Someone Else's Debt: A Quantitative Framework for Cyber Diligence at Deal Speed by Yolonda Smith is a new release on Leanpub!
Link: https://leanpub.com/someone_elses_debt
#books #ebooks #newreleases #leanpublishing #selfpublishing #business_it_alignment #risk #computer_security
The Cybersecurity Advantage by Christophe Foulon is on sale on Leanpub! Its suggested price is $29.99; get it for $17.50 with this coupon:
https://leanpub.com/the-cybersecurity-advantage/c/LeanpubMonthlySale20260429 #startups #computer_security #leadership
The Cybersecurity Advantage
Transform your SMB’s cybersecurity from a cost center into a growth engine. Learn how fractional leadership builds trust, wins business, and scales your company.
JavaScript for hackers by Gareth Heyes is on sale on Leanpub! Its suggested price is $35.00; get it for $14.00 with this coupon:
https://leanpub.com/javascriptforhackers/c/LeanPublishingDaily20260430 #javascript #computer_security #computer_programming
JavaScript for hackers
Learn how to find interesting behaviour and flaws in JavaScript. Reading this book you will find the latest and greatest techniques for hacking JavaScript and g

Rust Programming MasterClass (Updated 2026)
Master Rust from core practice to 100+ recipes, plus network programming and automation for protocols, packet analysis, and ops-ready tooling.
How to Think Like a Security Researcher by Ilkay Adil is free with a Leanpub Reader membership! Or you can buy it for $1.99!
https://leanpub.com/security-researcher-mindset #computer_programming #computer_security
How to Think Like a Security Researcher
How to Think Like a Security Researcher by Ilkay Adil is free with a Leanpub Reader membership! Or you can buy it for $1.99!
https://leanpub.com/security-researcher-mindset #computer_programming #computer_security
How to Think Like a Security Researcher

Linux DevOps eBook Bundle
Welcome to this comprehensive collection of essential tech guides. Each book in this bundle serves as a stepping stone into the vast world of technology, from the foundational layers of Linux systems to the nuanced art of infrastructure management with Terraform. Whether you're a seasoned professional or a passionate enthusiast looking to expand your horizons, this bundle caters to your thirst for knowledge without overwhelming you. By selecting this bundle, you're not just acquiring texts; you're embarking on a journey. A journey that has been charted by someone who believes in the power of sharing knowledge, the importance of understanding core principles, and the joy of learning. Thank you for allowing these works to be a part of your educational journey. Dive in, explore, and let the world of technology unfold before you. Suggested order of reading the books would be: 1. Introduction to Linux: - Provides foundational knowledge on which many of the other topics will be built upon, especially for those who are new to the Linux environment. 2. Introduction to Bash Scripting: - After gaining familiarity with the Linux environment, users can delve into automating tasks within that environment using Bash scripting. 3. Introduction to Git and GitHub: - Version control is essential for any serious coding or infrastructure project. Knowing Git and GitHub early will be beneficial as the reader progresses to other topics. 4. Introduction to SQL: - Databases are ubiquitous in software and system design. SQL is foundational for understanding how to interact with relational databases. 5. Introduction to Docker: - With a foundation in Linux, scripting, version control, and databases, readers can move on to understanding containerization, a key concept in modern development and deployment practices. 6. Introduction to Terraform: - After grasping the basics of Docker, users can further their knowledge in infrastructure automation and Infrastructure as Code (IaC) with Terraform. If you're into DevOps, you'll love DevOps Daily: it has free bite-sized exercises, tools, and guides to level up fast.

Is Your Car a BYOD Risk? Researchers Demonstrate How
If an employee's phone connects to their car and then their corporate network, an attack against the car can reach the company.
Dark ReadingThinking about doing a #PoC of #E2E #encryption – sorry #Cat2Cat encryption. Leave a like there if there is interest for such a completely useless but secure messenger.
This project should show that #cats can carry messages in the #Neuland aka #internet.
#computer_security #privacy #ePrivacy #opensource

65% Of Employees Bypass Cybersecurity Measures, New Study Finds
More than half of workers surveyed say they've shared confidential data with external parties and bypassed other critical cyber protections. Here's what you need to know.
Forbes