Practical Foundations of Linux Debugging, Disassembly, Reversing by Dmitry Vostokov (2021)

Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers. [Read More]

Memory Dump Analysis Anthology by Dmitry Vostokov (2018)

This reference volume consists of revised, edited, cross-referenced, and thematically organized selected articles from Software Diagnostics Institute (DumpAnalysis.org + TraceAnalysis.org) and Software Diagnostics Library (former Crash Dump Analysis blog, DumpAnalysis.org/blog) about software diagnostics, root cause analysis, debugging, crash and hang dump analysis, software trace and log analysis written in June 2017 - November 2018 for software engineers developing and maintaining products on Windows platforms, quality assurance engineers testing software, technical support and escalation engineers dealing with complex software issues, security researchers, reverse engineers, malware and memory forensics analysts. [Read More]

Fundamentals of Trace and Log Analysis: A Pattern-Oriented Approach to Monitoring, Diagnostics, and Debugging by Dmitry Vostokov (2023)

This book will help you analyze traces and logs from different software environments and communicate analysis results using a pattern language that covers everything from a small debugging log to a distributed trace with billions of messages from hundreds of computers, thousands of software components, threads, and processes. [Read More]

Understanding phishing techniques by Administrator (2023)

Phishing remains a pervasive and adaptable threat in the cybersecurity landscape, continuously evolving to exploit vulnerabilities. Recognizing the various cyber techniques employed in phishing attacks is essential for individuals and organizations to bolster their defenses. [Read More]

Metasploit Penetration Testing Cookbook by Abhinav Singh (2012)

With over 70 recipes, this cookbook is designed to help both professional penetration testers and newcomers to the Metasploit framework enhance their expertise. The practical tasks and recipes cover a wide range of Metasploit aspects, progressing from the basics to more advanced topics. [Read More]

Cloud penetration testing for red teamers by Kim Crawley (2023)

“Cloud Penetration Testing for Red Teamers” by Kim Crawley is a must-read for cybersecurity professionals and red teamers seeking to deepen their knowledge and expertise in cloud penetration testing, with a specific focus on three major cloud platforms: Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP). [Read More]

Information security handbook by Daaren Death (2023)

This book is targeted at the information security professional looking to understand the critical success factors needed to build a successful business-aligned information security program. Additionally, this book is suited for anyone looking to understand the key aspects of an information security program and how they should be implemented within an organization. [Read More]