Podcast Episodes

Back to Search
(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test

(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test



The Book "(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test" is a study guide for the CISSP certification exam, which focuses on the field of information syst…


Published on 5 months, 3 weeks ago

ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide

ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide



The Book provide a comprehensive guide to the Certified in Risk and Information Systems Control (CRISC) certification exam. It explores various aspects of IT risk management, including governance, co…


Published on 5 months, 3 weeks ago

IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT



This "IoT and OT Security Handbook" explains the challenges of securing IoT and OT devices in the era of Industry 4.0. The book highlights the importance of asset inventory, network segmentation, vul…


Published on 5 months, 3 weeks ago

iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence



This excerpt comes from iOS Forensics for Investigators, a book by Gianluca Tiepolo, a cybersecurity researcher specializing in mobile forensics and incident response. The book is a comprehensive gui…


Published on 5 months, 3 weeks ago

iOS Application Security: The Definitive Guide for Hackers and Developers

iOS Application Security: The Definitive Guide for Hackers and Developers



The source is a book entitled "iOS Application Security" by William Pollock. The book is a guide to security practices and common security vulnerabilities in iOS development. It covers a wide range o…


Published on 5 months, 3 weeks ago

iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics

iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics



The Book is an excerpt from a book about iOS 14 programming fundamentals using Swift. The Book covers fundamental topics such as object types, variables, control flow, memory management, and Cocoa cl…


Published on 5 months, 3 weeks ago

Investigating Windows Systems

Investigating Windows Systems



The source Book is an excerpt from "Investigating Windows Systems.pdf," a book that aims to guide digital forensic analysts through the process of analyzing data from Windows systems. The text provid…


Published on 5 months, 3 weeks ago

Investigating Internet Crimes

Investigating Internet Crimes



This excerpt from the book "Investigating Internet Crimes" provides a comprehensive guide for law enforcement officers and investigators on how to effectively investigate and prosecute internet-relat…


Published on 5 months, 3 weeks ago

Introduction to Computer Organization

Introduction to Computer Organization



The Book provide an introductory overview of computer organization, covering the fundamental concepts of hardware and software. The sources explore topics such as data storage formats, number systems…


Published on 5 months, 3 weeks ago

Introduction to Compiler Design

Introduction to Compiler Design



This excerpt from Introduction to Compiler Design by Torben Ægidius Mogensen provides a comprehensive overview of compiler design principles, focusing on the theoretical foundations and practical tec…


Published on 5 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate