Hacker Highschool Security Awareness For Teens – Lesson 7: Attack Analysis
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 7: Attack Analysis:
Contributors
Introduction
Netstat and Host Application Firewalls
Netstat
Firewalls
Exercises
Packet Sniffers
2.1 Sniffing
Decoding Network Traffic
Sniffing Other Computers
Intrusion Detection Systems
Exercises
Honeypots and Honeynets
Types of Honeypots
Building a Honeypot
Exercises
Further Reading
Glossary
Hacker Highschool Security Awareness For Teens – Lesson 8: Forensics
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 8: Forensics:
Contributors
Introduction
Forensic Principles
Introduction
Avoid Contamination
Act Methodically
Chain of Evidence
Conclusion
Stand-alone Forensics
Introduction
Hard Drive and Storage Media Basics
Encryption, Decryption and File Formats
Finding a Needle in a Haystack
find
grep
strings
awk
The Pipe “|”
Making use of other sources
Network Forensics
Introduction
Firewall Logs
Mail Headers
Further Reading
Hacker Highschool Security Awareness For Teens – Lesson 9: Email Security
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 9: Email Security:
Contributors
Introduction
How E-mail Works
E-mail Accounts
POP and SMTP
Web Mail
Safe E-mail Usage Part 1: Receiving
Spam, Phishing and Fraud
HTML E-Mail
Attachment Security
Forged headers
Safe E-mail Usage Part 2: Sending
Digital Certificates
Digital Signatures
Getting a certificate
Encryption
How does it work
Decryption
Is Encryption Unbreakable
Connection Security
Hacker Highschool Security Awareness For Teens Lesson 4 Services and Connections
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 4: Services and Connections:
Contributors
Introduction
Services
HTTP and The Web
E-Mail – POP and SMTP
IRC
FTP
Telnet and SSH
DNS
DHCP
Connections
ISPs
Plain Old Telephone Service
DSL
Cable Modems
Further Reading
Hackers & Painters: Big Ideas from the Computer Age
فهرست مطالب کتاب Hackers & Painters: Big Ideas from the Computer Age:
1. Why Nerds Are Unpopular
2. Hackers and Painters
3. What You Can’t Say
4. Good Bad Attitude
5. The Other Road Ahead
6. How to Make Wealth
7. Mind the Gap
8. A Plan for Spam
9. Taste for Makers
10. Programming Languages Explained
11. The Hundred-Year Language
12. Beating the Averages
13. Revenge of the Nerds
14. The Dream Language
15. Design and Research
Hackers Beware: Defending Your Network From The Wiley Hacker
فهرست مطالب کتاب Hackers Beware:
Introduction
How and Why Hackers Do It
Information Gathering
Spoofing
Session Hijacking
Denial of Service Attacks
Buffer Overflow Attacks
Password Security
Microsoft NT Password Crackers
UNIX Password Crackers
Fundamentals of Microsoft NT
Specific Exploits for NT
Fundamentals of UNIX
Specific Exploits for UNIX
Preserving Access
Covering the Tracks
Other Types of Attacks
SANS Top 10
Putting It All Together
Summary
Hackers Delight (Second Edition)
فهرست مطالب کتاب Hacker’s Delight (Second Edition):
Chapter 1. Introduction
Chapter 2. Basics
Chapter 3. Power-Of-2 Boundaries
Chapter 4. Arithmetic Bounds
Chapter 5. Counting Bits
Chapter 6. Searching Words
Chapter 7. Rearranging Bits And Bytes
Chapter 8. Multiplication
Chapter 9. Integer Division
Chapter 10. Integer Division By Constants
Chapter 11. Some Elementary Functions
Chapter 12. Unusual Bases For Number Systems
Chapter 13. Gray Code
Chapter 14. Cyclic Redundancy Check
Chapter 15. Error-Correcting Codes
Chapter 16. Hilbert’s Curve
Chapter 17. Floating-Point
Chapter 18. Formulas For Primes
Hacking Exposed Malware & Rootkits: Malware & Rootkits Security Secrets & Solutions
فهرست مطالب کتاب Hacking Exposed Malware & Rootkits:
Part I Malware
Case Study: Please Review This Before Our Quarterly Meeting
Method of Infection
Malware Functionality
Part II Rootkits
User-Mode Rootkits
Kernel-Mode Rootkits
Virtual Rootkits
The Future of Rootkits: If You Think It’s Bad Now…
Part III Prevention Technologies
Antivirus
Host Protection Systems
Host-Based Intrusion Prevention
Rootkit Detection
General Security Practices
Appendix System Integrity Analysis: Building Your Own Rootkit Detector
Index
Hacking Exposed Windows: Windows Security Secrets & Solutions (Third Edition)
فهرست مطالب کتاب Hacking Exposed Windows: Windows Security Secrets & Solutions (Third Edition):
Information Security Basics
