Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) about software diagnostics, debugging, crash dump analysis, software trace and log analysis, malware analysis and memory forensics written in November 2011 - May 2014.

  2. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) about memory dump analysis, software trace and log analysis, software troubleshooting, and debugging written in November 2010 - October 2011.

  3. Certified Information Systems Security Professional (CISSP) Exam Guide
    Master CISSP with hands-on bonus content and practical coverage of all eight exam domains
    Packt Publishing Ltd

    This is a comprehensive book for aspiring CISSP professionals. Complete with practice exam questions that match exam-level difficulty, you’ll gain the knowledge and skills needed to excel in information security and become CISSP-certified experts.

  4. UNLOCK CISSP
    Essential Notes for Exam Day Success
    Anoop A. Shetty

    FREE BOOK! This book is a comprehensive guide specifically designed for individuals preparing for the CISSP exam. It offers concentrated notes and key information for revision, making it an ideal resource after completing the main reading material. By providing a concise summary of essential topics, the book aims to save valuable time, especially during the critical last-minute study phase, possibly a week before the exam.

  5. The Insider Goes Deep into Broadband
    Broadband Internet Articles
    Lefty Insider

    This collection is targeted primarily to a demographic of 10 million college educated BabyBoomer aged men who are working in, or have worked in, the IT fields. The proposed goal ofthis manuscript is to reach one percent of this market, most of whom are disinclined to usesocial media, and find pdf files more accessible and readable than poorly formatted andweakly illustrated eBooks.

  6. Diving into JTAG
    A Comprehensive Guide to Debugging, Testing, and Securing Embedded Systems with JTAG Protocol
    Aliaksandr Kavalchuk

    WARNING: The main goal of this book is to test Leanpub functionality, and all the information in this book can be found in my articles for the Interrupt by Memfault and PlatformIO blogs.So, there is no need to buy this book—you should only do so if you prefer reading information in book format or if you just want to buy me a coffee. :) This book is a collection of my articles originally published in the blogs Interrupt by Memfault and PlatformIO with some additional edits and enhancements.   A unique feature of this book is the extensive use of GIF animations and videos to visually demonstrate key concepts and processes. However, since not all EPUB readers support GIF and video playback, each animation and video is accompanied by a link to an external resource. Readers can follow these links to view the corresponding content and enhance their understanding. Repo with all GIF animation: https://github.com/Zamuhrishka/diving-into-jtag-book-animations

  7. The book contains the full Software Diagnostics Services training transcript and ten step-by-step exercises. It covers dozens of crash dump analysis patterns from the x64 process and complete (physical) memory dumps. Learn how to analyze Rust application crashes and freezes, navigate through memory dump space, and diagnose heap corruption, memory leaks, CPU spikes, blocked threads, deadlocks, wait chains, and more with the WinDbg debugger. The training uses a unique and innovative pattern-oriented analysis approach focusing on safe and unsafe Rust code and its interfacing with the Windows OS. It is useful whether you come to Rust from C and C++ or interpreted languages like Python, and facilitates memory thinking when programming in Rust.

  8. CompTIA Security+ SY0-701 Certification Guide - Third Edition
    Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt
    Packt Publishing Ltd

    This book will help you build a comprehensive foundation in cybersecurity and prepare you to overcome the challenges of today's digital world.

  9. Unethical Software Engineering
    Dark Patterns
    Cesare Pautasso

    In unethical software, not every line of code is written with good intentions. Unethical Software Engineering: Dark Patterns exposes how to manipulate users, drive profits, and evade accountability. From covert surveillance, monetization at all costs, digital fraud, ranking manipulation, all the way to unethical artificial intelligence practices, this scary book unveils how these "dark patterns" exploit human beings, erode trust, and disrupt digital ethics.Whether you're a developer, an architect, a tech enthusiast, or simply a concerned user, this book will change how you think about your daily apps — and inspire you to demand better. By helping you to draw the line between what is acceptable and what is questionable, Unethical Software Engineering: Dark Patterns shines a light on the digital dark side of software engineering where profits are prioritized over people.

  10. CISM: The Last Mile
    Your guide to the finish line
    Pete Zerger

    This book covers every topic in the latest CISM exam syllabus, approaching topics from the ISACA perspective. It's 325+ pages organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the CISM exam without wasting time or money.

  11. Cybersecurity from Beginner to Paid Professional, Part 1
    Protecting Systems, Data and Networks
    Bolakale Aremu

    If you're ready to build a rock-solid foundation in cybersecurity, this book is the only one you'll need. Cybersecurity from Beginner to Paid Professional, Part 1 offers a friendly, accessible introduction to the world of cybersecurity.

  12. Driving Business Growth Through Cybersecurity: The Strategic Advantage of Fractional Executive Advisors for SMBs
    Empowering SMBs with Strategic Cybersecurity: A Practical Guide to Growth and Resilience
    Christophe Foulon

    Unlock the power of cybersecurity to drive your SMB's growth and resilience. This comprehensive guide reveals how fractional executive cybersecurity advisors can transform your security investments into a competitive advantage. Learn to navigate compliance, build a security-aware culture, and implement cost-effective strategies that protect and propel your business forward in the digital age.

  13. Secure Android Design and Development
    From App Layer to HAL – Aligned with Android 15
    Mohammad Hossein Heydarchi

    "Secure Android Design & Development" is an effort to provide a compiled guideline that collects cybersecurity principles, threat modeling, the Android security model, compilers, and tools together to make it possible to design and develop more securely from the HAL layer to the application layer. 

  14. Payloads All The Things
    Web Application Security Cheatsheets
    Swissky

    Complete with detailed explanations, practical examples, and real-world scenarios, PayloadsAllTheThings provides everything you need to test, exploit, and secure vulnerable systems.

  15. Snort 3 QuickStart Pro
    Detect malicious network activity, scan packets, generate alerts, and debug traffic for active intrusion prevention system (IPS)
    GitforGits | Asian Publishing House

    Whether you work for a small business or manage a large enterprise network, these integrations can significantly improve your security posture. Troubleshooting is another important aspect of using Snort effectively. In this book, I've included detailed sections on diagnosing and resolving common issues, so you can keep Snort running smoothly and reliably. You will learn to analyze logs, debug rules, and fine-tune configurations for optimal results. This book helps you become a proficient user of Snort, provides you with the tools and knowledge you need to protect your network from the ever-increasing number of cybersecurity threats