Lean Enterprise: How High Performance Organizations Innovate at Scale

فهرست مطالب کتاب Lean Enterprise:

PART I: ORIENT

Chapter 1 – Introduction

Chapter 2 – Manage the Dynamics of the Enterprise Portfolio

PART II: EXPLORE

Chapter 3 – Model and Measure Investment Risk

Chapter 4 – Explore Uncertainty to Detect Opportunities

Chapter 5 – Evaluate the Product/Market Fit

PART III: EXPLOIT

Chapter 6 – Deploy Continuous Improvement

Chapter 7 – Identify Value and Increase Flow

Chapter 8 – Adopt Lean Engineering Practices

Chapter 9 – Take an Experimental Approach to Product Development

Chapter 10 – Implement Mission Command

PART IV: TRANSFORM

Chapter 11 – Grow an Innovation Culture

Chapter 12 – Embrace Lean Thinking for Governance, Risk, and Compliance

Chapter 13 – Evolve Financial Management to Drive Product Innovation

Chapter 14 – Turn IT into a Competitive Advantage

Chapter 15 – Start Where You Are

Lean UX: Applying Lean Principles to Improve User Experience

فهرست مطالب کتاب Lean UX:

Section I: Introduction and Principles

Chapter 1: Why Lean UX?

Chapter 2: Principles

Section II: Process

Chapter 3: Vision, Framing, and Outcomes

Chapter 4: Collaborative Design

Chapter 5: MVPs and Experiments

Chapter 6: Feedback and Research

Section III: Making It Work

Chapter 7: Integrating Lean UX and Agile

Chapter 8: Making Organizational Shifts

Learn Kali Linux 2019 Perform powerful penetration testing using Kali Linux

فهرست مطالب کتاب Learn Kali Linux 2019:

Section 1: Kali Linux Basics

Chapter 1: Introduction to Hacking

Chapter 2: Setting Up Kali – Part 1

Chapter 3: Setting Up Kali – Part 2

Chapter 4: Getting Comfortable with Kali Linux 2019

Section 2: Reconnaissance

Chapter 5: Passive Information Gathering

Chapter 6: Active Information Gathering

Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019

Chapter 7: Working with Vulnerability Scanners

Chapter 8: Understanding Network Penetration Testing

Chapter 9: Network Penetration Testing – Pre-Connection Attacks

Chapter 10: Network Penetration Testing – Gaining Access

Chapter 11: Network Penetration Testing – Post-Connection Attacks

Chapter 12: Network Penetration Testing – Detection and Security

Chapter 13: Client-Side Attacks – Social Engineering

Chapter 14: Performing Website Penetration Testing

Chapter 15: Website Penetration Testing – Gaining Access

Chapter 16: Best Practices

Learn Wireshark

فهرست مطالب:

Preface 1

Chapter 1: Appreciating Traffic Analysis 7

Chapter 2: Using Wireshark NG

Chapter 3: Installing Wireshark on a PC or macOS

Chapter 4: Exploring the Wireshark Interface

Chapter 5: Tapping into the Data Stream

Chapter 6: Personalizing the Interface

Chapter 7: Using Display and Capture Filters

Chapter 8: Outlining the OSI Model

Chapter 9: Decoding TCP and UDP

Chapter 10: Managing TCP Connections

Chapter 11: Analyzing IPv4 and IPv6

Chapter 12: Discovering ICMP

Chapter 13: Understanding ARP

Chapter 14: Troubleshooting Latency Issues

Chapter 15: Subsetting, Saving, and Exporting Captures

Chapter 16: Using CloudShark for Packet Analysis

Assessment

Other Books You May Enjoy

Index

Learning Data Mining with Python

فهرست مطالب کتاب Learning Data Mining with Python:

Chapter 1: Getting Started with Data Mining

Chapter 2: Classifying with scikit-learn Estimators

Chapter 3: Predicting Sports Winners with Decision Trees

Chapter 4: Recommending Movies Using Affinity Analysis

Chapter 5: Extracting Features with Transformers

Chapter 6: Social Media Insight Using Naive Bayes

Chapter 7: Discovering Accounts to Follow Using Graph Mining

Chapter 8: Beating CAPTCHAs with Neural Networks

Chapter 9: Authorship Attribution

Chapter 10: Clustering News Articles

Chapter 11: Classifying Objects in Images Using Deep Learning

Chapter 12: Working with Big Data

Appendix: Next Steps

Learning Materials LPIC-1 (101)

فهرست مطالب کتاب Learning Materials LPIC-1 (101):

Topic 101: System Architecture

Topic 102: Linux Installation and Package Management

Topic 103: GNU and Unix Commands

Topic 104: Devices, Linux Filesystems, Filesystem Hierarchy Standard

Imprint

Learning Python Network Programming Utilize Python 3 to get network applications up and running quickly and easily

فهرست مطالب کتاب Learning Python Network Programming:

Chapter 1: Network Programming and Python

Chapter 2: HTTP and Working with the Web

Chapter 3: APIs in Action

Chapter 4: Engaging with E-mails

Chapter 5: Interacting with Remote Systems

Chapter 6: IP and DNS

Chapter 7: Programming with Sockets

Chapter 8: Client and Server Applications

Chapter 9: Applications for the Web

Learning VMware NSX (Second Edition)

فهرست مطالب:

Preface

Introduction to Network Virtualization

NSX Core Components

NSX Installation and Configuration

NSX Functional Services

Edge Services Gateway

Service Composer

Monitoring

Managing NSX

Conclusion

Linux 101 Hacks

فهرست مطالب کتاب Linux 101 Hacks:

Chapter 1: Powerful CD Command Hacks

Hack 1. Define CD Base Directory Using CDPATH

Hack 2. Use CD Alias to Navigate Up the Directory

Hack 3. Perform mkdir and cd Using a Single Command

Hack 4. Toggle Between Directories

Hack 5. Manipulate Directory Stack

Hack 6. Automatically Correct Mistyped Directory Names

Chapter 2: Essential Linux Commands

Hack 7. Grep Command

Hack 8. Regular Expression in Grep

Hack 9. Find Command

Hack 10. Suppress Standard Output and Error Message

Hack 11. Join Command

Hack 12. Change the Case

Hack 13. Xargs Command

Hack 14. Sort Command

Hack 15. Uniq Command

Hack 16. Cut Command

Hack 17. Stat Command

Hack 18. Diff Command

Hack 19. Display Total Connect Time of Users

Hack 20. Execute Commands in the Background

Hack 21. Sed Basics – Find and Replace Using RegEx

Hack 22: Awk Introduction – Print Examples

Hack 23. Vim Editor Navigation Fundamentals

Hack 24. Chmod Command Examples

Hack 25. View Multiple Log Files in One Terminal

Hack 26. Less Command

Hack 27. Wget Examples

Chapter 3: SSH Commands and Tips

Hack 28. Debug SSH Client Session

Hack 29. Toggle SSH Session using SSH Escape Character

Hack 30. Display SSH Session Statistics

Hack 31. Change OpenSSH Security Options

Hack 32. Transfer All PuTTY Sessions

Chapter 4: Date Manipulation

Hack 33. Set System Date and Time

Hack 34. Set Hardware Date and Time

Hack 35. Display Date and Time in a Specific Format

Hack 36. Display Past Date and Time

Hack 37. Display Future Date and Time

Chapter 5: PS1, PS2, PS3, PS4 and

Hack 38. PS1 – Default Interaction Prompt

Hack 39. PS2 – Continuation Interactive Prompt

Hack 40. PS3 – Prompt Used by Select Command

Hack 41. PS4 – Prompt to Prefix Tracing Output

Hack 42. PROMPT_COMMAND

Hack 43. Customize Bash Prompt Using PS1

Hack 44. Colorful Bash Prompt Using PS1

Chapter 6: Archive and Compression

Hack 45. Zip Command Basics

Hack 46. Zip Command Advanced Compression

Hack 47. Password Protection of Zip files

Hack 48. Tar Command Examples

Hack 49. Combine gzip, bzip2 with Tar

Hack 50. BZ is Eazy! Bz* Command Examples

Hack 51. Cpio Examples

Chapter 7: Command Line History

Hack 52. Bash Command Line History Examples

Hack 53. History Related Environment Variables

Hack 54. History Expansion Examples

Chapter 8: System Administration Tasks

Hack 55. Partition Using fdisk

Hack 56. Format a Partition Using mke2fsk

Hack 57. Mount a Partition

