Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. What aspects of authentication and authorization do you need to think about when you are building applications on Kubernetes? This book will dig into the different kids of auth to consider, how to implement auth, and how to communicate identity across services within your apps.

  2. Self-Hosting for busy web developers
    Quick and easy 15-minute setup, deployment, and day 2 operation for hosting your web applications
    Andrej Friesen

    A lot of developers and indie hackers have lost their ability to build and run their applications.Big tech and allegedly simple services promise a no-frills solution and make infrastructure seem impossible.It can be simple and cost-effective for small applications if you keep it simple. Kubernetes, clusters

  3. Breaking down JSON Web Tokens
    From pros and cons to building and revoking
    The FusionAuth Team

    JSON Web Tokens, or JWTs, are a powerful tool to encapsulate information in an integrity preserving fashion. This technology is widely deployed and supported, and can help you build scalable, secure systems.

  4. No Description Available
  5. Bug Bounty Programming & Web Security Audit
    Everything you should know about
    Senesh Wijayarathne

    By reading this book, you can get a clear understanding of how to do a Web Security Audit on your own website or on a website that is given in any Bug Bounty Platforms. Make sure that you are safe from Hackers!! Ask yourself, is your web application is safe from Hackers!?

  6. Best Free AntiVirus Software For Ancient Old Windows Xp Sp3 Operating System Bilingual Version In English & Germany Languange.

  7. CyberDefensewithMicrosoftDefender
    Lab Guide
    Dave Kawula, Cary Sun, Cristal Kawula, John O'Neill Sr., and Emile Cabot

    In today’s world defending against attacks that originate from both inside and outside your organization is critical. Unfortunately, threat actors are preying on organizations lagging with their Cyber Security defenses and becoming easy targets. 

  8. STILL Scanning
    Steven D Leon
    No Description Available
  9. No Description Available
  10. No Description Available
  11. Web Security- Web Audit Assignment
    Web Security
    Kangesar Nagalojan

    Website must be audited to find the vulnerabilities that may lead to security breaches and identify the inconsistencies which give a chance to attacker attack the site and it may lead to business loss and lack of integrity and confidentiality.

  12. My First Bug Bounty
    Navin Jayawardena
    No Description Available
  13. My First Bug Bounty
    Navin Jayawardena
    No Description Available
  14. Accelerated Windows Memory Dump Analysis, Sixth Edition, Part 2, Kernel and Complete Spaces
    Training Course Transcript and WinDbg Practice Exercises with Notes
    Dmitry Vostokov

    Learn how to analyze system crashes and freezes, navigate through the kernel and complete spaces, and diagnose patterns of abnormal software behavior using the WinDbg debugger. The course covers more than 35 crash dump analysis patterns from x64 kernel and complete (physical) memory dumps.

  15. Evil of Dark Web
    The Untold Horror Stories
    Bolakale Aremu

    The dark web horror stories you must read:Story #1: The True EatersStory #2: The HitmanStory #3: The Plague Doctor