Leanpub Header

Skip to main content

Filters

Category: "Cryptography"

Books

  1. Cybersecurity Architect's Handbook
    An end-to-end guide to implementing and maintaining robust security architecture
    Packt Publishing Ltd

    This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments.

  2. Cybersecurity from Beginner to Paid Professional, Part 1
    Protecting Systems, Data and Networks
    Bolakale Aremu

    If you're ready to build a rock-solid foundation in cybersecurity, this book is the only one you'll need. Cybersecurity from Beginner to Paid Professional, Part 1 offers a friendly, accessible introduction to the world of cybersecurity.

  3. Guardians of Privacy
    Unveiling the Nexus of Blockchain & Artificial Intelligence in Digital Identity and IoT
    Solidity Academy

    Guardians of PrivacyUnveiling the Nexus of Blockchain&Artificial Intelligence in Digital Identity and IoT

  4. The Essential Guide to Blockchain Platforms
    A comparative guide from Bitcoin to Solana to Kaspa
    Ross P Green

    Whether you're looking to invest, develop software or generally curious about a blockchain project, this guide will help you make an educated decision for which blockchain to choose. This book covers many blockchains both technically and comparatively, describing Bitcoin, Ethereum, Kaspa, Kadena, Algorand, Saito, Pulsechain, Solana, Sei, Bittensor and Nano. This book also asks the tough questions unveiling interesting insights:Does the Blockchain Trilemma really exist? Is the Trilemma a technological problem or an economic problem?Is there confusion on the definition of decentralisation? Is it better to focus on openness and non-excludability?Are the incentive mechanisms in many blockchains broken? Should all budget be focused on security, what about scalability and decentralisation?What is fee recycling attack? Which blockchain solves it? This is not just a guide; it's a roadmap for those seeking a deeper understanding of the technological nuances that differentiate blockchains.

  5. CISSP: The Last Mile
    Your guide to the finish line
    Pete Zerger

    The book covers every topic in the latest CISSP exam syllabus, organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the exam without wasting time or money.

  6. Node-OPCUA by example Edition 2024
    Node-OPCUA From Basics to Expertise - Crafting Effective Client and Server Applications in Industrial Communication with JavaScript and TypeScript
    Etienne Rossignon

    Dive into 'Node-OPCUA' and explore the world of industrial protocols with the author's proven recipes. Learn how to build exceptional OPC UA clients and servers through hands-on examples, elevating your industrial programming expertise from basic to advanced levels. This guide is key to mastering Node-OPCUA in JavaScript and TypeScript.

  7. Do you want to know how diamonds and AI-electronics technology can contribute to saving human life on Earth? If so, you should read My Bestseller E-Book, which explores the potential and the risks of using diamonds and AI-electronics technology for quantum computing, AI-electronics devices, and AI-electronics sensing.

  8. Implementation Guide for a Full System
    By Manan Vora & Marc Krisjanous
    Manan Vora

    As cryptocurrency gains more widespread acceptance, the need for secure and trusted custodyservices has become increasingly critical. These services, which provide the secure storage andtransfer of digital assets, are, in many ways, the foundation of the broader cryptocurrencyecosystem.

  9. The McGinty Equation
    Unifying Quantum Field Theory and Fractal Theory to Understand Subatomic Particle Behavior
    Chris McGinty

    Beyond practical applications, the McGinty Equation underscores the beauty and elegance of physics, demonstrating how theoretical concepts can be used to solve complex problems and uncover new truths about the universe. Its potential applications extend beyond quantum mechanics and into other fields, such as biology, finance, and computer science.

  10. Will an old man be able to counter this remorseless hacker-turned-killer? As the clock ticks it becomes harder and harder than before until a story of a ruthless world of dark web and its hidden rules are unearthed before us.

  11. Encyclopedia Cyberspacia
    The 42nd and Final Encyclopedia Cyberspacia
    Lefty Insider

    This Guide is intended to provide you the information required to efficiently and safely navigate the Dark Web.Following the chapters, you will find appendices, which provide supplemental information, history, and opinion about Cyberspace.

  12. Crypto Cashflow
    optimal prime
    No Description Available
  13. Bug Bounty Programming & Web Security Audit
    Everything you should know about
    Senesh Wijayarathne

    By reading this book, you can get a clear understanding of how to do a Web Security Audit on your own website or on a website that is given in any Bug Bounty Platforms. Make sure that you are safe from Hackers!! Ask yourself, is your web application is safe from Hackers!?

  14. Are you interested in learning to develop smart contracts with Ethereum, and develop a really useful dapp and become a millionaire?

  15. NETWORK SECURITY MANAGEMENT
    Joseph Thachil George

    The main purpose of this book is to understand the concept of network security. When implementing the network, the primary concern is to ensure confidentiality, integrity, and authentication. These concepts have been discussed in this book and explained with practical examples