Detecting, Troubleshooting, and Preventing Congestion in Storage Networks

فهرست مطالب:

1 Introduction to Congestion in Storage Networks

2 Understanding Congestion in Fibre Channel Fabrics

3 Detecting Congestion in Fibre Channel Fabrics

4 Troubleshooting Congestion in Fibre Channel Fabrics

5 Solving Congestion by Storage I/O Performance Monitoring

6 Preventing Congestion in Fibre Channel Fabrics

7 Congestion Management in Ethernet Storage Networks

8 Congestion Management in TCP Storage Networks

9 Congestion Management in Cisco UCS Servers

DevOps with Windows Server 2016: Obtain Enterprise Agility and Continuous Delivery by Implementing DevOps with Windows Server 2016

فهرست مطالب:

Preface

Chapter 1: Introducing DevOps 9

Chapter 2: DevOps Tools and Technologies

Chapter 3: DevOps Automation Primer

Chapter 4: Nano, Containers, and Docker Primer

Chapter 5: Building a Sample Application

Chapter 6: Source Code Control

Chapter 7: Configuration Management

Chapter 8: Configuration Management and Operational Validation

Chapter 9: Continuous Integration

Chapter 10: Continuous Delivery and Deployment

Chapter 11: Monitoring and Measuring

Index

Digital Forensics Essentials Professional Series

فهرست مطالب کتاب Digital Forensics Essentials Professional Series:

Module 01: Computer Forensics Fundamentals

Fundamentals of Computer Forensics

Digital Evidence

Forensic Readiness

Roles and Responsibilities of a Forensic Investigator

Legal Compliance in Computer Forensics

Module 02: Computer Forensics Investigation Process

Forensic Investigation Process and its Importance

Forensic Investigation Process – Pre-investigation Phase

Forensic Investigation Process – Investigation Phase

Forensic Investigation Process – Post-investigation Phase

Module 03: Understanding Hard Disks and File Systems

Different Types of Disk Drives and their Characteristics

Logical Structure of a Disk

Booting Process of Windows, Linux, and Mac Operating Systems

File Systems of Windows, Linux, and Mac Operating Systems

File System Examination

Module 04: Data Acquisition and Duplication

Data Acquisition Fundamentals

Types of Data Acquisition

Data Acquisition Format

Data Acquisition Methodology

Module 05: Defeating Anti-forensics Techniques

Anti-forensics and its Techniques

Anti-forensics Countermeasures

Module 06: Windows Forensics

Volatile and Non-Volatile Information

Windows Memory and Registry Analysis

Cache, Cookie, and History Recorded in Web Browsers

Windows Files and Metadata

Module 07: Linux and Mac Forensics

Volatile and Non-Volatile Data in Linux

Analyze Filesystem Images Using The Sleuth Kit

Memory Forensics

Mac Forensics

Module 08: Network Forensics

Network Forensics Fundamentals

Event Correlation Concepts and Types

Identify Indicators of Compromise (IoCs) from Network Logs

Investigate Network Traffic

Module 09: Investigating Web Attacks

Web Application Forensics

IIS and Apache Web Server Logs

Investigating Web Attacks on Windows-based Servers

Detect and Investigate Attacks on Web Applications

Module 10: Dark Web Forensics

Dark Web

Dark Web Forensics

Tor Browser Forensics

Module 11: Investigating Email Crimes

Email Basics

Email Crime Investigation and its Steps

Module 12: Malware Forensics

Malware, its Components and Distribution Methods

Malware Forensics Fundamentals and Recognize Types of Malware Analysis

Static Malware Analysis

Analyze Suspicious Word Documents

Dynamic Malware Analysis

System Behavior Analysis

Network Behavior Analysis

Glossary

References

Digital Forensics with Open Source Tools

فهرست مطالب کتاب Digital Forensics with Open Source Tools:

About the Authors

Acknowledgments

Introduction

CHAPTER 1: Digital Forensics with Open Source Tools

CHAPTER 2: Open Source Examination Platform

CHAPTER 3: Disk and File System Analysis

CHAPTER 4: Windows Systems and Artifacts

CHAPTER 5: Linux Systems and Artifacts

CHAPTER 6: Mac OS X Systems and Artifacts

CHAPTER 7: Internet Artifacts

CHAPTER 8: File Analysis

CHAPTER 9: Automating Analysis and Extending Capabilities

Appendix A: Free, Non-open Tools of Note

Index

Domain-Driven Design Distilled

فهرست مطالب کتاب Domain-Driven Design Distilled:

Chapter 1: DDD for Me

Chapter 2: Strategic Design with Bounded Contexts and the Ubiquitous Language

Chapter 3: Strategic Design with Subdomains

Chapter 4: Strategic Design with Context Mapping

Chapter 5: Tactical Design with Aggregates

Chapter 6: Tactical Design with Domain Events

Chapter 7: Acceleration and Management Tools

EC-Council Certified Incident Handler v3 – CEI Material

فهرست مطالب کتاب Certified Incident Handler: Building a Culture of Security:

What Is ECIH

ECIH TRAINING SCHEDULE AND EXAM Information

How to Access Course rel ated material

CLASS MINIMUM REQUIREMENTS, Basic Lab Setup

Requirements, and Lab Setup Environment

What Is EC-COUNCIL CYBERQ

What shoul d you ensure before going to Cl ass

How to Teach ECIH

Where to get help

EC‑Council CEH v13 Module 2: Footprinting and Reconnaissance

فهرست مطالب کتاب ECCouncil CEH v13 Module 2: Footprinting and Reconnaissance:

Footprinting Concepts

Footprinting through Search Engines

Footprinting through Internet Research Services

Footprinting through Social Networking Sites

Whois Footprinting

DNS Footprinting

Network and Email Footprinting

Footprinting through Social Engineering

Footprinting Tasks using Advanced Tools and Al

Footprinting Countermeasures

EC‑Council CEH v13 Module 3: Scanning Networks

فهرست مطالب کتاب ECCouncil CEH v13 Module 3: Scanning Networks:

Network Scanning Concepts

Host Discovery

Port and Service Discovery

OS Discovery

Scanning Beyond IDS and Firewall

Network Scanning Countermeasures