EC‑Council CEH v13 Module 5: Vulnerability Analysis
فهرست مطالب کتاب EC‑Council CEH v13 Module 5: Vulnerability Analysis:
Vulnerability Assessment Concepts
Vulnerability Assessment Tools
Vulnerability Assessment Reports
EC‑Council CEH v13 Module 6: System Hacking
فهرست مطالب کتاب EC‑Council CEH v13 Module 6: System Hacking:
Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs
EC‑Council CEH v13 Module 7: Malware Threats
فهرست مطالب کتاب EC‑Council CEH v13 Module 7: Malware Threats:
Malware and APT Concepts
Fileless Malware Concepts
Al-based Malware Concepts
Malware Analysis
Malware Countermeasures
EC‑Council CEH v13 Module 8: Sniffing
فهرست مطالب کتاب EC‑Council CEH v13 Module 8: Sniffing:
Sniffing Concepts
Sniffing Techniques
Sniffing Tools
Sniffing Countermeasures
EC‑Council CEH v13 Module 9: Social Engineering
فهرست مطالب کتاب EC‑Council CEH v13 Module 9: Social Engineering:
Social Engineering Concepts
Human-based Social Engineering Techniques
Computer-based Social Engineering Techniques
Mobile-based Social Engineering Techniques
Social Engineering Countermeasures
EC‑Council CEH v13: Ethical Hacking and Countermeasures
فهرست مطالب کتاب EC‑Council CEH v13: Ethical Hacking and Countermeasures:
Module 01: Introduction to Ethical Hacking
Information Security Overview
Hacking Concepts and Hacker Classes
Ethical Hacking Concepts
Hacking Methodologies and Frameworks
Information Security Controls
Information Security Laws and Standards
EC‑Council CEH v13: Module 4 Enumeration
فهرست مطالب کتاب EC‑Council CEH v13: Module 4 Enumeration:
Enumeration Concepts
NetBIOS Enumeration
SNMP and LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Effective Modern C++ 42 Specific Ways to Improve Your Use of C++11 and C++14
فهرست مطالب کتاب Effective Modern C++:
- Deducing Types
- auto
- Moving to Modern C++
- Smart Pointers
- Rvalue References, Move Semantics, and Perfect Forwarding
- Lambda Expressions
- The Concurrency API
- Tweaks
End-to-End Network Security: Defense-in-Depth
فهرست مطالب:
Introduction
Part I Introduction to Network Security Solutions
Part II Security Lifecycle: Frameworks and Methodologies
Part III Defense-In-Depth Applied
Part IV Case Studies
Index
Entrepreneur Revolution: How to Develop Your Entrepreneurial Mindset and Start a Business That Works
فهرست مطالب کتاب Entrepreneur Revolution:
Part I: Breaking Free from
Chapter 2: The Rise of the Global
Chapter 4: Meet your Entrepreneur Brain
Chapter 5: How to be an Empire
Chapter 6: Lean In
Chapter 7: The Very Essence of
Part II: Finding Your Place In The Entrepreneur Revolution
Chapter 8: The Entrepreneur
Chapter 9: Building a Global Small
Chapter 10: The Ascending Transaction Model (ATM)
Part III: Living The Entrepreneur Revolution Dream
Chapter 11: The Seven-Stage Journey into the Entrepreneur
Chapter 13: The Value Creation
Chapter 15: Living the Dream
Essential Computer Security: Everyones Guide to E‑mail, Internet, and Wireless Security
فهرست مطالب کتاب Essential Computer Security: Everyones Guide to E‑mail, Internet, and Wireless Security:
Part I: Bare Essentials
Chapter 1 – Basic Windows Security
Chapter 2 – Passwords
Chapter 3 – Viruses, Worms, and Other Malware
Chapter 4 – Patching
Part II: More Essential Security
Chapter 5 – Perimeter Security
Chapter 6 – E-mail Safety
Chapter 7 – Web Surfing Privacy and Safety
Chapter 8 – Wireless Network Security
Chapter 9 – Spyware and Adware
Part III: Testing and Maintenance
Chapter 10 – Keeping Things Secure
Chapter 11 – When Disaster Strikes
Chapter 12 – Microsoft Alternatives: Inside the Linux Desktop
Part IV: Security Resources
Appendix A Essential Network Communications
Appendix B Case Study: SOHO (Five Computers, Printer, Servers, etc.)
Appendix C Glossary of Technology and Terminology
Ethical Hacking and Countermeasures: Web Applications and Data Servers
فهرست مطالب کتاب Ethical Hacking and Countermeasures: Web Applications and Data Servers:
- Introduction to Hacking
- Linux Basics
- Information Gathering Techniques
- Target Enumeration and Port Scanning Techniques
- Vulnerability Assessment
- Network Sniffing
- Remote Exploitation
- Client Side Exploitation
- Postexploitation
- Windows Exploit Development Basics
- Wireless Hacking
- Web Hacking