Subscribe
Sign in
Home
Yaksas Security
Yaksas Security Classroom
Learn Sendy
Archive
About
Latest
Top
Book Review: Web Application Security by Andrew Hoffman
Review of the book Web Application Security by Andrew Hoffman. Published in March 2020 by O'Reilly Publication.
Oct 21
•
Uday Mittal
Share this post
Book Review: Web Application Security by Andrew Hoffman
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
Book Review: Container Security by Liz Rice
Review of the book Container Security by Liz Rice. Published in April 2020 by O'Reilly Publication.
Oct 20
•
Uday Mittal
Share this post
Book Review: Container Security by Liz Rice
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
Book Review: Red Team Development and Operations by Joe Vest and James Tubberville
Review of the book Red Team Development and Operations by Joe Vest and James Tubberville. Published in January 2020.
Oct 19
•
Uday Mittal
Share this post
Book Review: Red Team Development and Operations by Joe Vest and James Tubberville
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
Book Review: The Cybersecurity Manager's Guide
Review of the book The Cybersecurity Manager's Guide by odd Barnum. Book published in March 2021.
Oct 7
•
Uday Mittal
Share this post
Book Review: The Cybersecurity Manager's Guide
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
Book Review: Penetration Testing Azure for Ethical Hackers
Review of the book Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen. Book published in November 2021.
Oct 6
•
Uday Mittal
Share this post
Book Review: Penetration Testing Azure for Ethical Hackers
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
September 2024
Book Review: Pentesting Azure Applications
Review of the book Pentesting Azure Applications by Matt Burrough. Book published in July 2021.
Sep 14
•
Uday Mittal
Share this post
Book Review: Pentesting Azure Applications
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
Book Review: Hacking API
Review of the book Hacking APIs - Breaking web application programming interfaces (API) by Corey Ball. Book published in April 2022.
Sep 13
•
Uday Mittal
Share this post
Book Review: Hacking API
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
August 2024
Switch to Hyper-V is Painful
Simple things are not simple when it comes to Hyper-V
Aug 31
•
Uday Mittal
Share this post
Switch to Hyper-V is Painful
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
Book Review: Practical Threat Intelligence and Data-Driven Threat Hunting
Review of the book Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazcón. Book published in October 2020.
Aug 28
•
Uday Mittal
Share this post
Book Review: Practical Threat Intelligence and Data-Driven Threat Hunting
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
Book Review: Cyber Warfare – Truth, Tactics, and Strategies
Review of the book Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham. Book published in February 2020.
Aug 25
•
Uday Mittal
Share this post
Book Review: Cyber Warfare – Truth, Tactics, and Strategies
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
Are you the Person of Interest?
Person of Interest is a thriller Sci-Fi television show depicting advanced mass surveillance.
Aug 22
•
Uday Mittal
Share this post
Are you the Person of Interest?
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
Book Review: How to Hack Like a LEGEND
Review of the book How to Hack Like a LEGEND by Sparc Flow. First published in 2018 and a newer edition in October 2022.
Aug 21
•
Uday Mittal
Share this post
Book Review: How to Hack Like a LEGEND
www.udaymittal.com
Copy link
Facebook
Email
Note
Other
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts