Mobile and Wireless Network Security and Privacy

فهرست مطالب کتاب Mobile and Wireless Network Security and Privacy:

Preface

Acknowledgement

Research Directions in Security and Privacy for Mobile and Wireless Networks

Pervasive Systems: Enhancing Trust Negotiation with Privacy Support

Applying Trust in Mobile and Wireless Networks

A Framework for Computing Trust in Mobile Ad-Hoc Networks

The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security

On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks

Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions

An Anonymous MAC Protocol for Wireless Ad-hoc Networks

Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks

Index

Mobile Malware Attacks and Defense

فهرست مطالب کتاب Mobile Malware Attacks and Defense:

Chapter 1: Introduction to Mobile Malware

Chapter 2: Visual Payloads

Chapter 3: Timeline of Mobile Malware, Hoaxes, and Threats

Chapter 4: Overview of Mobile Malware Families

Chapter 5: Taxonomy of Mobile Malware

Chapter 6: Phishing, SMishing, and Vishing

Chapter 7: Operating System and Device Vulnerabilities

Chapter 8: Analyzing Mobile Malware

Chapter 9: Forensic Analysis of Mobile Malware

Chapter 10: Debugging and Disassembly of MMC

Chapter 11: Mobile Malware Mitigation Measures

MySQL Notes For Professionals

فهرست مطالب کتاب MySQL Notes For Professionals:

Getting started with MySQL

Data Types

SELECT

Backticks

NULL

Limit and Offset

Creating databases

Using Variables

Comment MySQL

INSERT

DELETE

UPDATE

ORDER BY

Group By

Error 1055: ONLY_FULL_GROUP_BY: something is not in GROUP BY clause …

Joins

JOINS: Join 3 table with the same name of id.

UNION

Arithmetic

String operations

Date and Time Operations

Handling Time Zones

Regular Expressions

VIEW

Table Creation

ALTER TABLE

Drop Table

MySQL LOCK TABLE

Error codes

Stored routines (procedures and functions)

Indexes and Keys

Full-Text search

PREPARE Statements

JSON

Extract values from JSON type

MySQL Admin

TRIGGERS

Configuration and tuning

Events

ENUM

Install Mysql container with Docker-Compose

Character Sets and Collations

MyISAM Engine

Converting from MyISAM to InnoDB

Transaction

Log files

Clustering

Partitioning

Replication

Backup using mysqldump

mysqlimport

LOAD DATA INFILE

MySQL Unions

MySQL client

Temporary Tables

Customize PS1

Dealing with sparse or missing data

Connecting with UTF-8 Using Various Programming language.

Time with subsecond precision

One to Many

Server Information

SSL Connection Setup

Create New User

Security via GRANTs

Change Password

Recover and reset the default root password for MySQL 5.7+

Recover from lost root password

MySQL Performance Tips

Performance Tuning

Reserved Words

Network Attacks & Exploitation: A Framework

فهرست مطالب کتاب Network Attacks & Exploitation:

Introduction

Chapter 1 Computer Network Exploitation

Chapter 2 The Attacker

Chapter 3 The Defender

Chapter 4 Asymmetries

Chapter 5 Attacker Frictions

Chapter 6 Defender Frictions

Chapter 7 Off ensive Strategy

Chapter 8 Defensive Strategy

Chapter 9 Off ensive Case Studies

Appendix Attack

References

Bibliography

Index

Network Defense and Countermeasures: Principles and Practices (Fourth Edition)

فهرست مطالب کتاب Network Defense and Countermeasures: Principles and Practices (Fourth Edition):

Chapter 1 Introduction to Network Security

Chapter 2 Types of Attacks

Chapter 3 Fundamentals of Firewalls

Chapter 4 Firewall Practical Applications

Chapter 5 Intrusion-Detection Systems

Chapter 6 Encryption Fundamentals

Chapter 7 Virtual Private Networks

Chapter 8 Operating System Hardening

Chapter 9 Defending Against Virus Attacks

Chapter 10 Defending against Trojan Horses and Phishing

Chapter 11 Security Policies

Chapter 12 Assessing System Security

Chapter 13 Security Standards

Chapter 14 Physical Security and Disaster Recovery

Chapter 15 Techniques Used by Attackers

Chapter 16 Introduction to Forensics

Chapter 17 Cyber Warfare and Terrorism

Network Design Cookbook – 2nd Edition

فهرست مطالب کتاب Network Design Cookbook – 2nd Edition:

Start Here

Introduction

Design Process

Design PODs

Example

Frameworks

Solutions

Services

Attributes

Network Forensics: Tracking Hackers Through Cyberspace

فهرست مطالب کتاب Network Forensics: Tracking Hackers Through Cyberspace:

Part I: Foundation

Chapter 1: Practical Investigative Strategies

Chapter 2: Technical Fundamentals

Chapter 3: Evidence Acquisition

Part II: Traffic Analysis

Chapter 4: Packet Analysis

Chapter 5: Statistical Flow Analysis

Chapter 6: Wireless: Network Forensics Unplugged

Chapter 7: Network Intrusion Detection and Analysis

Part III: Network Devices and Servers

Chapter 8: Event Log Aggregation, Correlation, and Analysis

Chapter 9: Switches, Routers, and Firewalls

Chapter 10: Web Proxies

Part IV: Advanced Topics

Chapter 11: Network Tunneling

Chapter 12: Malware Forensics

Network Security Auditing

فهرست مطالب کتاب Network Security Auditing:

Introduction

Chapter 1 The Principles of Auditing

Chapter 2 Information Security and the Law

Chapter 3 Information Security Governance, Frameworks, and Standards

Chapter 4 Auditing Tools and Techniques

Chapter 5 Auditing Cisco Security Solutions

Chapter 6 Policy, Compliance, and Management

Chapter 7 Infrastructure Security

Chapter 8 Perimeter Intrusion Prevention

Chapter 9 Access Control

Chapter 10 Secure Remote Access

Chapter 11 Endpoint Protection

Chapter 12 Unified Communications

Index

Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1

فهرست مطالب کتاب Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1:

Chapter 1 Communication in a Connected World

Chapter 2 Network Components, Types, and Connections

Chapter 3 Wireless and Mobile Networks

Chapter 4 Build a Home Network

Chapter 5 Communication Principles

Chapter 6 Network Media

Chapter 7 The Access Layer

Chapter 8 The Internet Protocol

Chapter 9 IPv4 and Network Segmentation

Chapter 10 IPv6 Addressing Formats and Rules

Chapter 11 Dynamic Addressing with DHCP

Chapter 12 Gateways to Other Networks

Chapter 13 The ARP Process

Chapter 14 Routing Between Networks

Chapter 15 TCP and UDP

Chapter 16 Application Layer Services

Chapter 17 Network Testing Utilities

Chapter 18 Network Design

Chapter 19 Cloud and Virtualization

Chapter 20 Number Systems

Chapter 21 Ethernet Switching

Chapter 22 Network Layer

Chapter 23 IPv4 Address Structure

Chapter 24 Address Resolution

Chapter 25 IP Addressing Services

Chapter 26 Transport Layer

Chapter 27 The Cisco IOS Command Line

Chapter 28 Build a Small Cisco Network

Chapter 29 ICMP

Chapter 30 Physical Layer

Chapter 31 Data Link Layer

Chapter 32 Routing at the Network Layer

Chapter 33 IPv6 Addressing

Chapter 34 IPv6 Neighbor Discovery

Chapter 35 Cisco Switches and Routers

Chapter 36 Troubleshoot Common Network Problems

Chapter 37 Network Support

Chapter 38 Cybersecurity Threats, Vulnerabilities, and Attacks

Chapter 39 Network Security

Appendix A Answers to “Check Your Understanding”

Questions

Glossary

Networking with MikroTik MTCNA Study Guide

فهرست مطالب کتاب Networking with MikroTik MTCNA Study Guide:

