Podcast Episodes

Back to Search
CC Certified in Cybersecurity All-in-One Exam Guide
CC Certified in Cybersecurity All-in-One Exam Guide

This excerpt from the Certified in Cybersecurity All-in-One Exam Guide details the foundational knowledge needed for individuals pursuing the Certifi…

1 year, 2 months ago

Short Long
View Episode
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

This Book "Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence", a Book written by Kevin …

1 year, 2 months ago

Short Long
View Episode
The Car Hacker's Handbook: A Guide for the Penetration Tester
The Car Hacker's Handbook: A Guide for the Penetration Tester

"The Car Hacker's Handbook" is a guide for penetration testers focused on automotive security. It teaches readers how to assess vulnerabilities in mo…

1 year, 2 months ago

Short Long
View Episode
C++20: Get the Details
C++20: Get the Details

The Book is a detailed explanation of the new features in C++20, including the Ranges library, Coroutines, Concepts, and Modules. The document also p…

1 year, 2 months ago

Short Long
View Episode
C How to Program
C How to Program

The Book provide an extensive overview of the C programming language, encompassing its fundamental concepts, syntax, and practical applications. The …

1 year, 2 months ago

Short Long
View Episode
Building an Effective Security Program
Building an Effective Security Program

This Book presents a comprehensive guide to building an effective cybersecurity program, covering all aspects from identifying threats and vulnerabil…

1 year, 2 months ago

Short Long
View Episode
Building Mobile Apps at Scale: 39 Engineering Challenges
Building Mobile Apps at Scale: 39 Engineering Challenges

The Book is a collection of excerpts from "Building Mobile Apps at Scale," which provides advice and insights on the complexities and challenges of b…

1 year, 2 months ago

Short Long
View Episode
Bug Bounty Automation With Python
Bug Bounty Automation With Python

This excerpt from the book Bug Bounty Automation With Python: The Secrets of Bug Hunting provides a comprehensive introduction to automating bug boun…

1 year, 2 months ago

Short Long
View Episode
Cybersecurity Blue Team Strategies
Cybersecurity Blue Team Strategies

The Book provides a detailed guide to building and managing a cybersecurity blue team. It covers a range of topics, including the roles and responsib…

1 year, 2 months ago

Short Long
View Episode
Blockchains for Network Security: Principles, technologies and applications
Blockchains for Network Security: Principles, technologies and applications

The book chapter excerpt that focuses on the integration of blockchain technology with various applications, specifically in the context of network s…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us