Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. No Description Available
  2. Prepare yourself for the HashiCorp Certified: Vault Associate exam with this guide! HashiCorp Ambassador, Ned Bellavance reviews the certification objectives, provides insight from real-world experience, and gives key takeaways for to help you focus on what matters most.

  3. Getting Started with HashiCorp Vault
    A hands-on guide on HashiCorp Vault for beginners.
    Anubhav Mishra

    HashiCorp Vault is a popular secret management project used by small startups to the world's largest organizations. In this book, learn core Vault concepts and application patterns using a hands-on approach.

  4. Identity And APIs
    Techniques to Mature Platform Security
    Nordic APIs

    Much of API security boils down to how you handle identity. In Identity and APIs, we discover the techniques to secure platform access and delegate access throughout a mature API ecosystem.

  5. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in October 2008 - June 2009. This major revision contains corrections and WinDbg output color highlighting.

  6. Fundamentals of Physical Memory Analysis
    Anniversary Edition
    Dmitry Vostokov

    The book is a fully revised transcript of a seminar about physical memory analysis on Windows platforms. Topics include memory acquisition, memory spaces, challenges of physical memory analysis, common WinDbg commands, memory analysis patterns and their classification, common mistakes, a hands-on WinDbg analysis example, a guide to further study.

  7. Designing Distributed Systems
    Distributed Systems
    Joseph Thachil George

    From mobile phones to the Internet, our lives depend increasingly on distributed systems linking computers and other devices together in a seamless and transparent way. This edition provides a comprehensive source of material on the principles and practice of distributed computer systems.

  8. Cybercrime and Social Media Relationships
    Cybercrime and Social Media Relation
    Joseph Thachil George

    The Book ‘’Cybercrime and Social Media Relationships’’ is written by Cyber security expert Mr. Joseph Thachil George.  Joseph writes books, which, considering where you’re reading this, makes perfect sense. He is best known for writing research papers, including the technical and non- technical contents.

  9. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in January - September 2008. This major revision contains corrections and WinDbg output color highlighting.

  10. Safer @ Home with pfSense®
    Recipes to secure your home and family's internet experience
    Michael Lines

    You don't need to risk your security and privacy on consumer-grade security products any longer. pfSense® is a powerful, commercial-grade firewall that provides capabilities far beyond what you can get in consumer products. This book will walk you through setting up your pfSense® firewall with easy to follow recipes to choose from.

  11. Book walks through a number of real world examples for reverse engineering data structures and algorithms found in malware.

  12. Software Construction Brick by Brick, Increment 1
    Using LEGO® to Teach Software Architecture, Design, Implementation, Internals, Diagnostics, Debugging, Testing, Integration, and Security
    Dmitry Vostokov

    The first increment covers memory, memory addresses, pointers, program loading, kernel and user spaces, virtual process space, memory isolation, virtual and physical memory, memory paging, memory dump types.

  13. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog), written from August 2006 to December 2007. This major revision contains updates relevant to Windows 10 and WinDbg output color highlighting.

  14. Cybersecurity is a complex field riddled with standards, acronyms and gates for businesses trying to establish themselves. For many businesses navigating cybersecurity, it can be difficult to know where to start. This book aims to provide everything you need to start building your own security program.

  15. Mental Self Defense and Reverse Social Engineering for Human Beings
    Against the Tactics, Strategies and Psycho Bullshit of Modern Totalitarianism, 2020
    J. Michael Hudson

    Every child is taught not to do what our governing entities do at the highest levels on a vast scale: bully, fight, trick, cheat, point, threaten violence, pick out some classmates you don’t like and make their lives hell, start a cult and take over student government, build a network of spies and then blackmail your friends to achieve your goals.