Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. Code, Chips and Control
    The Security Posture of Digital Isolation
    Sal Kimmich

    Now we have made it to the kernel. Let's assume you have a chip, any chip, from the suppliers we've just discussed. You might choose to manually load a kernel onto that chip, using a GRand Unified Bootloader (GRUB) to load (or strap) the kernel, and pass all permissions over to it. It is the animus in the machine. There are many different kernels, but they share one interesting characteristic to security: they run with the highest level of access, mediating interactions between user applications and the physical chips. A good kernel will handle low-level tasks like CPU scheduling, memory allocation, device input/output, and system calls. It is the bridge between software and hardware: if the kernel fails to load or crashes, the entire system will halt. To make this level of access a bit safer, the kernel is designed to be always resident in memory, and execute in a protected mode that is isolated from applications. This prevents damage to core system data...

  2. Learn how to attack and defend email infrastructures.

  3. Building Virtual Machine Labs: A Hands-on Guide (Second Edition)
    Learn everything there is to know about building and maintaining your own home or workplace virtual lab environment on the most popular hypervisors today in this new and improved second edition release!
    Tony Robinson

    The premise of this book is to provide students a hands-on, go-to resource for building a secure, customizable lab environment in order to enable their own specific pursuits.

  4. Frida handbook
    Learn about binary instrumentation with the Frida toolkit.
    Fernando Diaz (@entdark_)

    Learn about binary instrumentation using the Frida toolkit using practical examples. This book is not deeply focused in theory but practical use cases instead, from basic uses of the API to how to apply it in real-world scenarios. We will apply instrumentation under Linux, Windows and MacOS systems.

  5. You're about to gain the digital confidence that sets successful students apart. This comprehensive guide breaks down the essential digital literacy skills you need to thrive in today's technology-driven world—without the jargon or overwhelming complexity. From mastering online research and spotting fake information to protecting your privacy and communicating professionally, you'll learn practical strategies you can apply immediately. Discover how to use collaborative tools effectively, manage your digital wellness, and build a positive online reputation. Whether you're navigating social media, submitting assignments online, or preparing for a digital future, this book gives you the knowledge and tools to move through the digital landscape with confidence and security. Stop feeling lost in the digital world and start taking control of your online presence and skills.

  6. Cyber Security Basic : Protect Yourself Online
    Simple Steps to Guard Your Privacy and Defeat Online Threats.
    Kristian Reformis

    Do you ever feel like you're being watched behind your phone screen? Are you sure your bank account is safe with just one simple password?"The truth is, every click could be an open door for a cybercriminal. Don't wait until your identity is stolen or your accounts are drained to take action.Discover the secrets to building your own 'Digital Fortress' in the new book "Cybersecurity Basics: Protect Yourself Online" by Kristian Reformis. In the digital age, ignorance is no longer an excuse—it's a vulnerability. Secure your world today!

  7. Beyond the Basics: Practical Bug Bounty Hunting
    A Beginner's Guide to Becoming a Bug Bounty Hunter (Web Security)
    morioka12

    This book is designed for individuals who have already learned the basics of web security. It provides a systematic guide to acquiring the "practical bug hunting skills" necessary to achieve your first valid report (First Blood), earn your first bounty, and consistently deliver results in real-world bug bounty programs.

  8. Take a look under the hood of your Windows personal computer. Locate and eliminate security problems. This book shows you how to become an amateur digital Sherlock Holmes.

  9. Building Identity Systems That Don’t Break
    Spring Boot, Spring Security, Keycloak, Okta SAML 2.0, and Just-In-Time Provisioning
    Binit Datta

    SSO works—until it doesn’t. This book shows what really happens after login: identity brokering, federation, Just-In-Time provisioning, sessions, cookies, logout failures, and trust boundaries—built with Spring Boot, Spring Security, Keycloak, and Okta SAML. Learn how enterprise identity systems behave in production, not just in demos.

  10. Guidebook To Computer and Smartphone Security Second Edition
    Security Information For Everyone
    Brandon Lipani

    I am a Certified Comptia Security + professional helping users and companies secure their computers, networks and smartphones across the country. The purpose of this book is to educate and teach computer and smartphone users about safety and security online.

  11. How to Think Like a Security Researcher
    A practical mindset guide for beginners in cybersecurity.
    Ilkay Adil
    No Description Available
  12. Lessons Learned in Security Bug Bounty
    A Guide to Strategies in Vulnerability Hunting
    Eusebiu Blindu

    Real lessons from real bug bounty work — focusing on what actually leads to vulnerabilities, not just theory.

  13. What actually happens after you click Login? Beyond the screen, beyond the redirects, beyond the success message, enterprise Single Sign-On reveals its true complexity. Beyond the Login Screen exposes the real mechanics of SSO—HTTP calls, cookies, tokens, and protocol exchanges—across Spring Boot, Keycloak, and Azure Entra ID. This book is for professionals who need more than configurations: it is for those who must understand identity deeply, troubleshoot decisively, and deliver reliable authentication experiences when it matters most.

  14. Modern Android Security for Developers
    Kotlin Patterns for a Dangerous World
    Mahmoud Ramadan

    Build Android apps that can survive real-world attacks. Modern Android Security is a practical, Kotlin-first guide that shows how apps are actually compromised—and the proven patterns you need to protect data, APIs, and users in a hostile environment.

  15. Practical Introduction to OSS Bug Hunting
    Aiming to get my first CVE ID in 30 days
    morioka12

    This book is a systematic and practical introductory guide to bug hunting, designed for those who have finished learning the basics of web security and are ready to achieve the real-world milestone of obtaining their first CVE ID.