The Windows Security Architecture from the Hacker’s Perspective Footprinting and Scanning
Enumeration
Hacking Windows-Specif ic Services
Discovering and Exploiting Windows Vulnerabilities
Post-Exploit Pillaging
Achieving Stealth and Maintaining Presence
Hacking SQL Server
Hacking Microsoft Client Apps
Physical Attacks
Windows Security Features and Tools
Windows Security Checklist
About the Companion Website
Hacking Exposed: Network Security Secrets & Solutions (Second Edition)
فهرست مطالب کتاب Hacking Exposed: Network Security Secrets & Solutions (Second Edition):
Part 1: Casing the Establishment
Footprinting
Scanning
Enumeration
Part II: System Hacking
Hacking Windows 95/98 and ME
Hacking Windows NT
Hacking Windows 2000
Novell NetWare Hacking
Hacking UNIX
Part III: Network Hacking
Dial-Up, PBX, Voicemail, and VPN Hacking
Network Devices
Firewalls
Denial of Service (DoS) Attacks
Part IV: Software Hacking
Remote Control Insecurities
Advanced Techniques
Web Hacking
Hacking the Internet User
Part V: Appendixes
Ports
Top 14 Security Vulnerabilities
About the Companion Web Site
Index
Hacking with Python The Ultimate Beginners Guide
فهرست مطالب Hacking with Python The Ultimate Beginners Guide:
Chapter 1: Preparation For Hacking
Chapter 2: Python Basics
Chapter 3: Writing Python Programs
Chapter 5: Operators and Expressions
Chapter 6: Functions and Modules
Chapter 7: Setting Up for Hacking
Chapter 8: Network Hacking
Chapter 9: Hacks for the Web
Chapter 10: Understanding Attacks Using Python
Chapter 11: Other Nifty Hacks to Try
Conclusion
Bonus: Preview Of ‘Introduction to Python 3
How Google Tests Software
فهرست مطالب کتاب How Google Tests Software:
Foreword & Preface
Foreword by Alberto Savoia
Foreword by Patrick Copeland
Preface
Chapter 1: Introduction to Google Software Testing
Quality ≠ Test
Roles
Organizational Structure
Crawl, Walk, Run
Types of Tests
Chapter 2: The Software Engineer in Test
The Life of an SET
Development and Test Workflow
Who Are These SETs Anyway?
The Early Phase of a Project
Team Structure
Design Docs
Interfaces and Protocols
Automation Planning
Testability
SET Workflow: An Example
Test Execution
Test Size Definitions
Use of Test Sizes in Shared Infrastructure
Benefits of Test Sizes
Test Runtime Requirements
Case Study: Change in Common Library
Test Certified
Interviews:
Founders of the Test Certified Program
SETs
Tool Developer Ted Mao
WebDriver Creator Simon Stewart
Chapter 3: The Test Engineer
A User-Facing Test Role
The Life of a TE
Test Planning
Risk
Life of a Test Case
Life of a Bug
Recruiting TEs
Test Leadership at Google
Maintenance Mode Testing
Quality Bots Experiment
BITE Experiment
Google Test Analytics
Free Testing Workflow
External Vendors
Interviews:
Google Docs TE – Lindsay Webster
YouTube TE – Apple Chow
Chapter 4: The Test Engineering Manager
The Life of a TEM
Getting Projects and People
Impact
Interviews:
Gmail TEM – Ankit Mehta
Android TEM – Hung Dang
Chrome TEM – Joel Hynoski
The Test Engineering Director
Interviews:
Search & Geo Test Director – Shelton Mar
Engineering Tools Director – Ashish Kumar
Google India Test Director – Sujay Sahni
Engineering Manager – Brad Green
James Whittaker
Chapter 5: Improving How Google Tests Software
Fatal Flaws in Google’s Process
The Future of the SET
The Future of the TE
The Future of the Test Director and Manager
The Future of Test Infrastructure
In Conclusion
Appendix A: Chrome OS Test Plan
Overview of Themes
Risk Analysis
Per-Build Baseline Testing
Per-LKG Day Testing
Per-Release Testing
Manual Versus Automation
Dev Versus Test Quality Focus
Release Channels
User Input
Test Case Repositories
Test Dashboarding
Virtualization
Performance
Stress, Long-Running, and Stability
Test Execution Framework (Autotest)
OEMs
Hardware Lab
E2E Farm Automation
Testing the Browser AppManager
Browser Testability
Hardware
Timeline
Primary Test Drivers
Relevant Documents
Appendix B: Test Tours for Chrome
The Shopping Tour
The Student Tour
The International Calling Tour
The Landmark Tour
The All Nighter Tour
The Artisan’s Tour
Tools in Chrome
The Bad Neighborhood Tour
The Personalization Tour
Appendix C: Blog Posts on Tools and Code
Take a BITE out of Bugs and Redundant Labor
Unleash the QualityBots
RPF: Google’s Record Playback Framework
Google Test Analytics — Now in Open Source
Comprehensive
Quick
Actionable
Sustained Value
Index