Hacker Highschool Security Awareness For Teens – Lesson 7: Attack Analysis

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 7: Attack Analysis:

Contributors

Introduction

Netstat and Host Application Firewalls

Netstat

Firewalls

Exercises

Packet Sniffers

2.1 Sniffing

Decoding Network Traffic

Sniffing Other Computers

Intrusion Detection Systems

Exercises

Honeypots and Honeynets

Types of Honeypots

Building a Honeypot

Exercises

Further Reading

Glossary

Hacker Highschool Security Awareness For Teens – Lesson 8: Forensics

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 8: Forensics:

Contributors

Introduction

Forensic Principles

Introduction

Avoid Contamination

Act Methodically

Chain of Evidence

Conclusion

Stand-alone Forensics

Introduction

Hard Drive and Storage Media Basics

Encryption, Decryption and File Formats

Finding a Needle in a Haystack

find

grep

strings

awk

The Pipe “|”

Making use of other sources

Network Forensics

Introduction

Firewall Logs

Mail Headers

Further Reading

Hacker Highschool Security Awareness For Teens – Lesson 9: Email Security

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 9: Email Security:

Contributors

Introduction

How E-mail Works

E-mail Accounts

POP and SMTP

Web Mail

Safe E-mail Usage Part 1: Receiving

Spam, Phishing and Fraud

HTML E-Mail

Attachment Security

Forged headers

Safe E-mail Usage Part 2: Sending

Digital Certificates

Digital Signatures

Getting a certificate

Encryption

How does it work

Decryption

Is Encryption Unbreakable

Connection Security

Hacker Highschool Security Awareness For Teens Lesson 4 Services and Connections

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 4: Services and Connections:

Contributors

Introduction

Services

HTTP and The Web

E-Mail – POP and SMTP

IRC

FTP

Telnet and SSH

DNS

DHCP

Connections

ISPs

Plain Old Telephone Service

DSL

Cable Modems

Further Reading

Hackers & Painters: Big Ideas from the Computer Age

فهرست مطالب کتاب Hackers & Painters: Big Ideas from the Computer Age:

1. Why Nerds Are Unpopular

2. Hackers and Painters

3. What You Can’t Say

4. Good Bad Attitude

5. The Other Road Ahead

6. How to Make Wealth

7. Mind the Gap

8. A Plan for Spam

9. Taste for Makers

10. Programming Languages Explained

11. The Hundred-Year Language

12. Beating the Averages

13. Revenge of the Nerds

14. The Dream Language

15. Design and Research

Hackers Beware: Defending Your Network From The Wiley Hacker

فهرست مطالب کتاب Hackers Beware:

Introduction

How and Why Hackers Do It

Information Gathering

Spoofing

Session Hijacking

Denial of Service Attacks

Buffer Overflow Attacks

Password Security

Microsoft NT Password Crackers

UNIX Password Crackers

Fundamentals of Microsoft NT

Specific Exploits for NT

Fundamentals of UNIX

Specific Exploits for UNIX

Preserving Access

Covering the Tracks

Other Types of Attacks

SANS Top 10

Putting It All Together

Summary

Hackers Delight (Second Edition)

فهرست مطالب کتاب Hacker’s Delight (Second Edition):

Chapter 1. Introduction

Chapter 2. Basics

Chapter 3. Power-Of-2 Boundaries

Chapter 4. Arithmetic Bounds

Chapter 5. Counting Bits

Chapter 6. Searching Words

Chapter 7. Rearranging Bits And Bytes

Chapter 8. Multiplication

Chapter 9. Integer Division

Chapter 10. Integer Division By Constants

Chapter 11. Some Elementary Functions

Chapter 12. Unusual Bases For Number Systems

Chapter 13. Gray Code

Chapter 14. Cyclic Redundancy Check

Chapter 15. Error-Correcting Codes

Chapter 16. Hilbert’s Curve

Chapter 17. Floating-Point

Chapter 18. Formulas For Primes

Hacking Exposed Malware & Rootkits: Malware & Rootkits Security Secrets & Solutions

فهرست مطالب کتاب Hacking Exposed Malware & Rootkits:

Part I Malware

Case Study: Please Review This Before Our Quarterly Meeting

Method of Infection

Malware Functionality

Part II Rootkits

User-Mode Rootkits

Kernel-Mode Rootkits

Virtual Rootkits

The Future of Rootkits: If You Think It’s Bad Now…

Part III Prevention Technologies

Antivirus

Host Protection Systems

Host-Based Intrusion Prevention

Rootkit Detection

General Security Practices

Appendix System Integrity Analysis: Building Your Own Rootkit Detector

Index

Hacking Exposed Windows: Windows Security Secrets & Solutions (Third Edition)

فهرست مطالب کتاب Hacking Exposed Windows: Windows Security Secrets & Solutions (Third Edition):

Information Security Basics

The Windows Security Architecture from the Hacker’s Perspective Footprinting and Scanning

