Security Books
What Is eBPF?
In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, o
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making
Web Application Firewalls
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security consultant Chad Russell covers the current application threat landscape for modern d
Java Notes for Professionals
The Java Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow.
Unmanned Aircraft Systems in the Cyber Domain, 2nd Edition
Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This open book will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly eme
Introducing Istio Service Mesh for Microservices, 2nd Edition
Microservices fundamentally change the way you design enterprise software. By adding network dependencies to your application logic, you invite in a host of potential hazards that grow proportionally with the number of connections you make. With the updated edition of this practical ebook, application architects and development team leads will lear
High Performance Privacy Preserving AI
Artificial intelligence (AI) depends on data. In sensitive domains - such as healthcare, security, finance, and many more - there is therefore tension between unleashing the power of AI and maintaining the confidentiality and security of the relevant data. This book - intended for researchers in academia and R&D engineers in industry - explains how
Game Hacking Academy
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling o
Modern C, 3rd Edition
From code running on the smallest embedded devices to the low-level libraries behind popular programming languages like Python and Ruby, the software world depends on C. And even after 50 years, it's still getting better! The new C23 standard adds improvements for security, reliability, and performance. In this thoroughly-revised new edition, autho
Defend Dissent
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's use o