Mobile and Wireless Network Security and Privacy
فهرست مطالب کتاب Mobile and Wireless Network Security and Privacy:
Preface
Acknowledgement
Research Directions in Security and Privacy for Mobile and Wireless Networks
Pervasive Systems: Enhancing Trust Negotiation with Privacy Support
Applying Trust in Mobile and Wireless Networks
A Framework for Computing Trust in Mobile Ad-Hoc Networks
The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security
On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks
Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions
An Anonymous MAC Protocol for Wireless Ad-hoc Networks
Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks
Index
Mobile Malware Attacks and Defense
فهرست مطالب کتاب Mobile Malware Attacks and Defense:
Chapter 1: Introduction to Mobile Malware
Chapter 2: Visual Payloads
Chapter 3: Timeline of Mobile Malware, Hoaxes, and Threats
Chapter 4: Overview of Mobile Malware Families
Chapter 5: Taxonomy of Mobile Malware
Chapter 6: Phishing, SMishing, and Vishing
Chapter 7: Operating System and Device Vulnerabilities
Chapter 8: Analyzing Mobile Malware
Chapter 9: Forensic Analysis of Mobile Malware
Chapter 10: Debugging and Disassembly of MMC
Chapter 11: Mobile Malware Mitigation Measures
MySQL Notes For Professionals
فهرست مطالب کتاب MySQL Notes For Professionals:
Getting started with MySQL
Data Types
SELECT
Backticks
NULL
Limit and Offset
Creating databases
Using Variables
Comment MySQL
INSERT
DELETE
UPDATE
ORDER BY
Group By
Error 1055: ONLY_FULL_GROUP_BY: something is not in GROUP BY clause …
Joins
JOINS: Join 3 table with the same name of id.
UNION
Arithmetic
String operations
Date and Time Operations
Handling Time Zones
Regular Expressions
VIEW
Table Creation
ALTER TABLE
Drop Table
MySQL LOCK TABLE
Error codes
Stored routines (procedures and functions)
Indexes and Keys
Full-Text search
PREPARE Statements
JSON
Extract values from JSON type
MySQL Admin
TRIGGERS
Configuration and tuning
Events
ENUM
Install Mysql container with Docker-Compose
Character Sets and Collations
MyISAM Engine
Converting from MyISAM to InnoDB
Transaction
Log files
Clustering
Partitioning
Replication
Backup using mysqldump
mysqlimport
LOAD DATA INFILE
MySQL Unions
MySQL client
Temporary Tables
Customize PS1
Dealing with sparse or missing data
Connecting with UTF-8 Using Various Programming language.
Time with subsecond precision
One to Many
Server Information
SSL Connection Setup
Create New User
Security via GRANTs
Change Password
Recover and reset the default root password for MySQL 5.7+
Recover from lost root password
MySQL Performance Tips
Performance Tuning
Reserved Words
Network Attacks & Exploitation: A Framework
فهرست مطالب کتاب Network Attacks & Exploitation:
Introduction
Chapter 1 Computer Network Exploitation
Chapter 2 The Attacker
Chapter 3 The Defender
Chapter 4 Asymmetries
Chapter 5 Attacker Frictions
Chapter 6 Defender Frictions
Chapter 7 Off ensive Strategy
Chapter 8 Defensive Strategy
Chapter 9 Off ensive Case Studies
Appendix Attack
References
Bibliography
Index
Network Defense and Countermeasures: Principles and Practices (Fourth Edition)
فهرست مطالب کتاب Network Defense and Countermeasures: Principles and Practices (Fourth Edition):
Chapter 1 Introduction to Network Security
Chapter 2 Types of Attacks
Chapter 3 Fundamentals of Firewalls
Chapter 4 Firewall Practical Applications
Chapter 5 Intrusion-Detection Systems
Chapter 6 Encryption Fundamentals
Chapter 7 Virtual Private Networks
Chapter 8 Operating System Hardening
