Beginning Python: From Novice to Professional – Third Edition
فهرست مطالب:
About the Author
About the Technical Reviewer
Preface
Introduction
Chapter 1: Instant Hacking: The Basics
Chapter 2: Lists and Tuples
Chapter 3: Working with Strings
Chapter 4: Dictionaries: When Indices Won’t Do
Chapter 5: Conditionals, Loops, and Some Other Statements
Chapter 6: Abstraction
Chapter 7: More Abstraction
Chapter 8: Exceptions
Chapter 9: Magic Methods, Properties, and Iterators
Chapter 10: Batteries Included
Chapter 11: Files and Stuff
Chapter 12: Graphical User Interfaces
Chapter 13: Database Support
Chapter 14: Network Programming
Chapter 15: Python and the Web
Chapter 16: Testing, 1-2-3
Chapter 17: Extending Python
Chapter 18: Packaging Your Programs
Chapter 19: Playful Programming
Chapter 20: Project 1: Instant Markup
Chapter 21: Project 2: Painting a Pretty Picture
Chapter 22: Project 3: XML for All Occasions
Chapter 23: Project 4: In the News
Chapter 24: Project 5: A Virtual Tea Party
Chapter 25: Project 6: Remote Editing with CGI
Chapter 26: Project 7: Your Own Bulletin Board
Chapter 27: Project 8: File Sharing with XML-RPC
Chapter 28: Project 9: File Sharing II—Now with GUI!
Chapter 29: Project 10: Do-It-Yourself Arcade Game
Appendix A: The Short Version
Appendix B: Python Reference
Index
Black Hat Bash: Bash Scripting for Hackers and Pentesters
فهرست مطالب:
Chapter 1: Bash Basics
Chapter 2: Advanced Bash Concepts
Chapter 3: Setting Up a Hacking Lab
Chapter 4: Reconnaissance
Chapter 5: Vulnerability Scanning and Fuzzing
Chapter 6: Gaining a Web Shell
Chapter 7: Reverse Shells
Chapter 8: Local Information Gathering
Chapter 9: Privilege Escalation
Chapter 10: Persistence
Chapter 11: Network Probing and Lateral Movement
Chapter 12: Defense Evasion
Chapter 13: Exfiltration and Counter-Forensics
Bug Bounty Hunting Essentials
فهرست مطالب:
Preface
Chapter 1: Basics of Bug Bounty Hunting
Chapter 2: How to Write a Bug Bounty Report
Chapter 3: SQL Injection Vulnerabilities
Chapter 4: Cross-Site Request Forgery
Chapter 5: Application Logic Vulnerabilities
Chapter 6: Cross-Site Scripting Attacks
Chapter 7: SQL Injection
Chapter 8: Open Redirect Vulnerabilities
Chapter 9: Sub-Domain Takeovers
Chapter 10: XML External Entity Vulnerability
Chapter 11: Template Injection
Chapter 12: Top Bug Bounty Hunting Tools
Chapter 13: Top Learning Resources
Other Books You May Enjoy
Index
Building Data Centers with VXLAN BGP EVPN
فهرست مطالب:
Introduction
Chapter 1 Introduction to Programmable Fabric
Chapter 2 VXLAN BGP EVPN Basics
Chapter 3 VXLAN/EVPN Forwarding Characteristics
Chapter 4 The Underlay
Chapter 5 Multitenancy
Chapter 6 Unicast Forwarding
Chapter 7 Multicast Forwarding
Chapter 8 External Connectivity
Chapter 9 Multi-pod, Multifabric, and Data Center Interconnect (DCI)
Chapter 10 Layer 4–7 Services Integration
Chapter 11 Introduction to Fabric Management
Appendix A VXLAN BGP EVPN Implementation Options
Index
Burp Suite Cookbook: Web Application Security Made Easy with Burp Suite – Second Edition
فهرست مطالب:
Preface
Getting Started with Burp Suite
Getting to Know the Burp Suite of Tools
Configuring, Crawling, Auditing, and Reporting with Burp
Assessing Authentication Schemes
Assessing Authorization Checks
Assessing Session Management Mechanisms
Assessing Business Logic
Evaluating Input Validation Checks
Attacking the Client
Working with Burp Suite Macros and Extensions
Implementing Advanced Topic Attacks
Index
CC Certified in Cybersecurity Cert Guide
فهرست مطالب:
Introduction
1 Cybersecurity Principles