Hack 58. Fine Tune a Partition Using tune2fs

Hack 59. Create a Swap File System

Hack 60. Create a New User

Hack 61. Create a New Group

Hack 62. Setup SSH Passwordless Login in OpenSSH

Hack 63. Use ssh-copy-id Along With ssh-agent

Hack 64. Crontab Examples

Hack 65. Safe Reboot Of Linux Using Magic SysRq Key

Hack 66. Linux Parted Command Examples

Hack 67. Rsync Command Examples

Hack 68. Chkconfig Command Examples

Hack 69. How to Setup Anacron

Hack 70. IPTables Rules Examples

Chapter 9: Install Packages

Hack 71. Yum Command Examples

Hack 72. RPM Command Examples

Hack 73. apt-* Command Examples

Hack 74. Install from Source

Chapter 10: LAMP Stack

Hack 75. Install Apache 2 with SSL4

Linux 101 Hacks www.thegeekstuff.co

Hack 76. Install PHP from Source

Hack 77. Install MySQL

Hack 78. Install LAMP Stack

Hack 79. Install XAMPP

Hack 80. Secure Your Apache Web Server

Hack 81. Apachectl and Httpd Tips

Hack 82. Setup Apache Virtual Host Configuration

Hack 83. Rotate Apache Logs Files

Chapter 11: Bash Scripting

Hack 84. Execution Sequence of .bash_* files

Hack 85. Bash FOR Loops Using C Like Syntax

Hack 86. Debug a Shell Script

Hack 87. Quoting

Hack 88. Read Data File Fields Inside a Shell Script

Chapter 12: System Monitoring and Performance

Hack 89. Free Command

Hack 90. Top Command

Hack 91. Df Command

Hack 92. Du Command

Hack 93. Lsof Commands

Hack 94. Vmstat Command

Hack 95. Netstat Command

Hack 96. Sysctl Command

Hack 97. Nice Command

Hack 98. Renice Command

Hack 99. Kill Command

Hack 100. Ps Command

Hack 101. Sar Command

Linux Bible (Ninth Edition)

فهرست مطالب کتاب Linux Bible (Ninth Edition):

Acknowledgments

Introduction

Part I: Getting Started

Chapter 1: Starting with Linux

Chapter 2: Creating the Perfect Linux Desktop

Part II: Becoming a Linux Power User

Chapter 3: Using the Shell

Chapter 4: Moving around the Filesystem

Chapter 5: Working with Text Files

Chapter 6: Managing Running Processes

Chapter 7: Writing Simple Shell Scripts

Part III: Becoming a Linux System Administrator

Chapter 8: Learning System Administration

Chapter 9: Installing Linux

Chapter 10: Getting and Managing Software

Chapter 11: Managing User Accounts

Chapter 12: Managing Disks and Filesystems

Part IV: Becoming a Linux Server Administrator

Chapter 13: Understanding Server Administration

Chapter 14: Administering Networking

Chapter 15: Starting and Stopping Services

Chapter 16: Configuring a Print Server

Chapter 17: Configuring a Web Server

Chapter 18: Configuring an FTP Server

Chapter 19: Configuring a Windows File Sharing (Samba) Server

Chapter 20: Configuring an NFS File Server

Chapter 21: Troubleshooting Linux

Part V: Learning Linux Security Techniques

Chapter 22: Understanding Basic Linux Security

Chapter 23: Understanding Advanced Linux Security

Chapter 24: Enhancing Linux Security with SELinux

Chapter 25: Securing Linux on a Network

Part VI: Extending Linux into the Cloud

Chapter 26: Using Linux for Cloud Computing

Chapter 27: Deploying Linux to the Cloud

Part VII: Appendixes

Appendix A: Media

Appendix B: Exercise Answers

Index

Linux Essentials for Cybersecurity

فهرست مطالب:

Introduction

Part I: Introducing Linux

Part II: User and Group Accounts

Part III: File and Data Storage

Part IV: Automation

Part V: Networking

Part VI: Process and Log Administration

Part VII: Software Management

Part VIII: Security Tasks

Appendix A: Answers to Review Questions

Appendix B: Resource Guide

Glossary

Index