Computer Security and Cryptography
فهرست مطالب کتاب Computer Security and Cryptography:
CHAPTER 1: APERITIFS
CHAPTER 2: COLUMNAR TRANSPOSITION
CHAPTER 3: MONOALPHABETIC SUBSTITUTION
CHAPTER 4: POLYALPHABETIC SUBSTITUTION
CHAPTER 5: STATISTICAL TESTS
CHAPTER 6: THE EMERGENCE OF CIPHER MACHINES
CHAPTER 7: THE JAPANESE CIPHER MACHINES
CHAPTER 8: STREAM CIPHERS
CHAPTER 9: BLOCK-CIPHERS: LUCIFER, DES, AND AES
CHAPTER 10: THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY
CHAPTER 11: THE KNAPSACK CRYPTOSYSTEM
CHAPTER 12: THE RSA CRYPTOSYSTEM
CHAPTER 13: PRIME NUMBERS AND FACTORIZATION
CHAPTER 14: THE DISCRETE LOGARITHM PROBLEM
CHAPTER 15: ELLIPTIC CURVE CRYPTOGRAPHY
CHAPTER 16: KEY EXCHANGE IN A NETWORK
CHAPTER 17: DIGITAL SIGNATURES AND AUTHENTICATION
CHAPTER 18: APPLICATIONS OF CRYPTOGRAPHY
CHAPTER 19: CRYPTOGRAPHIC PATENTS
Computer Security Fundamentals Fourth Edition
فهرست مطالب کتاب Computer Security Fundamentals:
Chapter 1. Introduction to Computer Security
Chapter 2. Networks and the Internet
Chapter 3. Cyber Stalking, Fraud, and Abuse
Chapter 4. Denial of Service Attacks
Chapter 5. Malware
Chapter 6. Techniques Used by Hackers
Chapter 7. Industrial Espionage in Cyberspace
Chapter 8. Encryption
Chapter 9. Computer Security Technology
Chapter 10. Security Policies
Chapter 11. Network Scanning and Vulnerability Scanning
Chapter 12. Cyber Terrorism and Information Warfare
Chapter 13. Cyber Detective
Chapter 14. Introduction to Forensics
Chapter 15. Cybersecurity Engineering
Configuring Windows Server 2008 Network Infrastructure – MCTS Self-Paced Training Kit (Exam 70-642)
فهرست مطالب:
Chapter 1: Understanding and Configuring TCP/IP
Chapter 2: Configuring Name Resolution
Chapter 3: Configuring a DNS Zone Infrastructure
Chapter 4: Creating a DHCP Infrastructure
Chapter 5: Configuring IP Routing
Chapter 6: Protecting Network Traffic with IPsec
Chapter 7: Connecting to Networks
Chapter 8: Configuring Windows Firewall and Network Access Protection
Chapter 9: Managing Software Updates
Chapter 10: Monitoring Computers
Chapter 11: Managing Files
Chapter 12: Managing Printers
Continuous Delivery: Reliable Software Releases through Build
فهرست مطالب کتاب Continuous Delivery: Reliable Software Releases through Build:
Part I: Foundations
Chapter 1: The Problem of Delivering Software
Chapter 2: Configuration Management
Chapter 3: Continuous Integration
Chapter 4: Implementing a Testing Strategy
Part II: The Deployment Pipeline
Chapter 5: Anatomy of the Deployment Pipeline
Chapter 6: Build and Deployment Scripting
Chapter 7: The Commit Stage
Chapter 8: Automated Acceptance Testing
Chapter 9: Testing Nonfunctional Requirements
Chapter 10: Deploying and Releasing Applications
Part III: The Delivery Ecosystem
Chapter 11: Managing Infrastructure and Environments
Chapter 12: Managing Data
Chapter 13: Managing Components and Dependencies
Chapter 14: Advanced Version Control
Chapter 15: Managing Continuous Delivery
Cracking the Coding Interview: 150 Programming Questions and Solutions (Fourth Edition)
فهرست مطالب کتاب Cracking the Coding Interview: 150 Programming Questions and Solutions:
Foreword
Introduction
Behind the Scenes
The Microsoft Interview
The Amazon Interview
The Google Interview
The Apple Interview
The Yahoo Interview
Interview War Stories
Before the Interview
Resume Advice
Behavioral Preparation
Technical Preparation
The Interview and Beyond
Handling Behavioral Questions
Handling Technical Questions
Five Algorithm Approaches
The Offer and Beyond
Top Ten Mistakes Candidates Make
Frequently Asked Questions
Interview Questions
Data Structures
Chapter 1: Arrays and Strings
Chapter 2: Linked Lists
Chapter 3: Stacks and Queues
Chapter 4: Trees and Graphs
Concepts and Algorithms
Chapter 5: Bit Manipulation
Chapter 6: Brain Teasers
Chapter 7: Object-Oriented Design
Chapter 8: Recursion
Chapter 9: Sorting and Searching
Chapter 10: Mathematical
