Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. CISSP: The Last Mile
    Your guide to the finish line
    Pete Zerger

    The book covers every topic in the latest CISSP exam syllabus, organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the exam without wasting time or money.

  2. CISM: The Last Mile
    Your guide to the finish line
    Pete Zerger

    This book covers every topic in the latest CISM exam syllabus, approaching topics from the ISACA perspective. It's 325+ pages organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the CISM exam without wasting time or money.

  3. Code, Chips and Control
    The Security Posture of Digital Isolation
    Sal Kimmich

    Now we have made it to the kernel. Let's assume you have a chip, any chip, from the suppliers we've just discussed. You might choose to manually load a kernel onto that chip, using a GRand Unified Bootloader (GRUB) to load (or strap) the kernel, and pass all permissions over to it. It is the animus in the machine. There are many different kernels, but they share one interesting characteristic to security: they run with the highest level of access, mediating interactions between user applications and the physical chips. A good kernel will handle low-level tasks like CPU scheduling, memory allocation, device input/output, and system calls. It is the bridge between software and hardware: if the kernel fails to load or crashes, the entire system will halt. To make this level of access a bit safer, the kernel is designed to be always resident in memory, and execute in a protected mode that is isolated from applications. This prevents damage to core system data...

  4. Secure Android Design and Development
    From App Layer to HAL
    Mohammad Hossein Heydarchi

    Design and build Android apps that pass security reviews and survive real-world attacks

  5. This training course is a reformatted, improved, modernized, and remastered full-color version of the previous x64 Windows Debugging: Practical Foundations book with additional material.

  6. Building Virtual Machine Labs: A Hands-on Guide (Second Edition)
    Learn everything there is to know about building and maintaining your own home or workplace virtual lab environment on the most popular hypervisors today in this new and improved second edition release!
    Tony Robinson

    The premise of this book is to provide students a hands-on, go-to resource for building a secure, customizable lab environment in order to enable their own specific pursuits.

  7. Pwning OWASP Juice Shop
    Björn Kimminich

    Official companion guide to the OWASP Juice Shop. Being a web application with a vast number of intended security vulnerabilities, the OWASP Juice Shop is supposed to be the opposite of a  best practice  or  template application  for web developers: It is an awareness, training, demonstration and exercise tool for security risks in modern web apps.

  8. CISSP: Die letzte Meile (Deutsche Ausgabe)
    Ihr Wegweiser zum Ziel
    Pete Zerger and TranslateAI

    Das Buch behandelt alle Themen des aktuellen CISSP-Prüfungslehrplans in einem Format, das es ermöglicht, spezifische Prüfungsdomänen und Konzepte auf einen Blick zu vertiefen, wodurch es sich zu einer unverzichtbaren Prüfungsressource für alle entwickelt, die sich ohne Zeit- und Geldverschwendung auf die Prüfung vorbereiten möchten.

  9. Breaking into Information Security: Learning the Ropes 101
    Teaching You The Core Fundamentals For Getting Your Career Started in Penetration Testing.
    Andy Gill

    All of the basic topics to get you from zero to junior pentester level - covering off everything you need to know to start breaking into web application penetration testing industry or looking for flaws on bug bounties. (LTR101)

  10. WASEC: Web Application Security for the everyday software engineer
    Everything a web developer should know about application security: concise, condensed and made to last.
    Alessandro Nadalin

    Everything a software engineer should know about Web application security. How can I avoid a catastrophe if my CDN gets compromised? Do I still need CSRF tokens? This book will be the solid, concise read around security you always wanted in your library.

  11. Unethical Software Engineering
    Dark Patterns
    Cesare Pautasso

    In unethical software, not every line of code is written with good intentions. Unethical Software Engineering: Dark Patterns exposes how to manipulate users, drive profits, and evade accountability. From covert surveillance, monetization at all costs, digital fraud, ranking manipulation, all the way to unethical artificial intelligence practices, this scary book unveils how these "dark patterns" exploit human beings, erode trust, and disrupt digital ethics.Whether you're a developer, an architect, a tech enthusiast, or simply a concerned user, this book will change how you think about your daily apps — and inspire you to demand better. By helping you to draw the line between what is acceptable and what is questionable, Unethical Software Engineering: Dark Patterns shines a light on the digital dark side of software engineering where profits are prioritized over people.

  12. Frida handbook
    Learn about binary instrumentation with the Frida toolkit.
    Fernando Diaz (@entdark_)

    Learn about binary instrumentation using the Frida toolkit using practical examples. This book is not deeply focused in theory but practical use cases instead, from basic uses of the API to how to apply it in real-world scenarios. We will apply instrumentation under Linux, Windows and MacOS systems.

  13. Diving into JTAG
    A Comprehensive Guide to Debugging, Testing, and Securing Embedded Systems with JTAG Protocol
    Aliaksandr Kavalchuk

    WARNING: The main goal of this book is to test Leanpub functionality, and all the information in this book can be found in my articles for the Interrupt by Memfault and PlatformIO blogs.So, there is no need to buy this book—you should only do so if you prefer reading information in book format or if you just want to buy me a coffee. :) This book is a collection of my articles originally published in the blogs Interrupt by Memfault and PlatformIO with some additional edits and enhancements.   A unique feature of this book is the extensive use of GIF animations and videos to visually demonstrate key concepts and processes. However, since not all EPUB readers support GIF and video playback, each animation and video is accompanied by a link to an external resource. Readers can follow these links to view the corresponding content and enhance their understanding. Repo with all GIF animation: https://github.com/Zamuhrishka/diving-into-jtag-book-animations

  14. Discover the power of open-source software with "Best Free Open Source Data Recovery Apps for Mac OS - English Edition."

  15. Books As Code
    Use developer tools and practices to write books like a Geek
    Alec the Geek

    Want to write a technical book? Approach it the same way you build software!