Podcast Episodes
Back to Search
Cracking the Coding Interview: 189 Programming Questions and Solutions
A comprehensive guide for technical interviews in the software industry, particularly focusing on algorithm, coding, and design questions. It offers …
3 months, 2 weeks ago
Computer Networks, Global Edition
A comprehensive overview of computer networking principles and technologies. The text explores foundational concepts such as gateways, routers, and n…
3 months, 3 weeks ago
Computer Forensics: Incident Response Essentials
A practical guide for investigating computer crimes, focusing on methodologies and tools for digital evidence acquisition and analysis. The text cove…
3 months, 3 weeks ago
CompTIA Pentest+ (Practice Exams)
A comprehensive overview of penetration testing concepts and methodologies, covering various attack types and the tools used by security professional…
3 months, 3 weeks ago
CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual
Offers an in-depth look at the Certified Information Systems Auditor (CISA) certification. It covers critical aspects of information systems auditing…
3 months, 3 weeks ago
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
A preparation guide for Certified Ethical Hacker (CEH) certification, focusing on a wide array of cybersecurity topics. It covers fundamental concept…
3 months, 3 weeks ago
The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)
Focusing on cybersecurity defense through the lens of offensive security. The material covers the evolution of cybersecurity practices, critiques the…
3 months, 3 weeks ago
The Cybersecurity Manager's Guide: The Art of Building Your Security Program
Outlines a seven-step methodology for building an effective InfoSec program by focusing on the "art," or people side, of security. The author, Todd, …
3 months, 3 weeks ago
Certificate of Cloud Auditing Knowledge Study Guide
Focusing heavily on the complexities of cloud governance, compliance, and auditing. A significant portion of the text is dedicated to the Cloud Contr…
3 months, 3 weeks ago
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime
Explains the nature of cybercrime and the three primary levels of the internet: the Surface Web, Deep Web, and Dark Web. A significant portion of the…
3 months, 3 weeks ago