Chapter 9 Defending Against Virus Attacks
Chapter 10 Defending against Trojan Horses and Phishing
Chapter 11 Security Policies
Chapter 12 Assessing System Security
Chapter 13 Security Standards
Chapter 14 Physical Security and Disaster Recovery
Chapter 15 Techniques Used by Attackers
Chapter 16 Introduction to Forensics
Chapter 17 Cyber Warfare and Terrorism
Network Design Cookbook – 2nd Edition
فهرست مطالب کتاب Network Design Cookbook – 2nd Edition:
Start Here
Introduction
Design Process
Design PODs
Example
Frameworks
Solutions
Services
Attributes
Network Forensics: Tracking Hackers Through Cyberspace
فهرست مطالب کتاب Network Forensics: Tracking Hackers Through Cyberspace:
Part I: Foundation
Chapter 1: Practical Investigative Strategies
Chapter 2: Technical Fundamentals
Chapter 3: Evidence Acquisition
Part II: Traffic Analysis
Chapter 4: Packet Analysis
Chapter 5: Statistical Flow Analysis
Chapter 6: Wireless: Network Forensics Unplugged
Chapter 7: Network Intrusion Detection and Analysis
Part III: Network Devices and Servers
Chapter 8: Event Log Aggregation, Correlation, and Analysis
Chapter 9: Switches, Routers, and Firewalls
Chapter 10: Web Proxies
Part IV: Advanced Topics
Chapter 11: Network Tunneling
Chapter 12: Malware Forensics
Network Security Auditing
فهرست مطالب کتاب Network Security Auditing:
Introduction
Chapter 1 The Principles of Auditing
Chapter 2 Information Security and the Law
Chapter 3 Information Security Governance, Frameworks, and Standards
Chapter 4 Auditing Tools and Techniques
Chapter 5 Auditing Cisco Security Solutions
Chapter 6 Policy, Compliance, and Management
Chapter 7 Infrastructure Security
Chapter 8 Perimeter Intrusion Prevention
Chapter 9 Access Control
Chapter 10 Secure Remote Access
Chapter 11 Endpoint Protection
Chapter 12 Unified Communications
Index
Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1
فهرست مطالب کتاب Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1:
Chapter 1 Communication in a Connected World
Chapter 2 Network Components, Types, and Connections
Chapter 3 Wireless and Mobile Networks
Chapter 4 Build a Home Network
Chapter 5 Communication Principles
Chapter 6 Network Media
Chapter 7 The Access Layer
Chapter 8 The Internet Protocol
Chapter 9 IPv4 and Network Segmentation
Chapter 10 IPv6 Addressing Formats and Rules
Chapter 11 Dynamic Addressing with DHCP
Chapter 12 Gateways to Other Networks
Chapter 13 The ARP Process
Chapter 14 Routing Between Networks
Chapter 15 TCP and UDP
Chapter 16 Application Layer Services
Chapter 17 Network Testing Utilities
Chapter 18 Network Design
Chapter 19 Cloud and Virtualization
Chapter 20 Number Systems
Chapter 21 Ethernet Switching
Chapter 22 Network Layer
Chapter 23 IPv4 Address Structure
Chapter 24 Address Resolution
Chapter 25 IP Addressing Services
Chapter 26 Transport Layer
Chapter 27 The Cisco IOS Command Line
Chapter 28 Build a Small Cisco Network
Chapter 29 ICMP
Chapter 30 Physical Layer
Chapter 31 Data Link Layer
Chapter 32 Routing at the Network Layer
Chapter 33 IPv6 Addressing
Chapter 34 IPv6 Neighbor Discovery
Chapter 35 Cisco Switches and Routers
Chapter 36 Troubleshoot Common Network Problems
Chapter 37 Network Support
Chapter 38 Cybersecurity Threats, Vulnerabilities, and Attacks
Chapter 39 Network Security
Appendix A Answers to “Check Your Understanding”
Questions
Glossary
Networking with MikroTik MTCNA Study Guide
فهرست مطالب کتاب Networking with MikroTik MTCNA Study Guide:
1 MikroTik
2 RouterOS Software
3 Defaults
4 Accessing the Router
5 Configuring RouterOS
