Podcast Episodes

Back to Search
Cyber Security: The complete guide to cyber threats and protection

Cyber Security: The complete guide to cyber threats and protection



The Book material provides a comprehensive overview of cybersecurity, covering various aspects of this crucial field. The text explores the cyber threats faced by individuals and organizations, analy…


Published on 11 months, 2 weeks ago

Cyber Risks and Insurance: The Legal Principles

Cyber Risks and Insurance: The Legal Principles



The Book present a comprehensive analysis of cyber risks and insurance, particularly in relation to the legal principles and regulations governing data protection, cybersecurity, and the impact of ar…


Published on 11 months, 2 weeks ago

Cyber Crime Investigator's Field Guide

Cyber Crime Investigator's Field Guide



The Book text is an excerpt from the Cyber Crime Investigator’s Field Guide, which provides a comprehensive guide for cybercrime investigators. The guide explores various aspects of cybercrime, cover…


Published on 11 months, 2 weeks ago

Cuckoo Malware Analysis

Cuckoo Malware Analysis



The provided Book is an excerpt from the book "Cuckoo Malware Analysis" by Digit Oktavianto and Iqbal Muhardianto. The excerpt primarily focuses on Cuckoo Sandbox, an open-source automated malware an…


Published on 11 months, 2 weeks ago

Cryptography and Network Security: Principles and Practice

Cryptography and Network Security: Principles and Practice



The source Book provides a comprehensive overview of cryptography and network security. It starts with fundamental computer security concepts, covering security attacks, services, and mechanisms, bef…


Published on 11 months, 2 weeks ago

SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition

SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition



The provided Book comes from a book titled "CSSLP Certification All-in-One Exam Guide, Third Edition," which is a comprehensive guide for individuals preparing for the Certified Secure Software Lifec…


Published on 11 months, 2 weeks ago

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data



The sources are from a book titled "Hands-On Cryptography with Python" by Samuel Bowne. This book aims to teach readers about cryptography and how to use Python to encrypt and decrypt data. It covers…


Published on 11 months, 2 weeks ago

Cryptography and Network Security

Cryptography and Network Security



This Book excerpt comes from the book "Cryptography and Network Security" by Marcelo S. Alencar. The book, intended for both graduate and undergraduate students, is a comprehensive resource covering …


Published on 11 months, 2 weeks ago

The Security Risk Assessment Handbook

The Security Risk Assessment Handbook



The provided Book is an excerpt from a comprehensive guide to information security risk assessment, outlining a methodical approach to identifying, analyzing, and mitigating risks to an organization'…


Published on 11 months, 2 weeks ago

The Art of Linux Kernel Design

The Art of Linux Kernel Design



This Book provides a deep dive into the design and implementation of the Linux 0.11 operating system. It examines key concepts like memory management, process creation, and inter-process communicatio…


Published on 11 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate