SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling

فهرست مطالب SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling:

Step 4: Keeping Access

Application-Level Trojan Horse Suites

Virtual Network Computing Overview

Common Remote Control Backdoor Capabilities

Wrappers and Packers

Memory Analysis

LAB 5.1:Windows Analysis with Rekall

Rootkit Techniques

Kernel-Mode RootkitTechniques

Rootkit Examples

LAB 5.2: Fun with Rootkits

Covering Tracks In Linux Ln and UNIX

Hiding Files in UNIX

UNIX Log Editing Ed

nting E Editing

LAB 5.3: Shell HistoryAnalysis

Covering Tracks in Windows

Hiding Filles in NTFS

Alternate Data Streams in NTFS

LAB 5.4: Alternate Data Streams

Log Editing

LAB 5.5: Windows Log Editing

Covering Tracks on the Network

Reverse HTTP Shells

ICMP Tunnels

Covert_TCP

LAB 5.6: Covert Channels

Steganography

Hydan

Putting It All Together

Conclusions and References

Serious Cryptography (2nd Edition) – A Practical Introduction to Modern Encryption

فهرست مطالب کتاب Serious Cryptography (2nd Edition):

Part I: Fundamentals

Chapter 1: Encryption

Chapter 2: Randomness

Chapter 3: Cryptographic Security

Part II: Symmetric Crypto

Chapter 4: Block Ciphers

Chapter 5: Stream Ciphers

Chapter 6: Hash Functions

Chapter 7: Keyed Hashing

Chapter 8: Authenticated Encryption

Part III: Asymmetric Crypto

Chapter 9: Hard Problems

Chapter 10: RSA

Chapter 11: Diffie–Hellman

Chapter 12: Elliptic Curves

Part IV: Applications

Chapter 13: TLS

Chapter 14: Quantum and Post-Quantum

Chapter 15: Cryptocurrency Cryptography

SQL Notes For Professionals

فهرست مطالب کتاب SQL Notes For Professionals:

Getting started with SQL

Identifier

Data Types

NULL

Example Databases and Tables

SELECT

GROUP BY

ORDER BY

AND & OR Operators

CASE

LIKE operator

IN clause

Filter results using WHERE and HAVING

SKIP TAKE (Pagination)

EXCEPT

EXPLAIN and DESCRIBE

EXISTS CLAUSE

JOIN

UPDATE

CREATE Database

CREATE TABLE

CREATE FUNCTION

TRY/CATCH

UNION / UNION ALL

ALTER TABLE

INSERT

MERGE

cross apply, outer apply

DELETE

TRUNCATE

DROP Table

DROP or DELETE Database

Cascading Delete

GRANT and REVOKE

XML

Primary Keys

Indexes

Row number

SQL Group By vs Distinct

Finding Duplicates on a Column Subset with Detail

String Functions

Functions (Aggregate)

Functions (Scalar/Single Row)

Functions (Analytic)

Window Functions

Common Table Expressions

Views

Materialized Views

Comments

Foreign Keys

Sequence

Subqueries

Execution blocks

Stored Procedures

Triggers

Transactions

Table Design

Synonyms

Information Schema

Order of Execution

Clean Code in SQL

SQL Injection

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

فهرست مطالب کتاب The AI Revolution in Networking, Cybersecurity, and Emerging Technologies:

Preface

Introducing the Age of AI: Emergence, Growth, and Impact on Technology

Connected Intelligence: AI in Computer Networking

Securing the Digital Frontier: AI’s Role in Cybersecurity

AI and Collaboration: Building Bridges, Not Walls

AI in the Internet of Things (AIoT)

Revolutionizing Cloud Computing with AI

Impact of AI in Other Emerging Technologies

Index

The Complete Guide to YouTube for Business

فهرست مطالب:

Introduction Marketing + You(Tube): Your Business on the Platform

Chapter ONE Identifying + Refining Goals for Your YouTube Presence

Chapter TWO Like + Subscribe to a YouTube Marketing Strategy

Chapter THREE Shorts, Sweet, + to the Point: YouTube Video Formats

Chapter FOUR Everything You Need to Know About the Algorithm

Chapter FIVE Tips + Tricks for Developing Engaging YouTube Videos

Chapter SIX Measurement + Monetization Strategies

Conclusion  Subscribe Worthy Software for Your Social Strategy

The Complete VMware vSphere Guide

فهرست مطالب:

Preface

The Virtual Data Center

The Discovery Process

The Design Factors

vSphere Management Design

vSphere Storage Design

vSphere Network Design

vSphere Compute Design

vSphere Physical Design

Virtual Machine Design

Deployment Workflow and Component Installation

Configuring and Managing vSphere 6.7

Life Cycle Management, Patching, and Upgrading

VM Deployment and Management

VM Resource Management

Availability and Disaster Recovery

Securing and Protecting Your Environment

Analyzing and Optimizing Your Environment

Troubleshooting Your Environment

Building Your Own VMware vSphere Lab

Index

The Do’s and Don’ts of Reddit Marketing – Masters in Marketing Series

فهرست مطالب:

Why Reddit Matters in 2025

The Do’s of Reddit Marketing

The Don’ts of Reddit Marketing

Ad Strategies on Reddit

Engagement Tactics for Brands

Crisis Management on Reddit

Actionable Checklist

HubSpot’s Reddit Playbook: Frontline Insights

The Linux Programming Interface A Linux and UNIX System Programming Handbook

فهرست مطالب کتاب The Linux Programming Interface:

Preface

Chapter 1: History and Standards

Chapter 2: Fundamental Concepts .

Chapter 3: System Programming Concepts.

Chapter 4: File I/O: The Universal I/O Model

Chapter 5: File I/O: Further Details

Chapter 6: Processes

Chapter 7: Memory Allocation.

Chapter 8: Users and Groups

Chapter 9: Process Credentials

Chapter 10: Time.

Chapter 11: System Limits and Options

Chapter 12: System and Process Information

Chapter 13: File I/O Buffering.

Chapter 14: File Systems

Chapter 15: File Attributes

Chapter 16: Extended Attributes

Chapter 17: Access Control Lists

Chapter 18: Directories and Links

Chapter 19: Monitoring File Events

viii Brief Contents

Chapter 20: Signals: Fundamental Concepts

Chapter 21: Signals: Signal Handlers

Chapter 22: Signals: Advanced Features

Chapter 23: Timers and Sleeping

Chapter 24: Process Creation

Chapter 25: Process Termination

Chapter 26: Monitoring Child Processes

Chapter 27: Program Execution.

Chapter 28: Process Creation and Program Execution in More Detail.

Chapter 29: Threads: Introduction

Chapter 30: Threads: Thread Synchronization

Chapter 31: Threads: Thread Safety and Per-Thread Storage

Chapter 32: Threads: Thread Cancellation.

Chapter 33: Threads: Further Details

Chapter 34: Process Groups, Sessions, and Job Control

Chapter 35: Process Priorities and Scheduling

Chapter 36: Process Resources

Chapter 37: Daemons

Chapter 38: Writing Secure Privileged Programs

Chapter 39: Capabilities

Chapter 40: Login Accounting

Chapter 41: Fundamentals of Shared Libraries

Chapter 42: Advanced Features of Shared Libraries

Chapter 43: Interprocess Communication Overview

Chapter 44: Pipes and FIFOs

Chapter 45: Introduction to System V IPC

Chapter 46: System V Message Queues

Brief Contents ix

Chapter 47: System V Semaphores

Chapter 48: System V Shared Memory

Chapter 49: Memory Mappings

Chapter 50: Virtual Memory Operations

Chapter 51: Introduction to POSIX IPC.

Chapter 52: POSIX Message Queues

Chapter 53: POSIX Semaphores

Chapter 54: POSIX Shared Memory

Chapter 55: File Locking.

Chapter 56: Sockets: Introduction

Chapter 57: Sockets: UNIX Domain

Chapter 58: Sockets: Fundamentals of TCP/IP Networks

Chapter 59: Sockets: Internet Domains

Chapter 60: Sockets: Server Design

Chapter 61: Sockets: Advanced Topics

Chapter 62: Terminals

Chapter 63: Alternative I/O Models

Chapter 64: Pseudoterminals

Appendix A: Tracing System Calls

Appendix B: Parsing Command-Line Options

Appendix C: Casting the NULL Pointer

Appendix D: Kernel Configuration

Appendix E: Further Sources of Information

Appendix F: Solutions to Selected Exercises

Bibliography

Index

The LISP Network Evolution to the Next-Generation of Data Networks

فهرست مطالب کتاب The LISP Network:

Chapter 1: LISP and the Future of Networking

Chapter 2: LISP Architecture

Chapter 3: Data Center Trends

Chapter 4: The Wide­Area Network: Bringing Traffic from Access to the Data Center

Chapter 5: Mega­Scale Access Networks: LISP, User Access, and the Internet of Things

Chapter 6: Security

Chapter 7: LISP and the Next­Generation Mobile Network

The Official CompTIA PenTest+ Student Guide (Exam PT0-002)

فهرست مطالب کتاب The Official CompTIA PenTest+ Student Guide:

Lesson 1: Scoping Organizational/Customer Requirements

Lesson 2: Defining the Rules of Engagement

Lesson 3: Footprinting and Gathering Intelligence

Lesson 4: Evaluating Human and Physical Vulnerabilities

Lesson 5: Preparing the Vulnerability Scan

Lesson 6: Scanning Logical Vulnerabilities

Lesson 7: Analyzing Scanning Results

Lesson 8: Avoiding Detection and Covering Tracks

Lesson 9: Exploiting the LAN and Cloud

Lesson 10: Testing Wireless Networks

Lesson 11: Targeting Mobile Devices

Lesson 12: Attacking Specialized Systems

Lesson 13: Web Application-Based Attacks

Lesson 14: Performing System Hacking

Lesson 15: Scripting and Software Development

Lesson 16: Leveraging the Attack: Pivot and Penetrate

Lesson 17: Communicating During the PenTesting Process

Lesson 18: Summarizing Report Components

Lesson 19: Recommending Remediation

Lesson 20: Performing Post-Report Delivery Activities

The Ultimate Kali Linux Book (Third Edition)

فهرست مطالب کتاب The Ultimate Kali Linux Book (Third Edition): 

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Building a Penetration Testing Lab

Chapter 3: Setting up for Advanced Penetration Testing Techniques

Chapter 4: Passive Reconnaissace

Chapter 5: Exploring Open Source Intelligence

Chapter 6: Active Reconnaissance

Chapter 7: Performing Vulnerability Assessments

Chapter 8: Understanding Network Penetration Testing

Chapter 9: Post Exploitation techniques

Chapter 10: Working with Active Directory attacks

Chapter 11: Advanced Active Directory attacks

Chapter 12: Delving into Command and Control tactics

Chapter 13: Advanced wireless penetration testing

Chapter 14: Exploring Social Engineering attacks

Chapter 15: Understanding Website Application security

Chapter 16: Advanced Website Penetration Testing Techniques

17. Chapter 17: Best Practices for the real world