytelling with Data



This summary is talking about the Book "Practical SQL, 2nd Edition: A Beginner's Guide to Storytelling with Data".

"Practical SQL, 2nd Edition" is a comprehensive guide for beginners to learn the SQL …


Published on 1 year ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate