Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. CISSP: The Last Mile
    Your guide to the finish line
    Pete Zerger

    The book covers every topic in the latest CISSP exam syllabus, organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the exam without wasting time or money.

  2. CISM: The Last Mile
    Your guide to the finish line
    Pete Zerger

    This book covers every topic in the latest CISM exam syllabus, approaching topics from the ISACA perspective. It's 325+ pages organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the CISM exam without wasting time or money.

  3. CISA: The Last Mile
    Your guide to the finish line
    Pete Zerger

    This book covers every topic in the latest CISA exam syllabus, approaching topics from the ISACA perspective. It's 400+ pages, organized in a format following the syllabus that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the CISA exam without wasting time or money.

  4. Rust for Network Programming and Automation, Second Edition
    Work around designing networks, TCP/IP protocol, packet analysis and performance monitoring using Rust 1.68
    GitforGits | Asian Publishing House

    From the fundamentals of TCP/IP to advanced packet manipulation and analysis techniques, we have delved deeply into the core concepts that power modern networks. The practical examples and hands-on approach were created to teach you real-world skills that you can immediately apply to your projects. Whether you're developing network applications, troubleshooting network issues, or automating network tasks, the knowledge in this book will help you succeed.

  5. Pwning OWASP Juice Shop
    Björn Kimminich

    Official companion guide to the OWASP Juice Shop. Being a web application with a vast number of intended security vulnerabilities, the OWASP Juice Shop is supposed to be the opposite of a  best practice  or  template application  for web developers: It is an awareness, training, demonstration and exercise tool for security risks in modern web apps.

  6. The GPG Guide
    Modern OpenPGP for Every Workflow
    Tony Gies

    The comprehensive, current PGP and GnuPG reference: from air-gapped key generation to YubiKey provisioning, Git signing, email encryption, and emergency recovery.

  7. JavaScript for hackers
    Learn to think like a hacker
    Gareth Heyes

    Learn how to find interesting behaviour and flaws in JavaScript. Reading this book you will find the latest and greatest techniques for hacking JavaScript and generating XSS payloads. Includes ways to construct JavaScript using only +[]()! characters. Never heard of DOM Clobbering? This book has all the details.

  8. Go beyond the basics and master the deep technical realities of memory corruption. Learn how modern defenses like ASLR, CFI, and PAC work, then discover the sophisticated ROP, leak, and data-only techniques required to bypass them. This is your essential guide to advanced exploit development and defense evasion.

  9. CISSP: Die letzte Meile (Deutsche Ausgabe)
    Ihr Wegweiser zum Ziel
    Pete Zerger and TranslateAI

    Das Buch behandelt alle Themen des aktuellen CISSP-Prüfungslehrplans in einem Format, das es ermöglicht, spezifische Prüfungsdomänen und Konzepte auf einen Blick zu vertiefen, wodurch es sich zu einer unverzichtbaren Prüfungsressource für alle entwickelt, die sich ohne Zeit- und Geldverschwendung auf die Prüfung vorbereiten möchten.

  10. Building Virtual Machine Labs
    A Hands-On Guide
    Tony Robinson

    Learn everything there is to know about building and maintaining your own home or workplace virtual lab environment on the most popular hypervisors today!

  11. Unethical Software Engineering
    Dark Patterns
    Cesare Pautasso

    In unethical software, not every line of code is written with good intentions. Unethical Software Engineering: Dark Patterns exposes how to manipulate users, drive profits, and evade accountability. From covert surveillance, monetization at all costs, digital fraud, ranking manipulation, all the way to unethical artificial intelligence practices, this scary book unveils how these "dark patterns" exploit human beings, erode trust, and disrupt digital ethics.Whether you're a developer, an architect, a tech enthusiast, or simply a concerned user, this book will change how you think about your daily apps — and inspire you to demand better. By helping you to draw the line between what is acceptable and what is questionable, Unethical Software Engineering: Dark Patterns shines a light on the digital dark side of software engineering where profits are prioritized over people.

  12. The API Gateway Handbook
    Your Practical Guide to API Gateway Setup, Security, and Operation
    Thomas Bayer and Tobias Polley

    Whether you’re exposing APIs to partners, building microservices, or connecting legacy systems, API Gateways sit at the heart of your infrastructure. This book takes you step by step through architecture, security, traffic control, OpenAPI validation, and real-world deployment. With vendor-neutral guidance and practical examples using the open-source Membrane API Gateway, it’s a hands-on resource for API developers, architects, and platform teams.

  13. Diving into JTAG
    A Comprehensive Guide to Debugging, Testing, and Securing Embedded Systems with JTAG Protocol
    Aliaksandr Kavalchuk

    WARNING: The main goal of this book is to test Leanpub functionality, and all the information in this book can be found in my articles for the Interrupt by Memfault and PlatformIO blogs.So, there is no need to buy this book—you should only do so if you prefer reading information in book format or if you just want to buy me a coffee. :) This book is a collection of my articles originally published in the blogs Interrupt by Memfault and PlatformIO with some additional edits and enhancements.   A unique feature of this book is the extensive use of GIF animations and videos to visually demonstrate key concepts and processes. However, since not all EPUB readers support GIF and video playback, each animation and video is accompanied by a link to an external resource. Readers can follow these links to view the corresponding content and enhance their understanding. Repo with all GIF animation: https://github.com/Zamuhrishka/diving-into-jtag-book-animations

  14. Hello! I'm Tony Robinson, a senior security analyst and rule writer on the Proofpoint Emerging Threats team. I write rules for the ETOPEN and ETPRO rulesets. My book will teach you about the ins and outs of Suricata, rules and rule writing in general, why the IDS software behaves a certain way, and how to get the most out of your Suricata deployments.

  15. Hello! I'm Tony Robinson, a senior security analyst and rule writer on the Proofpoint Emerging Threats team. I write rules for the ETOPEN and ETPRO rulesets. My book will teach you about the ins and outs of Suricata, rules and rule writing in general, why the IDS software behaves a certain way, and how to get the most out of your Suricata deployments.