Chapter 11: Testing
Chapter 12: System Design and Memory Limits
Knowledge-Based
Chapter 13: C++
Chapter 14: Java
Chapter 15: Databases
Chapter 16: Low-Level
Chapter 17: Networking
Chapter 18: Threads and Locks
Additional Review Problems
Chapter 19: Moderate
Chapter 20: Hard
Solutions
Mock Interviews
About the Author
Cross‑Site Scripting Attacks: XSS Exploits and Defense
فهرست مطالب کتاب Cross‑Site Scripting Attacks: XSS Exploits and Defense:
Chapter 1: Cross-site Scripting Fundamentals
Chapter 2: The XSS Discovery Toolkit
Chapter 3: XSS Theory
Chapter 4: XSS Attack Methods
Chapter 5: Advanced XSS Attack Vectors
Chapter 6: XSS Exploited
Chapter 7: Exploit Frameworks
Chapter 8: XSS Worms
Chapter 9: Preventing XSS Attacks
Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)
فهرست مطالب:
Part One: Background
Part Two: Symmetric Ciphers
Part Three: Asymmetric Ciphers
Part Four: Cryptographic Data Integrity Algorithms
Part Five: Mutual Trust
Part Six: Network and Internet Security
CWNA Certified Wireless Network Administrator Study Guide
فهرست مطالب:
Introduction
Assessment Test
Chapter 1 Overview of Wireless Standards and Organizations
Chapter 2 Radio Frequency Fundamentals
Chapter 3 Radio Frequency Components, Measurements, and Mathematics
Chapter 4 Radio Frequency Signal and Antenna Concepts
Chapter 5 IEEE 802.11 Standards
Chapter 6 Wireless Networks and Spread Spectrum Technologies
Chapter 7 Wireless LAN Topologies
Chapter 8 802.11 Medium Access
Chapter 9 802.11 MAC Architecture
Chapter 10 Wireless Devices
Chapter 11 Network Design, Implementation, and Management
Chapter 12 WLAN Troubleshooting
Chapter 13 802.11 Network Security Architecture
Chapter 14 Wireless Attacks, Intrusion Monitoring, and Policy
Chapter 15 Radio Frequency Site Survey Fundamentals
Chapter 16 Site Survey Systems and Devices
Glossary
Index
Data Center Virtualization Fundamentals
فهرست مطالب:
Introduction
Part I: What Is Virtualization?
Part II: Virtualization in Network Technologies
Part III: Virtualization in Storage Technologies
Part IV: Virtualization in Server Technologies
Part V: End-to-End Virtualization
Part VI: Appendixes
Data Structures and Algorithm Analysis in C
فهرست مطالب کتاب Data Structures and Algorithm Analysis in C:
PREFACE
CHAPTER 1: INTRODUCTION
CHAPTER 2: ALGORITHM ANALYSIS
CHAPTER 3: LISTS, STACKS, AND QUEUES
CHAPTER 4: TREES
CHAPTER 5: HASHING
CHAPTER 6: PRIORITY QUEUES (HEAPS)
CHAPTER 7: SORTING
CHAPTER 8: THE DISJOINT SET ADT
CHAPTER 9: GRAPH ALGORITHMS
CHAPTER 10: ALGORITHM DESIGN TECHNIQUES
CHAPTER 11: AMORTIZED ANALYSIS
Deploying Juniper Data Centers with EVPN VXLAN
فهرست مطالب:
Contents
1 Introducing the Juniper Ecosystem
2 Overview of Data Center Architecture
3 BGP for the Data Center
4 VXLAN as a Network Virtualization Overlay
5 Bridged Overlay in an EVPN VXLAN Fabric
6 MAC-VRFs
7 Centrally Routed Bridging
8 Edge-Routed Bridging
9 Routed Overlay and Host-Routed Bridging
10 DHCP in EVPN VXLAN Fabrics
11 Data Center Interconnect
12 Building Data Centers with Juniper Apstra, Part I—Apstra Foundation
13 Building Data Centers with Juniper Apstra, Part II—Advanced Apstra Deployments
14 Building Virtual Fabrics with vJunos, Containerlab, and Juniper Apstra
15 Large-Scale Fabrics, Inter-VRF Routing, and Security Policies in Apstra
Acronym Legend
Designing Real-World Multi-domain Networks
فهرست مطالب:
Part 1 – Introduction
1 Multi-Domain Networks
Part 2 – Multi-Domain Design
2 SD-Access and Campus Fabric
3 SD-WAN and DMVPN
4 Application Centric Infrastructure (ACI) – Integration and MultiDomain Capabilities
5 Enterprise MPLS
6 Carrier Neutral Facilities (CNF)
7 Cloud Connectivity
8 Security
9 Automation
Part 3 – Real World Use Cases
10 Global Manufacturing Use Case with SDA, SDWAN and CNFs
11 Financial Industry with ACI, MPLS and Security
12 Retail Use Case with Cloud, SDWAN and SDA
13 Public Sector Use Case
14 Transportation Use Case