EC‑Council CEH v13 Module 5: Vulnerability Analysis

فهرست مطالب کتاب ECCouncil CEH v13 Module 5: Vulnerability Analysis:

Vulnerability Assessment Concepts

Vulnerability Assessment Tools

Vulnerability Assessment Reports

EC‑Council CEH v13 Module 6: System Hacking

فهرست مطالب کتاب EC‑Council CEH v13 Module 6: System Hacking:

Gaining Access

Escalating Privileges

Maintaining Access

Clearing Logs

EC‑Council CEH v13 Module 7: Malware Threats

فهرست مطالب کتاب ECCouncil CEH v13 Module 7: Malware Threats:

Malware and APT Concepts

Fileless Malware Concepts

Al-based Malware Concepts

Malware Analysis

Malware Countermeasures

EC‑Council CEH v13 Module 8: Sniffing

فهرست مطالب کتاب ECCouncil CEH v13 Module 8: Sniffing:

Sniffing Concepts

Sniffing Techniques

Sniffing Tools

Sniffing Countermeasures

EC‑Council CEH v13 Module 9: Social Engineering

فهرست مطالب کتاب ECCouncil CEH v13 Module 9: Social Engineering:

Social Engineering Concepts

Human-based Social Engineering Techniques

Computer-based Social Engineering Techniques

Mobile-based Social Engineering Techniques

Social Engineering Countermeasures

EC‑Council CEH v13: Ethical Hacking and Countermeasures

فهرست مطالب کتاب ECCouncil CEH v13: Ethical Hacking and Countermeasures:

Module 01: Introduction to Ethical Hacking

Information Security Overview

Hacking Concepts and Hacker Classes

Ethical Hacking Concepts

Hacking Methodologies and Frameworks

Information Security Controls

Information Security Laws and Standards

EC‑Council CEH v13: Module 4 Enumeration

فهرست مطالب کتاب ECCouncil CEH v13: Module 4 Enumeration:

Enumeration Concepts

NetBIOS Enumeration

SNMP and LDAP Enumeration

NTP and NFS Enumeration

SMTP and DNS Enumeration

Other Enumeration Techniques

Enumeration Countermeasures

Effective Modern C++ 42 Specific Ways to Improve Your Use of C++11 and C++14

فهرست مطالب کتاب Effective Modern C++:

  1. Deducing Types
  2. auto
  3. Moving to Modern C++
  4. Smart Pointers
  5. Rvalue References, Move Semantics, and Perfect Forwarding
  6. Lambda Expressions
  7. The Concurrency API
  8. Tweaks

End-to-End Network Security: Defense-in-Depth

فهرست مطالب:

Introduction

Part I Introduction to Network Security Solutions

Part II Security Lifecycle: Frameworks and Methodologies

Part III Defense-In-Depth Applied

Part IV Case Studies

Index

Entrepreneur Revolution: How to Develop Your Entrepreneurial Mindset and Start a Business That Works

فهرست مطالب کتاب Entrepreneur Revolution:

Part I: Breaking Free from

Chapter 2: The Rise of the Global

Chapter 4: Meet your Entrepreneur Brain

Chapter 5: How to be an Empire

Chapter 6: Lean In

Chapter 7: The Very Essence of

Part II: Finding Your Place In The Entrepreneur Revolution

Chapter 8: The Entrepreneur

Chapter 9: Building a Global Small

Chapter 10: The Ascending Transaction Model (ATM)

Part III: Living The Entrepreneur Revolution Dream

Chapter 11: The Seven-Stage Journey into the Entrepreneur

Chapter 13: The Value Creation

Chapter 15: Living the Dream

Essential Computer Security: Everyones Guide to E‑mail, Internet, and Wireless Security

فهرست مطالب کتاب Essential Computer Security: Everyones Guide to Email, Internet, and Wireless Security:

Part I: Bare Essentials

Chapter 1 – Basic Windows Security

Chapter 2 – Passwords

Chapter 3 – Viruses, Worms, and Other Malware

Chapter 4 – Patching

Part II: More Essential Security

Chapter 5 – Perimeter Security

Chapter 6 – E-mail Safety

Chapter 7 – Web Surfing Privacy and Safety

Chapter 8 – Wireless Network Security

Chapter 9 – Spyware and Adware

Part III: Testing and Maintenance

Chapter 10 – Keeping Things Secure

Chapter 11 – When Disaster Strikes

Chapter 12 – Microsoft Alternatives: Inside the Linux Desktop

Part IV: Security Resources

Appendix A Essential Network Communications

Appendix B Case Study: SOHO (Five Computers, Printer, Servers, etc.)

Appendix C Glossary of Technology and Terminology

Ethical Hacking and Countermeasures: Web Applications and Data Servers

فهرست مطالب کتاب Ethical Hacking and Countermeasures: Web Applications and Data Servers:

  1. Introduction to Hacking
  2. Linux Basics
  3. Information Gathering Techniques
  4. Target Enumeration and Port Scanning Techniques
  5. Vulnerability Assessment
  6. Network Sniffing
  7. Remote Exploitation
  8. Client Side Exploitation
  9. Postexploitation
  10. Windows Exploit Development Basics
  11. Wireless Hacking
  12. Web Hacking