Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. Accelerated Disassembly, Reconstruction and Reversing
    Training Course Transcript and WinDbg Practice Exercises with Memory Cell Diagrams, Third Edition
    Dmitry Vostokov

    Learn disassembly, execution history reconstruction, and binary reversing techniques for better software diagnostics, troubleshooting, and debugging on x64 Windows platforms via practical step-by-step hands-on exercises using WinDbg and memory dumps. Covered 25 ADDR patterns, and many concepts are illustrated with Memory Cell Diagrams.

  2. vRealize Network Insight Cookbook
    Everything (and more) you ever wanted to know about vRealize Network Insight.
    Martijn Smit

    If you are in any way affiliated with network and virtual infrastructure troubleshooting and monitoring, you’re going to like this book. If you’re driven crazy by having to overlap multiple tools to get the information needed to troubleshoot an issue in your environment, you’re going to love this book.

  3. Cyber Defense Forensics Analyst “Real World Hands on Examples”

  4. Accelerated Mac OS X Core Dump Analysis, Second Edition
    Training Course Transcript with GDB and LLDB Practice Exercises
    Dmitry Vostokov

    Learn how to analyse app crashes and freezes, navigate through process core memory dump space and diagnose corruption, memory leaks, CPU spikes, blocked threads, deadlocks, wait chains, and much more. The book consists of GDB and LLDB exercises highlighting more than 30 memory analysis patterns diagnosed in 64-bit process core memory dumps.

  5. Advanced Windows Memory Dump Analysis with Data Structures
    Training Course Transcript and WinDbg Practice Exercises with Notes, Fifth Edition
    Dmitry Vostokov

    Learn how to use WinDbg to navigate memory space and Windows data structures to diagnose structural and behavioral patterns in the 64-bit kernel and complete (physical) memory dumps. Additional topics include memory search, kernel linked list navigation, practical WinDbg scripting, registry, system variables and objects, device drivers, and I/O.

  6. Accelerated Windows Malware Analysis with Memory Dumps
    Training Course Transcript and WinDbg Practice Exercises, Third Edition
    Dmitry Vostokov

    The full transcript of Software Diagnostics Services training. Learn how to navigate process, kernel, and physical spaces and diagnose malware patterns in Windows memory dump files using WinDbg and practical step-by-step hands-on exercises. Covered more than 20 malware analysis patterns. The third edition has some exercises updated to Windows 11.

  7. You Can Use The Dark Web For Good
    It's not the tool or weapon that is good or evil but to what use and intent it is applied.
    djilpmh pi

    Is the Dark Web all evil and badness? Are all power tools and weapons inherently disgusting and should they all be eliminated from existence? TOR (the onion router, the technology behind what is called the Dark Web) is just another powerful tool, and it should be (and is) used to support purposes beneficial to peaceful and just societies.

  8. This training course is a combined, reformatted, improved, and modernized version of the two previous books Windows Debugging: Practical Foundations and x64 Windows Debugging: Practical Foundations.

  9. Hacking of the Free
    Understanding Digital Threats to Democracy in the 21st Century
    Ken Buckler

    The Internet age has ushered a new type of warfare - digital warfare. This isn't just warfare among "hackers" gaining unauthorized access to computer systems, but a war to influence public opinion through data analytics, propaganda and "fake news".

  10. Accelerated Windows Memory Dump Analysis, Sixth Edition, Part 1, Process User Space
    Training Course Transcript and WinDbg Practice Exercises with Notes
    Dmitry Vostokov

    Learn how to analyze application and service crashes and freezes, navigate through process user space, and diagnose heap corruption, memory and handle leaks, CPU spikes, blocked threads, deadlocks, wait chains, and much more using WinDbg debugger. The course covers more than 50 crash dump analysis patterns from x86 and x64 process memory dumps.

  11. El arte de hackear personas, para que hagan o digan lo que nosotros queremos, sin que se den cuenta.

  12. DeepWeb & DarkWeb - The Real History
    La verdadera realidad de la red profunda.
    Victor H Miranda O

    Un paseo dentro de la DeepWeb de forma segura

  13. CR1M3
    The CyberCrime Handbook
    Anon42

    Delve into the methods and the markets which drive the underground of tomorrow's darkweb.

  14. Theoretical Software Diagnostics
    Collected Articles, Fourth Edition
    Dmitry Vostokov

    Contains reprinted articles in full color (including more than 230 figures) from 16 volumes of Memory Dump Analysis Anthology (Diagnomicon) related to pattern-oriented software diagnostics with additional comments showing the historical development of this autonomous and distinctive discipline over the last 18 years.

  15. Ein half-managed IPsec-VPN ist wie ein Ochsenkarren mit Tieren aus verschiedenen Ställen und Treibern, die sich nicht kennen.Natürlich geht die Reise meist gut, aber oft dauert es länger als gedacht, bis alles ineinander greift und zueinander passt.Dieses Buch soll ein Reisebegleiter sein und über die größten Klippen hinweg helfen.