The Official CompTIA Security+ Study Guide (Exam SY0-601)

فهرست مطالب کتاب The Official CompTIA Security+ Study Guide (Exam SY0601):

Lesson 1: Comparing Security Roles and Security Controls

Lesson 2: Explaining Threat Actors and Threat Intelligence

Lesson 3: Performing Security Assessments

Lesson 4: Identifying Social Engineering and Malware

Lesson 5: Summarizing Basic Cryptographic Concepts

Lesson 6: Implementing Public Key Infrastructure

Lesson 7: Implementing Authentication Controls

Lesson 8: Implementing Identity and Account Management Controls

Lesson 9: Implementing Secure Network Designs

Lesson 10: Implementing Network Security Appliances

Lesson 11: Implementing Secure Network Protocols

Lesson 12: Implementing Host Security Solutions

Lesson 13: Implementing Secure Mobile Solutions

Lesson 14: Summarizing Secure Application Concepts

Lesson 15: Implementing Secure Cloud Solutions

Lesson 16: Explaining Data Privacy and Protection Concepts

Lesson 17: Performing Incident Response

Lesson 18: Explaining Digital Forensics

Lesson 19: Summarizing Risk Management Concepts

Lesson 20: Implementing Cybersecurity Resilience

Lesson 21: Explaining Physical Security

The Shellcoders Handbook: Discovering and Exploiting Security Holes (Second Edition)

فهرست مطالب کتاب The Shellcoders Handbook: Discovering and Exploiting Security Holes:

Part I: Introduction to Exploitation: Linux on x86

Chapter 1: Before You Begin

Chapter 2: Stack Overflows

Chapter 3: Shellcode

Chapter 4: Introduction to Format String Bugs

Chapter 5: Introduction to Heap Overflows

Part II: Other Platforms — Windows, Solaris, OS X, and Cisco

Chapter 6: The Wild World of Windows

Chapter 7: Windows Shellcode

Chapter 8: Windows Overflows

Chapter 9: Overcoming Filters

Chapter 10: Introduction to Solaris Exploitation

Chapter 11: Advanced Solaris Exploitation

Chapter 12: OS X Shellcode

Chapter 13: Cisco IOS Exploitation

Chapter 14: Protection Mechanisms

Part III: Vulnerability Discovery

Chapter 15: Establishing a Working Environment

Chapter 16: Fault Injection

Chapter 17: The Art of Fuzzing

Chapter 18: Source Code Auditing: Finding Vulnerabilities in C-Based Languages

Chapter 19: Instrumented Investigation: A Manual Approach

Chapter 20: Tracing for Vulnerabilities

Chapter 21: Binary Auditing: Hacking Closed Source Software

Part IV: Advanced Materials

Chapter 22: Alternative Payload Strategies

Chapter 23: Writing Exploits that Work in the Wild

Chapter 24: Attacking Database Software

Chapter 25: Unix Kernel Overflows

Chapter 26: Exploiting Unix Kernel Vulnerabilities

Chapter 27: Hacking the Windows Kernel

The Ultimate Kali Linux Book (Third Edition)

فهرست مطالب کتاب The Ultimate Kali Linux Book (Third Edition): 

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Building a Penetration Testing Lab

Chapter 3: Setting up for Advanced Penetration Testing Techniques

Chapter 4: Passive Reconnaissace

Chapter 5: Exploring Open Source Intelligence

Chapter 6: Active Reconnaissance

Chapter 7: Performing Vulnerability Assessments

Chapter 8: Understanding Network Penetration Testing

Chapter 9: Post Exploitation techniques

Chapter 10: Working with Active Directory attacks

Chapter 11: Advanced Active Directory attacks

Chapter 12: Delving into Command and Control tactics

Chapter 13: Advanced wireless penetration testing

Chapter 14: Exploring Social Engineering attacks

Chapter 15: Understanding Website Application security

Chapter 16: Advanced Website Penetration Testing Techniques

17. Chapter 17: Best Practices for the real world

The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition

فهرست مطالب کتاب The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition:

Introduction to Ethical Hacking

Building a Penetration Testing Lab

Setting up for Advanced Penetration Testing Techniques

Passive Reconnaissace

Exploring Open Source Intelligence

Active Reconnaissance

Performing Vulnerability Assessments

Understanding Network Penetration Testing

The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws

فهرست مطالب کتاب The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws:

Chapter 1 Web Application (In)security

Chapter 2 Core Defense Mechanisms

Chapter 3 Web Application Technologies

Chapter 4 Mapping the Application

Chapter 5 Bypassing Client-Side Controls

Chapter 6 Attacking Authentication

Chapter 7 Attacking Session Management

Chapter 8 Attacking Access Controls

Chapter 9 Injecting Code

Chapter 10 Exploiting Path Traversal

Chapter 11 Attacking Application Logic

Chapter 12 Attacking Other Users

Chapter 13 Automating Bespoke Attacks

Chapter 14 Exploiting Information Disclosure

Chapter 15 Attacking Compiled Applications

Chapter 16 Attacking Application Architecture

Chapter 17 Attacking the Web Server

Chapter 18 Finding Vulnerabilities in Source Code

Chapter 19 A Web Application Hacker’s Toolkit

Chapter 20 A Web Application Hacker’s Methodology

Unauthorised Access: Physical Penetration Testing for IT Security Teams

فهرست مطالب کتاب Unauthorised Access: Physical Penetration Testing for IT Security Teams:

