Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. CISSP: The Last Mile
    Your guide to the finish line
    Pete Zerger

    The book covers every topic in the latest CISSP exam syllabus, organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the exam without wasting time or money.

  2. CISA: The Last Mile
    Your guide to the finish line
    Pete Zerger

    This book covers every topic in the latest CISA exam syllabus, approaching topics from the ISACA perspective. It's 400+ pages, organized in a format following the syllabus that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the CISA exam without wasting time or money.

  3. CISM: The Last Mile
    Your guide to the finish line
    Pete Zerger

    This book covers every topic in the latest CISM exam syllabus, approaching topics from the ISACA perspective. It's 325+ pages organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the CISM exam without wasting time or money.

  4. Across 30 chapters, you'll trace real code paths through nearly 400 CAS modules, learning the architecture decisions, design patterns, and implementation techniques that hold this massive system together. Whether you're a CAS contributor trying to fix a tricky bug, an architect evaluating CAS for your organization, or a Java developer who wants to study a mature, real-world Spring Boot application at scale — this book gives you the map. Written by a long-time CAS committer who has been involved since the original CAS 3.0 architecture, this book distills years of hard-won knowledge into a single, code-level reference.

  5. JavaScript for hackers
    Learn to think like a hacker
    Gareth Heyes

    Learn how to find interesting behaviour and flaws in JavaScript. Reading this book you will find the latest and greatest techniques for hacking JavaScript and generating XSS payloads. Includes ways to construct JavaScript using only +[]()! characters. Never heard of DOM Clobbering? This book has all the details.

  6. Book walks through a number of real world examples for reverse engineering data structures and algorithms found in malware.

  7. Active Directory Credential Pipelines
    Capture → Crack → Use: Real-World Credential Abuse in Active Directory
    Bug Senior

    A practical, operator-grade guide to Active Directory credential abuse.Explains how NTLM, Kerberos, and certificate-based attacks form real-world credential pipelines—from capture to use.

  8. The Modern Cryptography CookBook
    Cryptography is for EveryOne. Learn from Crypto Principle to Applied Cryptography With Practical Example
    Anish Nath

    Cryptography Cookbook is the intuitive way of learning practical cryptography and applied cryptograhy. This book contains more than 1000+ recieipes which include and not limited to Symmetric Key, Assymetric Keys, hashing algorithms, hmac, key exchanges,pki ,encoding decoding,certificare management tls,gpg,smime,ssh-keygen,keytool,iptables etc.

  9. CISSP: 総仕上げ (日本語版)
    ゴールへの手引き
    Pete Zerger and TranslateAI

    本書は、最新のCISSP試験シラバスのすべてのトピックを網羅し、特定の試験ドメインや概念を一目で詳しく掘り下げることができる形式で構成されており、時間や費用を無駄にすることなく試験対策を行いたい方にとって、必携の参考書となっています。

  10. CISSP: Die letzte Meile (Deutsche Ausgabe)
    Ihr Wegweiser zum Ziel
    Pete Zerger and TranslateAI

    Das Buch behandelt alle Themen des aktuellen CISSP-Prüfungslehrplans in einem Format, das es ermöglicht, spezifische Prüfungsdomänen und Konzepte auf einen Blick zu vertiefen, wodurch es sich zu einer unverzichtbaren Prüfungsressource für alle entwickelt, die sich ohne Zeit- und Geldverschwendung auf die Prüfung vorbereiten möchten.

  11. Security+ The Last Mile
    Your guide to the finish line
    Pete Zerger

    The book covers every topic in the latest Security+ exam syllabus (SY0-701), with 300 pages organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the exam without wasting time or money.

  12. Frida handbook
    Learn about binary instrumentation with the Frida toolkit.
    Fernando Diaz (@entdark_)

    Learn about binary instrumentation using the Frida toolkit using practical examples. This book is not deeply focused in theory but practical use cases instead, from basic uses of the API to how to apply it in real-world scenarios. We will apply instrumentation under Linux, Windows and MacOS systems.

  13. Hello! I'm Tony Robinson, a senior security analyst and rule writer on the Proofpoint Emerging Threats team. I write rules for the ETOPEN and ETPRO rulesets. My book will teach you about the ins and outs of Suricata, rules and rule writing in general, why the IDS software behaves a certain way, and how to get the most out of your Suricata deployments.

  14. Hello! I'm Tony Robinson, a senior security analyst and rule writer on the Proofpoint Emerging Threats team. I write rules for the ETOPEN and ETPRO rulesets. My book will teach you about the ins and outs of Suricata, rules and rule writing in general, why the IDS software behaves a certain way, and how to get the most out of your Suricata deployments.

  15. Pwning OWASP Juice Shop
    Björn Kimminich

    Official companion guide to the OWASP Juice Shop. Being a web application with a vast number of intended security vulnerabilities, the OWASP Juice Shop is supposed to be the opposite of a  best practice  or  template application  for web developers: It is an awareness, training, demonstration and exercise tool for security risks in modern web apps.