Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

فهرست مطالب کتاب Wireshark for Security Professionals:

Chapter1: Introducing Wireshark

Chapter 2: Setting Up the Lab

Chapter 3: The Fundamentals

Chapter 4: Capturing Packets

Chapter 5: Diagnosing Attacks

Chapter 6: Offensive Wireshark

Chapter 7: Decrypting TLS, Capturing USB, Keyloggers, and Network

Chapter 8: Scripting with Lua

Zero Trust Architecture – Cisco Press

فهرست مطالب کتاب Zero Trust Architecture – Cisco Press:

Preface

Introduction

Chapter 1 Overview of Zero Trust (ZT)

Chapter 2 Zero Trust Capabilities

Chapter 3 Zero Trust Reference Architecture

Chapter 4 Zero Trust Enclave Design

Chapter 5 Enclave Exploration and Consideration

Chapter 6 Segmentation

Chapter 7 Zero Trust Common Challenges

Chapter 8 Developing a Successful Segmentation Plan

Chapter 9 Zero Trust Enforcement

Chapter 10 Zero Trust Operations

Chapter 11 Conclusion

Appendix A Applied Use Case for Zero Trust Principles

Index

Zero Trust in Resilient Cloud and Network Architectures

فهرست مطالب کتاب Zero Trust in Resilient Cloud and Network Architectures:

Introduction

Part 1: Zero Trust Fundamentals

Chapter 1. Zero Trust Demystified

Chapter 2. Secure Automation and Orchestration Overview

Chapter 3. Zero Trust Network Deployment

Chapter 4. Security and Segmentation

Part 2: Network Automation Capabilities in Software Defined

Architectures

Chapter 5. DHCP and Dynamic Addressing Concepts

Chapter 6. Automating the Campus

Chapter 7. Plug-and-Play and Zero-Touch Provisioning

Chapter 8. Routing and Traffic Engineering

Chapter 9. Authentication and Authorization

Chapter 10. Quantum Security

Chapter 11. Network Convergence and Considerations

Part 3: Deployment Best Practices, Architectures, and Use Cases

Chapter 12. Software-Defined Network Deployment Best Practices

Chapter 13. Wired and Wireless Assurance

Chapter 14. Large-Scale Software-Defined Network Deployment

Part 4: Cloud Security

Chapter 15. Cloud-Native Security Foundation

Chapter 16. Cloud-Native Application Security

Chapter 17. Data Center Segmentation On-Prem to the Cloud

Chapter 18. Using Common Policy to Enforce Security

Chapter 19. Workload Mobility: On-Prem to Cloud

Part 5: Key Customer Case Studies

Chapter 20. Resilience and Survivability

Chapter 21. Zero Trust in Industrial Manufacturing Vertical

Part 6: Integrations and Automation

Chapter 22. Third-Party SDN Integrations

Chapter 23. Infrastructure as Code (IaC)