Podcast Episodes

Back to Search
JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron

JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron



The Book provide a comprehensive guide to building cross-platform applications with GraphQL, React, React Native, and Electron. The first source, "JavaScript Everywhere," focuses on setting up a deve…


Published on 1 year ago

(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test

(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test



The Book "(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test" is a study guide for the CISSP certification exam, which focuses on the field of information syst…


Published on 1 year ago

ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide

ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide



The Book provide a comprehensive guide to the Certified in Risk and Information Systems Control (CRISC) certification exam. It explores various aspects of IT risk management, including governance, co…


Published on 1 year ago

IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT



This "IoT and OT Security Handbook" explains the challenges of securing IoT and OT devices in the era of Industry 4.0. The book highlights the importance of asset inventory, network segmentation, vul…


Published on 1 year ago

iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence



This excerpt comes from iOS Forensics for Investigators, a book by Gianluca Tiepolo, a cybersecurity researcher specializing in mobile forensics and incident response. The book is a comprehensive gui…


Published on 1 year ago

iOS Application Security: The Definitive Guide for Hackers and Developers

iOS Application Security: The Definitive Guide for Hackers and Developers



The source is a book entitled "iOS Application Security" by William Pollock. The book is a guide to security practices and common security vulnerabilities in iOS development. It covers a wide range o…


Published on 1 year ago

iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics

iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics



The Book is an excerpt from a book about iOS 14 programming fundamentals using Swift. The Book covers fundamental topics such as object types, variables, control flow, memory management, and Cocoa cl…


Published on 1 year ago

Investigating Windows Systems

Investigating Windows Systems



The source Book is an excerpt from "Investigating Windows Systems.pdf," a book that aims to guide digital forensic analysts through the process of analyzing data from Windows systems. The text provid…


Published on 1 year ago

Investigating Internet Crimes

Investigating Internet Crimes



This excerpt from the book "Investigating Internet Crimes" provides a comprehensive guide for law enforcement officers and investigators on how to effectively investigate and prosecute internet-relat…


Published on 1 year ago

Introduction to Computer Organization

Introduction to Computer Organization



The Book provide an introductory overview of computer organization, covering the fundamental concepts of hardware and software. The sources explore topics such as data storage formats, number systems…


Published on 1 year ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate