ntroducing Windows Server 2016 Technical Preview
فهرست مطالب کتاب Windows Server 2016 Technical Preview:
Introduction
Chapter 1: The software-defined datacenter
Chapter 2: Compute
Chapter 3: Storage
Chapter 4: Networking
Chapter 5: Security
Chapter 6: App Plat
Chapter 7: Systems management
Oracle Database Notes For Professionals
فهرست مطالب کتاب Oracle Database Notes For Professionals:
Getting started with Oracle Database
Getting started with PL/SQL
Anonymous PL/SQL Block
PL/SQL procedure
Data Dictionary
Dates
Working with Dates
DUAL table
JOINS
Handling NULL values
String Manipulation
IF-THEN-ELSE Statement
Limiting the rows returned by a query (Pagination)
Recursive Sub-Query Factoring using the WITH Clause (A.K.A. Common Table Expressions)
Different ways to update records
Update with Joins
Functions
Statistical functions
Window Functions
Creating a Context
Splitting Delimited Strings
Collections and Records
Object Types
Loop
Cursors
Sequences
Indexes
Hints
Packages
Exception Handling
Error logging
Database Links
Table partitioning
Oracle Advanced Queuing (AQ)
constraints
Autonomous Transactions
Oracle MAF
level query
Hierarchical Retrieval With Oracle Database 12C
Data Pump
Bulk collect
Real Application Security
Assignments model and language
Triggers
Dynamic SQL
Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits
فهرست مطالب:
Introduction
1 Introduction to Penetration Testing
2 Standards
3 Cryptography
4 Reconnaissance
5 Malware
6 Hacking Windows
7 Web Hacking
8 Vulnerability Scanning
9 Introduction to Linux
10 Linux Hacking
11 Introduction to Kali Linux
12 General Hacking Techniques
13 Introduction to Metasploit
14 More with Metasploit
15 Introduction to Scripting with Ruby
16 Write Your Own Metasploit Exploits with Ruby
17 General Hacking Knowledge
18 Additional Pen Testing Topics
19 A Sample Pen Test Project
Appendix A: Answers to Chapter Multiple Choice Questions
Index Index
Pentesting Active Directory and Windows-based Infrastructure
فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:
1 Getting the Lab Ready and Attacking Exchange Server
2 Defense Evasion 25
3 Domain Reconnaissance and Discovery 51
4 Credential Access in Domain 71
5 Lateral Movement in Domain and Across Forests 101
6 Domain Privilege Escalation 141
7 Persistence on Domain Level 179
8 Abusing Active Directory Certificate Services 221
9 Compromising Microsoft SQL Server 267
10 Taking Over WSUS and SCCM
Practical Deployment of Cisco Identity Services Engine
فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:
Chapter 1: Introduction
Chapter 2: ISE Clustering and Basic Setup
Chapter 3: Authentication Methods
Chapter 4: Policy Elements
Chapter 5: Authentication
Chapter 6: Authorization
Chapter 7: Network Access Device Configuration
Chapter 8: ISE Profiling
Chapter 9: ISE Portals and Guest Access
Chapter 10: Deployment Strategies
Chapter 11: ISE Policy Design Practices
Chapter 12: Corporate Authentication Designs
Chapter 13: BYOD Designs
Chapter 14: ISE Posture Assessment
Chapter 15: VPN Integrations
Chapter 16: ISE Reporting and Logging
Chapter 17: ISE CLI
Chapter 18: ISE Administration
Practical Hardware Pentesting Learn attack and defense techniques for embedded sys
فهرست مطالب کتاب Practical Hardware Pentesting:
Practical Hardware Pentesting Second Edition Learn attack and defense
techniques for embedded systems in IoT and other devices
Feedback
Prerequisites the basics you will need
Approach to buying test equipment
The component pantry
Sample labs
Summary
Questions
Feedback
Technical requirements
Introduction to the boards
Why C and not Arduino
The toolchain
Introduction to C
Summary
Questions
Further reading
Feedback
Technical requirements
Understanding I2C
Understanding SPI
Understanding UART
Understanding D1W
Summary
Questions
Feedback
Technical requirements
Finding the data
Extracting the data
Understanding unknown storage structures
Mounting filesystems
Repacking
Summary
Questions
Further reading
Practical Social Engineering A Primer for the Ethical Hacker
فهرست مطالب کتاب Practical Social Engineering:
Acknowledgments
Introduction
PART I: THE BASICS
Chapter 1: What Is Social Engineering?
