Marketing image for the Ultimate Cybersecurity Career by Packt book bundle, which shows a sampling of book covers included in the bundle.

Humble Book Bundle: Ultimate Cybersecurity Career by Packt

About the Bundle This bundle includes the following books: Microsoft Defender for Identity in Depth: An exhaustive guide to ITDR, breach prevention, and cyberattack response by Pierre Thoor Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats , Second Edition by David Álvarez Pérez, Ravikant Tiwari AWS Certified Security - Specialty (SCS-C02) Exam Guide - Second Edition by Adam Book, Stuart Scott Practical Cybersecurity Architecture : A guide to creating and implementing robust designs for cybersecurity architects by Ed Moyle, Diana Kelley Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs by Mostafa Yahia Enhancing Your Cloud Security with a CNAPP Solution: Unlock the full potential of Microsoft Defender for Cloud to fortify your cloud security by Yuri Diogenes The OSINT Handbook: A practical guide to gathering and analyzing online information by Dale Meredith Zero Trust Overview and Playbook Introduction: Guidance for business, security, and technology leaders and practitioners by Mark Simos, Nikhil Kumar Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional’s guide to AI attacks, threat modeling, and securing AI with MLSecOps by John Sotiropoulos Incident Response for Windows: Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems by Tykushin, Ostrovskaya Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career by Kenneth Underhill, Christophe Foulon, Tia Hopkins Pentesting Active Directory and Windows-based Infrastructure: A comprehensive practical guide to penetration testing Microsoft infrastructure by Denis Isakov Python for Security and Networking: Leverage Python modules and tools in securing your network and applications , Third Edition by José Manuel Ortega CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual 2019 to help you audit, monitor, and assess information systems by Hemang Doshi Mastering Microsoft 365 Defender: Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats by Ru Campbell, Hedberg Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption by Massimo Bertaccini Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code by Dennis Chow PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers by Miriam C. Wiesner The Ultimate Kali Linux Book: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire , Second Edition by Glen D. Singh Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh by Rajneesh Gupta Resilient Cybersecurity: Reconstruct your defense strategy in an evolving cyber world by Mark Dunkerley My approach I had a good conversation with ChatGPT gpt-4o about this bundle and how I could think about what’s important to read given my role and responsibilities. Here’s the most salient excerpt from its assessment: ...

GoToSocial mascot: a happy cartoon sloth

GoToSocial on a Raspberry Pi Zero 2 W: Will it work?

I didn’t keep good notes as I went, honestly. I did a first pass on this “shooting from the hip” a bit to just see if I could get it to work. Instead of using Docker-CE, I used podman which created a little bit more work (not much at all really). Ultimately the service did start up, did run. It was even usable until the moment it started federating. As soon as I started following external accounts from the instance, and the federated traffic started coming in, I could see that the system was hitting high loadavg numbers (like in excess of 5.0). But the CPU cores still had plenty of idle capacity. ...

Gotify logo. A cartoon gopher running while carrying a postal envelope.

Self-Hosting Gotify with Docker

Introduction Gotify is a lightweight, self-hosted notification service designed for ease of use and minimal resource consumption. In this guide, we’ll walk through setting up Gotify with Docker, using PostgreSQL as the database backend. Prerequisites A server with Docker and Docker Compose installed Basic familiarity with command-line operations A reverse proxy setup (e.g., Nginx, Caddy, or Traefik) if you want to secure access Step 1: Prepare the Environment Variables Create a .env file in your project directory to store environment variables: ...

marketing image for Humble Tech Book Bundle: Linux from Beginner to Professional by O'Reilly

Humble Tech Book Bundle: Linux from Beginner to Professional by O'Reilly

About the Bundle This bundle includes the following books: Learning Git: A Hands-On and Visual Guide to the Basics of Git by Anna Skoulikari Efficient Linux at the Command Line by Daniel J. Barrett Web Application Security: Exploitation and Countermeasures for Modern Web Applications by Andrew Hoffman Network Programmability and Automation: Skills for the Next-Generation Network Engineer by Matt Oswalt, Christian Adell, Scott Lowe, Jason Edelman Python for Devops: Learn Ruthlessly Effective Automation by Noah Gift, Kennedy Behrman, Alfredo Deza, Robert Jordan, Grig Gheorghiu Terraform: Up and Running, 3rd Edition by Yevgeniy Brikman Docker: Up & Running: Shipping Reliable Containers in Production by Karl Matthias, Sean P. Kane Kubernetes: Up & Running by Kelsey Hightower, Brendan Burns, Joe Beda Practical Linux System Administration: A Guide to Installation, Configuration, and Management by Ken Hess Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way by Lorin Hochstein Linux Pocket Guide by Daniel J. Barrett Learning DevSecOps: A Practical Guide to Processes and Tools by Steve Suehring Learning Modern Linux: A Handbook for the Cloud Native Practitioner by Michael Hausenblas FastAPI: Modern Python Web Development by Bill Lubanovic

Uptime Kuma logo

Deploying Uptime Kuma with Docker

Uptime Kuma is a sleek and powerful uptime monitoring tool designed for self-hosters. In this guide, I’ll show you how to deploy Uptime Kuma using Docker and Docker Compose. Prerequisites Before diving in, ensure you have the following: Docker and Docker Compose installed on your system. Familiarity with creating and editing files in a terminal. A reverse proxy (e.g., Traefik or Nginx Proxy Manager) if you plan to make the service available externally. Docker Compose Configuration Here’s the docker-compose.yml file you can use to deploy Uptime Kuma: ...

ActivePieces logo

Deploying ActivePieces with Docker Compose

Introduction ActivePieces is a powerful automation tool that can be deployed using Docker Compose. In this guide, I’ll walk through my custom deployment configuration and provide helpful notes for setup, troubleshooting, and future improvements. This guide assumes you are experienced with Docker troubleshooting and have a preferred reverse proxy setup. Configuring the reverse proxy is beyond the scope of this article. I personally use and endorse Traefik. Docker Compose Configuration Here is the docker-compose.yml file I use to deploy ActivePieces: ...

Bookstack logo

Bookstack notes

References Bookstack home page Bookstack source Bookstack Codeberg

Forgejo logo

forgejo

References Forgejo homepage Forgejo source Codeberg - Flagship implementation of Forgejo for public use.

Huginn project logo. It's a raven with a headset on. Text next to it reads Huginn: Your agents are standing by

How to Set Up Huginn with MariaDB on Docker

How to Set Up Huginn with MariaDB on Docker In this guide, we’ll walk through the process of setting up Huginn, a powerful open-source system for automating tasks and managing workflows, using Docker. We’ll use MariaDB as the backend database and go over how to configure it with simple environment variables. Prerequisites Before we start, you’ll need: Docker and Docker Compose installed on your server. A basic understanding of Docker Compose and containerized applications. A server or machine running a Linux or macOS-based operating system. If you’re on macOS, you will need to install the uuid command line tool through Homebrew. You can do so with the following command: ...

n8n logo on a background of concentric rings

n8n

n8n is not Open Source; it is what they call “Source Available” and is not an OSI approved license. Background Resources Upstream n8n main site n8n GitHub