Podcast Episodes

Back to Search
Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic

Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic



This summary is talking about the Book "Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic".

The sources provide a comprehensive guide to Wireshark, an open-source netw…


Published on 1 year ago

Response Evidence Preservation and Collection

Response Evidence Preservation and Collection



This summary is talking about the Book "Response Evidence Preservation and Collection".

The provided text is a collection of excerpts from a PDF document about digital evidence preservation and collec…


Published on 1 year ago

RTFM - Red Team Field Manual v2

RTFM - Red Team Field Manual v2



This summary is talking about the Book "RTFM - Red Team Field Manual v2".

This document, titled "RTFM - Red Team Field Manual," serves as a comprehensive guide for cybersecurity professionals conducti…


Published on 1 year ago

Real-World Bug Hunting: A Field Guide to Web Hacking

Real-World Bug Hunting: A Field Guide to Web Hacking



This summary is talking about the Book "Real-World Bug Hunting: A Field Guide to Web Hacking".

This book is a comprehensive guide to web hacking, focusing on finding and exploiting security vulnerabil…


Published on 1 year ago

Red Team Guide A Practical Guide For Red Team And Offensive Security

Red Team Guide A Practical Guide For Red Team And Offensive Security



This summary is talking about the Book "Red Team Guide A Practical Guide For Red Team And Offensive Security".

The provided text is an excerpt from a "Red Team Guide," which serves as a practical manu…


Published on 1 year ago

Seeking the Truth from Mobile Evidence

Seeking the Truth from Mobile Evidence



This summary is talking about the Book "Seeking the Truth from Mobile Evidence".

This text comes from the book Seeking the Truth from Mobile Evidence, which is a guide for forensic examiners on how to…


Published on 1 year ago

SQL kurz und gut

SQL kurz und gut



This summary is talking about the Book "SQL kurz und gut".

This document provides a comprehensive guide to SQL, a language used for managing and querying data in databases. It covers fundamental conce…


Published on 1 year ago

Spring Security in Action

Spring Security in Action



This summary is talking about the Book "Spring Security in Action".

This book, Spring Security In Action, teaches Java developers how to secure their Spring applications. The text is divided into two …


Published on 1 year ago

The PowerShell Scripting & Toolmaking Book

The PowerShell Scripting & Toolmaking Book



This summary is talking about the Book "The PowerShell Scripting & Toolmaking Book".

It is a comprehensive guide to building PowerShell tools and scripts. It covers a wide range of topics, including t…


Published on 1 year ago

Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication

Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication



This summary is talking about the Book "Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication".

Explains the history of social engineerin…


Published on 1 year ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate