How Marketers Master Business Growth on LinkedIn: The Marketer’s Guide
فهرست مطالب کتاب How Marketers Master Business Growth on LinkedIn:
ندارد
How to Use Instagram for Business: Guide 2023
فهرست مطالب:
Introduction
Identifying goals & creating a strategy
Engagement and followers
Square pix to video: Insta today
Instagram: The Platform In-depth
Conclusion
Additional resources
HPE Synergy Administration Student Guide
فهرست مطالب کتاب HPE Synergy Administration Student Guide:
Module 0: Course Overview
Module 1: HPE Synergy Solution
Module 2: HPE Synergy Cabling
Module 3: HPE Synergy Networking
Module 4: HPE Synergy Storage
Module 5: HPE Synergy Composability
Module 6: HPE Synergy Firmware
Module 7: HPE Synergy Analytics
Module 8: HPE Synergy Maintenance and Growth
HPE Synergy For Dummies, 2nd Edition
فهرست مطالب:
Introduction
Chapter 1 The Idea Economy and Composable Infrastructure
Chapter 2 HPE Synergy Overview
Chapter 3 HPE Synergy Frame
Chapter 4 HPE Synergy Composer
Chapter 5 HPE Synergy Image Streamer
Chapter 6 HPE Synergy Composable Compute
Chapter 7 HPE Synergy Composable Storage
Chapter 8 HPE Synergy Composable Fabric
Chapter 9 Ten Key Tips about Synergy
Appendix HPE Services for Synergy
HTTP The Definitive Guide
فهرست مطالب کتاب HTTP The Definitive Guide :
Part I. HTTP: The Web’s Foundation
Part II. HTTP Architecture
Part III. Identification, Authorization, and Security
Part IV. Entities, Encodings, and Internationalization
Part V. Content Publishing and Distribution
Part VI. Appendixes
IAPP CIPM Certified Information Privacy Manager Study Guide
فهرست مطالب کتاب IAPP CIPM Certified Information Privacy Manager Study Guide:
Introduction
Chapter 1: Developing a Privacy Program
Chapter 2: Privacy Program Framework
Chapter 3: Privacy Operational Life Cycle: Assess
Chapter 4: Privacy Operational Life Cycle: Protect
Chapter 5: Privacy Operational Life Cycle: Sustain
Chapter 6: Privacy Operational Life Cycle: Respond
Index
ICS-410-1 ICS Ovenriew
فهرست مطالب:
GICSP Overview
ICS Concepts
EXERCISE l.l: Learningfrom Peers
Purdue Levels 0 and I
ExERcısE l.2: Programming a PLC
Purdue Levels 2 and 3
scADA
ExERcısE l.3: Programmingan HMl
lT and ICS Differences
Physical and Cybersecurity
Secure ICS Network Architectures
EXERCISE 1.4: Architecting a Secure DCS
ICS-410-2: Field Devices and Controllers
فهرست مطالب:
ICS Attack Surhce
Purdue Level 0 and I Attacks
Control Things Platform
ExERcısE 2. l: Finding Passwords in EEPRoM Dumps
Level 0 and I Technologies
ExERcısE 2.2: Exploring Fieldbus Protocols
Purdue Level 0 and I Defenses
Ethernet and TCP/lP
ExERcısE 2.3: Network Capture Analysis
ICS Protocols overTCP/IP
Attack on Networks
ExERcısE 2’4: Enumerating ModbusTCP
ICS-410-3: Supervisory Systems
فهرست مطالب:
Enforcement Zone Devices
Understanding Basic Cryptography
WirelessTechnologies
Wireless Attacks and Defenses
ExERcısE 3.I: Network Forensics of an Attack
Purdue Level 2 and 3 Attacks
Historians and Databases
ExERcIsE 3.2ı BypassingAuthentication with SQL lnjection
HMI and UlAtocks
Password Defenses
ExERcısE 3.3: Password Fuzzing
ICS-410-4: Workstations and Servers
فهرست مطالب:
Patching ICS Systems
Defending Microsoft Windows
EXERCISE 4.1 : Baselining with PowerShell
Defending Unix and Linux
Endpoint Security Software
EXERC I SE 4.2: Configuring Host-Based Firewalls
Event Logging and Analysis
ExERcısE 4.3: Windows Event Logs
Honeypots
Attacks on the Perimeter
ExERcısE 4.4: Finding Remote Access
ICS-410-5 ICS Secutiy Governance
فهرست مطالب:
Building an ICS Cybersecurity Program
Creating ICS Cybersecurit Polic
Disaster Recovery
Measuring Cybersecurity Risk
lncident Response
EXERCISE 5. I : lncident ResponseTabletop Exercise
Final Thoughts and Next Steps