Podcast Episodes

Back to Search
Cyber Security and IT Infrastructure Protection
Cyber Security and IT Infrastructure Protection

The Book titled Cyber Security and IT Infrastructure Protection. The book examines various aspects of cyber security, including data encryption, publ…

1 year, 2 months ago

Short Long
View Episode
Cyber Security: The complete guide to cyber threats and protection
Cyber Security: The complete guide to cyber threats and protection

The Book material provides a comprehensive overview of cybersecurity, covering various aspects of this crucial field. The text explores the cyber thr…

1 year, 2 months ago

Short Long
View Episode
Cyber Risks and Insurance: The Legal Principles
Cyber Risks and Insurance: The Legal Principles

The Book present a comprehensive analysis of cyber risks and insurance, particularly in relation to the legal principles and regulations governing da…

1 year, 2 months ago

Short Long
View Episode
Cyber Crime Investigator's Field Guide
Cyber Crime Investigator's Field Guide

The Book text is an excerpt from the Cyber Crime Investigator’s Field Guide, which provides a comprehensive guide for cybercrime investigators. The g…

1 year, 2 months ago

Short Long
View Episode
Cuckoo Malware Analysis
Cuckoo Malware Analysis

The provided Book is an excerpt from the book "Cuckoo Malware Analysis" by Digit Oktavianto and Iqbal Muhardianto. The excerpt primarily focuses on C…

1 year, 2 months ago

Short Long
View Episode
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice

The source Book provides a comprehensive overview of cryptography and network security. It starts with fundamental computer security concepts, coveri…

1 year, 2 months ago

Short Long
View Episode
SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition
SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition

The provided Book comes from a book titled "CSSLP Certification All-in-One Exam Guide, Third Edition," which is a comprehensive guide for individuals…

1 year, 2 months ago

Short Long
View Episode
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

The sources are from a book titled "Hands-On Cryptography with Python" by Samuel Bowne. This book aims to teach readers about cryptography and how to…

1 year, 2 months ago

Short Long
View Episode
Cryptography and Network Security
Cryptography and Network Security

This Book excerpt comes from the book "Cryptography and Network Security" by Marcelo S. Alencar. The book, intended for both graduate and undergradua…

1 year, 2 months ago

Short Long
View Episode
The Security Risk Assessment Handbook
The Security Risk Assessment Handbook

The provided Book is an excerpt from a comprehensive guide to information security risk assessment, outlining a methodical approach to identifying, a…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us