The Official CompTIA Security+ Study Guide (Exam SY0-601)
فهرست مطالب کتاب The Official CompTIA Security+ Study Guide (Exam SY0‑601):
Lesson 1: Comparing Security Roles and Security Controls
Lesson 2: Explaining Threat Actors and Threat Intelligence
Lesson 3: Performing Security Assessments
Lesson 4: Identifying Social Engineering and Malware
Lesson 5: Summarizing Basic Cryptographic Concepts
Lesson 6: Implementing Public Key Infrastructure
Lesson 7: Implementing Authentication Controls
Lesson 8: Implementing Identity and Account Management Controls
Lesson 9: Implementing Secure Network Designs
Lesson 10: Implementing Network Security Appliances
Lesson 11: Implementing Secure Network Protocols
Lesson 12: Implementing Host Security Solutions
Lesson 13: Implementing Secure Mobile Solutions
Lesson 14: Summarizing Secure Application Concepts
Lesson 15: Implementing Secure Cloud Solutions
Lesson 16: Explaining Data Privacy and Protection Concepts
Lesson 17: Performing Incident Response
Lesson 18: Explaining Digital Forensics
Lesson 19: Summarizing Risk Management Concepts
Lesson 20: Implementing Cybersecurity Resilience
Lesson 21: Explaining Physical Security
The Shellcoders Handbook: Discovering and Exploiting Security Holes (Second Edition)
فهرست مطالب کتاب The Shellcoders Handbook: Discovering and Exploiting Security Holes:
Part I: Introduction to Exploitation: Linux on x86
Chapter 1: Before You Begin
Chapter 2: Stack Overflows
Chapter 3: Shellcode
Chapter 4: Introduction to Format String Bugs
Chapter 5: Introduction to Heap Overflows
Part II: Other Platforms — Windows, Solaris, OS X, and Cisco
Chapter 6: The Wild World of Windows
Chapter 7: Windows Shellcode
Chapter 8: Windows Overflows
Chapter 9: Overcoming Filters
Chapter 10: Introduction to Solaris Exploitation
Chapter 11: Advanced Solaris Exploitation
Chapter 12: OS X Shellcode
Chapter 13: Cisco IOS Exploitation
Chapter 14: Protection Mechanisms
Part III: Vulnerability Discovery
Chapter 15: Establishing a Working Environment
Chapter 16: Fault Injection
Chapter 17: The Art of Fuzzing
Chapter 18: Source Code Auditing: Finding Vulnerabilities in C-Based Languages
Chapter 19: Instrumented Investigation: A Manual Approach
Chapter 20: Tracing for Vulnerabilities
Chapter 21: Binary Auditing: Hacking Closed Source Software
Part IV: Advanced Materials
Chapter 22: Alternative Payload Strategies
Chapter 23: Writing Exploits that Work in the Wild
Chapter 24: Attacking Database Software
Chapter 25: Unix Kernel Overflows
Chapter 26: Exploiting Unix Kernel Vulnerabilities
Chapter 27: Hacking the Windows Kernel
The Ultimate Kali Linux Book (Third Edition)
فهرست مطالب کتاب The Ultimate Kali Linux Book (Third Edition):
Chapter 1: Introduction to Ethical Hacking
Chapter 2: Building a Penetration Testing Lab
Chapter 3: Setting up for Advanced Penetration Testing Techniques
Chapter 4: Passive Reconnaissace
Chapter 5: Exploring Open Source Intelligence
Chapter 6: Active Reconnaissance
Chapter 7: Performing Vulnerability Assessments
Chapter 8: Understanding Network Penetration Testing
Chapter 9: Post Exploitation techniques
Chapter 10: Working with Active Directory attacks
Chapter 11: Advanced Active Directory attacks
Chapter 12: Delving into Command and Control tactics
Chapter 13: Advanced wireless penetration testing
Chapter 14: Exploring Social Engineering attacks
Chapter 15: Understanding Website Application security
Chapter 16: Advanced Website Penetration Testing Techniques
17. Chapter 17: Best Practices for the real world
The Ultimate Kali Linux Book, Second Edition
فهرست مطالب کتاب The Ultimate Kali Linux Book, Second Edition:
ندارد
The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition
فهرست مطالب کتاب The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition:
Introduction to Ethical Hacking
Building a Penetration Testing Lab
Setting up for Advanced Penetration Testing Techniques
Passive Reconnaissace
Exploring Open Source Intelligence
Active Reconnaissance
Performing Vulnerability Assessments
Understanding Network Penetration Testing
The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws
فهرست مطالب کتاب The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws:
Chapter 1 Web Application (In)security
Chapter 2 Core Defense Mechanisms
Chapter 3 Web Application Technologies
Chapter 4 Mapping the Application
Chapter 5 Bypassing Client-Side Controls
Chapter 6 Attacking Authentication
Chapter 7 Attacking Session Management
Chapter 8 Attacking Access Controls
Chapter 9 Injecting Code
Chapter 10 Exploiting Path Traversal
Chapter 11 Attacking Application Logic
Chapter 12 Attacking Other Users
Chapter 13 Automating Bespoke Attacks
Chapter 14 Exploiting Information Disclosure
Chapter 15 Attacking Compiled Applications
Chapter 16 Attacking Application Architecture
Chapter 17 Attacking the Web Server
Chapter 18 Finding Vulnerabilities in Source Code
Chapter 19 A Web Application Hacker’s Toolkit
Chapter 20 A Web Application Hacker’s Methodology
Unauthorised Access: Physical Penetration Testing for IT Security Teams
فهرست مطالب کتاب Unauthorised Access: Physical Penetration Testing for IT Security Teams:
Preface
Acknowledgements
Foreword
1 The Basics of Physical Penetration Testing
2 Planning Your Physical Penetration Tests 11
3 Executing Tests 29
4 An Introduction to Social Engineering
5 Lock Picking 67
6 Information Gathering 89
7 Hacking Wireless Equipment 121
8 Gathering the Right Equipment 155
9 Tales from the Front Line 177
10 Introducing Security Policy Concepts 207
11 Counter Intelligence 229
Appendix A: UK Law 249
Appendix B: US Law 255
Appendix C: EU Law 261
Appendix D: Security Clearances 265
Appendix E: Security Accreditations 271
Index
Viruses Revealed
فهرست مطالب کتاب Viruses Revealed:
The Problem
Baseline Definitions
Historical Overview
Malware Defined
Virus Activity and Operation
Virus Mechanisms
System Solutions
Anti-Malware Technology Overview
Malware Management
Information Gathering
Product Evaluation and Testing
Risk and Incident Management
User Management
Case Studies: What Went Wrong, What Went Right, What Can We Learn?
Case Studies: The First Wave
Case Studies: The Second Wave
Case Studies: Turning the Worm (the Third Wave)
Social Aspects
Virus Origin and Distribution
Metaviruses, Hoaxes, and Related Nuisances
Legal and Quasilegal Imperatives
Responsibility, Morality, and Ethics
Wrap Up
Appendixes
Frequently Asked Questions on VIRUS-L/comp.virus
Viruses and the Macintosh
Social Engineering
Glossary
Index
Web Applications and Data Servers
فهرست مطالب کتاب Web Applications and Data Servers:
Part I: Introduction to Computer Network Security
Computer Network Fundamentals
Computer Network Security Fundamentals
Part II: Security Issues and Challenges in the Traditional Computer Network
Security Motives and Threats to Computer Networks
Introduction to Computer Network Vulnerabilities
Cyber Crimes and Hackers
Scripting and Security in Computer Networks and Web Browsers
Security Assessment, Analysis, and Assurance
Part III: Dealing with Computer Network Security Challenges
Disaster Management
Access Control and Authorization
Authentication
Cryptography
Part III: Dealing with Computer Network Security Challenges
Firewalls
System Intrusion Detection and Prevention
Computer and Network Forensics
Virus and Content Filtering
Standardization and Security Criteria: Security Evaluation of Computer Products
Computer Network Security Protocols
Security in Wireless Networks and Devices
Security in Sensor Networks
Other Efforts to Secure Data in Computer Networks
Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems
Cloud Computing and Related Security Issues
Virtualization Security
Mobile Systems and Corresponding Intractable Security Issues
Part V: Securing the Last Frontiers – The Home Front
Conquering the Last Frontier in the Digital Invasion: The Home Front
Part VI: Hands-on Projects
Projects
Windows Forensic Analysis DVD Toolkit
فهرست مطالب کتاب Windows Forensic Analysis DVD Toolkit:
Preface
Chapter 1 Live Response: Collecting Volatile Data
Chapter 2 Live Response: Data Analysis
Chapter 3 Windows Memory Analysis
Chapter 4 Registry Analysis
Chapter 5 File Analysis
Chapter 6 Executable File Analysis
Chapter 7 Rootkits and Rootkit Detection
Index
Windows Security Internals with PowerShell
فهرست مطالب کتاب Windows Security Internals with PowerShell:
Introduction
Chapter 1: Setting Up a PowerShell Testing Environment
PART I: An Overview of the Windows Operating System
Chapter 2: The Windows Kernel
Chapter 3: User-Mode Applications
PART II: The Windows Security Reference Monitor
Chapter 4: Security Access Tokens
Chapter 5: Security Descriptors
Chapter 6: Reading and Assigning Security Descriptors
Chapter 7: Access Checking
Chapter 8: Other Access Checking Use Cases
Chapter 9: Security Auditing
PART III: The Local Security Authority and Authentication
Chapter 10: Local Authentication
Chapter 11: Active Directory
Chapter 12: Interactive Authentication
Chapter 13: Network Authentication
Chapter 14: Kerberos Authentication
Chapter 15: Negotiate Authentication and Other Security Packages
Appendix A: Building a Windows Domain Network for Testing
Appendix B: SDDL SID Constants
Wireless Network Security
فهرست مطالب کتاب Wireless Network Security:
Preface
Part I: Security in General Wireless/Mobile Networks
Chapter 1: High Performance Elliptic Curve Cryptographic Co-processor
Chapter 2: An Adaptive Encryption Protocol in Mobile Computing
Part II: Security in Ad Hoc Network
Chapter 3: Pre-Authentication and Authentication Models in Ad Hoc Networks
Chapter 4: Promoting Identity-Based Key Management in Wireless Ad Hoc Networks
Chapter 5: A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks
Chapter 6: Secure Routing in Wireless Ad-Hoc Networks
Chapter 7: A Survey on Intrusion Detection in Mobile Ad Hoc Networks
Part III: Security in Mobile Cellular Networks
Chapter 8: Intrusion Detection in Cellular Mobile Networks
Chapter 9: The Spread of Epidemics on Smartphones
Part IV: Security in Wireless LANs
Chapter 10: Cross-Domain Mobility-Adaptive Authentication
Chapter 11: AAA Architecture and Authentication for Wireless LAN Roaming
Chapter 12: An Experimental Study on Security Protocols in WLANs
Part V: Security in Sensor Networks
Chapter 13: Security Issues in Wireless Sensor Networks used in Clinical Information Systems
Chapter 14: Key Management Schemes in Sensor Networks
Chapter 15: Secure Routing in Ad Hoc and Sensor Networks
About the Editors
Index