1 MikroTik

2 RouterOS Software

3 Defaults

4 Accessing the Router

5 Configuring RouterOS

6 Managing Users

7 Interfaces

8 Addresses

9 Routing

10 VPNs and Tunnels

11 Queues

12 Firewalls

13 NAT

14 Wireless Networks

15 Wireless Security

16 Troubleshooting Tools

17 RouterOS Monitoring

18 The Dude

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

فهرست مطالب کتاب Ninja Hacking:

Chapter 1: The Historical Ninja

Chapter 2: The Modern Ninja

Chapter 3: Strategies and Tactics

Chapter 4: Exploitation of Current Events

Chapter 5: Disguise

Chapter 6: Impersonation

Chapter 7: Infiltration

Chapter 8: Use of Timing to Enter an Area

Chapter 9: Discovering Weak Points in Area Defenses

Chapter 10: Psychological Weaknesses

Chapter 11: Distraction

Chapter 12: Concealment Devices

Chapter 13: Covert Listening Devices

Chapter 14: Intelligence

Chapter 15: Surveillance

Chapter 16: Sabotage

Chapter 17: Hiding and Silent Movement

NodeJS Notes For Professionals

فهرست مطالب کتاب NodeJS Notes For Professionals:

Getting started with Node.js

npm

Web Apps With Express

Filesystem I/O

Exporting and Consuming Modules

Exporting and Importing Module in node.js

How modules are loaded

Cluster Module

Readline

json

Event Emitters

Autoreload on changes

Environment

Callback to Promise

Executing files or commands with Child Processes

Exception handling

Keep a node application constantly running

Uninstalling Node.js

nvm – Node Version Manager

http

Using Streams

Deploying Node.js applications in production

Securing Node.js applications

Mongoose Library

js

File upload

io communication

Mongodb integration

Handling POST request in Node.js

Simple REST based CRUD API

Template frameworks

js Architecture & Inner Workings

Debugging Node.js application

Node server without framework

JS with ES6

Interacting with Console

Cassandra Integration

Creating API’s with Node.js

Graceful Shutdown

Using IISNode to host Node.js Web Apps in IIS

CLI

NodeJS Frameworks

grunt

Using WebSocket’s with Node.JS

metalsmith

Parsing command line arguments

Client-server communication

js Design Fundamental

Connect to Mongodb

Performance challenges

Send Web Notification

Remote Debugging in Node.JS

Database (MongoDB with Mongoose)

Good coding style

Restful API Design: Best Practices

Deliver HTML or any other sort of file

TCP Sockets

Hack

Bluebird Promises

Async/Await

Koa Framework v2

Unit testing frameworks

ECMAScript 2015 (ES6) with Node.js

Routing AJAX requests with Express.JS

Sending a file stream to client

NodeJS with Redis

Using Browserfiy to resolve ‘required’ error with browsers

JS and MongoDB.

Passport integration

Dependency Injection

NodeJS Beginner Guide

Use Cases of Node.js

js

PostgreSQL integration

MySQL integration

MySQL Connection Pool

MSSQL Intergration

js with Oracle

Synchronous vs Asynchronous programming in nodejs

js Error Management

js v6 New Features and Improvement

Eventloop

Nodejs History

js

Asynchronous programming

js code for STDIN and STDOUT without using any library

MongoDB Integration for Node.js/Express.js

Lodash

csv parser in node js

Loopback – REST Based connector

Running node.js as a service

js with CORS

Getting started with Nodes profiling

js Performance

Yarn Package Manager

OAuth 2.0

Node JS Localization

Deploying Node.js application without downtime.

js (express.js) with angular.js Sample code

NodeJs Routing

Creating a Node.js Library that Supports Both Promises and Error-First Callbacks

Project Structure

Avoid callback hell

Arduino communication with nodeJs

N-API

Multithreading

Windows authentication under node.js

Require()

Route-Controller-Service structure for ExpressJS

Push notifications

Installing Node.js