Introducing Python: Modern Computing in Simple Packages
فهرست مطالب:
Preface
CHAPTER 1 A Taste of Py
CHAPTER 2 Py Ingredients: Numbers, Strings, and Variables
CHAPTER 3 Py Filling: Lists, Tuples, Dictionaries, and Sets
CHAPTER 4 Py Crust: Code Structures
CHAPTER 5 Py Boxes: Modules, Packages, and Programs
CHAPTER 6 Oh Oh: Objects and Classes
CHAPTER 7 Mangle Data Like a Pro
CHAPTER 8 Data Has to Go Somewhere
CHAPTER 9 The Web, Untangled
CHAPTER 10 Systems
CHAPTER 11 Concurrency and Networks
CHAPTER 12 Be a Pythonista
Index
Introducing Windows 8.1 for IT Professionals Technical Overview
فهرست مطالب کتاب Introducing Windows 8.1 for IT Professionals Technical Overview:
Introduction
Chapter 1 An overview of Windows 8.1
Chapter 2 The Windows 8.1 user experience
Chapter 3 Deploying Windows 8.1
Chapter 4 Security in Windows 8.1
Chapter 5 Internet Explorer 11
Chapter 6 Delivering Windows Store apps
Chapter 7 Recovery options in Windows 8.1
Chapter 8 Windows 8.1 and networks
Chapter 9 Virtualization in Windows 8.1
Chapter 10 Windows RT 8.1
Chapter 11 Managing mobile devices
Introduction To Linux – A Hands On Guide
فهرست مطالب کتاب Introduction To Linux – A Hands On Guide:
Introduction
Chapter 1. What is Linux?
Chapter 2. Quickstart
Chapter 3. About files and the file system
Chapter 4. Processes
Chapter 5. I/O redirection
Chapter 6. Text editors
Chapter 7. Home sweet /home
Chapter 8. Printers and printing
Chapter 9. Fundamental Backup Techniques
Chapter 10. Networking
Chapter 11. Sound and Video
Appendix A. Where to go from here?
Appendix B. DOS versus Linux commands
Appendix C. Shell Features
IT Governance: A Managers Guide to Data Security and ISO27001/ISO 27002
فهرست مطالب کتاب IT Governance: A Managers Guide to Data Security and ISO27001/ISO 27002:
Introduction
Why is information security necessary?
The Combined Code, the Turnbull Report and Sarbanes–Oxley
ISO27001
Organizing information security
Information security policy and scope
The risk assessment and statement of applicability
External parties
Asset management
Human resources security
Equipment security
Communications and operations management
Controls against malicious software (malware) and back-ups
Network security management and media handling
Exchanges of information
Electronic commerce services
E-mail and internet use
Access control
Network access control
Operating system access control
Application access control and teleworking
Systems acquisition, development and maintenance
Cryptographic controls
Security in development and support processes
Monitoring and information security incident management
Business continuity management
Compliance
The ISO27001 audit
Appendix 1: Useful websites
Appendix 2: Further reading
JavaScript Notes For Professionals
فهرست مطالب کتاب JavaScript Notes For Professionals:
Getting started with JavaScript
JavaScript Variables
Built-in Constants
Comments
Console
Datatypes in JavaScript
Strings
Date
Date Comparison
Comparison Operations
Conditions
Arrays
Objects
Arithmetic (Math)
Bitwise operators
Constructor functions
Declarations and Assignments
Loops
Functions
Functional JavaScript
Prototypes, objects
Classes
Namespacing
Context (this)
Setters and Getters
Events
Inheritance
Method Chaining
Callbacks
Intervals and Timeouts
Regular expressions
Cookies
Web Storage
Data attributes
JSON
AJAX
Enumerations
Map
Timestamps
Unary Operators
Generators
Promises
Set
Modals – Prompts
execCommand and contenteditable
History
Navigator Object
BOM (Browser Object Model)
The Event Loop
Strict mode
Custom Elements
Data Manipulation
Binary Data
Template Literals
Fetch
Scope
Modules
Screen
Variable coercion/conversion
Destructuring assignment
WebSockets
Arrow Functions
Workers
requestAnimationFrame
Creational Design Patterns
Detecting browser
Symbols
Transpiling
Automatic Semicolon Insertion – ASI
Localization
Geolocation
IndexedDB
Modularization Techniques
Proxy
.postMessage() and MessageEvent
WeakMap
WeakSet
Escape Sequences
Behavioral Design Patterns
Server-sent events
Async functions (async/await)
Async Iterators
How to make iterator usable inside async callback function
Tail Call Optimization
Bitwise Operators – Real World Examples (snippets)
Tilde ~
Using JavaScript to get/set CSS custom variables
Selection API
File API, Blobs and FileReaders
Notifications API
Vibration API
Battery Status API
Fluent API
Web Cryptography API
Security issues
Same Origin Policy & Cross-Origin Communication
Error Handling
Global error handling in browsers
Debugging
Unit Testing JavaScript
Evaluating JavaScript
Linters – Ensuring code quality
Anti-patterns
Performance Tips
Memory efficiency
Reserved Keywords
JavaScript: The Good Parts
فهرست مطالب کتاب JavaScript: The Good Parts:
1. Good Parts
2. Grammar
3. Objects
4. Functions
5. Inheritance
6. Arrays
7. Regular Expressions
8. Methods
9. Style
Beautiful Features
jQuery Notes For Professionals
فهرست مطالب کتاب jQuery Notes For Professionals:
Getting started with jQuery
Selectors
Each function
Attributes
document-ready event
Events
DOM Manipulation
DOM Traversing
CSS Manipulation
Element Visibility
Append
Prepend
Getting and setting width and height of an element
jQuery .animate() Method
jQuery Deferred objects and Promises
Ajax
Checkbox Select all with automatic check/uncheck on other checkbox change
Plugins
Kali Linux – Assuring Security by Penetration Testing
فهرست مطالب کتاب Kali Linux – Assuring Security by Penetration Testing:
PART I: Lab Preparation and Testing Procedures
Chapter 1: Beginning with Kali Linux
Chapter 2: Penetration Testing Methodology
PART II: Penetration Testers Armory
Chapter 3: Target Scoping
Chapter 4: Information Gathering
Chapter 5: Target Discovery
Chapter 6: Enumerating Target
Chapter 7: Vulnerability Mapping
Chapter 8: Social Engineering
Chapter 9: Target Exploitation
Chapter 10: Privilege Escalation
Chapter 11: Maintaining Access
Chapter 12: Documentation and Reporting
PART III: Extra Ammunition
Appendix A: Supplementary Tools
Appendix B: Key Resources
Kali Linux Cookbook: Over 70 Recipes to Help You Master Kali Linux for Effective Penetration Security Testing
فهرست مطالب کتاب Kali Linux Cookbook: Over 70 Recipes to Help You Master Kali Linux for Effective Penetration Security Testing:
Chapter 1: Up and Running with Kali Linux
Chapter 2: Customizing Kali Linux
Chapter 3: Advanced Testing Lab
Chapter 4: Information Gathering
Chapter 5: Vulnerability Assessment
Chapter 6: Exploiting Vulnerabilities
Chapter 7: Escalating Privileges
Chapter 8: Password Attacks
Chapter 9: Wireless Attacks
Kali Linux CTF Blueprints
فهرست مطالب کتاب Kali Linux CTF Blueprints:
Preface
Chapter 1: Microsoft Environments
Chapter 2: Linux Environments
Chapter 3: Wireless and Mobile
Chapter 4: Social Engineering
Chapter 5: Cryptographic Projects
Chapter 6: Red Teaming
Appendix
Index
LAN Switch Security What Hackers Know About Your Switches
فهرست مطالب کتاب LAN Switch Security What Hackers Know About Your Switches:
Introduction
Part I Vulnerabilities and Mitigation Techniques
Chapter 1 Introduction to Security
Chapter 2 Defeating a Learning Bridge’s Forwarding Process
Chapter 3 Attacking the Spanning Tree Protocol
Chapter 4 Are VLANS Safe?
Chapter 5 Leveraging DHCP Weaknesses
Chapter 6 Exploiting IPv4 ARP
Chapter 7 Exploiting IPv6 Neighbor Discovery and Router Advertisement
Chapter 8 What About Power over Ethernet?
Chapter 9 Is HSRP Resilient?
Chapter 10 Can We Bring VRRP Down?
Chapter 11 Information Leaks with Cisco Ancillary Protocols
Part II How Can a Switch Sustain a Denial of Service Attack?
Chapter 12 Introduction to Denial of Service Attacks
Chapter 13 Control Plane Policing
Chapter 14 Disabling Control Plane Protocols
Chapter 15 Using Switches to Detect a Data Plane DoS
Part III Using Switches to Augment the Network Security
Chapter 16 Wire Speed Access Control Lists
Chapter 17 Identity-Based Networking Services with 802.1X
Part IV What Is Next in LAN Security?
Chapter 18 IEEE 802.1AE
Appendix Combining IPsec with L2TPv3 for Secure Pseudowire
Index
Lean Customer Development: Building Products Your Customers Will Buy
فهرست مطالب کتاب Lean Customer Development:
Foreword
Preface
Chapter 1: Why You Need Customer Development
Chapter 2: Where Should I Start?
Chapter 3: Who Should I Be Talking To?
Chapter 4: What Should I Be Learning?
Chapter 5: Get Out of the Building
Chapter 6: What Does a Validated Hypothesis Look Like?
Chapter 7: What Kind of Minimum Viable Product Should I Build?
Chapter 8: How Does Customer Development Work When You Already Have Customers?
Chapter 9: Ongoing Customer Development
Appendix: Questions That Work
Index