Podcast Episodes
Back to Search
Cyber Security and IT Infrastructure Protection
The Book titled Cyber Security and IT Infrastructure Protection. The book examines various aspects of cyber security, including data encryption, publ…
1 year, 2 months ago
Cyber Security: The complete guide to cyber threats and protection
The Book material provides a comprehensive overview of cybersecurity, covering various aspects of this crucial field. The text explores the cyber thr…
1 year, 2 months ago
Cyber Risks and Insurance: The Legal Principles
The Book present a comprehensive analysis of cyber risks and insurance, particularly in relation to the legal principles and regulations governing da…
1 year, 2 months ago
Cyber Crime Investigator's Field Guide
The Book text is an excerpt from the Cyber Crime Investigator’s Field Guide, which provides a comprehensive guide for cybercrime investigators. The g…
1 year, 2 months ago
Cuckoo Malware Analysis
The provided Book is an excerpt from the book "Cuckoo Malware Analysis" by Digit Oktavianto and Iqbal Muhardianto. The excerpt primarily focuses on C…
1 year, 2 months ago
Cryptography and Network Security: Principles and Practice
The source Book provides a comprehensive overview of cryptography and network security. It starts with fundamental computer security concepts, coveri…
1 year, 2 months ago
SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition
The provided Book comes from a book titled "CSSLP Certification All-in-One Exam Guide, Third Edition," which is a comprehensive guide for individuals…
1 year, 2 months ago
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
The sources are from a book titled "Hands-On Cryptography with Python" by Samuel Bowne. This book aims to teach readers about cryptography and how to…
1 year, 2 months ago
Cryptography and Network Security
This Book excerpt comes from the book "Cryptography and Network Security" by Marcelo S. Alencar. The book, intended for both graduate and undergradua…
1 year, 2 months ago
The Security Risk Assessment Handbook
The provided Book is an excerpt from a comprehensive guide to information security risk assessment, outlining a methodical approach to identifying, a…
1 year, 2 months ago