Chapter 2: Ethical Considerations in Social Engineering
PART II: OFFENSIVE SOCIAL ENGINEERING
Chapter 3: Preparing for an Attack
Chapter 4: Gathering Business OSINT
Chapter 5: Social Media and Public Documents
Chapter 6: Gathering OSINT About People
Chapter 7: Phishing
Chapter 8: Cloning a Landing Page
Chapter 9: Detection, Measurement, and Reporting
PART III: DEFENDING AGAINST SOCIAL ENGINEERING
Chapter 10: Proactive Defense Techniques
Chapter 11: Technical Email Controls
Chapter 12: Producing Threat Intelligence
Appendix A: Scoping Worksheet
Appendix B: Reporting Template
Appendix C: Information-Gathering Worksheet
Appendix D: Pretexting Sample
Appendix E: Exercises to Improve Your Social Engineering
Index
Pro SQL Server 2019 Administration
فهرست مطالب کتاب Pro SQL Server 2019 Administration:
Chapter 2: GUI Installation
Chapter 3: Server Core Installation
Chapter 4: Installation on Heterogeneous Operating Systems
Chapter 5: Configuring the Instance
Chapter 6: Database Configuration
Chapter 7: Table Optimizations
Chapter 8: Indexes and Statistics
Chapter 9: Database Consistency
Chapter 10: SQL Server Security Mode
Chapter 11: Encryption
Chapter 12: Backups and Restores
Chapter 13: High Availability and Disaster Recovery Concepts
Chapter 14: Implementing Always On Availability Groups
Chapter 15: Implementing Log Shipping
Chapter 16: Scaling Workloads
Chapter 17: SQL Server Metadata
Chapter 18: Locking and Blocking
Chapter 19: Extended Events
Chapter 20: Query Store
Chapter 21: Distributed Replay
Chapter 22: Automating Maintenance Routines
Chapter 23: Policy-Based Management
Chapter 24: Resource Governor
Python Basics: A Practical Introduction to Python 3
فهرست مطالب:
Contents
Foreword
Introduction
Setting Up Python
Your First Python Program
Strings and String Methods
Numbers and Math
Functions and Loops
Finding and Fixing Code Bugs
Conditional Logic and Control Flow
Tuples, Lists, and Dictionaries
Object-Oriented Programming (OOP)
Modules and Packages
File Input and Output
Installing Packages With pip
Creating and Modifying PDF Files
Working With Databases
Interacting With the Web
Scientiрc Computing and Graphing
Graphical User Interfaces
Final Thoughts and Next Steps
Python Notes For Professionals
فهرست مطالب کتاب Python Notes For Professionals:
Getting started with Python Language
Python Data Types
Indentation
Comments and Documentation
Date and Time
Date Formatting
Enum
Set
Simple Mathematical Operators
Bitwise Operators
Boolean Operators
Operator Precedence
Variable Scope and Binding
Conditionals
Comparisons
Loops
Arrays
Multidimensional arrays
Dictionary
List
List comprehensions
List slicing (selecting parts of lists)
groupby()
Linked lists
Linked List Node
Filter
Heapq
Tuple
Basic Input and Output
Files & Folders I/O
path
Iterables and Iterators
Functions
Defining functions with list arguments
Functional Programming in Python
Partial functions
Decorators
Classes
Metaclasses
String Formatting
String Methods
Using loops within functions
Importing modules
Difference between Module and Package
Math Module
Complex math
Collections module
Operator module
JSON Module
Sqlite3 Module
The os Module
The locale Module
Itertools Module
Asyncio Module
Random module
Functools Module
The dis module
The base64 Module
Queue Module
Deque Module
Webbrowser Module
tkinter
pyautogui module
Indexing and Slicing
Plotting with Matplotlib
graph-tool
Generators
Reduce
Map Function
Exponentiation
Searching
Sorting, Minimum and Maximum
Counting
The Print Function
Regular Expressions (Regex)
Copying data
Context Managers (“with” Statement)
The __name__ special variable
Checking Path Existence and Permissions
Creating Python packages
Usage of “pip” module: PyPI Package Manager
pip: PyPI Package Manager
Parsing Command Line arguments
Subprocess Library
py
Recursion
Type Hints
Exceptions
Raise Custom Errors / Exceptions
Commonwealth Exceptions
urllib
Web scraping with Python
HTML Parsing
Manipulating XML
Python Requests Post
Distribution
Property Objects
Overloading
Polymorphism
Method Overriding
User-Defined Methods
String representations of class instances: __str__ and __repr__ methods
Debugging
Reading and Writing CSV
Writing to CSV from String or List
Dynamic code execution with `exec` and `eval`
PyInstaller – Distributing Python Code
Data Visualization with Python
The Interpreter (Command Line Console)
*args and **kwargs
Garbage Collection
Pickle data serialisation
Binary Data
Idioms
Data Serialization
Multiprocessing
Multithreading
Processes and Threads
Python concurrency
Parallel computation
Sockets
Websockets
Sockets And Message Encryption/Decryption Between Client and Server
Python Networking
Python HTTP Server
Flask
Introduction to RabbitMQ using AMQPStorm
Descriptor
tempfile NamedTemporaryFile
Input, Subset and Output External Data Files using Pandas
Unzipping Files
Working with ZIP archives
Getting start with GZip
Stack
Working around the Global Interpreter Lock (GIL)
Deployment
Logging
Web Server Gateway Interface (WSGI)
Python Server Sent Events
Alternatives to switch statement from other languages
List destructuring (aka packing and unpacking)
Accessing Python source code and bytecode
Mixins
Attribute Access
ArcPy
Abstract Base Classes (abc)
Plugin and Extension Classes
Immutable datatypes(int, float, str, tuple and frozensets)
Incompatibilities moving from Python 2 to Python 3
2to3 tool
Non-official Python implementations
Abstract syntax tree
Unicode and bytes
Python Serial Communication (pyserial)
Neo4j and Cypher using Py2Neo
Basic Curses with Python
Templates in python
Pillow
The pass statement
CLI subcommands with precise help output
Database Access
Connecting Python to SQL Server
PostgreSQL
Python and Excel
Turtle Graphics
Python Persistence
Design Patterns
hashlib
Creating a Windows service using Python
Mutable vs Immutable (and Hashable) in Python
configparser
Optical Character Recognition
Virtual environments
Python Virtual Environment – virtualenv
Virtual environment with virtualenvwrapper
Create virtual environment with virtualenvwrapper in windows
sys
ChemPy – python package
pygame
Pyglet
Audio
pyaudio
shelve
IoT Programming with Python and Raspberry PI
kivy – Cross-platform Python Framework for NUI Development
Pandas Transform: Preform operations on groups and concatenate the results
Similarities in syntax, Differences in meaning: Python vs. JavaScript
Call Python from C#
ctypes
Writing extensions
Python Lex-Yacc
Unit Testing
test
Profiling
Python speed of program
Performance optimization
Security and Cryptography
Secure Shell Connection in Python
Python Anti-Patterns
Common Pitfalls
Hidden Features
React JS Notes for Professionals
فهرست مطالب کتاب React JS Notes for Professionals:
Getting started with React
Components
Using ReactJS with TypeScript
State in React
Props in React
React Component Lifecycle
Forms and User Input
React Boilerplate [React + Babel + Webpack]
Using ReactJS with jQuery
React Routing
Communicate Between Components
How to setup a basic webpack, react and babel environment
createClass vs extends React.Component
React AJAX call
Communication Between Components
Stateless Functional Components
Performance
Introduction to Server-Side Rendering
Setting Up React Environment
Using React with Flow
JSX
React Forms
User interface solutions
Using ReactJS in Flux way
React, Webpack & TypeScript installation
How and why to use keys in React
Keys in react
Higher Order Components
React with Redux
Installation
React Tools
React Native Notes For Professionals
فهرست مطالب کتاب React Native Notes For Professionals:
ندارد