Preface

Acknowledgements

Foreword

1 The Basics of Physical Penetration Testing

2 Planning Your Physical Penetration Tests 11

3 Executing Tests 29

4 An Introduction to Social Engineering

5 Lock Picking 67

6 Information Gathering 89

7 Hacking Wireless Equipment 121

8 Gathering the Right Equipment 155

9 Tales from the Front Line 177

10 Introducing Security Policy Concepts 207

11 Counter Intelligence 229

Appendix A: UK Law 249

Appendix B: US Law 255

Appendix C: EU Law 261

Appendix D: Security Clearances 265

Appendix E: Security Accreditations 271

Index

Viruses Revealed

فهرست مطالب کتاب Viruses Revealed:

The Problem

Baseline Definitions

Historical Overview

Malware Defined

Virus Activity and Operation

Virus Mechanisms

System Solutions

Anti-Malware Technology Overview

Malware Management

Information Gathering

Product Evaluation and Testing

Risk and Incident Management

User Management

Case Studies: What Went Wrong, What Went Right, What Can We Learn?

Case Studies: The First Wave

Case Studies: The Second Wave

Case Studies: Turning the Worm (the Third Wave)

Social Aspects

Virus Origin and Distribution

Metaviruses, Hoaxes, and Related Nuisances

Legal and Quasilegal Imperatives

Responsibility, Morality, and Ethics

Wrap Up

Appendixes

Frequently Asked Questions on VIRUS-L/comp.virus

Viruses and the Macintosh

Social Engineering

Glossary

Index

Web Applications and Data Servers

فهرست مطالب کتاب Web Applications and Data Servers:

Part I: Introduction to Computer Network Security

Computer Network Fundamentals

Computer Network Security Fundamentals

Part II: Security Issues and Challenges in the Traditional Computer Network

Security Motives and Threats to Computer Networks

Introduction to Computer Network Vulnerabilities

Cyber Crimes and Hackers

Scripting and Security in Computer Networks and Web Browsers

Security Assessment, Analysis, and Assurance

Part III: Dealing with Computer Network Security Challenges

Disaster Management

Access Control and Authorization

Authentication

Cryptography

Part III: Dealing with Computer Network Security Challenges

Firewalls

System Intrusion Detection and Prevention

Computer and Network Forensics

Virus and Content Filtering

Standardization and Security Criteria: Security Evaluation of Computer Products

Computer Network Security Protocols

Security in Wireless Networks and Devices

Security in Sensor Networks

Other Efforts to Secure Data in Computer Networks

Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems

Cloud Computing and Related Security Issues

Virtualization Security

Mobile Systems and Corresponding Intractable Security Issues

Part V: Securing the Last Frontiers – The Home Front

Conquering the Last Frontier in the Digital Invasion: The Home Front

Part VI: Hands-on Projects

Projects

Windows Forensic Analysis DVD Toolkit

فهرست مطالب کتاب Windows Forensic Analysis DVD Toolkit:

Preface

Chapter 1 Live Response: Collecting Volatile Data

Chapter 2 Live Response: Data Analysis

Chapter 3 Windows Memory Analysis

Chapter 4 Registry Analysis

Chapter 5 File Analysis

Chapter 6 Executable File Analysis

Chapter 7 Rootkits and Rootkit Detection

Index

Windows Security Internals with PowerShell

فهرست مطالب کتاب Windows Security Internals with PowerShell:

Introduction

Chapter 1: Setting Up a PowerShell Testing Environment

PART I: An Overview of the Windows Operating System

Chapter 2: The Windows Kernel

Chapter 3: User-Mode Applications

PART II: The Windows Security Reference Monitor

Chapter 4: Security Access Tokens

Chapter 5: Security Descriptors

Chapter 6: Reading and Assigning Security Descriptors

Chapter 7: Access Checking

Chapter 8: Other Access Checking Use Cases

Chapter 9: Security Auditing

PART III: The Local Security Authority and Authentication

Chapter 10: Local Authentication

Chapter 11: Active Directory

Chapter 12: Interactive Authentication

Chapter 13: Network Authentication

Chapter 14: Kerberos Authentication

Chapter 15: Negotiate Authentication and Other Security Packages

Appendix A: Building a Windows Domain Network for Testing

Appendix B: SDDL SID Constants

Wireless Network Security

فهرست مطالب کتاب Wireless Network Security:

Preface

Part I: Security in General Wireless/Mobile Networks

Chapter 1: High Performance Elliptic Curve Cryptographic Co-processor

Chapter 2: An Adaptive Encryption Protocol in Mobile Computing

Part II: Security in Ad Hoc Network

Chapter 3: Pre-Authentication and Authentication Models in Ad Hoc Networks

Chapter 4: Promoting Identity-Based Key Management in Wireless Ad Hoc Networks

Chapter 5: A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks

Chapter 6: Secure Routing in Wireless Ad-Hoc Networks

Chapter 7: A Survey on Intrusion Detection in Mobile Ad Hoc Networks

Part III: Security in Mobile Cellular Networks

Chapter 8: Intrusion Detection in Cellular Mobile Networks

Chapter 9: The Spread of Epidemics on Smartphones

Part IV: Security in Wireless LANs

Chapter 10: Cross-Domain Mobility-Adaptive Authentication

Chapter 11: AAA Architecture and Authentication for Wireless LAN Roaming

Chapter 12: An Experimental Study on Security Protocols in WLANs

Part V: Security in Sensor Networks

Chapter 13: Security Issues in Wireless Sensor Networks used in Clinical Information Systems

Chapter 14: Key Management Schemes in Sensor Networks

Chapter 15: Secure Routing in Ad Hoc and Sensor Networks

About the Editors

Index