Master Veeam Tricks – Volume 1

فهرست مطالب کتاب Master Veeam Tricks – Volume 1:

Chapter 1 – Upgrading a Veeam Backup Repository from Server 2016 to Server 2019 + ReFS DeDuplication

Chapter 2 – Veeam RESTful API and Postman

Chapter 3 – Sizing Veeam for Office 365 Backup Storage

Chapter 4 – HTML Report of all Veeam Backup Copy Jobs in PowerShell

Chapter 5 – Troubleshooting Veeam B&R Error Code: 32768 Failed to create VM Recovery Snapshot

Chapter 6 – Install Veeam Backup and Replication using PowerShell

Chapter 7 – Veeam for Nutanix AHV

Chapter 8 – Veeam Backup and Replication and SMB MultiChannel

Chapter 9 – Veeam Backup and Replication Preferred Subnet and SMB Multichannel

Chapter 10 – Using StarWind Cloud VTL for AWS and Veeam

Chapter 11 – Configure Azure Direct Restore with Veeam 9.5

Chapter 12 – Configure 2 Factor Authentication (2FA) for Veeam with DUO

Chapter 13 – The Secret Life of VBM Files

Chapter 14 – Efficient Veeam NetApp Backups from Storage Snapshots

Chapter 15 – Sizing your Backup Storage and Saving Money

Chapter 16 – Join us at MVPDays and meet great MVP’s like this in person

Mastering Active Directory – Third Edition

فهرست مطالب:

Preface

Chapter 1: Active Directory Fundamentals

Chapter 2: Active Directory Domain Services 2022

Chapter 3: Designing an Active Directory Infrastructure

Chapter 4: Active Directory Domain Name System

Chapter 5: Placing Operations Master Roles

Chapter 6: Migrating to Active Directory 2022

Chapter 7: Managing Active Directory Objects

Chapter 8: Managing Users, Groups, and Devices

Chapter 9: Designing the OU Structure

Chapter 10: Managing Group Policies

Chapter 11: Active Directory Services – Part 01

Chapter 12: Active Directory Services – Part 02

Chapter 13: Active Directory Certificate Services

Chapter 14: Active Directory Federation Services

Chapter 15: Active Directory Rights Management Services

Chapter 16: Active Directory Security Best Practices

Chapter 17: Advanced AD Management with PowerShell

Chapter 18: Hybrid Identity

Chapter 19: Active Directory Audit and Monitoring

Other Books You May Enjoy

Index

Mastering Active Directory (Third Edition): Design, deploy, and protect Active Directory Domain Services for Windows Server 2022

فهرست مطالب کتاب Mastering Active Directory (Third Edition):

Chapter 1: Active Directory Fundamentals

Chapter 2: Active Directory Domain Services 2022

Chapter 3: Designing an Active Directory Infrastructure

Chapter 4: Active Directory Domain Name System

Chapter 5: Placing Operations Master Roles

Chapter 6: Migrating to Active Directory 2022

Chapter 7: Managing Active Directory Objects

Chapter 8: Managing Users, Groups, and Devices

Chapter 9: Designing the OU Structure

Chapter 10: Managing Group Policies

Chapter 11: Active Directory Services – Part 01

Chapter 12: Active Directory Services – Part 02

Chapter 13: Active Directory Certificate Services

Chapter 14: Active Directory Federation Services

Chapter 15: Active Directory Rights Management Services

Chapter 16: Active Directory Security Best Practices

Chapter 17: Advanced AD Management with PowerShell

Chapter 18: Hybrid Identity

Chapter 19: Active Directory Audit and Monitoring

Mastering Active Directory Automate tasks by leveraging PowerShell

فهرست مطالب کتاب Mastering Active Directory:

Active Directory Fundamentals Benefits

Active Directory Domain Services 2016

Designing Active Directory Infrastructure

Active Directory Domain Name System

Placing Operations Master Roles

Migrating to Active Directory 2016

Managing Active Directory Objects Tools

Managing Users, Groups, and Devices

Designing the OU Structure

Managing Group Policies

Active Directory Services

Active Directory Certificate Services

Active Directory Federation Services

Active Directory Rights Management Services

Active Directory Security Best Practices

Advanced AD Management with PowerShell

Summary

Active Directory Audit and Monitoring

Active Directory Troubleshooting

Mastering Active Directory, Third Edition: Design, deploy, and protect Active Directory Domain Services for Windows Server 2022

فهرست مطالب کتاب Mastering Active Directory:

Preface

Chapter 1: Active Directory Fundamentals

Chapter 2: Active Directory Domain Services 2022

Chapter 3: Designing an Active Directory Infrastructure

Chapter 4: Active Directory Domain Name System

Chapter 5: Placing Operations Master Roles

Chapter 6: Migrating to Active Directory 2022

Chapter 7: Managing Active Directory Objects

Chapter 8: Managing Users, Groups, and Devices

Chapter 9: Designing the OU Structure

Chapter 10: Managing Group Policies

Chapter 11: Active Directory Services – Part 01

Chapter 12: Active Directory Services – Part 02

Chapter 13: Active Directory Certificate Services

Chapter 14: Active Directory Federation Services

Chapter 15: Active Directory Rights Management Services

Chapter 16: Active Directory Security Best Practices

Chapter 17: Advanced AD Management with PowerShell

Chapter 18: Hybrid Identity

Chapter 19: Active Directory Audit and Monitoring

Index

Mastering Active Directory: Automate tasks by leveraging PowerShell for Active Directory Domain Services 2016

فهرست مطالب کتاب Mastering Active Directory: Automate tasks by leveraging PowerShell for Active Directory Domain Services 2016:

