Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. اختراق تطبيقات الويب
    كيف تصبح باحث أمني
    Peter Yaworski and Yasser Gersy

    في شهر مايو٢٠١٦ قام موقع تويتر بدفع اكثر من 300,000 $  دولار لباحثين امنيين اكتشفوا ثغرات وقام بالابلاغ عنها ,ونظرا لاهمية البيانات والخصوصية  لذلك يلجئ العديد من المواقع العالمية امثال فيسبوك وتويتر وجوجل ودروب بوكس لتوظيف الهاكرز او الباحثيين الامنين لتحليل تطبيقاتهم وايجاد نقاط الضعف بها, هذا الكتاب يوفر لك شرح كامل ووافي لكل ماتحتاجه للدخول لهذا العالم  كي تصبح باحث امنى ويوفر لك كامل المصادر والمراجع بالاضافة الى كل الادوات التي تحتاجها لاختراق المواقع واستكشاف الثغرات بها .

  2. Breaking into Information Security: Learning the Ropes 101
    Teaching You The Core Fundamentals For Getting Your Career Started in Penetration Testing.
    Andy Gill

    All of the basic topics to get you from zero to junior pentester level - covering off everything you need to know to start breaking into web application penetration testing industry or looking for flaws on bug bounties. (LTR101)

  3. The Modern Cryptography CookBook
    Cryptography is for EveryOne. Learn from Crypto Principle to Applied Cryptography With Practical Example
    Anish Nath

    Cryptography Cookbook is the intuitive way of learning practical cryptography and applied cryptograhy. This book contains more than 1000+ recieipes which include and not limited to Symmetric Key, Assymetric Keys, hashing algorithms, hmac, key exchanges,pki ,encoding decoding,certificare management tls,gpg,smime,ssh-keygen,keytool,iptables etc.

  4. Death by Identity Theft
    Lowering the Risk of Identity Theft and its Consequences
    Ken Buckler

    Identity Theft is quite honestly out of control. As a cyber security professional working as a Federal contractor for almost ten years, I work diligently to help protect others from this terrifying crime. In fact, I thought I had taken every precaution to protect myself and my family.

  5. Programming Linux Anti-Reversing Techniques teaches the reader how to code and analyze well known anti-reversing techniques for Linux. The book shows how a reverse engineer analyzes a binary using tools like IDA, Radare2, GDB, readelf, and more. The code is presented to the reader ready to compile and analyze on their own.

  6. Holistic InfoSec For Web Developers, Fascicle 2: Mobile and IoT
    Creating and maintaining robust technical solutions that will resist attacks from your adversaries
    Kim Carter

    The second part of a three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget. Free Online: https://f2.holisticinfosecforwebdevelopers.com

  7. Holistic InfoSec For Web Developers, Fascicle 1: VPS, Network, Cloud and Web Applications
    Creating and maintaining robust technical solutions that will resist attacks from your adversaries
    Kim Carter

    The second part of a three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget. Free Online: https://f1.holisticinfosecforwebdevelopers.com

  8. Python For Hackers
    Shantnu Tiwari

    Learn hacking techniques with practical examples you can run and modify.

  9. Holistic InfoSec For Web Developers, Fascicle 0: Physical and People
    Creating and maintaining robust technical solutions that will resist attacks from your adversaries
    Kim Carter

    The first part of a three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget. Free Online: https://f0.holisticinfosecforwebdevelopers.com

  10. Ich will den OpenWrt-Paketfilter verstehen, mit allem was dazu gehört. Das heißt, ich will die Grundlagen kennen und die Bestandteile des Paketfilters. Ich will wissen, wie ich das konfigurieren und dann die Konfiguration überprüfen kann. Nicht zuletzt möchte ich fundiert entscheiden können, wann ich den Paketfilter wie einsetze.

  11. All about CAPTCHA's
    Decoding CAPTCHA's for Fun and Profit
    Ben E. C. Boyter

    Welcome to the practical guide to decoding CAPTCHA's. Everything you need to start decoding CAPTCHA's is contained within. Although there is a heavy emphasis on decoding you can consider it a general guide to CAPTCHA's in general. Although mostly focussed on algorithmic methods of decoding CAPTCHA's this will also briefly cover paid/human services, history and anechdotes.