2 Risk Management
3 Threats to Security
4 Physical Access Controls
5 Logical Access Controls
6 Computer Networking Fundamentals
7 Network Security Infrastructure
8 Data and the System
9 Security in the Life
10 Security in Emergencies
11 Tying It All Together
12 After the Certification
13 Final Preparation
Glossary of Key Terms
Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&A
Appendix B CC Certified in Cybersecurity Cert Guide Exam Updates
Appendix C Study Planner
CC Certified in Cybersecurity Study Guide
فهرست مطالب:
Introduction
PART I DOMAIN 1: SECURITY PRINCIPLES
CHAPTER 1 Confidentiality, Integrity, Availability, and Non-repudiation
CHAPTER 2 Authentication and Authorization
CHAPTER 3 Privacy
CHAPTER 4 Risk Management
CHAPTER 5 Security Controls
CHAPTER 6 Ethics
CHAPTER 7 Security Governance Processes
PART II DOMAIN 2: BUSINESS CONTINUITY (BC), DISASTER RECOVERY (DR) & INCIDENT RESPONSE (IR) CONCEPTS
CHAPTER 8 Business Continuity
CHAPTER 9 Disaster Recovery
CHAPTER 10 Incident Response
PART III DOMAIN 3: ACCESS CONTROLS CONCEPTS
CHAPTER 11 Physical Access Controls
CHAPTER 12 Logical Access Controls
PART IV DOMAIN 4: NETWORK SECURITY
CHAPTER 13 Computer Networking
CHAPTER 14 Network Threats and Attacks
CHAPTER 15 Threat Identification and Prevention
CHAPTER 16 Network Security Infrastructure
CHAPTER 17 Cloud Computing
PART V DOMAIN 5: SECURITY OPERATIONS
CHAPTER 18 Encryption
CHAPTER 19 Data Handling
CHAPTER 20 Logging and Monitoring
CHAPTER 21 Configuration Management
CHAPTER 22 Best Practice Security Policies
CHAPTER 23 Security Awareness Training
Index
CCENT ICND1 Study Guide Exam 100-105 (Third Edition)
فهرست مطالب:
Introduction
Assessment Test
Answers to Assessment Test
Chapter 1 Internetworking
Chapter 2 Ethernet Networking and Data Encapsulation
Chapter 3 Introduction to TCP/IP
Chapter 4 Easy Subnetting
Chapter 5 VLSMs, Summarization, and Troubleshooting TCP/IP
Chapter 6 Cisco’s Internetworking Operating System (IOS)
Chapter 7 Managing a Cisco Internetwork
Chapter 8 Managing Cisco Devices
Chapter 9 IP Routing
Chapter 10 Layer 2 Switching
Chapter 11 VLANs and Inter-VLAN Routing
Chapter 12 Security
Chapter 13 Network Address Translation (NAT)
Chapter 14 Internet Protocol Version 6 (IPv6)
Appendix A Answers to Written Labs
Appendix B Answers to Review Questions
Appendix C Disabling and Configuring Network Services
CCENT/CCNA ICND1 640-822 Official Cert Guide – Third Edition
فهرست مطالب:
Introduction
Part I: Networking Fundamentals
Part II: LAN Switching
Part III: IPv4 Addressing and Subnetting
Part IV: IPv4 Routing
Part V: Wide-Area Networks
Part VI: Final Preparation
Part VII: Appendixes
Part VIII: DVD-Only
CCIE Enterprise Infrastructure Foundation
فهرست مطالب:
Chapter 1. Switching
Chapter 2. DMVPN
Chapter 3. IP Prefix Lists
Chapter 4. RIPv2
Chapter 5. EIGRP
Chapter 6. OSPF
Chapter 7. BGP
Chapter 8. MPLS and L3VPNs
Chapter 9. IPv6
Chapter 10. SD-WAN
Chapter 11. SD-ACCESS
CCNA 200-301 Official Cert Library
فهرست مطالب:
Introduction
Part I: Introduction to Networking
Part II: Implementing Ethernet LANs
Part III: Implementing VLANs and STP
Part IV: IPv4 Addressing
Part V: IPv4 Routing
Part VI: OSPF
Part VII: IP Version 6
Part VIII: Wireless LANs
Part IX: Appendixes
CCNA 200-301 Official Cert Library
فهرست مطالب:
Introduction
Part I: Introduction to Networking
Part II: Implementing Ethernet LANs
Part III: Implementing VLANs and STP
Part IV: IPv4 Addressing
Part V: IPv4 Routing
Part VI: OSPF
Part VII: IP Version 6
Part VIII: Wireless LANs
Part IX: Appendixes