Computer Security and Cryptography

فهرست مطالب کتاب Computer Security and Cryptography:

CHAPTER 1: APERITIFS

CHAPTER 2: COLUMNAR TRANSPOSITION

CHAPTER 3: MONOALPHABETIC SUBSTITUTION

CHAPTER 4: POLYALPHABETIC SUBSTITUTION

CHAPTER 5: STATISTICAL TESTS

CHAPTER 6: THE EMERGENCE OF CIPHER MACHINES

CHAPTER 7: THE JAPANESE CIPHER MACHINES

CHAPTER 8: STREAM CIPHERS

CHAPTER 9: BLOCK-CIPHERS: LUCIFER, DES, AND AES

CHAPTER 10: THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY

CHAPTER 11: THE KNAPSACK CRYPTOSYSTEM

CHAPTER 12: THE RSA CRYPTOSYSTEM

CHAPTER 13: PRIME NUMBERS AND FACTORIZATION

CHAPTER 14: THE DISCRETE LOGARITHM PROBLEM

CHAPTER 15: ELLIPTIC CURVE CRYPTOGRAPHY

CHAPTER 16: KEY EXCHANGE IN A NETWORK

CHAPTER 17: DIGITAL SIGNATURES AND AUTHENTICATION

CHAPTER 18: APPLICATIONS OF CRYPTOGRAPHY

CHAPTER 19: CRYPTOGRAPHIC PATENTS

Computer Security Fundamentals Fourth Edition

فهرست مطالب کتاب Computer Security Fundamentals:

Chapter 1. Introduction to Computer Security

Chapter 2. Networks and the Internet

Chapter 3. Cyber Stalking, Fraud, and Abuse

Chapter 4. Denial of Service Attacks

Chapter 5. Malware

Chapter 6. Techniques Used by Hackers

Chapter 7. Industrial Espionage in Cyberspace

Chapter 8. Encryption

Chapter 9. Computer Security Technology

Chapter 10. Security Policies

Chapter 11. Network Scanning and Vulnerability Scanning

Chapter 12. Cyber Terrorism and Information Warfare

Chapter 13. Cyber Detective

Chapter 14. Introduction to Forensics

Chapter 15. Cybersecurity Engineering

Configuring Windows Server 2008 Network Infrastructure – MCTS Self-Paced Training Kit (Exam 70-642)

فهرست مطالب:

Chapter 1: Understanding and Configuring TCP/IP

Chapter 2: Configuring Name Resolution

Chapter 3: Configuring a DNS Zone Infrastructure

Chapter 4: Creating a DHCP Infrastructure

Chapter 5: Configuring IP Routing

Chapter 6: Protecting Network Traffic with IPsec

Chapter 7: Connecting to Networks

Chapter 8: Configuring Windows Firewall and Network Access Protection

Chapter 9: Managing Software Updates

Chapter 10: Monitoring Computers

Chapter 11: Managing Files

Chapter 12: Managing Printers

Continuous Delivery: Reliable Software Releases through Build

فهرست مطالب کتاب Continuous Delivery: Reliable Software Releases through Build:

Part I: Foundations

Chapter 1: The Problem of Delivering Software

Chapter 2: Configuration Management

Chapter 3: Continuous Integration

Chapter 4: Implementing a Testing Strategy

Part II: The Deployment Pipeline

Chapter 5: Anatomy of the Deployment Pipeline

Chapter 6: Build and Deployment Scripting

Chapter 7: The Commit Stage

Chapter 8: Automated Acceptance Testing

Chapter 9: Testing Nonfunctional Requirements

Chapter 10: Deploying and Releasing Applications

Part III: The Delivery Ecosystem

Chapter 11: Managing Infrastructure and Environments

Chapter 12: Managing Data

Chapter 13: Managing Components and Dependencies

Chapter 14: Advanced Version Control

Chapter 15: Managing Continuous Delivery

Cracking the Coding Interview: 150 Programming Questions and Solutions (Fourth Edition)

فهرست مطالب کتاب Cracking the Coding Interview: 150 Programming Questions and Solutions:

Foreword

Introduction

Behind the Scenes

The Microsoft Interview

The Amazon Interview

The Google Interview

The Apple Interview

The Yahoo Interview

Interview War Stories

Before the Interview

Resume Advice

Behavioral Preparation

Technical Preparation

The Interview and Beyond

Handling Behavioral Questions

Handling Technical Questions

Five Algorithm Approaches

The Offer and Beyond

Top Ten Mistakes Candidates Make

Frequently Asked Questions

Interview Questions

Data Structures

Chapter 1: Arrays and Strings

Chapter 2: Linked Lists

Chapter 3: Stacks and Queues

Chapter 4: Trees and Graphs

Concepts and Algorithms

Chapter 5: Bit Manipulation

Chapter 6: Brain Teasers

Chapter 7: Object-Oriented Design

Chapter 8: Recursion

Chapter 9: Sorting and Searching

Chapter 10: Mathematical

Chapter 11: Testing

Chapter 12: System Design and Memory Limits

Knowledge-Based

Chapter 13: C++

Chapter 14: Java

Chapter 15: Databases

Chapter 16: Low-Level

Chapter 17: Networking

Chapter 18: Threads and Locks

Additional Review Problems

Chapter 19: Moderate

Chapter 20: Hard

Solutions

Mock Interviews

About the Author

Cross‑Site Scripting Attacks: XSS Exploits and Defense

فهرست مطالب کتاب CrossSite Scripting Attacks: XSS Exploits and Defense:

Chapter 1: Cross-site Scripting Fundamentals

Chapter 2: The XSS Discovery Toolkit

Chapter 3: XSS Theory

Chapter 4: XSS Attack Methods

Chapter 5: Advanced XSS Attack Vectors

Chapter 6: XSS Exploited

Chapter 7: Exploit Frameworks

Chapter 8: XSS Worms

Chapter 9: Preventing XSS Attacks

Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)

فهرست مطالب:

Part One: Background

Part Two: Symmetric Ciphers

Part Three: Asymmetric Ciphers

Part Four: Cryptographic Data Integrity Algorithms

Part Five: Mutual Trust

Part Six: Network and Internet Security

CWNA Certified Wireless Network Administrator Study Guide

فهرست مطالب:

Introduction

Assessment Test

Chapter 1 Overview of Wireless Standards and Organizations

Chapter 2 Radio Frequency Fundamentals

Chapter 3 Radio Frequency Components, Measurements, and Mathematics

Chapter 4 Radio Frequency Signal and Antenna Concepts

Chapter 5 IEEE 802.11 Standards

Chapter 6 Wireless Networks and Spread Spectrum Technologies

Chapter 7 Wireless LAN Topologies

Chapter 8 802.11 Medium Access

Chapter 9 802.11 MAC Architecture

Chapter 10 Wireless Devices

Chapter 11 Network Design, Implementation, and Management

Chapter 12 WLAN Troubleshooting

Chapter 13 802.11 Network Security Architecture

Chapter 14 Wireless Attacks, Intrusion Monitoring, and Policy

Chapter 15 Radio Frequency Site Survey Fundamentals

Chapter 16 Site Survey Systems and Devices

Glossary

Index

Data Center Virtualization Fundamentals

فهرست مطالب:

Introduction

Part I: What Is Virtualization?

Part II: Virtualization in Network Technologies

Part III: Virtualization in Storage Technologies

Part IV: Virtualization in Server Technologies

Part V: End-to-End Virtualization

Part VI: Appendixes

Data Structures and Algorithm Analysis in C

فهرست مطالب کتاب Data Structures and Algorithm Analysis in C:

PREFACE

CHAPTER 1: INTRODUCTION

CHAPTER 2: ALGORITHM ANALYSIS

CHAPTER 3: LISTS, STACKS, AND QUEUES

CHAPTER 4: TREES

CHAPTER 5: HASHING

CHAPTER 6: PRIORITY QUEUES (HEAPS)

CHAPTER 7: SORTING

CHAPTER 8: THE DISJOINT SET ADT

CHAPTER 9: GRAPH ALGORITHMS

CHAPTER 10: ALGORITHM DESIGN TECHNIQUES

CHAPTER 11: AMORTIZED ANALYSIS

Deploying Juniper Data Centers with EVPN VXLAN

فهرست مطالب:

Contents

1 Introducing the Juniper Ecosystem

2 Overview of Data Center Architecture

3 BGP for the Data Center

4 VXLAN as a Network Virtualization Overlay

5 Bridged Overlay in an EVPN VXLAN Fabric

6 MAC-VRFs

7 Centrally Routed Bridging

8 Edge-Routed Bridging

9 Routed Overlay and Host-Routed Bridging

10 DHCP in EVPN VXLAN Fabrics

11 Data Center Interconnect

12 Building Data Centers with Juniper Apstra, Part I—Apstra Foundation

13 Building Data Centers with Juniper Apstra, Part II—Advanced Apstra Deployments

14 Building Virtual Fabrics with vJunos, Containerlab, and Juniper Apstra

15 Large-Scale Fabrics, Inter-VRF Routing, and Security Policies in Apstra

Acronym Legend

Designing Real-World Multi-domain Networks

فهرست مطالب:

Part 1 – Introduction

1 Multi-Domain Networks

Part 2 – Multi-Domain Design

2 SD-Access and Campus Fabric

3 SD-WAN and DMVPN

4 Application Centric Infrastructure (ACI) – Integration and MultiDomain Capabilities

5 Enterprise MPLS

6 Carrier Neutral Facilities (CNF)

7 Cloud Connectivity

8 Security

9 Automation

Part 3 – Real World Use Cases

10 Global Manufacturing Use Case with SDA, SDWAN and CNFs

11 Financial Industry with ACI, MPLS and Security

12 Retail Use Case with Cloud, SDWAN and SDA

13 Public Sector Use Case

14 Transportation Use Case