Podcast Episodes

Back to Search
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics



Offers a comprehensive guide to cybersecurity, focusing on attack and defense strategies for infrastructure security. It explores the current threat landscape, detailing various attack methodologies …


Published on 5 months, 2 weeks ago

Cyber-Security Threats, Actors, and Dynamic Mitigation

Cyber-Security Threats, Actors, and Dynamic Mitigation



Explores various facets of cybersecurity, ranging from system and network threats to cryptographic vulnerabilities. It examines cyber-attack methodologies, including reconnaissance, malware, and deni…


Published on 5 months, 2 weeks ago

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques



Provides an extensive overview of cybersecurity strategies, detailing both attack and defense methodologies. It covers the lifecycle of cyberattacks, from initial reconnaissance using various tools a…


Published on 5 months, 3 weeks ago

Cyber Security: Threats and Responses for Government and Business

Cyber Security: Threats and Responses for Government and Business



Provides an extensive overview of cybersecurity threats and responses, highlighting the dynamic and evolving nature of the cyber domain. It examines how the Internet, while a powerful tool for societ…


Published on 5 months, 3 weeks ago

Cyber Security: The CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief Information Security

Cyber Security: The CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief Information Security



Introduces ESORMA, an Enterprise Security Operations Risk Management Architecture. This guide provides a practical, eight-domain framework—Scope, Priority, Evaluate, Enable, Harden, Monitor, Operatio…


Published on 5 months, 3 weeks ago

Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices)

Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices)



Explores various facets of cybersecurity. It covers threats to computer networks, cyber-physical systems, and the Internet of Things (IoT), alongside defensive strategies. The text discusses lightwei…


Published on 5 months, 3 weeks ago

Cyber Victimology: Decoding Cyber-Crime Victimisation

Cyber Victimology: Decoding Cyber-Crime Victimisation



Examines the evolution of victimology to include cybercrime, discussing various patterns of cyber victimization affecting individuals, companies, and governments. The book explores the roles of victi…


Published on 5 months, 3 weeks ago

Cyber Arms

Cyber Arms



Explores the multifaceted evolution and implications of cyber warfare and cybersecurity. It traces the history of malicious code from simple pranks to sophisticated cyber weapons, highlighting signif…


Published on 5 months, 3 weeks ago

Create Graphical User Interfaces with Python: How to build windows, buttons, and widgets for your Python projects

Create Graphical User Interfaces with Python: How to build windows, buttons, and widgets for your Python projects



Focuses on teaching users how to develop graphical user interfaces (GUIs) using Python and the guizero library. It covers various aspects, from creating basic windows, text boxes, and buttons to impl…


Published on 5 months, 3 weeks ago

C++ Primer (5th Edition)

C++ Primer (5th Edition)



Explains core C++ concepts ranging from basic program compilation and execution on different operating systems to advanced topics like templates, exception handling, and object-oriented programming. …


Published on 5 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate