Leanpub Header

Skip to main content

Filters


Books

  1. This Book Hates You
    Mr. Brutal Honesty

    Brutally honest. Darkly funny. This book doesn't care about your feelings—it cares about your growth.

  2. 100 Tips From A Millennial by Omar Ossama
    100 Tips From A Millennial by Omar Ossama
    Omar Ossama

    Want some guidance to succeed. Some tips to help you be on track and adjust your mindset. You need to read that book.

  3. No Description Available
  4. testbooks
    fasoori
    No Description Available
  5. "When Your All Is Not Enough"
    - A Tale of Two Lovers
    ADESOLA AFOLAYAN OLAYINKA

    When Your All Is Not Enough: A Tale of Two Lovers By Dr. Adesola Afolayan OlayinkaWhat happens when love isn't enough to keep two souls together?In When Your All Is Not Enough, journey into the lives of two lovers bound by passion but divided by purpose. Set against a backdrop of dreams, disappointments, and self-discovery, this emotional narrative explores the complexities of love, ambition, and identity.He gave his all. So did she. But was love alone ever truly enough?This deeply personal and fictionalized tale mirrors the raw truths of life—where giving your all doesn't always guarantee a happy ending, and where sometimes, letting go is the most courageous act of love.

  6. No Description Available
  7. PowerShell SysAdmin Crash Course, Second Edition
    Unlock the Full Potential of PowerShell with Advanced Techniques, Automation, Configuration Management and Integration
    GitforGits | Asian Publishing House

    In this book, I'll take you on a fundamentals exploration that quickly progresses to powerful, time-saving methods that can transform your day-to-day administrative tasks. I share my own experiences, challenges, and discoveries from the field, so you can see how PowerShell can be a true game-changer in managing IT environments. As you flip through the pages, you'll come across hands-on tasks like handling files, directories, and the registry, plus automating repetitive tasks with ease.

  8. Radiate Peace & Energy
    THE ULTIMATE GUIDE TO SELF-CARE & SPIRITUAL HEALING
    Clare Grace

    Feeling overwhelmed? You’re not alone — and you don’t have to stay stuck there. This guide is a warm companion for your journey toward peace, balance, and spiritual renewal. Because taking care of you is not a luxury — it’s essentia

  9. No Description Available
  10. Python para Novatos
    Una introducción práctica a la programación con Python
    Antonio Jaren Santillana Lozano

    ¡Embárcate en el fascinante mundo de la programación con "Python para Novatos"! Esta guía práctica te llevará de la mano desde los fundamentos hasta la creación de tus propios proyectos en Python.

  11. Descubra como a computação em nuvem e a virtualização estão revolucionando a gestão de TI. Neste eBook gratuito, você vai entender os conceitos-chave, os modelos de serviço e implantação, além dos principais benefícios e desafios dessas tecnologias. Ideal para quem está começando na área ou quer atualizar seus conhecimentos sobre Cloud Computing. Prepare-se para mergulhar no futuro da tecnologia com uma linguagem simples e objetiva!

  12. Go beyond the basics and master the deep technical realities of memory corruption. Learn how modern defenses like ASLR, CFI, and PAC work, then discover the sophisticated ROP, leak, and data-only techniques required to bypass them. This is your essential guide to advanced exploit development and defense evasion.

  13. Uncover the advanced exploits missed by standard scans. This definitive guide dissects sophisticated 2025 vulnerabilities in injection, authentication/authorization (JWT/SAML/OAuth), SSRF, deserialization, APIs (REST/GraphQL/gRPC), and cloud environments. Essential technical knowledge for serious security professionals.

  14. Cybersecurity Deconstructed
    Advanced Techniques and Internals
    Steve T.

    Go beyond abstractions and master the core technical realities of modern cybersecurity. Deconstruct advanced network evasion and EDR bypass techniques, dissect sophisticated post-exploitation and cloud attack vectors, and analyze cryptographic failures and malware at their roots. This deep dive into internals equips practitioners with the crucial understanding needed to elevate both offensive and defensive capabilities against today's threats.

  15. No Description Available