Outlines a seven-step methodology for building an effective InfoSec program by focusing on the "art," or people side, of security. The author, Todd, draws on over two decades of experience to argue t…
Published on 16 hours ago
Focusing heavily on the complexities of cloud governance, compliance, and auditing. A significant portion of the text is dedicated to the Cloud Controls Matrix (CCM), an industry-specific framework d…
Published on 1 day, 16 hours ago
Explains the nature of cybercrime and the three primary levels of the internet: the Surface Web, Deep Web, and Dark Web. A significant portion of the material details the major criminal activities fo…
Published on 2 days, 16 hours ago
Serves as an in-depth textbook resource, outlining the foundational concepts of cybersecurity, beginning with definitions of data, information, and networking. It extensively covers the history and e…
Published on 3 days, 16 hours ago
Focusing on Ad Hoc Networks and utilizing the ns-3 simulator. The material covers both the theoretical and practical aspects of simulation, including the formal definition and characteristics of Mobi…
Published on 4 days, 16 hours ago
A technical resource aimed at IT engineers looking to utilize Zabbix 5 for monitoring their environments. Authored by Nathan Liefting and Brian van Baekel, the book is structured as a recipe-style gu…
Published on 5 days, 16 hours ago
A deep foundation in blockchain technology, starting with a historical context of money and the centralized systems it relies upon, before introducing the decentralized, trustless model of blockchain…
Published on 6 days, 16 hours ago
Focusing on the application of user experience (UX) principles to Extended Reality (XR), which includes Virtual Reality (VR) and Augmented Reality (AR). The content explores the history of XR, the ri…
Published on 1 week ago
An extensive table of contents and introductory material for a guide on using the popular code editor for Python development. The source details fundamental setup procedures such as installing Visual…
Published on 1 week, 1 day ago
Argues that cybersecurity is primarily a behavioral challenge rather than a technological one, emphasizing that people are the cause of nearly all security incidents. The book introduces and elaborat…
Published on 1 week, 2 days ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate