Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. Encyclopedia of Crash Dump Analysis Patterns
    Detecting Abnormal Software Structure and Behavior in Computer Memory, Third Edition
    Dmitry Vostokov

    This reference reprints with corrections, additional comments, and classification more than 370 alphabetically arranged and cross-referenced memory analysis patterns originally published in Memory Dump Analysis Anthology volumes with most examples illustrated for Windows WinDbg and a few for Mac OS X and Linux GDB.

  2. Unduh pada channel Kami: https://t.me/AlFursanID/20 Bug Hunting 101 merupakan salah satu buku yang diharapkan dapat menjadi panduan untuk para penguji untuk dapat mengetahui tips dan trik tertentu di dalam mencari suatu kerentanan, yang isinya dirangkum dari berbagai rujukan dan diurutkan beradasarkan pola pembelajaran yang diharapkan efektif.   

  3. Doxing UserName
    "Siguiendo las huellas del usuario"
    Julio Rangel Medina

    Documento que muestra como hacker y cibercriminales usan la técnica "Doxing" para investigar a los usuarios en internet, partiendo de su propio nombre de usuario o "UserName"

  4. Web Application Advanced Hacking
    A Hands-On Field Guide to latest techniques used by security researchers and bug bounty hunters
    Maor Tal

    Over the last few years, applications’ technology stack has changed rapidly. Web Application Advanced Hacking (WAAH) shares advanced techniques used by ethical hackers to carry out a thorough penetration test and security audit for modern web applications in a practical, hands-on approach.

  5. Trace, Log, Text, Narrative, Data
    An Analysis Pattern Reference for Information Mining, Diagnostics, Anomaly Detection, Fifth Edition
    Dmitry Vostokov

    General trace and log analysis patterns allow the application of uniform diagnostics and anomaly detection across diverse software environments. This pattern language covers any execution artifact from a small debugging trace to a distributed log with billions of messages from hundreds of computers, thousands of components, threads, and processes.

  6. Password Management Tools for Businesses and Institutions
    Improving cybersecurity by eliminating weak, reused, and compromised passwords
    Richard Edwards

    Cybersecurity often depends on the choices made by individuals. Most people are conscientious when it comes to information security management, but if we consider how passwords and account credentials are used and managed in the workplace, then we can easily see weaknesses in our cybersecurity defences.

  7. 10 extensive labs to help you achieve the CCNP Security Implementing Cisco Edge Network Security certification. Detailed labs that match the exam blueprint, broken down into manageable sections.

  8. Surviving a Ransomware Attack with Azure Site Recovery Volume 1
    Dave Kawula, Emile Cabot, Cary Sun, Cristal Kawula, and John O'Neill Sr.

    Have you been the victim of an Ransomware Attack? Are you worried about Ransomware and how to defend against it?  Well if so then this book is for you.  This step by step guide will show you how to use Microsoft’s Azure Site Recovery, Windows Defender Advanced Threat Protection, Window Admin Center and more.

  9. Your Safety and Privacy Online
    The CIA and NSA
    Siggi Bjarnason

    This book will teach those without technical or computer knowledge how to stay safe online, that is it will teach online safety, cybersecurity or information security (aka infosec). All technobabble will be explained prior to use in terms the average public can understand.

  10. Shadow IT
    What you don't know can hurt you. If you know there is a problem and deliberately ignore it, that's irresponsible and dereliction of due diligence.
    djilpmh pi

    Unhelpfulness from IT resources has driven users to using solutions that with increasing cleverness bypass conventional security and operational restrictions. If you're not already blocking these ShadowIT events in your own organization, you're not looking hard enough. Chapters 2, 4, and 10 are available in the "Free Sample" link below.

  11. Identity Management 101
    In The Secure World of Unsecure Unicorns
    Giuliana Carullo

    I’ve been studying secure unicorns and their habits for a pretty long time. During that time, and as a conclusion of my extensive effort, I figured out that a big part of them are known as procrastinating unicorns whose famous motto is: I’ll think about security later... After even more studies of these creatures, I found their weapon: IAM...

  12. A Cyber Security book for the rest of us! From beginner to expert, this book contains the fundamentals of cyber security, at home and at work, and how to implement good cyber security habits in your daily life, family, work, and community.

  13. Code cryptography using PHP

  14. Cryptography is for everyone, no matter which role, function you are in, a basic level of security is needed. The style and approach is used in this book is to full-fill all of the cryptography needs for the go lang programmer from beginner to advanced level.

  15. Python Cryptography
    Python Cryptography
    Anish Nath

    Cryptography for Python Developer