Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
فهرست مطالب کتاب Wireshark for Security Professionals:
Chapter1: Introducing Wireshark
Chapter 2: Setting Up the Lab
Chapter 3: The Fundamentals
Chapter 4: Capturing Packets
Chapter 5: Diagnosing Attacks
Chapter 6: Offensive Wireshark
Chapter 7: Decrypting TLS, Capturing USB, Keyloggers, and Network
Chapter 8: Scripting with Lua
Zero Trust Architecture – Cisco Press
فهرست مطالب کتاب Zero Trust Architecture – Cisco Press:
Preface
Introduction
Chapter 1 Overview of Zero Trust (ZT)
Chapter 2 Zero Trust Capabilities
Chapter 3 Zero Trust Reference Architecture
Chapter 4 Zero Trust Enclave Design
Chapter 5 Enclave Exploration and Consideration
Chapter 6 Segmentation
Chapter 7 Zero Trust Common Challenges
Chapter 8 Developing a Successful Segmentation Plan
Chapter 9 Zero Trust Enforcement
Chapter 10 Zero Trust Operations
Chapter 11 Conclusion
Appendix A Applied Use Case for Zero Trust Principles
Index
Zero Trust in Resilient Cloud and Network Architectures
فهرست مطالب کتاب Zero Trust in Resilient Cloud and Network Architectures:
Introduction
Part 1: Zero Trust Fundamentals
Chapter 1. Zero Trust Demystified
Chapter 2. Secure Automation and Orchestration Overview
Chapter 3. Zero Trust Network Deployment
Chapter 4. Security and Segmentation
Part 2: Network Automation Capabilities in Software Defined
Architectures
Chapter 5. DHCP and Dynamic Addressing Concepts
Chapter 6. Automating the Campus
Chapter 7. Plug-and-Play and Zero-Touch Provisioning
Chapter 8. Routing and Traffic Engineering
Chapter 9. Authentication and Authorization
Chapter 10. Quantum Security
Chapter 11. Network Convergence and Considerations
Part 3: Deployment Best Practices, Architectures, and Use Cases
Chapter 12. Software-Defined Network Deployment Best Practices
Chapter 13. Wired and Wireless Assurance
Chapter 14. Large-Scale Software-Defined Network Deployment
Part 4: Cloud Security
Chapter 15. Cloud-Native Security Foundation
Chapter 16. Cloud-Native Application Security
Chapter 17. Data Center Segmentation On-Prem to the Cloud
Chapter 18. Using Common Policy to Enforce Security
Chapter 19. Workload Mobility: On-Prem to Cloud
Part 5: Key Customer Case Studies
Chapter 20. Resilience and Survivability
Chapter 21. Zero Trust in Industrial Manufacturing Vertical
Part 6: Integrations and Automation
Chapter 22. Third-Party SDN Integrations
Chapter 23. Infrastructure as Code (IaC)