Beginning Python: From Novice to Professional – Third Edition

فهرست مطالب:

About the Author

About the Technical Reviewer

Preface

Introduction

Chapter 1: Instant Hacking: The Basics

Chapter 2: Lists and Tuples

Chapter 3: Working with Strings

Chapter 4: Dictionaries: When Indices Won’t Do

Chapter 5: Conditionals, Loops, and Some Other Statements

Chapter 6: Abstraction

Chapter 7: More Abstraction

Chapter 8: Exceptions

Chapter 9: Magic Methods, Properties, and Iterators

Chapter 10: Batteries Included

Chapter 11: Files and Stuff

Chapter 12: Graphical User Interfaces

Chapter 13: Database Support

Chapter 14: Network Programming

Chapter 15: Python and the Web

Chapter 16: Testing, 1-2-3

Chapter 17: Extending Python

Chapter 18: Packaging Your Programs

Chapter 19: Playful Programming

Chapter 20: Project 1: Instant Markup

Chapter 21: Project 2: Painting a Pretty Picture

Chapter 22: Project 3: XML for All Occasions

Chapter 23: Project 4: In the News

Chapter 24: Project 5: A Virtual Tea Party

Chapter 25: Project 6: Remote Editing with CGI

Chapter 26: Project 7: Your Own Bulletin Board

Chapter 27: Project 8: File Sharing with XML-RPC

Chapter 28: Project 9: File Sharing II—Now with GUI!

Chapter 29: Project 10: Do-It-Yourself Arcade Game

Appendix A: The Short Version

Appendix B: Python Reference

Index

Black Hat Bash: Bash Scripting for Hackers and Pentesters

فهرست مطالب:

Chapter 1: Bash Basics

Chapter 2: Advanced Bash Concepts

Chapter 3: Setting Up a Hacking Lab

Chapter 4: Reconnaissance

Chapter 5: Vulnerability Scanning and Fuzzing

Chapter 6: Gaining a Web Shell

Chapter 7: Reverse Shells

Chapter 8: Local Information Gathering

Chapter 9: Privilege Escalation

Chapter 10: Persistence

Chapter 11: Network Probing and Lateral Movement

Chapter 12: Defense Evasion

Chapter 13: Exfiltration and Counter-Forensics

Bug Bounty Hunting Essentials

فهرست مطالب:

Preface

Chapter 1: Basics of Bug Bounty Hunting

Chapter 2: How to Write a Bug Bounty Report

Chapter 3: SQL Injection Vulnerabilities

Chapter 4: Cross-Site Request Forgery

Chapter 5: Application Logic Vulnerabilities

Chapter 6: Cross-Site Scripting Attacks

Chapter 7: SQL Injection

Chapter 8: Open Redirect Vulnerabilities

Chapter 9: Sub-Domain Takeovers

Chapter 10: XML External Entity Vulnerability

Chapter 11: Template Injection

Chapter 12: Top Bug Bounty Hunting Tools

Chapter 13: Top Learning Resources

Other Books You May Enjoy

Index

Building Data Centers with VXLAN BGP EVPN

فهرست مطالب:

Introduction

Chapter 1 Introduction to Programmable Fabric

Chapter 2 VXLAN BGP EVPN Basics

Chapter 3 VXLAN/EVPN Forwarding Characteristics

Chapter 4 The Underlay

Chapter 5 Multitenancy

Chapter 6 Unicast Forwarding

Chapter 7 Multicast Forwarding

Chapter 8 External Connectivity

Chapter 9 Multi-pod, Multifabric, and Data Center Interconnect (DCI)

Chapter 10 Layer 4–7 Services Integration

Chapter 11 Introduction to Fabric Management

Appendix A VXLAN BGP EVPN Implementation Options

Index

Burp Suite Cookbook: Web Application Security Made Easy with Burp Suite – Second Edition

فهرست مطالب:

Preface

Getting Started with Burp Suite

Getting to Know the Burp Suite of Tools

Configuring, Crawling, Auditing, and Reporting with Burp

Assessing Authentication Schemes

Assessing Authorization Checks

Assessing Session Management Mechanisms

Assessing Business Logic

Evaluating Input Validation Checks

Attacking the Client

Working with Burp Suite Macros and Extensions

Implementing Advanced Topic Attacks

Index

CC Certified in Cybersecurity Cert Guide

فهرست مطالب:

Introduction

1 Cybersecurity Principles

2 Risk Management

3 Threats to Security

4 Physical Access Controls

5 Logical Access Controls

6 Computer Networking Fundamentals

7 Network Security Infrastructure

8 Data and the System

9 Security in the Life

10 Security in Emergencies

11 Tying It All Together

12 After the Certification

13 Final Preparation

Glossary of Key Terms

Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&A

Appendix B CC Certified in Cybersecurity Cert Guide Exam Updates

Appendix C Study Planner

CC Certified in Cybersecurity Study Guide

فهرست مطالب:

Introduction

PART I DOMAIN 1: SECURITY PRINCIPLES

CHAPTER 1 Confidentiality, Integrity, Availability, and Non-repudiation

CHAPTER 2 Authentication and Authorization

CHAPTER 3 Privacy

CHAPTER 4 Risk Management

CHAPTER 5 Security Controls

CHAPTER 6 Ethics

CHAPTER 7 Security Governance Processes

PART II DOMAIN 2: BUSINESS CONTINUITY (BC), DISASTER RECOVERY (DR) & INCIDENT RESPONSE (IR) CONCEPTS

CHAPTER 8 Business Continuity

CHAPTER 9 Disaster Recovery

CHAPTER 10 Incident Response

PART III DOMAIN 3: ACCESS CONTROLS CONCEPTS

CHAPTER 11 Physical Access Controls

CHAPTER 12 Logical Access Controls

PART IV DOMAIN 4: NETWORK SECURITY

CHAPTER 13 Computer Networking

CHAPTER 14 Network Threats and Attacks

CHAPTER 15 Threat Identification and Prevention

CHAPTER 16 Network Security Infrastructure

CHAPTER 17 Cloud Computing

PART V DOMAIN 5: SECURITY OPERATIONS

CHAPTER 18 Encryption

CHAPTER 19 Data Handling

CHAPTER 20 Logging and Monitoring

CHAPTER 21 Configuration Management

CHAPTER 22 Best Practice Security Policies

CHAPTER 23 Security Awareness Training

Index

CCENT ICND1 Study Guide Exam 100-105 (Third Edition)

فهرست مطالب:

Introduction

Assessment Test

Answers to Assessment Test

Chapter 1 Internetworking

Chapter 2 Ethernet Networking and Data Encapsulation

Chapter 3 Introduction to TCP/IP

Chapter 4 Easy Subnetting

Chapter 5 VLSMs, Summarization, and Troubleshooting TCP/IP

Chapter 6 Cisco’s Internetworking Operating System (IOS)

Chapter 7 Managing a Cisco Internetwork

Chapter 8 Managing Cisco Devices

Chapter 9 IP Routing

Chapter 10 Layer 2 Switching

Chapter 11 VLANs and Inter-VLAN Routing

Chapter 12 Security

Chapter 13 Network Address Translation (NAT)

Chapter 14 Internet Protocol Version 6 (IPv6)

Appendix A Answers to Written Labs

Appendix B Answers to Review Questions

Appendix C Disabling and Configuring Network Services

CCENT/CCNA ICND1 640-822 Official Cert Guide – Third Edition

فهرست مطالب:

Introduction

Part I: Networking Fundamentals

Part II: LAN Switching

Part III: IPv4 Addressing and Subnetting

Part IV: IPv4 Routing

Part V: Wide-Area Networks

Part VI: Final Preparation

Part VII: Appendixes

Part VIII: DVD-Only

CCIE Enterprise Infrastructure Foundation

فهرست مطالب:

Chapter 1. Switching

Chapter 2. DMVPN

Chapter 3. IP Prefix Lists

Chapter 4. RIPv2

Chapter 5. EIGRP

Chapter 6. OSPF

Chapter 7. BGP

Chapter 8. MPLS and L3VPNs

Chapter 9. IPv6

Chapter 10. SD-WAN

Chapter 11. SD-ACCESS

CCNA 200-301 Official Cert Library

فهرست مطالب:

Introduction

Part I: Introduction to Networking

Part II: Implementing Ethernet LANs

Part III: Implementing VLANs and STP

Part IV: IPv4 Addressing

Part V: IPv4 Routing

Part VI: OSPF

Part VII: IP Version 6

Part VIII: Wireless LANs

Part IX: Appendixes

CCNA 200-301 Official Cert Library

فهرست مطالب:

Introduction

Part I: Introduction to Networking

Part II: Implementing Ethernet LANs

Part III: Implementing VLANs and STP

Part IV: IPv4 Addressing

Part V: IPv4 Routing

Part VI: OSPF

Part VII: IP Version 6

Part VIII: Wireless LANs

Part IX: Appendixes