Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. CompTIA Security+ Last Minute Revision
    400+ acronyms, high-impact examples, and rapid drills mapped to SY0-701 domains for last-minute study
    GitforGits | Asian Publishing House

    The content has been organised around five operational domains that mirror the SY0-701 objectives and everyday security responsibilities. Each domain contains key references, crosswalks and short scenarios to facilitate rehearsal of connections rather than isolated facts. In order to assist you with finding terms quickly during last-minute revision, To facilitate this process, practice items are designed to pair acronyms with their respective appearances in multiple-choice questions, thereby training recognition in context.

  2. Code, Chips und Kontrolle (Deutsche Ausgabe)
    Die Sicherheitslage der digitalen Isolation
    Sal Kimmich and TranslateAI

    Nun sind wir beim Kernel angekommen. Nehmen wir an, Sie haben einen Chip, irgendeinen Chip, von den Anbietern, die wir gerade besprochen haben. Sie könnten sich dafür entscheiden, manuell einen Kernel auf diesen Chip zu laden, wobei Sie einen GRand Unified Bootloader (GRUB) verwenden, um den Kernel zu laden (oder zu bootstrappen) und alle Berechtigungen an ihn zu übergeben. Er ist die Seele in der Maschine. Es gibt viele verschiedene Kernel, aber sie teilen eine interessante Eigenschaft in Bezug auf Sicherheit: Sie laufen mit der höchsten Zugriffsebene und vermitteln die Interaktionen zwischen Benutzeranwendungen und den physischen Chips. Ein guter Kernel übernimmt niedrige Aufgaben wie CPU-Scheduling, Speicherverwaltung, Geräteeingabe/-ausgabe und Systemaufrufe. Er ist die Brücke zwischen Software und Hardware: Wenn der Kernel nicht geladen werden kann oder abstürzt, kommt das gesamte System zum Stillstand.

  3. Code, Chips en Controle (Nederlandse Editie)
    De Beveiligingshouding van Digitale Isolatie
    Sal Kimmich and TranslateAI

    Nu zijn we aangekomen bij de kernel. Laten we aannemen dat je een chip hebt, willekeurig welke chip, van de leveranciers die we net hebben besproken. Je zou ervoor kunnen kiezen om handmatig een kernel op die chip te laden, met behulp van een GRand Unified Bootloader (GRUB) om de kernel te laden (of te bootstrappen), en alle rechten daaraan over te dragen. Het is de animus in de machine. Er zijn veel verschillende kernels, maar ze delen één interessante eigenschap met betrekking tot beveiliging: ze draaien met het hoogste toegangsniveau en bemiddelen in interacties tussen gebruikersapplicaties en de fysieke chips. Een goede kernel behandelt taken op laag niveau zoals CPU-scheduling, geheugentoewijzing, apparaat-in/uitvoer en systeemaanroepen. Het is de brug tussen software en hardware: als de kernel niet laadt of crasht, komt het hele systeem tot stilstand.

  4. Code, Puces et Contrôle (Édition Française)
    La posture de sécurité de l'isolation numérique
    Sal Kimmich and TranslateAI

    Nous voici maintenant arrivés au noyau. Supposons que vous ayez une puce, n'importe laquelle, provenant des fournisseurs dont nous venons de parler. Vous pourriez choisir de charger manuellement un noyau sur cette puce, en utilisant un GRand Unified Bootloader (GRUB) pour charger (ou amorcer) le noyau, et lui transférer toutes les permissions. C'est l'âme dans la machine. Il existe de nombreux noyaux différents, mais ils partagent une caractéristique intéressante en matière de sécurité : ils s'exécutent avec le plus haut niveau d'accès, servant d'intermédiaire entre les applications utilisateur et les puces physiques. Un bon noyau gère les tâches de bas niveau comme l'ordonnancement du CPU, l'allocation de mémoire, les entrées/sorties des périphériques et les appels système. C'est le pont entre le logiciel et le matériel : si le noyau ne se charge pas ou plante, l'ensemble du système s'arrête. Pour rendre ce niveau d'accès un peu plus sûr, le noyau est conçu pour être toujours résident en mémoire et s'exécuter dans un mode protégé qui est isolé des applications. Cela empêche l'endommagement des données système essentielles. Tout accès au matériel doit être...

  5. Cybersecurity Architecture 101 (For Beginners) is a practical, beginner friendly guide to how modern security is actually designed. Starting from CIA, risk, and threat modeling, it walks you through identity, networks, endpoints, cloud, applications, data, Zero Trust, DevSecOps, governance, and real world roadmaps you can apply in your own environment.

  6. Docker and Kubernetes Security
    Supply Chain Security + Runtime Protection
    Mohammad-Ali A'râbi

    A practical, hands-on guide to securing Docker and Kubernetes workloads from build to production—recognized as a DevOps Dozen 2025 finalist for Best DevOps Book of the Year. Learn how to generate SBOMs, publish attestations, harden images, detect threats, and build a modern supply-chain-aware DevSecOps pipeline.

