Introducing Python: Modern Computing in Simple Packages

فهرست مطالب:

Preface

CHAPTER 1 A Taste of Py

CHAPTER 2 Py Ingredients: Numbers, Strings, and Variables

CHAPTER 3 Py Filling: Lists, Tuples, Dictionaries, and Sets

CHAPTER 4 Py Crust: Code Structures

CHAPTER 5 Py Boxes: Modules, Packages, and Programs

CHAPTER 6 Oh Oh: Objects and Classes

CHAPTER 7 Mangle Data Like a Pro

CHAPTER 8 Data Has to Go Somewhere

CHAPTER 9 The Web, Untangled

CHAPTER 10 Systems

CHAPTER 11 Concurrency and Networks

CHAPTER 12 Be a Pythonista

Index

Introducing Windows 8.1 for IT Professionals Technical Overview

فهرست مطالب کتاب Introducing Windows 8.1 for IT Professionals Technical Overview:

Introduction

Chapter 1 An overview of Windows 8.1

Chapter 2 The Windows 8.1 user experience

Chapter 3 Deploying Windows 8.1

Chapter 4 Security in Windows 8.1

Chapter 5 Internet Explorer 11

Chapter 6 Delivering Windows Store apps

Chapter 7 Recovery options in Windows 8.1

Chapter 8 Windows 8.1 and networks

Chapter 9 Virtualization in Windows 8.1

Chapter 10 Windows RT 8.1

Chapter 11 Managing mobile devices

 

Introduction To Linux – A Hands On Guide

فهرست مطالب کتاب Introduction To Linux – A Hands On Guide:

Introduction

Chapter 1. What is Linux?

Chapter 2. Quickstart

Chapter 3. About files and the file system

Chapter 4. Processes

Chapter 5. I/O redirection

Chapter 6. Text editors

Chapter 7. Home sweet /home

Chapter 8. Printers and printing

Chapter 9. Fundamental Backup Techniques

Chapter 10. Networking

Chapter 11. Sound and Video

Appendix A. Where to go from here?

Appendix B. DOS versus Linux commands

Appendix C. Shell Features

IT Governance: A Managers Guide to Data Security and ISO27001/ISO 27002

فهرست مطالب کتاب IT Governance: A Managers Guide to Data Security and ISO27001/ISO 27002:

Introduction

Why is information security necessary?

The Combined Code, the Turnbull Report and Sarbanes–Oxley

ISO27001

Organizing information security

Information security policy and scope

The risk assessment and statement of applicability

External parties

Asset management

Human resources security

Equipment security

Communications and operations management

Controls against malicious software (malware) and back-ups

Network security management and media handling

Exchanges of information

Electronic commerce services

E-mail and internet use

Access control

Network access control

Operating system access control

Application access control and teleworking

Systems acquisition, development and maintenance

Cryptographic controls

Security in development and support processes

Monitoring and information security incident management

Business continuity management

Compliance

The ISO27001 audit

Appendix 1: Useful websites

Appendix 2: Further reading

JavaScript Notes For Professionals

فهرست مطالب کتاب JavaScript Notes For Professionals:

Getting started with JavaScript

JavaScript Variables

Built-in Constants

Comments

Console

Datatypes in JavaScript

Strings

Date

Date Comparison

Comparison Operations

Conditions

Arrays

Objects

Arithmetic (Math)

Bitwise operators

Constructor functions

Declarations and Assignments

Loops

Functions

Functional JavaScript

Prototypes, objects

Classes

Namespacing

Context (this)

Setters and Getters

Events

Inheritance

Method Chaining

Callbacks

Intervals and Timeouts

Regular expressions

Cookies

Web Storage

Data attributes

JSON

AJAX

Enumerations

Map

Timestamps

Unary Operators

Generators

Promises

Set

Modals – Prompts

execCommand and contenteditable

History

Navigator Object

BOM (Browser Object Model)

The Event Loop

Strict mode

Custom Elements

Data Manipulation

Binary Data

Template Literals

Fetch

Scope

Modules

Screen

Variable coercion/conversion

Destructuring assignment

WebSockets

Arrow Functions

Workers

requestAnimationFrame

Creational Design Patterns

Detecting browser

Symbols

Transpiling

Automatic Semicolon Insertion – ASI

Localization

Geolocation

IndexedDB

Modularization Techniques

Proxy

.postMessage() and MessageEvent

WeakMap

WeakSet

Escape Sequences

Behavioral Design Patterns

Server-sent events

Async functions (async/await)

Async Iterators

How to make iterator usable inside async callback function

Tail Call Optimization

Bitwise Operators – Real World Examples (snippets)

Tilde ~

Using JavaScript to get/set CSS custom variables

Selection API

File API, Blobs and FileReaders

Notifications API

Vibration API

Battery Status API

Fluent API

Web Cryptography API

Security issues

Same Origin Policy & Cross-Origin Communication

Error Handling

Global error handling in browsers

Debugging

Unit Testing JavaScript

Evaluating JavaScript

Linters – Ensuring code quality

Anti-patterns

Performance Tips

Memory efficiency

Reserved Keywords

JavaScript: The Good Parts

فهرست مطالب کتاب JavaScript: The Good Parts:

1. Good Parts

2. Grammar

3. Objects

4. Functions

5. Inheritance

6. Arrays

7. Regular Expressions

8. Methods

9. Style

Beautiful Features

jQuery Notes For Professionals

فهرست مطالب کتاب jQuery Notes For Professionals: 

Getting started with jQuery

Selectors

Each function

Attributes

document-ready event

Events

DOM Manipulation

DOM Traversing

CSS Manipulation

Element Visibility

Append

Prepend

Getting and setting width and height of an element

jQuery .animate() Method

jQuery Deferred objects and Promises

Ajax

Checkbox Select all with automatic check/uncheck on other checkbox change

Plugins

Kali Linux – Assuring Security by Penetration Testing

فهرست مطالب کتاب Kali Linux – Assuring Security by Penetration Testing:

PART I: Lab Preparation and Testing Procedures

Chapter 1: Beginning with Kali Linux

Chapter 2: Penetration Testing Methodology

PART II: Penetration Testers Armory

Chapter 3: Target Scoping

Chapter 4: Information Gathering

Chapter 5: Target Discovery

Chapter 6: Enumerating Target

Chapter 7: Vulnerability Mapping

Chapter 8: Social Engineering

Chapter 9: Target Exploitation

Chapter 10: Privilege Escalation

Chapter 11: Maintaining Access

Chapter 12: Documentation and Reporting

PART III: Extra Ammunition

Appendix A: Supplementary Tools

Appendix B: Key Resources

Kali Linux Cookbook: Over 70 Recipes to Help You Master Kali Linux for Effective Penetration Security Testing

فهرست مطالب کتاب Kali Linux Cookbook: Over 70 Recipes to Help You Master Kali Linux for Effective Penetration Security Testing:

Chapter 1: Up and Running with Kali Linux

Chapter 2: Customizing Kali Linux

Chapter 3: Advanced Testing Lab

Chapter 4: Information Gathering

Chapter 5: Vulnerability Assessment

Chapter 6: Exploiting Vulnerabilities

Chapter 7: Escalating Privileges

Chapter 8: Password Attacks

Chapter 9: Wireless Attacks

Kali Linux CTF Blueprints

فهرست مطالب کتاب Kali Linux CTF Blueprints:

Preface

Chapter 1: Microsoft Environments

Chapter 2: Linux Environments

Chapter 3: Wireless and Mobile

Chapter 4: Social Engineering

Chapter 5: Cryptographic Projects

Chapter 6: Red Teaming

Appendix

Index

LAN Switch Security What Hackers Know About Your Switches

فهرست مطالب کتاب LAN Switch Security What Hackers Know About Your Switches:

Introduction

Part I Vulnerabilities and Mitigation Techniques

Chapter 1 Introduction to Security

Chapter 2 Defeating a Learning Bridge’s Forwarding Process

Chapter 3 Attacking the Spanning Tree Protocol

Chapter 4 Are VLANS Safe?

Chapter 5 Leveraging DHCP Weaknesses

Chapter 6 Exploiting IPv4 ARP

Chapter 7 Exploiting IPv6 Neighbor Discovery and Router Advertisement

Chapter 8 What About Power over Ethernet?

Chapter 9 Is HSRP Resilient?

Chapter 10 Can We Bring VRRP Down?

Chapter 11 Information Leaks with Cisco Ancillary Protocols

Part II How Can a Switch Sustain a Denial of Service Attack?

Chapter 12 Introduction to Denial of Service Attacks

Chapter 13 Control Plane Policing

Chapter 14 Disabling Control Plane Protocols

Chapter 15 Using Switches to Detect a Data Plane DoS

Part III Using Switches to Augment the Network Security

Chapter 16 Wire Speed Access Control Lists

Chapter 17 Identity-Based Networking Services with 802.1X

Part IV What Is Next in LAN Security?

Chapter 18 IEEE 802.1AE

Appendix Combining IPsec with L2TPv3 for Secure Pseudowire

Index

 

Lean Customer Development: Building Products Your Customers Will Buy

فهرست مطالب کتاب Lean Customer Development:

Foreword

Preface

Chapter 1: Why You Need Customer Development

Chapter 2: Where Should I Start?

Chapter 3: Who Should I Be Talking To?

Chapter 4: What Should I Be Learning?

Chapter 5: Get Out of the Building

Chapter 6: What Does a Validated Hypothesis Look Like?

Chapter 7: What Kind of Minimum Viable Product Should I Build?

Chapter 8: How Does Customer Development Work When You Already Have Customers?

Chapter 9: Ongoing Customer Development

Appendix: Questions That Work

Index