Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. Malware Narratives
    An Introduction, Revised Edition
    Dmitry Vostokov

    This is a revised and updated transcript of the Software Diagnostics Services seminar on the new application of software narratology to malware analysis.

  2. Introduction to Linux
    A Comprehensive Guide for Beginners
    Bobby Iliev

    Uncover the fascinating world of Linux with this all-inclusive guide designed to transform beginners into confident and knowledgeable users of this powerful operating system.

  3. SecOps Bit By Bit
    Roadmap for first-time CTOs and startup founders
    Alex Yarotsky

    Compilation of best practices for evaluating weak spots in your product and company and fostering a robust security culture within your organization.

  4. Wordpress Security Guide
    How to reduce the risk of getting your Wordpress site being hacked?
    Jean Cavallera

    The time and cost of securing your website is not much compared to the incalculable reputation and financial losses in case cyber criminals gain control of your website. Learn web security, common attach vectors and how to harden the security of your Wordpress site and the server hosting it.

  5. Hello! I'm Tony Robinson, a senior security analyst and rule writer on the Proofpoint Emerging Threats team. I write rules for the ETOPEN and ETPRO rulesets. My book will teach you about the ins and outs of Suricata, rules and rule writing in general, why the IDS software behaves a certain way, and how to get the most out of your Suricata deployments.

  6. Hello! I'm Tony Robinson, a senior security analyst and rule writer on the Proofpoint Emerging Threats team. I write rules for the ETOPEN and ETPRO rulesets. My book will teach you about the ins and outs of Suricata, rules and rule writing in general, why the IDS software behaves a certain way, and how to get the most out of your Suricata deployments.

  7. Many cyber-pros wish this book existed when they were first starting out.Are you looking to enhance your knowledge and become a more proficient cybersecurity engineer? Or perhaps you are new to the field and eager to learn the fundamentals?

  8. Many cyber-pros wish this book existed when they were first starting out.Are you looking to enhance your knowledge and become a more proficient cybersecurity engineer? Or perhaps you are new to the field and eager to learn the fundamentals?

  9. Embark on a cybersecurity adventure with "Ransomware Defense: TryHackMe Room Creation." This captivating journal takes you behind the scenes of the development process, uncovering the strategies and challenges faced in creating an immersive TryHackMe room. Discover the ins and outs of ransomware prevention, detection, and mitigation.

  10. Blue Team Primer: Detecting A Hacker
    A Security Operations Kickstarter
    Derek Carlin

    The most underutilized resource during a penetration test is the tester themselves. This book takes aim at how modern Security Operations teams can leverage the skillsets of penetration testers to improve their security posture and level up their detection game.

  11. Dive into the world of penetration testing with this comprehensive guide by cybersecurity expert, Brandon S. Keath. Explore each stage of the Penetration Testing Execution Standard, learn essential tools and techniques, and gain insights from real-world examples. Master the art of ethical hacking and become a skilled penetration tester.

  12. Deep Dive into Clouded Waters
    An overview in Digital Ocean's Pentest and Security
    Bleon Proko
    No Description Available
  13. The McGinty Equation
    Unifying Quantum Field Theory and Fractal Theory to Understand Subatomic Particle Behavior
    Chris McGinty

    Beyond practical applications, the McGinty Equation underscores the beauty and elegance of physics, demonstrating how theoretical concepts can be used to solve complex problems and uncover new truths about the universe. Its potential applications extend beyond quantum mechanics and into other fields, such as biology, finance, and computer science.

  14. SC-900 Practice Test Questions (Microsoft Security, Compliance, Identity Fundamentals)
    Clear SC-900 easily in first attempt | Microsoft Security, Compliance & Identity Fundamentals | In-depth explanations
    Ravikiran Srinivasulu

    Clear SC-900 exam with exam-relevant questions and in-depth explanations supported by product images

  15. Will an old man be able to counter this remorseless hacker-turned-killer? As the clock ticks it becomes harder and harder than before until a story of a ruthless world of dark web and its hidden rules are unearthed before us.