Leanpub Header

Skip to main content

Filters

Category: "Computer Security"

Books

  1. C++ Networking 101, Second Edition
    Build strong expertise into programming sockets, protocols, VPNs, and asynchronous I/O with 75+ sample programs
    GitforGits | Asian Publishing House

    This isn't a book to put on a shelf. It's meant to be used, tested, and adapted as you build your networking skills. In this new edition, I've been working on making the teaching flow better and making technical stuff clearer without overwhelming you. You'll get the basics down, like how C++ works well with TCP/IP and how sockets are the foundation for communication. Then, I'll show you how to build real client-server apps, set up IP addressing, and use protocols like HTTP, FTP, SMTP, IMAP, and DNS directly through C++ code. Each example is practical and you can actually implement it. It shows you not just how something works, but why it matters in real networking scenarios.

  2. Python Networking 101, Second Edition
    Mastering the capability of network and socket programming, AsyncIO, network performance, simulations and Ansible
    GitforGits | Asian Publishing House

    This second edition is for Python programmers who want to get into networking but don't want to feel overwhelmed. My goal is to make you comfortable with reading code and using it to solve real-world networking problems. A lot of people wrote to me saying that it helped them automate tasks that they had been doing manually for years, while others shared how it gave them the confidence to switch careers or take on more advanced responsibilities in their roles.

  3. First Bounty
    A Bug Hunter's Guide to Easy Wins
    Rodolfo Assis

    Learn a step-by-step, evidence-based approach that gives new bug hunters a realistic path to success. Stop relying on luck—get the system to land your first bounty in 6–8 months.

  4. CISSP: La Última Milla (Edición en Español)
    Tu guía hacia la meta final
    Pete Zerger and TranslateAI

    El libro cubre todos los temas del programa de estudios más reciente del examen CISSP, organizado en un formato que facilita profundizar en dominios y conceptos específicos del examen de un vistazo, lo que lo convierte en un recurso esencial para cualquiera que aspire a prepararse para el examen sin desperdiciar tiempo ni dinero.

  5. CISSP: 総仕上げ (日本語版)
    ゴールへの手引き
    Pete Zerger and TranslateAI

    本書は、最新のCISSP試験シラバスのすべてのトピックを網羅し、特定の試験ドメインや概念を一目で詳しく掘り下げることができる形式で構成されており、時間や費用を無駄にすることなく試験対策を行いたい方にとって、必携の参考書となっています。

  6. CISSP: Die letzte Meile (Deutsche Ausgabe)
    Ihr Wegweiser zum Ziel
    Pete Zerger and TranslateAI

    Das Buch behandelt alle Themen des aktuellen CISSP-Prüfungslehrplans in einem Format, das es ermöglicht, spezifische Prüfungsdomänen und Konzepte auf einen Blick zu vertiefen, wodurch es sich zu einer unverzichtbaren Prüfungsressource für alle entwickelt, die sich ohne Zeit- und Geldverschwendung auf die Prüfung vorbereiten möchten.

  7. Red Hat Cloud Foundations
    The Complete Guide to Building Enterprise Private Clouds with OpenShift, OpenStack, and Ceph
    BEKROUNDJO Akoley Aristide

    Transform your data center into a powerful private cloud with this comprehensive guide to Red Hat's enterprise stack. Learn how to deploy OpenShift for container orchestration, integrate OpenStack for VM workloads, and implement Ceph for unified storage—all on a single lab host. Through 10 hands-on chapters, you'll build a production-ready hybrid cloud from scratch, complete with security hardening, performance optimization, and GitOps automation, backed by real-world case studies and battle-tested configurations.

  8. Code, Chips and Control
    The Security Posture of Digital Isolation
    Sal Kimmich

    Now we have made it to the kernel. Let's assume you have a chip, any chip, from the suppliers we've just discussed. You might choose to manually load a kernel onto that chip, using a GRand Unified Bootloader (GRUB) to load (or strap) the kernel, and pass all permissions over to it. It is the animus in the machine. There are many different kernels, but they share one interesting characteristic to security: they run with the highest level of access, mediating interactions between user applications and the physical chips. A good kernel will handle low-level tasks like CPU scheduling, memory allocation, device input/output, and system calls. It is the bridge between software and hardware: if the kernel fails to load or crashes, the entire system will halt. To make this level of access a bit safer, the kernel is designed to be always resident in memory, and execute in a protected mode that is isolated from applications. This prevents damage to core system data. All hardware access must be...

  9. Learn ethical hacking and other usefuf information in IT world

  10. What's the difference between knowing about cybersecurity and actually doing cybersecurity? Practice with real tools on real problems. This field guide takes you from theory to practice with hands-on AWS, Linux, Python, Splunk, and SQL skills. Learn through actual incident response scenarios, not sanitized demos. Build working security solutions you can deploy tomorrow.

  11. Material for Secure Android Design and Development
    From App Layer to HAL – Aligned with Android 15
    Mohammad Hossein Heydarchi
    No Description Available
  12. Material for Cybersecurity Deconstructed
    Advanced Techniques and Internals
    Steve T.
    No Description Available
  13. The Insider Goes Deep into the Consumer Protection System
    A Journey NOT for the Faint of Heart
    Lefty Insider

    This is a work of fiction that attempts to document what might happen if a fictional Wisc senior citizen named Lefty Insider attempts to seek justice against exploitation from a fictional monopolistic corporation, (identified as Charpectrum), through the Federal and State Consumer Protection systems.This fictional tale seeks to imagine what a realistic experience would be like if a well-informed, educated and technically competent persistently stubborn consumer, of German ancestry, sought the protection of government agencies against the financial and marketing exploitation from a rapacious and malevolent incumbent monopoly Internet service provider corporation.This is also a story about elected idiots, liars, fools, incompetents, bureaucrats, and of course is but a fictional story about imagined government run Consumer Protection systems.

  14. Cybersecurity Interview Questions & Answers
    Master Real Interview Questions from Top Tech Companies like Amazon, Google, Facebook, and Microsoft
    Bolakale Aremu

    Short on time before your cybersecurity interview? Don’t panic—this practical guide is built to help you prepare fast, think smart, and answer like a pro.

  15. This training course is a reformatted, improved, modernized, and remastered full-color version of the previous x64 Windows Debugging: Practical Foundations book with additional material.