31 Days Before Your CCNA 200-301 Exam
فهرست مطالب:
Introduction
Day 31: Networking Models, Devices, and Components
Day 30: Ethernet Switching
Day 29: Switch Configuration Basics
Day 28: IPv4 Addressing
Day 27: IPv6 Addressing
Day 26: VLAN and Trunking Concepts and Configurations
Day 25: STP
Day 24: EtherChannel and HSRP
Day 23: DHCP and DNS
Day 22: Wireless Concepts
Day 21: WLAN Configuration
Day 20: LAN Security and Device Hardening
Day 19: Basic Routing Concepts
Day 18: Basic Router Configuration
Day 17: The Routing Table
Day 16: Inter-VLAN Routing
Day 15: Static and Default Route Configuration
Day 14: OSPF Operation
Day 13: Single-Area OSPF Implementation
Day 12: Fine-Tuning and Troubleshooting OSPF
Day 11: Network Security Concepts
Day 10: ACL Concepts
Day 9: ACL Implementation
Day 8: NAT
Day 7: WAN, VPN, and IPsec
Day 6: QoS
Day 5: CDP and LLDP
Day 4: Device Monitoring, Management, and Maintenance
Day 3: Cloud, Virtualization, and SDN
Day 2: SDA and Cisco DNA Center
Day 1: Network Automation
Exam Day
Post-Exam Information
CCNA Countdown Calendar (tear card content)
Exam Checklist (tear card content)
31 Days Before Your CCNA Routing & Switching Exam
فهرست مطالب:
Introduction
Digital Study Guide
Day 31: Networking Models, Devices, and Components
Day 30: Ethernet Switching
Day 29: Switch Configuration Basics
Day 28: VLAN and Trunking Concepts and Configurations
Day 27: IPv4 Addressing
Day 26: IPv6 Addressing
Day 25: Basic Routing Concepts
Day 24: Basic Router Configuration
Day 23: Static and Default Route Configuration
Day 22: RIPv2 Implementation
Day 21: VTP and Inter-VLAN Routing Configuration
Day 20: OSPF Operation
Day 19: Single-Area OSPF Implementation
Day 18: Multiarea OSPF Implementation
Day 17: Fine-Tuning and Troubleshooting OSPF
Day 16: EIGRP Operation
Day 15: EIGRP Implementation
Day 14: Fine-Tuning and Troubleshooting EIGRP
Day 13: CDP and LLDP
Day 12: LAN Security and Device Hardening
Day 11: STP
viii 31 Days Before Your CCNA Routing & Switching Exam
Day 10: EtherChannel and HSRP
Day 9: ACL Concepts
Day 8: ACL Implementation
Day 7: DHCP and DNS
Day 6: NAT
Day 5: WAN Overview
Day 4: WAN Implementation
Day 3: QoS, Cloud, and SDN
Day 2: Device Monitoring, Management, and Maintenance
Day 1: Troubleshooting Methodologies and Tools
Exam Day
Post-Exam Information
Index
51 Tips for Social Selling on LinkedIn and Beyond
فهرست مطالب:
Introduction to Social Selling
Social Selling Tips to Drive Sales for Your Business
LinkedIn Spotlight: Top Tips to Drive Sales on the #1 Social Selling Platform
The Power of Your Social Selling Index Score
Tips for Using Sales Navigator
Instagram: Not Just a Personal Social Platform
Taking Your Social Selling Efforts to TikTok
Conclusion
Active Directory Administration Cookbook
فهرست مطالب:
Preface
Chapter 2: Managing Domain Controllers
Chapter 3: Managing Active Directory Roles and Features
Chapter 4: Managing Containers and Organizational Units
Chapter 5: Managing Active Directory Sites and Troubleshooting Replication
Chapter 6: Managing Active Directory Users
Chapter 8: Managing Active Directory Computers
Chapter 9: Getting the Most Out of Group Policy
Chapter 10: Securing Active Directory
Chapter 11: Managing Federation
Chapter 12: Handling Authentication in a Hybrid World (AD FS, PHS, PTA, and 3SO)
Chapter 13: Handling Synchronization in a Hybrid World (Azure AD Connect)
Chapter 14: Hardening Azure AD
Other Books You May Enjoy
Index
Active Directory Administration Cookbook (Second Edition)
فهرست مطالب:
Preface
1 Optimizing Forests, Domains, and Trusts
2 Managing Domain Controllers
3 Managing Active Directory Roles and Features
4 Managing Containers and Organizational Units
5 Managing Active Directory Sites and Troubleshooting Replication
6 Managing Active Directory Users
7 Managing Active Directory Groups
8 Managing Active Directory Computers
9 Managing DNS
10 Getting the Most Out of Group Policy
11 Securing Active Directory
12 Managing Certificates
13 Managing Federation
14 Handling Authentication in a Hybrid World (AD FS, PHS, PTA, and DSSO)
15 Handling Synchronization in a Hybrid World (Azure AD Connect)
16 Hardening Azure AD
Index
AlmaLinux 9 Essentials
فهرست مطالب:
Introduction
A Brief History of AlmaLinux
Installing AlmaLinux 9 on a Clean Disk Drive
Dual Booting AlmaLinux 9 with Windows
Allocating Windows Disk Partitions to AlmaLinux 9
A Guided Tour of the GNOME 40 Desktop
An Overview of the Cockpit Web Interface
Using the Bash Shell on AlmaLinux 9
Managing AlmaLinux 9 Users and Groups
AlmaLinux 9 Software Installation and AppStreams
Managing AlmaLinux 9 systemd Units
AlmaLinux 9 Network Management
AlmaLinux 9 Firewall Basics
