Podcast Episodes

Back to Search
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide

The Book is an excerpt from a study guide for the Systems Security Certified Practitioner (SSCP) exam. It explains key information security concepts …

1 year, 3 months ago

Short Long
View Episode
ISO/IEC 9899:1999, Programming languages -- C
ISO/IEC 9899:1999, Programming languages -- C

The Book material provides a comprehensive and detailed description of the C programming language, including its syntax, semantics, and standard libr…

1 year, 3 months ago

Short Long
View Episode
JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron
JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron

The Book provide a comprehensive guide to building cross-platform applications with GraphQL, React, React Native, and Electron. The first source, "Ja…

1 year, 3 months ago

Short Long
View Episode
(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test
(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test

The Book "(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test" is a study guide for the CISSP certification ex…

1 year, 3 months ago

Short Long
View Episode
ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide
ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide

The Book provide a comprehensive guide to the Certified in Risk and Information Systems Control (CRISC) certification exam. It explores various aspec…

1 year, 3 months ago

Short Long
View Episode
IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT
IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

This "IoT and OT Security Handbook" explains the challenges of securing IoT and OT devices in the era of Industry 4.0. The book highlights the import…

1 year, 3 months ago

Short Long
View Episode
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

This excerpt comes from iOS Forensics for Investigators, a book by Gianluca Tiepolo, a cybersecurity researcher specializing in mobile forensics and …

1 year, 3 months ago

Short Long
View Episode
iOS Application Security: The Definitive Guide for Hackers and Developers
iOS Application Security: The Definitive Guide for Hackers and Developers

The source is a book entitled "iOS Application Security" by William Pollock. The book is a guide to security practices and common security vulnerabil…

1 year, 3 months ago

Short Long
View Episode
iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics
iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics

The Book is an excerpt from a book about iOS 14 programming fundamentals using Swift. The Book covers fundamental topics such as object types, variab…

1 year, 3 months ago

Short Long
View Episode
Investigating Windows Systems
Investigating Windows Systems

The source Book is an excerpt from "Investigating Windows Systems.pdf," a book that aims to guide digital forensic analysts through the process of an…

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us