Detecting, Troubleshooting, and Preventing Congestion in Storage Networks
فهرست مطالب:
1 Introduction to Congestion in Storage Networks
2 Understanding Congestion in Fibre Channel Fabrics
3 Detecting Congestion in Fibre Channel Fabrics
4 Troubleshooting Congestion in Fibre Channel Fabrics
5 Solving Congestion by Storage I/O Performance Monitoring
6 Preventing Congestion in Fibre Channel Fabrics
7 Congestion Management in Ethernet Storage Networks
8 Congestion Management in TCP Storage Networks
9 Congestion Management in Cisco UCS Servers
DevOps with Windows Server 2016: Obtain Enterprise Agility and Continuous Delivery by Implementing DevOps with Windows Server 2016
فهرست مطالب:
Preface
Chapter 1: Introducing DevOps 9
Chapter 2: DevOps Tools and Technologies
Chapter 3: DevOps Automation Primer
Chapter 4: Nano, Containers, and Docker Primer
Chapter 5: Building a Sample Application
Chapter 6: Source Code Control
Chapter 7: Configuration Management
Chapter 8: Configuration Management and Operational Validation
Chapter 9: Continuous Integration
Chapter 10: Continuous Delivery and Deployment
Chapter 11: Monitoring and Measuring
Index
Dictionary of Networking
فهرست مطالب کتاب Dictionary of Networking:
ندارد
Digital Forensics Essentials Professional Series
فهرست مطالب کتاب Digital Forensics Essentials Professional Series:
Module 01: Computer Forensics Fundamentals
Fundamentals of Computer Forensics
Digital Evidence
Forensic Readiness
Roles and Responsibilities of a Forensic Investigator
Legal Compliance in Computer Forensics
Module 02: Computer Forensics Investigation Process
Forensic Investigation Process and its Importance
Forensic Investigation Process – Pre-investigation Phase
Forensic Investigation Process – Investigation Phase
Forensic Investigation Process – Post-investigation Phase
Module 03: Understanding Hard Disks and File Systems
Different Types of Disk Drives and their Characteristics
Logical Structure of a Disk
Booting Process of Windows, Linux, and Mac Operating Systems
File Systems of Windows, Linux, and Mac Operating Systems
File System Examination
Module 04: Data Acquisition and Duplication
Data Acquisition Fundamentals
Types of Data Acquisition
Data Acquisition Format
Data Acquisition Methodology
Module 05: Defeating Anti-forensics Techniques
Anti-forensics and its Techniques
Anti-forensics Countermeasures
Module 06: Windows Forensics
Volatile and Non-Volatile Information
Windows Memory and Registry Analysis
Cache, Cookie, and History Recorded in Web Browsers
Windows Files and Metadata
Module 07: Linux and Mac Forensics
Volatile and Non-Volatile Data in Linux
Analyze Filesystem Images Using The Sleuth Kit
Memory Forensics
Mac Forensics
Module 08: Network Forensics
Network Forensics Fundamentals
Event Correlation Concepts and Types
Identify Indicators of Compromise (IoCs) from Network Logs
Investigate Network Traffic
Module 09: Investigating Web Attacks
Web Application Forensics
IIS and Apache Web Server Logs
Investigating Web Attacks on Windows-based Servers
Detect and Investigate Attacks on Web Applications
Module 10: Dark Web Forensics
Dark Web
Dark Web Forensics
Tor Browser Forensics
Module 11: Investigating Email Crimes
Email Basics
Email Crime Investigation and its Steps
Module 12: Malware Forensics
Malware, its Components and Distribution Methods
Malware Forensics Fundamentals and Recognize Types of Malware Analysis
Static Malware Analysis
Analyze Suspicious Word Documents
Dynamic Malware Analysis
System Behavior Analysis
Network Behavior Analysis
Glossary
References
Digital Forensics with Open Source Tools
فهرست مطالب کتاب Digital Forensics with Open Source Tools:
About the Authors
Acknowledgments
Introduction
CHAPTER 1: Digital Forensics with Open Source Tools
CHAPTER 2: Open Source Examination Platform
CHAPTER 3: Disk and File System Analysis
CHAPTER 4: Windows Systems and Artifacts
CHAPTER 5: Linux Systems and Artifacts
CHAPTER 6: Mac OS X Systems and Artifacts
CHAPTER 7: Internet Artifacts
CHAPTER 8: File Analysis
CHAPTER 9: Automating Analysis and Extending Capabilities
Appendix A: Free, Non-open Tools of Note
Index
Domain-Driven Design Distilled
فهرست مطالب کتاب Domain-Driven Design Distilled:
Chapter 1: DDD for Me
Chapter 2: Strategic Design with Bounded Contexts and the Ubiquitous Language
Chapter 3: Strategic Design with Subdomains
Chapter 4: Strategic Design with Context Mapping
Chapter 5: Tactical Design with Aggregates
Chapter 6: Tactical Design with Domain Events
Chapter 7: Acceleration and Management Tools
DotNET Frame work Notes For Professionals
فهرست مطالب کتاب DotNET Frame work Notes For Professionals:
EC-Council Certified Incident Handler v3 – CEI Material
فهرست مطالب کتاب Certified Incident Handler: Building a Culture of Security:
What Is ECIH
ECIH TRAINING SCHEDULE AND EXAM Information
How to Access Course rel ated material
CLASS MINIMUM REQUIREMENTS, Basic Lab Setup
Requirements, and Lab Setup Environment
What Is EC-COUNCIL CYBERQ
What shoul d you ensure before going to Cl ass
How to Teach ECIH
Where to get help
EC‑Council CEH v13 Appendix – Ethical Hacking Essential Concepts – 1
فهرست مطالب کتاب EC‑Council CEH v13 Appendix – Ethical Hacking Essential Concepts – 1:
ندارد
EC‑Council CEH v13 Lab Manual
فهرست مطالب کتاب EC‑Council CEH v13 Lab Manual:
ندارد
EC‑Council CEH v13 Module 2: Footprinting and Reconnaissance
فهرست مطالب کتاب EC‑Council CEH v13 Module 2: Footprinting and Reconnaissance:
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Internet Research Services
Footprinting through Social Networking Sites
Whois Footprinting
DNS Footprinting
Network and Email Footprinting
Footprinting through Social Engineering
Footprinting Tasks using Advanced Tools and Al
Footprinting Countermeasures
EC‑Council CEH v13 Module 3: Scanning Networks
فهرست مطالب کتاب EC‑Council CEH v13 Module 3: Scanning Networks:
Network Scanning Concepts
Host Discovery
Port and Service Discovery
OS Discovery
Scanning Beyond IDS and Firewall
Network Scanning Countermeasures