AlmaLinux 9 Firewall Configuration with firewalld
Configuring SSH Key-based Authentication on AlmaLinux 9
AlmaLinux 9 Remote Desktop Access with VNC
Displaying AlmaLinux 9 Applications Remotely (X11 Forwarding)
Using NFS on AlmaLinux 9 to Share Files with Remote Systems
Sharing Files between AlmaLinux 9 and Windows with Samba
An Overview of Virtualization Techniques
Installing KVM Virtualization on Creating KVM Virtual Machines on AlmaLinux 9 using Cockpit AlmaLinux 9
Creating KVM Virtual Machines on AlmaLinux 9 using virt-manager
Creating KVM Virtual Machines with virt-install and virsh
Creating an AlmaLinux 9 KVM Networked Bridge Interface
Managing KVM using the virsh Command-Line Tool
An Introduction to Linux Containers
Working with Containers on AlmaLinux 9
Setting Up an AlmaLinux 9 Web Server
Configuring an AlmaLinux 9 Postfix Email Server
Adding a New Disk Drive to an AlmaLinux 9 System
Adding a New Disk to an AlmaLinux 9 Volume Group and Logical Volume
Adding and Managing AlmaLinux 9 Swap Space
AlmaLinux 9 System and Process Monitoring
Index
Attacking and Exploiting Modern Web Applications: Discover the Mindset, Techniques, and Tools to Perform Modern Web Attacks and Exploitation
فهرست مطالب:
Part 1: Attack Preparation
Mindset and Methodologies
Toolset for Web Attacks and Exploitation
Part 2: Evergreen Attacks
Attacking the Authentication Layer – a SAML Use Case
Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress
Attacking IoT Devices – Command Injection and Path Traversal
Part 3: Novel Attacks
Attacking Electron JavaScript Applications – from CrossSite Scripting (XSS) to Remote Command Execution (RCE)
Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic
Continuing the Journey of Vulnerability Discovery
Index
Beginning DAX with Power BI: The SQL Pro’s Guide to Better Business Intelligence
فهرست مطالب:
About the Author
About the Technical Reviewer
Foreword
Acknowledgments
CHAPTER 1 Introduction to DAX
CHAPTER 2 Variables
CHAPTER 3 Context
CHAPTER 4 Summarizing and Aggregating
CHAPTER 5 Joins
CHAPTER 6 Filtering
CHAPTER 8 Debugging and Optimizing
CHAPTER 9 Practical DAX
Index
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
فهرست مطالب:
About the Author
About the Technical Reviewer
Acknowledgments
Introduction
Chapter 1: Security Trends
Chapter 2: Setting Up a Penetration Testing and Network Security Lab
Chapter 3: Elementary Linux Commands
Chapter 4: Know Your Network
Chapter 5: How to Build a Kali Web Server
Chapter 6: Kali Linux from the Inside Out
Chapter 7: Kali Linux and Python
Chapter 8: Information Gathering
Chapter 9: SQL Mapping
Chapter 10: Vulnerability Analysis
Chapter 11: Information Assurance Model
Chapter 12: Introducing Metasploit in Kali Linux
Chapter 13: Hashes and Passwords
Chapter 14: Classic and Modern Encryption
Chapter 15: Exploiting Targets
Index
Beginning Python: From Novice to Professional – Third Edition
فهرست مطالب:
About the Author
About the Technical Reviewer
Preface
Introduction
Chapter 1: Instant Hacking: The Basics
Chapter 2: Lists and Tuples
Chapter 3: Working with Strings
Chapter 4: Dictionaries: When Indices Won’t Do
Chapter 5: Conditionals, Loops, and Some Other Statements
Chapter 6: Abstraction
Chapter 7: More Abstraction
Chapter 8: Exceptions
Chapter 9: Magic Methods, Properties, and Iterators
Chapter 10: Batteries Included
Chapter 11: Files and Stuff
Chapter 12: Graphical User Interfaces
Chapter 13: Database Support
Chapter 14: Network Programming
Chapter 15: Python and the Web
Chapter 16: Testing, 1-2-3
Chapter 17: Extending Python
Chapter 18: Packaging Your Programs
Chapter 19: Playful Programming
Chapter 20: Project 1: Instant Markup
Chapter 21: Project 2: Painting a Pretty Picture
Chapter 22: Project 3: XML for All Occasions
Chapter 23: Project 4: In the News
Chapter 24: Project 5: A Virtual Tea Party
Chapter 25: Project 6: Remote Editing with CGI
Chapter 26: Project 7: Your Own Bulletin Board
Chapter 27: Project 8: File Sharing with XML-RPC
Chapter 28: Project 9: File Sharing II—Now with GUI!
Chapter 29: Project 10: Do-It-Yourself Arcade Game
Appendix A: The Short Version
Appendix B: Python Reference
Index
Black Hat Bash: Bash Scripting for Hackers and Pentesters
فهرست مطالب:
Chapter 1: Bash Basics
Chapter 2: Advanced Bash Concepts
Chapter 3: Setting Up a Hacking Lab
Chapter 4: Reconnaissance
Chapter 5: Vulnerability Scanning and Fuzzing
Chapter 6: Gaining a Web Shell
Chapter 7: Reverse Shells
Chapter 8: Local Information Gathering
Chapter 9: Privilege Escalation
Chapter 10: Persistence
Chapter 11: Network Probing and Lateral Movement
Chapter 12: Defense Evasion
Chapter 13: Exfiltration and Counter-Forensics