Kick off your book project in 3 hours! Live workshop on Zoom. You’ll leave with a real book project, progress on your first chapter, and a clear plan to keep going. Saturday, May 16, 2026. Learn more…

Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. CISSP: The Last Mile
    Your guide to the finish line
    Pete Zerger

    The book covers every topic in the latest CISSP exam syllabus, organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the exam without wasting time or money.

  2. CISM: The Last Mile
    Your guide to the finish line
    Pete Zerger

    This book covers every topic in the latest CISM exam syllabus, approaching topics from the ISACA perspective. It's 325+ pages organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the CISM exam without wasting time or money.

  3. CISA: The Last Mile
    Your guide to the finish line
    Pete Zerger

    This book covers every topic in the latest CISA exam syllabus, approaching topics from the ISACA perspective. It's 400+ pages, organized in a format following the syllabus that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the CISA exam without wasting time or money.

  4. You don't need a massive budget or a team of consultants to build a security program that actually works. Building an Agile Security Program gives startup founders and CTOs a step-by-step, NIST-aligned playbook with 300+ prioritized tasks, runnable automation code, and the practitioner voice of someone who's done it a hundred times.

  5. Pwning OWASP Juice Shop
    Björn Kimminich

    Official companion guide to the OWASP Juice Shop. Being a web application with a vast number of intended security vulnerabilities, the OWASP Juice Shop is supposed to be the opposite of a  best practice  or  template application  for web developers: It is an awareness, training, demonstration and exercise tool for security risks in modern web apps.

  6. Most universities have IT policies. Few have a formal strategy behind them. This guide uses data from 410 institutions to show higher education leaders where the sector's policy gaps are, how the unique dynamics of academic culture shape security programs differently than corporate or government environments, and how to close those gaps systematically.

  7. Web Application Advanced Hacking
    A Hands-On Field Guide to latest techniques used by security researchers and bug bounty hunters
    Maor Tal

    Over the last few years, applications’ technology stack has changed rapidly. Web Application Advanced Hacking (WAAH) shares advanced techniques used by ethical hackers to carry out a thorough penetration test and security audit for modern web applications in a practical, hands-on approach.

  8. The Cybersecurity Advantage
    How SMB Leaders Leverage Fractional Executive Guidance to Build Trust, Win Business, and Drive Growth
    Christophe Foulon

    Transform your cybersecurity from a necessary expense into a powerful engine for business expansion and market differentiation. This guide reveals how fractional executive leadership provides the enterprise-level strategy needed to build customer trust, navigate compliance, and outpace the competition. Stop just protecting your business and start using security to propel it forward.

  9. Uncover the advanced exploits missed by standard scans. This definitive guide dissects sophisticated 2025 vulnerabilities in injection, authentication/authorization (JWT/SAML/OAuth), SSRF, deserialization, APIs (REST/GraphQL/gRPC), and cloud environments. Essential technical knowledge for serious security professionals.

  10. Technical manual and report on AI agents swarms
    "Integrating Swarm Intelligence and Human Ingenuity: A Vision of Tomorrow's World"
    Chetan Ladwa

    "Explore the synergy of AI swarm technology""Integrating Swarm Intelligence and Human Ingenuity: A Vision of Tomorrow's World" Delve into a world where AI enhances human capabilities, transforming industries and society. Uncover the secrets of this groundbreaking tech and its profound impact. A future where AI collaborates with us awaits.

  11. CISSP: Die letzte Meile (Deutsche Ausgabe)
    Ihr Wegweiser zum Ziel
    Pete Zerger and TranslateAI

    Das Buch behandelt alle Themen des aktuellen CISSP-Prüfungslehrplans in einem Format, das es ermöglicht, spezifische Prüfungsdomänen und Konzepte auf einen Blick zu vertiefen, wodurch es sich zu einer unverzichtbaren Prüfungsressource für alle entwickelt, die sich ohne Zeit- und Geldverschwendung auf die Prüfung vorbereiten möchten.

  12. Hello! I'm Tony Robinson, a senior security analyst and rule writer on the Proofpoint Emerging Threats team. I write rules for the ETOPEN and ETPRO rulesets. My book will teach you about the ins and outs of Suricata, rules and rule writing in general, why the IDS software behaves a certain way, and how to get the most out of your Suricata deployments.

  13. Hello! I'm Tony Robinson, a senior security analyst and rule writer on the Proofpoint Emerging Threats team. I write rules for the ETOPEN and ETPRO rulesets. My book will teach you about the ins and outs of Suricata, rules and rule writing in general, why the IDS software behaves a certain way, and how to get the most out of your Suricata deployments.

  14. Programming Linux Anti-Reversing Techniques teaches the reader how to code and analyze well known anti-reversing techniques for Linux. The book shows how a reverse engineer analyzes a binary using tools like IDA, Radare2, GDB, readelf, and more. The code is presented to the reader ready to compile and analyze on their own.

  15. Building Virtual Machine Labs: A Hands-on Guide (Second Edition)
    Learn everything there is to know about building and maintaining your own home or workplace virtual lab environment on the most popular hypervisors today in this new and improved second edition release!
    Tony Robinson

    The premise of this book is to provide students a hands-on, go-to resource for building a secure, customizable lab environment in order to enable their own specific pursuits.