Active Directory Fundamentals Benefits

Active Directory Domain Services 2016

Designing Active Directory Infrastructure

Active Directory Domain Name System

Placing Operations Master Roles

Migrating to Active Directory 2016

Managing Active Directory Objects Tools

Managing Users, Groups, and Devices

Designing the OU Structure

Managing Group Policies

Active Directory Services

Active Directory Certificate Services

Active Directory Federation Services

Active Directory Rights Management Services

Active Directory Security Best Practices

Advanced AD Management with PowerShell

Summary  Azure

Active Directory Audit and Monitoring

Active Directory Troubleshooting

Mastering Cyber Intelligence Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

فهرست مطالب کتاب Mastering Cyber Intelligence: 

Preface

1 Cyber Threat Intelligence Life Cycle

2 Requirements and Intelligence Team Implementation

3 Cyber Threat Intelligence Frameworks

4 Cyber Threat Intelligence Tradecraft and Standards

5 Goal Setting, Procedures for CTI Strategy, and Practical Use

6 Cyber Threat Modeling and Adversary Analysis

7 Threat Intelligence Data Sources

8 Effective Defense Tactics and Data Protection

9 AI Applications in Cyber Threat Analytics

10 Threat Modeling and Analysis – Practical Use Cases

11 Usable Security: Threat Intelligence as Part of the Process

12 SIEM Solutions and Intelligence-Driven SOCs

13 Threat Intelligence Metrics, Indicators of Compromise, and

14 Threat Intelligence Reporting and Dissemination

15 Threat Intelligence Sharing and Cyber Activity Attribution – Practical Use Cases

Index

Mastering Kali Linux for Advanced Penetration Testing

فهرست مطالب:

Title Page

Copyright and Credits

Dedication

About Packt

Contributors

Preface

Goal-Based Penetration Testing

Open Source Intelligence and Passive Reconnaissance

Active Reconnaissance of External and Internal Networks

Vulnerability Assessment

Advanced Social Engineering and Physical Security

Wireless Attacks

Exploiting Web-Based Applications

Client-Side Exploitation

Bypassing Security Controls

Exploitation

Action on the Objective and Lateral Movement

Privilege Escalation

Command and Control

Embedded Devices and RFID Hacking

Other Books You May Enjoy

Mastering Linux Security and Hardening, Second Edition

فهرست مطالب کتابMastering Linux Security and Hardening:

Section 1: Setting up a Secure Linux System

Chapter 1: Running Linux in a Virtual Environment

Chapter 2: Securing User Accounts

Chapter 3: Securing Your Server with a Firewall – Part 1

Chapter 4: Securing Your Server with a Firewall – Part 2

Chapter 5: Encryption Technologies

Chapter 6: SSH Hardening

Section 2: Mastering File and Directory Access Control (DAC)

Chapter 7: Mastering Discretionary Access Control

Chapter 8: Access Control Lists and Shared Directory Management

Section 3: Advanced System Hardening Techniques

Chapter 9: Implementing Mandatory Access Control with SELinux and AppArmor

Chapter 10: Kernel Hardening and Process Isolation

Chapter 11: Scanning, Auditing, and Hardening

Chapter 12: Logging and Log Security

Chapter 13: Vulnerability Scanning and Intrusion Detection

Chapter 14: Security Tips and Tricks for the Busy Bee

Mastering Modern Web Penetration Testing

فهرست مطالب کتاب Mastering Modern Web Penetration Testing:

Chapter 1: Common Security Protocols

Chapter 2: Information Gathering

Chapter 3: Cross-Site Scripting

Chapter 4: Cross-Site Request Forgery

Chapter 5: Exploiting SQL Injection

Chapter 6: File Upload Vulnerabilities

Chapter 7: Metasploit and Web

Chapter 8: XML Attacks

Chapter 9: Emerging Attack Vectors

Chapter 10: OAuth 2.0 Security

Chapter 11: API Testing Methodology

Mastering Python Networking, Third Edition Your one-stop solution to using Python for network automation, programmability, and DevOps

فهرست مطالب کتاب Mastering Python Networking:

Preface

Chapter 1: Review of TCP/IP Protocol Suite and Python

Chapter 2: Low-Level Network Device Interactions

Chapter 3: APIs and Intent-Driven Networking

Chapter 4: The Python Automation Framework – Ansible Basics

Chapter 5: The Python Automation Framework – Beyond Basics

Chapter 6: Network Security with Python

Chapter 7: Network Monitoring with Python – Part 1

Chapter 8: Network Monitoring with Python – Part 2

Chapter 9: Building Network Web Services with Python

Chapter 10: AWS Cloud Networking

Chapter 11: Azure Cloud Networking

Chapter 12: Network Data Analysis with Elastic Stack

Chapter 13: Working with Git

Chapter 14: Continuous Integration with Jenkins

Chapter 15: Test-Driven Development for Networks

Index

Mastering Ubuntu Server – Second Edition

فهرست مطالب:

Preface

Chapter 1 – Deploying Ubuntu Server

Chapter 2 – Managing Users

Chapter 3 – Managing Storage Volumes

Chapter 4 – Connecting to Networks

Chapter 5 – Managing Software Packages

Chapter 6 – Controlling and Monitoring Processes

Chapter 7 – Setting Up Network Services

Chapter 8 – Accessing and sharing files

Chapter 9 – Sharing and Transferring Files

Chapter 10 – Serving Web Content

Chapter 11 – Learning Advanced Shell Techniques

Chapter 12 – Virtualization

Chapter 13 – Running Containers

Chapter 14 – Automating Server Configuration with Ansible

Chapter 15 – Securing Your Server

Chapter 16 – Troubleshooting Ubuntu Servers

Chapter 17 – Preventing and Recovering from Disasters

Appendix A: Using the Alternate Installer

Appendix B: Assessments

Other Books You May Enjoy

Index