6 Managing Users
7 Interfaces
8 Addresses
9 Routing
10 VPNs and Tunnels
11 Queues
12 Firewalls
13 NAT
14 Wireless Networks
15 Wireless Security
16 Troubleshooting Tools
17 RouterOS Monitoring
18 The Dude
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
فهرست مطالب کتاب Ninja Hacking:
Chapter 1: The Historical Ninja
Chapter 2: The Modern Ninja
Chapter 3: Strategies and Tactics
Chapter 4: Exploitation of Current Events
Chapter 5: Disguise
Chapter 6: Impersonation
Chapter 7: Infiltration
Chapter 8: Use of Timing to Enter an Area
Chapter 9: Discovering Weak Points in Area Defenses
Chapter 10: Psychological Weaknesses
Chapter 11: Distraction
Chapter 12: Concealment Devices
Chapter 13: Covert Listening Devices
Chapter 14: Intelligence
Chapter 15: Surveillance
Chapter 16: Sabotage
Chapter 17: Hiding and Silent Movement
NodeJS Notes For Professionals
فهرست مطالب کتاب NodeJS Notes For Professionals:
Getting started with Node.js
npm
Web Apps With Express
Filesystem I/O
Exporting and Consuming Modules
Exporting and Importing Module in node.js
How modules are loaded
Cluster Module
Readline
json
Event Emitters
Autoreload on changes
Environment
Callback to Promise
Executing files or commands with Child Processes
Exception handling
Keep a node application constantly running
Uninstalling Node.js
nvm – Node Version Manager
http
Using Streams
Deploying Node.js applications in production
Securing Node.js applications
Mongoose Library
js
File upload
io communication
Mongodb integration
Handling POST request in Node.js
Simple REST based CRUD API
Template frameworks
js Architecture & Inner Workings
Debugging Node.js application
Node server without framework
JS with ES6
Interacting with Console
Cassandra Integration
Creating API’s with Node.js
Graceful Shutdown
Using IISNode to host Node.js Web Apps in IIS
CLI
NodeJS Frameworks
grunt
Using WebSocket’s with Node.JS
metalsmith
Parsing command line arguments
Client-server communication
js Design Fundamental
Connect to Mongodb
Performance challenges
Send Web Notification
Remote Debugging in Node.JS
Database (MongoDB with Mongoose)
Good coding style
Restful API Design: Best Practices
Deliver HTML or any other sort of file
TCP Sockets
Hack
Bluebird Promises
Async/Await
Koa Framework v2
Unit testing frameworks
ECMAScript 2015 (ES6) with Node.js
Routing AJAX requests with Express.JS
Sending a file stream to client
NodeJS with Redis
Using Browserfiy to resolve ‘required’ error with browsers
JS and MongoDB.
Passport integration
Dependency Injection
NodeJS Beginner Guide
Use Cases of Node.js
js
PostgreSQL integration
MySQL integration
MySQL Connection Pool
MSSQL Intergration
js with Oracle
Synchronous vs Asynchronous programming in nodejs
js Error Management
js v6 New Features and Improvement
Eventloop
Nodejs History
js
Asynchronous programming
js code for STDIN and STDOUT without using any library
MongoDB Integration for Node.js/Express.js
Lodash
csv parser in node js
Loopback – REST Based connector
Running node.js as a service
js with CORS
Getting started with Nodes profiling
js Performance
Yarn Package Manager
OAuth 2.0
Node JS Localization
Deploying Node.js application without downtime.
js (express.js) with angular.js Sample code
NodeJs Routing
Creating a Node.js Library that Supports Both Promises and Error-First Callbacks
Project Structure
Avoid callback hell
Arduino communication with nodeJs
N-API
Multithreading
Windows authentication under node.js
Require()
Route-Controller-Service structure for ExpressJS
Push notifications
Installing Node.js