Hacking Exposed: Network Security Secrets & Solutions (Second Edition)

فهرست مطالب کتاب Hacking Exposed: Network Security Secrets & Solutions (Second Edition):

Part 1: Casing the Establishment

Footprinting

Scanning

Enumeration

Part II: System Hacking

Hacking Windows 95/98 and ME

Hacking Windows NT

Hacking Windows 2000

Novell NetWare Hacking

Hacking UNIX

Part III: Network Hacking

Dial-Up, PBX, Voicemail, and VPN Hacking

Network Devices

Firewalls

Denial of Service (DoS) Attacks

Part IV: Software Hacking

Remote Control Insecurities

Advanced Techniques

Web Hacking

Hacking the Internet User

Part V: Appendixes

Ports

Top 14 Security Vulnerabilities

About the Companion Web Site

Index

Hacking with Python The Ultimate Beginners Guide

فهرست مطالب Hacking with Python The Ultimate Beginners Guide:

Chapter 1: Preparation For Hacking

Chapter 2: Python Basics

Chapter 3: Writing Python Programs

Chapter 5: Operators and Expressions

Chapter 6: Functions and Modules

Chapter 7: Setting Up for Hacking

Chapter 8: Network Hacking

Chapter 9: Hacks for the Web

Chapter 10: Understanding Attacks Using Python

Chapter 11: Other Nifty Hacks to Try

Conclusion

Bonus: Preview Of ‘Introduction to Python 3

IAPP CIPM Certified Information Privacy Manager Study Guide

فهرست مطالب کتاب IAPP CIPM Certified Information Privacy Manager Study Guide:

Introduction

Chapter 1: Developing a Privacy Program

Chapter 2: Privacy Program Framework

Chapter 3: Privacy Operational Life Cycle: Assess

Chapter 4: Privacy Operational Life Cycle: Protect

Chapter 5: Privacy Operational Life Cycle: Sustain

Chapter 6: Privacy Operational Life Cycle: Respond

Index

ICS-410-1 ICS Ovenriew

فهرست مطالب:

GICSP Overview

ICS Concepts

EXERCISE l.l: Learningfrom Peers

Purdue Levels 0 and I

ExERcısE l.2: Programming a PLC

Purdue Levels 2 and 3

scADA

ExERcısE l.3: Programmingan HMl

lT and ICS Differences

Physical and Cybersecurity

Secure ICS Network Architectures

EXERCISE 1.4: Architecting a Secure DCS

ICS-410-2: Field Devices and Controllers

فهرست مطالب:

ICS Attack Surhce

Purdue Level 0 and I Attacks

Control Things Platform

ExERcısE 2. l: Finding Passwords in EEPRoM Dumps

Level 0 and I Technologies

ExERcısE 2.2: Exploring Fieldbus Protocols

Purdue Level 0 and I Defenses

Ethernet and TCP/lP

ExERcısE 2.3: Network Capture Analysis

ICS Protocols overTCP/IP

Attack on Networks

ExERcısE 2’4: Enumerating ModbusTCP

ICS-410-3: Supervisory Systems

فهرست مطالب:

Enforcement Zone Devices

Understanding Basic Cryptography

WirelessTechnologies

Wireless Attacks and Defenses

ExERcısE 3.I: Network Forensics of an Attack

Purdue Level 2 and 3 Attacks

Historians and Databases

ExERcIsE 3.2ı BypassingAuthentication with SQL lnjection

HMI and UlAtocks

Password Defenses

ExERcısE 3.3: Password Fuzzing

ICS-410-4: Workstations and Servers

فهرست مطالب:

Patching ICS Systems

Defending Microsoft Windows

EXERCISE 4.1 : Baselining with PowerShell

Defending Unix and Linux

Endpoint Security Software

EXERC I SE 4.2: Configuring Host-Based Firewalls

Event Logging and Analysis

ExERcısE 4.3: Windows Event Logs

Honeypots

Attacks on the Perimeter

ExERcısE 4.4: Finding Remote Access

ICS-410-5 ICS Secutiy Governance

فهرست مطالب:

Building an ICS Cybersecurity Program

Creating ICS Cybersecurit Polic

Disaster Recovery

Measuring Cybersecurity Risk

lncident Response

EXERCISE 5. I : lncident ResponseTabletop Exercise

Final Thoughts and Next Steps

ICS515.1 Threat Intelligence

فهرست مطالب:

Day 1: Threat Intelligence

Day 2: Asset ID’ing and NSM

Day 3: Incident Response

Day 4: Threat and Environment Manipulation

Day 5: Under Attack!

ICS515.2 Asset Identification and Network Security Monitoring

فهرست مطالب:

Case Study: Havex

ICS Asset and Network Visibility

ICS Network Security Monitoring – Collection

ICS Network Security Monitoring – Detection

ICS Network Security Monitoring – Analysis

ICS515.3 Incident Response

فهرست مطالب:

Case Study: German Steelworks Attack

Incident Response and Digital Forensics Overview

Evidence Acquisition

Sources of Forensic Data in ICS Networks

Memory Forensics and Identifying Capabilities

Integrated Timely Analysis