Leanpub Header

Skip to main content

Filters

Category: "Digital Forensics"

Books

  1. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) about software diagnostics, debugging, crash dump analysis, memory forensics, software trace and log analysis written in June 2014 - November 2014.

  2. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) about software diagnostics, debugging, crash dump analysis, software trace and log analysis, malware analysis and memory forensics written in November 2011 - May 2014.

  3. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) about memory dump analysis, software trace and log analysis, software troubleshooting, and debugging written in November 2010 - October 2011.

  4. Snort 3 QuickStart Pro
    Detect malicious network activity, scan packets, generate alerts, and debug traffic for active intrusion prevention system (IPS)
    GitforGits | Asian Publishing House

    Whether you work for a small business or manage a large enterprise network, these integrations can significantly improve your security posture. Troubleshooting is another important aspect of using Snort effectively. In this book, I've included detailed sections on diagnosing and resolving common issues, so you can keep Snort running smoothly and reliably. You will learn to analyze logs, debug rules, and fine-tune configurations for optimal results. This book helps you become a proficient user of Snort, provides you with the tools and knowledge you need to protect your network from the ever-increasing number of cybersecurity threats

  5. Discover the power of open-source software with "Best Free Open Source Data Recovery Apps for Mac OS - English Edition."

  6. Linux Essentials for Hackers & Pentesters
    Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Commands
    GitforGits | Asian Publishing House

    Manipulating text, managing networks, understanding ownership and permissions, writing programs in BASH shell, and using proxies, VPNs, and wireless networks are all covered. This book will teach you the fundamentals of hacking, including Linux commands and techniques to break into web applications and create your own hacking Linux toolkit.

  7. Accelerated macOS Core Dump Analysis, Third Edition
    Training Course Transcript with LLDB Practice Exercises
    Dmitry Vostokov

    The full transcript of Software Diagnostics Services training with 12 step-by-step exercises. Learn how to analyze app crashes and freezes, navigate through process core memory dump space and diagnose corruption, memory leaks, CPU spikes, blocked threads, deadlocks, wait chains, and much more.

  8. Eric Zimmerman's Binary Foray
    A history of all the blog posts from Binary Foray
    Andrew Rathbun and Eric Zimmerman
    No Description Available
  9. Accelerated Linux Disassembly, Reconstruction and Reversing, Second Edition
    Training Course Transcript and GDB Practice Exercises with Memory Cell Diagrams
    Dmitry Vostokov

    Learn disassembly, execution history reconstruction, and binary reversing techniques for better software diagnostics, troubleshooting, and debugging on x64 and ARM64 Linux platforms via practical step-by-step hands-on exercises using GDB and memory dumps. Covered 25 ADDR patterns, and many concepts are illustrated with Memory Cell Diagrams.

  10. EZ Tools Manuals
    Andrew Rathbun and Eric Zimmerman

    Eric Zimmerman's Tools are free, open-source, and widely taught around the world. This is the official manual for all of his command line and GUI tools.

  11. The Hitchhiker's Guide to DFIR: Experiences From Beginners and Experts
    A crowdsourced Digital Forensics and Incident Response (DFIR) book by the members of the Digital Forensics Discord Server
    Andrew Rathbun, ApexPredator, Kevin Pagano, Nisarg Suthar, John Haynes, Guus Beckers, Barry Grundy, Tristram, Victor Heiland, Jason Wilkins, Mark Berger, and Evangelos Dragonas

    A first-of-its-kind crowdsourced Digital Forensics and Incident Response (DFIR) book by the Digital Forensics Discord Server members to share knowledge!

  12. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in February 2010 - October 2010. This major revision contains corrections and WinDbg output color highlighting.

  13. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in July 2009 - January 2010. This major revision contains corrections and WinDbg output color highlighting.

  14. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in October 2008 - June 2009. This major revision contains corrections and WinDbg output color highlighting.

  15. This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in January - September 2008. This major revision contains corrections and WinDbg output color highlighting.