Lean Enterprise: How High Performance Organizations Innovate at Scale
فهرست مطالب کتاب Lean Enterprise:
PART I: ORIENT
Chapter 1 – Introduction
Chapter 2 – Manage the Dynamics of the Enterprise Portfolio
PART II: EXPLORE
Chapter 3 – Model and Measure Investment Risk
Chapter 4 – Explore Uncertainty to Detect Opportunities
Chapter 5 – Evaluate the Product/Market Fit
PART III: EXPLOIT
Chapter 6 – Deploy Continuous Improvement
Chapter 7 – Identify Value and Increase Flow
Chapter 8 – Adopt Lean Engineering Practices
Chapter 9 – Take an Experimental Approach to Product Development
Chapter 10 – Implement Mission Command
PART IV: TRANSFORM
Chapter 11 – Grow an Innovation Culture
Chapter 12 – Embrace Lean Thinking for Governance, Risk, and Compliance
Chapter 13 – Evolve Financial Management to Drive Product Innovation
Chapter 14 – Turn IT into a Competitive Advantage
Chapter 15 – Start Where You Are
Lean UX: Applying Lean Principles to Improve User Experience
فهرست مطالب کتاب Lean UX:
Section I: Introduction and Principles
Chapter 1: Why Lean UX?
Chapter 2: Principles
Section II: Process
Chapter 3: Vision, Framing, and Outcomes
Chapter 4: Collaborative Design
Chapter 5: MVPs and Experiments
Chapter 6: Feedback and Research
Section III: Making It Work
Chapter 7: Integrating Lean UX and Agile
Chapter 8: Making Organizational Shifts
Learn Kali Linux 2019 Perform powerful penetration testing using Kali Linux
فهرست مطالب کتاب Learn Kali Linux 2019:
Section 1: Kali Linux Basics
Chapter 1: Introduction to Hacking
Chapter 2: Setting Up Kali – Part 1
Chapter 3: Setting Up Kali – Part 2
Chapter 4: Getting Comfortable with Kali Linux 2019
Section 2: Reconnaissance
Chapter 5: Passive Information Gathering
Chapter 6: Active Information Gathering
Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019
Chapter 7: Working with Vulnerability Scanners
Chapter 8: Understanding Network Penetration Testing
Chapter 9: Network Penetration Testing – Pre-Connection Attacks
Chapter 10: Network Penetration Testing – Gaining Access
Chapter 11: Network Penetration Testing – Post-Connection Attacks
Chapter 12: Network Penetration Testing – Detection and Security
Chapter 13: Client-Side Attacks – Social Engineering
Chapter 14: Performing Website Penetration Testing
Chapter 15: Website Penetration Testing – Gaining Access
Chapter 16: Best Practices
Learn Packet Tracer by Examples
فهرست مطالب کتاب Learn Packet Tracer by Examples:
ندارد
Learn Wireshark
فهرست مطالب:
Preface 1
Chapter 1: Appreciating Traffic Analysis 7
Chapter 2: Using Wireshark NG
Chapter 3: Installing Wireshark on a PC or macOS
Chapter 4: Exploring the Wireshark Interface
Chapter 5: Tapping into the Data Stream
Chapter 6: Personalizing the Interface
Chapter 7: Using Display and Capture Filters
Chapter 8: Outlining the OSI Model
Chapter 9: Decoding TCP and UDP
Chapter 10: Managing TCP Connections
Chapter 11: Analyzing IPv4 and IPv6
Chapter 12: Discovering ICMP
Chapter 13: Understanding ARP
Chapter 14: Troubleshooting Latency Issues
Chapter 15: Subsetting, Saving, and Exporting Captures
Chapter 16: Using CloudShark for Packet Analysis
Assessment
Other Books You May Enjoy
Index
Learning Data Mining with Python
فهرست مطالب کتاب Learning Data Mining with Python:
Chapter 1: Getting Started with Data Mining
Chapter 2: Classifying with scikit-learn Estimators
Chapter 3: Predicting Sports Winners with Decision Trees
Chapter 4: Recommending Movies Using Affinity Analysis
Chapter 5: Extracting Features with Transformers
Chapter 6: Social Media Insight Using Naive Bayes
Chapter 7: Discovering Accounts to Follow Using Graph Mining
Chapter 8: Beating CAPTCHAs with Neural Networks
Chapter 9: Authorship Attribution
Chapter 10: Clustering News Articles
Chapter 11: Classifying Objects in Images Using Deep Learning
Chapter 12: Working with Big Data
Appendix: Next Steps
Learning Materials LPIC-1 (101)
فهرست مطالب کتاب Learning Materials LPIC-1 (101):
Topic 101: System Architecture
Topic 102: Linux Installation and Package Management
Topic 103: GNU and Unix Commands
Topic 104: Devices, Linux Filesystems, Filesystem Hierarchy Standard
Imprint
Learning Python Network Programming Utilize Python 3 to get network applications up and running quickly and easily
فهرست مطالب کتاب Learning Python Network Programming:
Chapter 1: Network Programming and Python
Chapter 2: HTTP and Working with the Web
Chapter 3: APIs in Action
Chapter 4: Engaging with E-mails
Chapter 5: Interacting with Remote Systems
Chapter 6: IP and DNS
Chapter 7: Programming with Sockets
Chapter 8: Client and Server Applications
Chapter 9: Applications for the Web
Learning VMware NSX (Second Edition)
فهرست مطالب:
Preface
Introduction to Network Virtualization
NSX Core Components
NSX Installation and Configuration
NSX Functional Services
Edge Services Gateway
Service Composer
Monitoring
Managing NSX
Conclusion
Linux 101 Hacks
فهرست مطالب کتاب Linux 101 Hacks:
Chapter 1: Powerful CD Command Hacks
Hack 1. Define CD Base Directory Using CDPATH
Hack 2. Use CD Alias to Navigate Up the Directory
Hack 3. Perform mkdir and cd Using a Single Command
Hack 4. Toggle Between Directories
Hack 5. Manipulate Directory Stack
Hack 6. Automatically Correct Mistyped Directory Names
Chapter 2: Essential Linux Commands
Hack 7. Grep Command
Hack 8. Regular Expression in Grep
Hack 9. Find Command
Hack 10. Suppress Standard Output and Error Message
Hack 11. Join Command
Hack 12. Change the Case
Hack 13. Xargs Command
Hack 14. Sort Command
Hack 15. Uniq Command
Hack 16. Cut Command
Hack 17. Stat Command
Hack 18. Diff Command
Hack 19. Display Total Connect Time of Users
Hack 20. Execute Commands in the Background
Hack 21. Sed Basics – Find and Replace Using RegEx
Hack 22: Awk Introduction – Print Examples
Hack 23. Vim Editor Navigation Fundamentals
Hack 24. Chmod Command Examples
Hack 25. View Multiple Log Files in One Terminal
Hack 26. Less Command
Hack 27. Wget Examples
Chapter 3: SSH Commands and Tips
Hack 28. Debug SSH Client Session
Hack 29. Toggle SSH Session using SSH Escape Character
Hack 30. Display SSH Session Statistics
Hack 31. Change OpenSSH Security Options
Hack 32. Transfer All PuTTY Sessions
Chapter 4: Date Manipulation
Hack 33. Set System Date and Time
Hack 34. Set Hardware Date and Time
Hack 35. Display Date and Time in a Specific Format
Hack 36. Display Past Date and Time
Hack 37. Display Future Date and Time
Chapter 5: PS1, PS2, PS3, PS4 and
Hack 38. PS1 – Default Interaction Prompt
Hack 39. PS2 – Continuation Interactive Prompt
Hack 40. PS3 – Prompt Used by Select Command
Hack 41. PS4 – Prompt to Prefix Tracing Output
Hack 42. PROMPT_COMMAND
Hack 43. Customize Bash Prompt Using PS1
Hack 44. Colorful Bash Prompt Using PS1
Chapter 6: Archive and Compression
Hack 45. Zip Command Basics
Hack 46. Zip Command Advanced Compression
Hack 47. Password Protection of Zip files
Hack 48. Tar Command Examples
Hack 49. Combine gzip, bzip2 with Tar
Hack 50. BZ is Eazy! Bz* Command Examples
Hack 51. Cpio Examples
Chapter 7: Command Line History
Hack 52. Bash Command Line History Examples
Hack 53. History Related Environment Variables
Hack 54. History Expansion Examples
Chapter 8: System Administration Tasks
Hack 55. Partition Using fdisk
Hack 56. Format a Partition Using mke2fsk
Hack 57. Mount a Partition
Hack 58. Fine Tune a Partition Using tune2fs
Hack 59. Create a Swap File System
Hack 60. Create a New User
Hack 61. Create a New Group
Hack 62. Setup SSH Passwordless Login in OpenSSH
Hack 63. Use ssh-copy-id Along With ssh-agent
Hack 64. Crontab Examples
Hack 65. Safe Reboot Of Linux Using Magic SysRq Key
Hack 66. Linux Parted Command Examples
Hack 67. Rsync Command Examples
Hack 68. Chkconfig Command Examples
Hack 69. How to Setup Anacron
Hack 70. IPTables Rules Examples
Chapter 9: Install Packages
Hack 71. Yum Command Examples
Hack 72. RPM Command Examples
Hack 73. apt-* Command Examples
Hack 74. Install from Source
Chapter 10: LAMP Stack
Hack 75. Install Apache 2 with SSL4
Linux 101 Hacks www.thegeekstuff.co
Hack 76. Install PHP from Source
Hack 77. Install MySQL
Hack 78. Install LAMP Stack
Hack 79. Install XAMPP
Hack 80. Secure Your Apache Web Server
Hack 81. Apachectl and Httpd Tips
Hack 82. Setup Apache Virtual Host Configuration
Hack 83. Rotate Apache Logs Files
Chapter 11: Bash Scripting
Hack 84. Execution Sequence of .bash_* files
Hack 85. Bash FOR Loops Using C Like Syntax
Hack 86. Debug a Shell Script
Hack 87. Quoting
Hack 88. Read Data File Fields Inside a Shell Script
Chapter 12: System Monitoring and Performance
Hack 89. Free Command
Hack 90. Top Command
Hack 91. Df Command
Hack 92. Du Command
Hack 93. Lsof Commands
Hack 94. Vmstat Command
Hack 95. Netstat Command
Hack 96. Sysctl Command
Hack 97. Nice Command
Hack 98. Renice Command
Hack 99. Kill Command
Hack 100. Ps Command
Hack 101. Sar Command
Linux Bible (Ninth Edition)
فهرست مطالب کتاب Linux Bible (Ninth Edition):
Acknowledgments
Introduction
Part I: Getting Started
Chapter 1: Starting with Linux
Chapter 2: Creating the Perfect Linux Desktop
Part II: Becoming a Linux Power User
Chapter 3: Using the Shell
Chapter 4: Moving around the Filesystem
Chapter 5: Working with Text Files
Chapter 6: Managing Running Processes
Chapter 7: Writing Simple Shell Scripts
Part III: Becoming a Linux System Administrator
Chapter 8: Learning System Administration
Chapter 9: Installing Linux
Chapter 10: Getting and Managing Software
Chapter 11: Managing User Accounts
Chapter 12: Managing Disks and Filesystems
Part IV: Becoming a Linux Server Administrator
Chapter 13: Understanding Server Administration
Chapter 14: Administering Networking
Chapter 15: Starting and Stopping Services
Chapter 16: Configuring a Print Server
Chapter 17: Configuring a Web Server
Chapter 18: Configuring an FTP Server
Chapter 19: Configuring a Windows File Sharing (Samba) Server
Chapter 20: Configuring an NFS File Server
Chapter 21: Troubleshooting Linux
Part V: Learning Linux Security Techniques
Chapter 22: Understanding Basic Linux Security
Chapter 23: Understanding Advanced Linux Security
Chapter 24: Enhancing Linux Security with SELinux
Chapter 25: Securing Linux on a Network
Part VI: Extending Linux into the Cloud
Chapter 26: Using Linux for Cloud Computing
Chapter 27: Deploying Linux to the Cloud
Part VII: Appendixes
Appendix A: Media
Appendix B: Exercise Answers
Index
Linux Essentials for Cybersecurity
فهرست مطالب:
Introduction
Part I: Introducing Linux
Part II: User and Group Accounts
Part III: File and Data Storage
Part IV: Automation
Part V: Networking
Part VI: Process and Log Administration
Part VII: Software Management
Part VIII: Security Tasks
Appendix A: Answers to Review Questions
Appendix B: Resource Guide
Glossary
Index