Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. First Bounty
    A Bug Hunter's Guide to Easy Wins
    Rodolfo Assis

    Learn a step-by-step, evidence-based approach that gives new bug hunters a realistic path to success. Stop relying on luck—get the system to land your first bounty in 6–8 months.

  2. CISSP: La Última Milla (Edición en Español)
    Tu guía hacia la meta final
    Pete Zerger and TranslateAI

    El libro cubre todos los temas del programa de estudios más reciente del examen CISSP, organizado en un formato que facilita profundizar en dominios y conceptos específicos del examen de un vistazo, lo que lo convierte en un recurso esencial para cualquiera que aspire a prepararse para el examen sin desperdiciar tiempo ni dinero.

  3. CISSP: 総仕上げ (日本語版)
    ゴールへの手引き
    Pete Zerger and TranslateAI

    本書は、最新のCISSP試験シラバスのすべてのトピックを網羅し、特定の試験ドメインや概念を一目で詳しく掘り下げることができる形式で構成されており、時間や費用を無駄にすることなく試験対策を行いたい方にとって、必携の参考書となっています。

  4. Red Hat Cloud Foundations
    The Complete Guide to Building Enterprise Private Clouds with OpenShift, OpenStack, and Ceph
    BEKROUNDJO Akoley Aristide

    Transform your data center into a powerful private cloud with this comprehensive guide to Red Hat's enterprise stack. Learn how to deploy OpenShift for container orchestration, integrate OpenStack for VM workloads, and implement Ceph for unified storage—all on a single lab host. Through 10 hands-on chapters, you'll build a production-ready hybrid cloud from scratch, complete with security hardening, performance optimization, and GitOps automation, backed by real-world case studies and battle-tested configurations.

  5. Learn ethical hacking and other usefuf information in IT world

  6. What's the difference between knowing about cybersecurity and actually doing cybersecurity? Practice with real tools on real problems. This field guide takes you from theory to practice with hands-on AWS, Linux, Python, Splunk, and SQL skills. Learn through actual incident response scenarios, not sanitized demos. Build working security solutions you can deploy tomorrow.

  7. The Insider Goes Deep into the Consumer Protection System
    A Journey NOT for the Faint of Heart
    Lefty Insider

    This is a work of fiction that attempts to document what might happen if a fictional Wisc senior citizen named Lefty Insider attempts to seek justice against exploitation from a fictional monopolistic corporation, (identified as Charpectrum), through the Federal and State Consumer Protection systems.This fictional tale seeks to imagine what a realistic experience would be like if a well-informed, educated and technically competent persistently stubborn consumer, of German ancestry, sought the protection of government agencies against the financial and marketing exploitation from a rapacious and malevolent incumbent monopoly Internet service provider corporation.This is also a story about elected idiots, liars, fools, incompetents, bureaucrats, and of course is but a fictional story about imagined government run Consumer Protection systems.

  8. This training course is a reformatted, improved, modernized, and remastered full-color version of the previous x64 Windows Debugging: Practical Foundations book with additional material.

  9. Accelerated .NET Memory Dump Analysis
    Training Course Transcript with WinDbg and LLDB Practice Exercises, Seventh Edition
    Dmitry Vostokov

    Learn how to analyze .NET application and service crashes and freezes, navigate memory dump space (managed and unmanaged code), and diagnose corruption, leaks, CPU spikes, blocked threads, deadlocks, wait chains, resource contention, and much more using WinDbg on Windows and LLDB on Linux. Covers 22 .NET memory dump analysis patterns, plus the additional 21 unmanaged patterns.

  10. Developing a secure system for Telemedicine and File Sharing
    Face and voice detection User authentication and authorization and Real-time communication Monitoring for secure Telemedicine and File Sharing system.
    paboda akalanka

    Telemedicine has transformed healthcare by enabling quick and accessible remote consultations and treatments. Telemedicine is increasingly used, raising concerns about patient data security and privacy. Telemedicine platforms are vulnerable despite security precautions, highlighting the necessity for a robust and comprehensive security framework geared to remote healthcare services. Liveness Detection, Continuous Authentication, Real-time Communication Monitoring, and a Bio-Biometric Authentication System that detects face and voice will be used to create an innovative security framework for telemedicine platforms.

  11. WisconsinSecureNet (WSN)
    It Is Time To Treat This State Like A Country, And Button It Down
    Lefty Insider

    This book is targeted primarily to technologists and policy makers who wish to better serve a demographic of Wisconsin landline Internet (HFC) consumers. (Rural residents in particular)

  12. Security+ The Last Mile
    Your guide to the finish line
    Pete Zerger

    The book covers every topic in the latest Security+ exam syllabus (SY0-701), with 300 pages organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the exam without wasting time or money.

  13. Estrategias y herramientas para analistas de ciberseguridad
    Guía completa sobre SIEM, IDS, Elastic Stack y detección de amenazas en Centros de Operaciones de Seguridad (SOC)
    José Manuel Ortega

    A la hora de desplegar un sistema de gestión de información y eventos de seguridad (SIEM) hay que tener en cuenta diferentes factores como, por ejemplo, el número de equipos a monitorizar o la granularidad que se pretende conseguir. Sin embargo, el aspecto más importante a considerar es el presupuesto disponible para invertir en herramientas comerciales o para adecuar una solución existente aprovechando plataformas open source. En base a los motivos expuestos anteriormente, los objetivos que pretende este libro son los siguientes:Comprender cómo funcionan las herramientas de gestión de eventos de ciberseguridad y qué tipos de SIEM hay para poder valorar qué herramienta se adapta mejor en cada situación.Estudio de los distintos tipos de sistemas de detección de intrusiones, analizando sus ventajas e inconvenientes desde el punto de vista de la gestión de eventos de seguridad.

  14. Uncover the advanced exploits missed by standard scans. This definitive guide dissects sophisticated 2025 vulnerabilities in injection, authentication/authorization (JWT/SAML/OAuth), SSRF, deserialization, APIs (REST/GraphQL/gRPC), and cloud environments. Essential technical knowledge for serious security professionals.

  15. Cybersecurity Deconstructed
    Advanced Techniques and Internals
    Steve T.

    Go beyond abstractions and master the core technical realities of modern cybersecurity. Deconstruct advanced network evasion and EDR bypass techniques, dissect sophisticated post-exploitation and cloud attack vectors, and analyze cryptographic failures and malware at their roots. This deep dive into internals equips practitioners with the crucial understanding needed to elevate both offensive and defensive capabilities against today's threats.