The Ultimate Kali Linux Book, Second Edition
فهرست مطالب کتاب The Ultimate Kali Linux Book, Second Edition:
ندارد
The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition
فهرست مطالب کتاب The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition:
Introduction to Ethical Hacking
Building a Penetration Testing Lab
Setting up for Advanced Penetration Testing Techniques
Passive Reconnaissace
Exploring Open Source Intelligence
Active Reconnaissance
Performing Vulnerability Assessments
Understanding Network Penetration Testing
The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws
فهرست مطالب کتاب The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws:
Chapter 1 Web Application (In)security
Chapter 2 Core Defense Mechanisms
Chapter 3 Web Application Technologies
Chapter 4 Mapping the Application
Chapter 5 Bypassing Client-Side Controls
Chapter 6 Attacking Authentication
Chapter 7 Attacking Session Management
Chapter 8 Attacking Access Controls
Chapter 9 Injecting Code
Chapter 10 Exploiting Path Traversal
Chapter 11 Attacking Application Logic
Chapter 12 Attacking Other Users
Chapter 13 Automating Bespoke Attacks
Chapter 14 Exploiting Information Disclosure
Chapter 15 Attacking Compiled Applications
Chapter 16 Attacking Application Architecture
Chapter 17 Attacking the Web Server
Chapter 18 Finding Vulnerabilities in Source Code
Chapter 19 A Web Application Hacker’s Toolkit
Chapter 20 A Web Application Hacker’s Methodology
Web Applications and Data Servers
فهرست مطالب کتاب Web Applications and Data Servers:
Part I: Introduction to Computer Network Security
Computer Network Fundamentals
Computer Network Security Fundamentals
Part II: Security Issues and Challenges in the Traditional Computer Network
Security Motives and Threats to Computer Networks
Introduction to Computer Network Vulnerabilities
Cyber Crimes and Hackers
Scripting and Security in Computer Networks and Web Browsers
Security Assessment, Analysis, and Assurance
Part III: Dealing with Computer Network Security Challenges
Disaster Management
Access Control and Authorization
Authentication
Cryptography
Part III: Dealing with Computer Network Security Challenges
Firewalls
System Intrusion Detection and Prevention
Computer and Network Forensics
Virus and Content Filtering
Standardization and Security Criteria: Security Evaluation of Computer Products
Computer Network Security Protocols
Security in Wireless Networks and Devices
Security in Sensor Networks
Other Efforts to Secure Data in Computer Networks
Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems
Cloud Computing and Related Security Issues
Virtualization Security
Mobile Systems and Corresponding Intractable Security Issues
Part V: Securing the Last Frontiers – The Home Front
Conquering the Last Frontier in the Digital Invasion: The Home Front
Part VI: Hands-on Projects
Projects
Windows Security Internals with PowerShell
فهرست مطالب کتاب Windows Security Internals with PowerShell:
Introduction
Chapter 1: Setting Up a PowerShell Testing Environment
PART I: An Overview of the Windows Operating System
Chapter 2: The Windows Kernel
Chapter 3: User-Mode Applications
PART II: The Windows Security Reference Monitor
Chapter 4: Security Access Tokens
Chapter 5: Security Descriptors
Chapter 6: Reading and Assigning Security Descriptors
Chapter 7: Access Checking
Chapter 8: Other Access Checking Use Cases
Chapter 9: Security Auditing
PART III: The Local Security Authority and Authentication
Chapter 10: Local Authentication
Chapter 11: Active Directory
Chapter 12: Interactive Authentication
Chapter 13: Network Authentication
Chapter 14: Kerberos Authentication
Chapter 15: Negotiate Authentication and Other Security Packages
Appendix A: Building a Windows Domain Network for Testing
Appendix B: SDDL SID Constants
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
فهرست مطالب کتاب Wireshark for Security Professionals:
Chapter1: Introducing Wireshark
Chapter 2: Setting Up the Lab
Chapter 3: The Fundamentals
Chapter 4: Capturing Packets
Chapter 5: Diagnosing Attacks
Chapter 6: Offensive Wireshark
Chapter 7: Decrypting TLS, Capturing USB, Keyloggers, and Network
Chapter 8: Scripting with Lua
Zero Trust Architecture – Cisco Press
فهرست مطالب کتاب Zero Trust Architecture – Cisco Press:
Preface
Introduction
Chapter 1 Overview of Zero Trust (ZT)
Chapter 2 Zero Trust Capabilities
Chapter 3 Zero Trust Reference Architecture
Chapter 4 Zero Trust Enclave Design
Chapter 5 Enclave Exploration and Consideration
Chapter 6 Segmentation
Chapter 7 Zero Trust Common Challenges
Chapter 8 Developing a Successful Segmentation Plan
Chapter 9 Zero Trust Enforcement
Chapter 10 Zero Trust Operations
Chapter 11 Conclusion
Appendix A Applied Use Case for Zero Trust Principles
Index