Enumeration

Hacking Windows-Specif ic Services

Discovering and Exploiting Windows Vulnerabilities

Post-Exploit Pillaging

Achieving Stealth and Maintaining Presence

Hacking SQL Server

Hacking Microsoft Client Apps

Physical Attacks

Windows Security Features and Tools

Windows Security Checklist

About the Companion Website

Hacking Exposed: Network Security Secrets & Solutions (Second Edition)

فهرست مطالب کتاب Hacking Exposed: Network Security Secrets & Solutions (Second Edition):

Part 1: Casing the Establishment

Footprinting

Scanning

Enumeration

Part II: System Hacking

Hacking Windows 95/98 and ME

Hacking Windows NT

Hacking Windows 2000

Novell NetWare Hacking

Hacking UNIX

Part III: Network Hacking

Dial-Up, PBX, Voicemail, and VPN Hacking

Network Devices

Firewalls

Denial of Service (DoS) Attacks

Part IV: Software Hacking

Remote Control Insecurities

Advanced Techniques

Web Hacking

Hacking the Internet User

Part V: Appendixes

Ports

Top 14 Security Vulnerabilities

About the Companion Web Site

Index

Hacking with Python The Ultimate Beginners Guide

فهرست مطالب Hacking with Python The Ultimate Beginners Guide:

Chapter 1: Preparation For Hacking

Chapter 2: Python Basics

Chapter 3: Writing Python Programs

Chapter 5: Operators and Expressions

Chapter 6: Functions and Modules

Chapter 7: Setting Up for Hacking

Chapter 8: Network Hacking

Chapter 9: Hacks for the Web

Chapter 10: Understanding Attacks Using Python

Chapter 11: Other Nifty Hacks to Try

Conclusion

Bonus: Preview Of ‘Introduction to Python 3

How Google Tests Software

فهرست مطالب کتاب How Google Tests Software:

Foreword & Preface

Foreword by Alberto Savoia

Foreword by Patrick Copeland

Preface

Chapter 1: Introduction to Google Software Testing

Quality ≠ Test

Roles

Organizational Structure

Crawl, Walk, Run

Types of Tests

Chapter 2: The Software Engineer in Test

The Life of an SET

Development and Test Workflow

Who Are These SETs Anyway?

The Early Phase of a Project

Team Structure

Design Docs

Interfaces and Protocols

Automation Planning

Testability

SET Workflow: An Example

Test Execution

Test Size Definitions

Use of Test Sizes in Shared Infrastructure

Benefits of Test Sizes

Test Runtime Requirements

Case Study: Change in Common Library

Test Certified

Interviews:

Founders of the Test Certified Program

SETs

Tool Developer Ted Mao

WebDriver Creator Simon Stewart

Chapter 3: The Test Engineer

A User-Facing Test Role

The Life of a TE

Test Planning

Risk

Life of a Test Case

Life of a Bug

Recruiting TEs

Test Leadership at Google

Maintenance Mode Testing

Quality Bots Experiment

BITE Experiment

Google Test Analytics

Free Testing Workflow

External Vendors

Interviews:

Google Docs TE – Lindsay Webster

YouTube TE – Apple Chow

Chapter 4: The Test Engineering Manager

The Life of a TEM

Getting Projects and People

Impact

Interviews:

Gmail TEM – Ankit Mehta

Android TEM – Hung Dang

Chrome TEM – Joel Hynoski

The Test Engineering Director

Interviews:

Search & Geo Test Director – Shelton Mar

Engineering Tools Director – Ashish Kumar

Google India Test Director – Sujay Sahni

Engineering Manager – Brad Green

James Whittaker

Chapter 5: Improving How Google Tests Software

Fatal Flaws in Google’s Process

The Future of the SET

The Future of the TE

The Future of the Test Director and Manager

The Future of Test Infrastructure

In Conclusion

Appendix A: Chrome OS Test Plan

Overview of Themes

Risk Analysis

Per-Build Baseline Testing

Per-LKG Day Testing

Per-Release Testing

Manual Versus Automation

Dev Versus Test Quality Focus

Release Channels

User Input

Test Case Repositories

Test Dashboarding

Virtualization

Performance

Stress, Long-Running, and Stability

Test Execution Framework (Autotest)

OEMs

Hardware Lab

E2E Farm Automation

Testing the Browser AppManager

Browser Testability

Hardware

Timeline

Primary Test Drivers

Relevant Documents

Appendix B: Test Tours for Chrome

The Shopping Tour

The Student Tour

The International Calling Tour

The Landmark Tour

The All Nighter Tour

The Artisan’s Tour

Tools in Chrome

The Bad Neighborhood Tour

The Personalization Tour

Appendix C: Blog Posts on Tools and Code

Take a BITE out of Bugs and Redundant Labor

Unleash the QualityBots

RPF: Google’s Record Playback Framework

Google Test Analytics — Now in Open Source

Comprehensive

Quick

Actionable

Sustained Value

Index