  7. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from the Software Diagnostics and Observability Institute and the Software Diagnostics Library (former Crash Dump Analysis blog) about software diagnostics, root cause analysis, debugging, crash and hang dump analysis, and software trace and log analysis written from 15 April 2024 to 14 November 2025.

  8. C++ Networking 101, Second Edition
    Build strong expertise into programming sockets, protocols, VPNs, and asynchronous I/O with 75+ sample programs
    GitforGits | Asian Publishing House

    This isn't a book to put on a shelf. It's meant to be used, tested, and adapted as you build your networking skills. In this new edition, I've been working on making the teaching flow better and making technical stuff clearer without overwhelming you. You'll get the basics down, like how C++ works well with TCP/IP and how sockets are the foundation for communication. Then, I'll show you how to build real client-server apps, set up IP addressing, and use protocols like HTTP, FTP, SMTP, IMAP, and DNS directly through C++ code. Each example is practical and you can actually implement it. It shows you not just how something works, but why it matters in real networking scenarios.

  9. Python Networking 101, Second Edition
    Mastering the capability of network and socket programming, AsyncIO, network performance, simulations and Ansible
    GitforGits | Asian Publishing House

    This second edition is for Python programmers who want to get into networking but don't want to feel overwhelmed. My goal is to make you comfortable with reading code and using it to solve real-world networking problems. A lot of people wrote to me saying that it helped them automate tasks that they had been doing manually for years, while others shared how it gave them the confidence to switch careers or take on more advanced responsibilities in their roles.

  10. First Bounty
    A Bug Hunter's Guide to Easy Wins
    Rodolfo Assis

    Learn a step-by-step, evidence-based approach that gives new bug hunters a realistic path to success. Stop relying on luck—get the system to land your first bounty in 6–8 months.

  11. CISSP: La Última Milla (Edición en Español)
    Tu guía hacia la meta final
    Pete Zerger and TranslateAI

    El libro cubre todos los temas del programa de estudios más reciente del examen CISSP, organizado en un formato que facilita profundizar en dominios y conceptos específicos del examen de un vistazo, lo que lo convierte en un recurso esencial para cualquiera que aspire a prepararse para el examen sin desperdiciar tiempo ni dinero.

  12. CISSP: 総仕上げ (日本語版)
    ゴールへの手引き
    Pete Zerger and TranslateAI

    本書は、最新のCISSP試験シラバスのすべてのトピックを網羅し、特定の試験ドメインや概念を一目で詳しく掘り下げることができる形式で構成されており、時間や費用を無駄にすることなく試験対策を行いたい方にとって、必携の参考書となっています。

  13. CISSP: Die letzte Meile (Deutsche Ausgabe)
    Ihr Wegweiser zum Ziel
    Pete Zerger and TranslateAI

    Das Buch behandelt alle Themen des aktuellen CISSP-Prüfungslehrplans in einem Format, das es ermöglicht, spezifische Prüfungsdomänen und Konzepte auf einen Blick zu vertiefen, wodurch es sich zu einer unverzichtbaren Prüfungsressource für alle entwickelt, die sich ohne Zeit- und Geldverschwendung auf die Prüfung vorbereiten möchten.

  14. Red Hat Cloud Foundations
    The Complete Guide to Building Enterprise Private Clouds with OpenShift, OpenStack, and Ceph
    BEKROUNDJO Akoley Aristide

    Transform your data center into a powerful private cloud with this comprehensive guide to Red Hat's enterprise stack. Learn how to deploy OpenShift for container orchestration, integrate OpenStack for VM workloads, and implement Ceph for unified storage—all on a single lab host. Through 10 hands-on chapters, you'll build a production-ready hybrid cloud from scratch, complete with security hardening, performance optimization, and GitOps automation, backed by real-world case studies and battle-tested configurations.

  15. Code, Chips and Control
    The Security Posture of Digital Isolation
    Sal Kimmich

    Now we have made it to the kernel. Let's assume you have a chip, any chip, from the suppliers we've just discussed. You might choose to manually load a kernel onto that chip, using a GRand Unified Bootloader (GRUB) to load (or strap) the kernel, and pass all permissions over to it. It is the animus in the machine. There are many different kernels, but they share one interesting characteristic to security: they run with the highest level of access, mediating interactions between user applications and the physical chips. A good kernel will handle low-level tasks like CPU scheduling, memory allocation, device input/output, and system calls. It is the bridge between software and hardware: if the kernel fails to load or crashes, the entire system will halt. To make this level of access a bit safer, the kernel is designed to be always resident in memory, and execute in a protected mode that is isolated from applications. This prevents damage to core system data...