Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in February 2010 - October 2010. This major revision contains corrections and WinDbg output color highlighting.

  2. The Dark Web
    The Unseen Side of the Internet
    Bolakale Aremu

    The Up to Date Book on Dark Web & Dark Net.You must read this book if you want to learn about or embark on the dark web journey. In this short book, you’ll learn the chilling tales of the dark web and dark net. You will know the fundamentals, the facts and figures about the surface web, the deep web and the dark web.

  3. Building Virtual Machine Labs: A Hands-on Guide (Second Edition)
    Learn everything there is to know about building and maintaining your own home or workplace virtual lab environment on the most popular hypervisors today in this new and improved second edition release!
    Tony Robinson

    The premise of this book is to provide students a hands-on, go-to resource for building a secure, customizable lab environment in order to enable their own specific pursuits.

  4. Brute XSS
    The Most Exclusive Collection of XSS Vectors and Payloads
    Rodolfo Assis

    The best XSS collection out there covering basics to advanced with clear directions, exclusive content and filter bypass tricks!

  5. Reconnaissance is the most important part of information security assessment activities, especially in Black-Box Penetration Testing / Bug Hunting activities, and should be underlined in performing reconnaissance, it does not invariably depend on the plenty of resources. Here the most important thing we need is creativity (resourcefulness)

  6. Hacking desde 0
    Pablo Álvarez Corredera

    Introdúcete en el mundo del hacking. Comienza aprendiendo los aspectos más importantes de la seguridad informática, antes de empezar a introducirte en las técnicas de hacking. Conoce los mejores sistemas operativos, software, recursos, etc. para ir avanzando en el camino del aprendizaje que te lleve a lograr convertirte en un pirata informático.

  7. Herramientas OSINT para auditorías de seguridad y ciberamenazas
    Obteniendo inteligencia a partir de fuentes abiertas
    José Manuel Ortega

    El objetivo de este libro es presentar la inteligencia de fuentes abiertas (OSINT) y analizar las principales herramientas a tener en cuenta para un investigador de seguridad con el objetivo de recopilar tanta información sobre nuestro objetivo como sea posible.

  8. If you are a student or practitioner of cyber security in Australia you are no longer restricted to texts that are primarily focused on overseas experiences. Finally there is a book that was written for you, describing the unique environment that you operate in daily.

  9. Cyber Range Essentials
    Construct a Hybrid Cloud-Physical Lab with Ansible and Terraform
    Nicholas McKinney

    Use modern DevOps practices such as Infrastructure-as-Code and Configuration-as-Code in order to build a Zero-Trust cyber range!

  10. TOR Accessible Raspberry Pi Motion Capture Camera (How To DIY)
    Build your own remote video monitoring camera with motion trigger and scheduled time lapse image capture accessed through TOR.
    djilpmh pi

    Make your own TOR accessible video monitoring camera on a Raspberry Pi SBC!

  11. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in July 2009 - January 2010. This major revision contains corrections and WinDbg output color highlighting.

  12. Frida handbook
    Learn about binary instrumentation with the Frida toolkit.
    Fernando Diaz (@entdark_)

    Learn about binary instrumentation using the Frida toolkit using practical examples. This book is not deeply focused in theory but practical use cases instead, from basic uses of the API to how to apply it in real-world scenarios. We will apply instrumentation under Linux, Windows and MacOS systems.

  13. NETWORK SECURITY MANAGEMENT
    Joseph Thachil George

    The main purpose of this book is to understand the concept of network security. When implementing the network, the primary concern is to ensure confidentiality, integrity, and authentication. These concepts have been discussed in this book and explained with practical examples

  14. Einführung in die Web Application Security für Angreifer und Entwickler,zumeist anhand von Angriffsbeispielen.

  15. No Description Available