Podcast Episodes

Back to Search
Jumpstarting the Raspberry Pi Zero W: Control the World Around You with a $10 Computer

Jumpstarting the Raspberry Pi Zero W: Control the World Around You with a $10 Computer



This Book from “Jumpstarting the Raspberry Pi Zero W” by Akkana Peck focuses on using the Raspberry Pi Zero W to control hardware and network devices. The book provides a comprehensive introduction t…


Published on 10 months, 3 weeks ago

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers



The Book "The Art of Intrusion" by Kevin Mitnick and William Simon, a detailed account of hacker exploits and security vulnerabilities. The text explores various methods used by hackers to penetrate …


Published on 10 months, 3 weeks ago

(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide

(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide



The Book is an excerpt from a study guide for the Systems Security Certified Practitioner (SSCP) exam. It explains key information security concepts and best practices, including the three pillars of…


Published on 10 months, 3 weeks ago

ISO/IEC 9899:1999, Programming languages -- C

ISO/IEC 9899:1999, Programming languages -- C



The Book material provides a comprehensive and detailed description of the C programming language, including its syntax, semantics, and standard library. It covers topics ranging from basic concepts …


Published on 10 months, 3 weeks ago

JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron

JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron



The Book provide a comprehensive guide to building cross-platform applications with GraphQL, React, React Native, and Electron. The first source, "JavaScript Everywhere," focuses on setting up a deve…


Published on 10 months, 3 weeks ago

(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test

(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test



The Book "(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test" is a study guide for the CISSP certification exam, which focuses on the field of information syst…


Published on 10 months, 3 weeks ago

ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide

ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide



The Book provide a comprehensive guide to the Certified in Risk and Information Systems Control (CRISC) certification exam. It explores various aspects of IT risk management, including governance, co…


Published on 10 months, 3 weeks ago

IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT



This "IoT and OT Security Handbook" explains the challenges of securing IoT and OT devices in the era of Industry 4.0. The book highlights the importance of asset inventory, network segmentation, vul…


Published on 10 months, 3 weeks ago

iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence



This excerpt comes from iOS Forensics for Investigators, a book by Gianluca Tiepolo, a cybersecurity researcher specializing in mobile forensics and incident response. The book is a comprehensive gui…


Published on 10 months, 3 weeks ago

iOS Application Security: The Definitive Guide for Hackers and Developers

iOS Application Security: The Definitive Guide for Hackers and Developers



The source is a book entitled "iOS Application Security" by William Pollock. The book is a guide to security practices and common security vulnerabilities in iOS development. It covers a wide range o…


Published on 10 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate