NSX-T Data Center Administration Guide (VMware NSX-T Data Center 3.0)
فهرست مطالب کتاب NSX-T Data Center Administration Guide (VMware NSX-T Data Center 3.0):
1 NSX Manager
2 Tier-0 Gateways
3 Tier-1 Gateway
4 Segments
5 Host Switches
6 Virtual Private Network (VPN)
7 Network Address Translation (NAT)
8 Load Balancing
9 Distributed Load Balancer
10 Forwarding Policies
11 IP Address Management (IPAM)
12 Networking Settings
13 Security
14 Inventory
15 Multisite and Federation
16 System Monitoring
17 Network Monitoring
18 Authentication and Authorization
19 Certificates
20 Configuring NSX-T Data Center in Manager Mode
21 Backing Up and Restoring NSX Manager
22 Operations and Management 886
23 Using NSX Cloud 965
ntroducing Windows Server 2016 Technical Preview
فهرست مطالب کتاب Windows Server 2016 Technical Preview:
Introduction
Chapter 1: The software-defined datacenter
Chapter 2: Compute
Chapter 3: Storage
Chapter 4: Networking
Chapter 5: Security
Chapter 6: App Plat
Chapter 7: Systems management
Offensive Security Wireless Attacks – WiFu (v3.0)
فهرست مطالب کتاب Offensive Security Wireless Attacks – WiFu:
IEEE 802.11
Wireless Networks
Packets and Network Interaction
Getting Started
Linux Wireless Stack and Drivers
Aircrack-ng Essentials
Cracking WEP with Connected Clients
Cracking WEP via a Client
Cracking Clientless WEP Networks
Bypassing WEP Shared Key Authentication
Cracking WPA/WPA2 PSK with Aircrack-ng
Cracking WPA with JTR and Aircrack-ng
Cracking WPA with coWPAtty
Cracking WPA with Pyrit
Additional Aircrack-ng Tools
Wireless Reconnaissance
Rogue Access Points
Appendix A: Cracking WEP via a Client – Alternate Solutions
Appendix B: ARP Amplification
Oracle Database Notes For Professionals
فهرست مطالب کتاب Oracle Database Notes For Professionals:
Getting started with Oracle Database
Getting started with PL/SQL
Anonymous PL/SQL Block
PL/SQL procedure
Data Dictionary
Dates
Working with Dates
DUAL table
JOINS
Handling NULL values
String Manipulation
IF-THEN-ELSE Statement
Limiting the rows returned by a query (Pagination)
Recursive Sub-Query Factoring using the WITH Clause (A.K.A. Common Table Expressions)
Different ways to update records
Update with Joins
Functions
Statistical functions
Window Functions
Creating a Context
Splitting Delimited Strings
Collections and Records
Object Types
Loop
Cursors
Sequences
Indexes
Hints
Packages
Exception Handling
Error logging
Database Links
Table partitioning
Oracle Advanced Queuing (AQ)
constraints
Autonomous Transactions
Oracle MAF
level query
Hierarchical Retrieval With Oracle Database 12C
Data Pump
Bulk collect
Real Application Security
Assignments model and language
Triggers
Dynamic SQL
Penetration Testing and Network Defense
فهرست مطالب کتاب Penetration Testing and Network Defense:
Foreword
Introduction
Part I Overview of Penetration Testing
Chapter 1 Understanding Penetration Testing
Chapter 2 Legal and Ethical Considerations
Chapter 3 Creating a Test Plan
Part II Performing the Test
Chapter 4 Performing Social Engineering
Chapter 5 Performing Host Reconnaissance
Chapter 6 Understanding and Attempting Session Hijacking
Chapter 7 Performing Web Server Attacks
Chapter 8 Performing Database Attacks
Chapter 9 Password Cracking
Chapter 10 Attacking the Network
Chapter 11 Scanning and Penetrating Wireless Networks
Chapter 12 Using Trojans and Backdoor Applications
Chapter 13 Penetrating UNIX, Microsoft, and Novell Servers
Chapter 14 Understanding and Attempting Buffer Overflows
Chapter 15 Denial-of-Service Attacks
Chapter 16 Case Study: A Methodical Step-By-Step Penetration Test
Part III Appendixes
Appendix A Preparing a Security Policy
Appendix B Tools
Glossary
Index
Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits
فهرست مطالب:
Introduction
1 Introduction to Penetration Testing
2 Standards
3 Cryptography
4 Reconnaissance
5 Malware
6 Hacking Windows
7 Web Hacking
8 Vulnerability Scanning
9 Introduction to Linux
10 Linux Hacking
11 Introduction to Kali Linux
12 General Hacking Techniques
13 Introduction to Metasploit
14 More with Metasploit
15 Introduction to Scripting with Ruby
16 Write Your Own Metasploit Exploits with Ruby
17 General Hacking Knowledge
18 Additional Pen Testing Topics
19 A Sample Pen Test Project
Appendix A: Answers to Chapter Multiple Choice Questions
Index Index
Pentesting Active Directory and Windows-based Infrastructure
فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:
1 Getting the Lab Ready and Attacking Exchange Server
2 Defense Evasion 25
3 Domain Reconnaissance and Discovery 51
4 Credential Access in Domain 71
5 Lateral Movement in Domain and Across Forests 101
6 Domain Privilege Escalation 141
7 Persistence on Domain Level 179
8 Abusing Active Directory Certificate Services 221
9 Compromising Microsoft SQL Server 267
10 Taking Over WSUS and SCCM
Practical Deployment of Cisco Identity Services Engine
فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:
Chapter 1: Introduction
Chapter 2: ISE Clustering and Basic Setup
Chapter 3: Authentication Methods
Chapter 4: Policy Elements
Chapter 5: Authentication
Chapter 6: Authorization
Chapter 7: Network Access Device Configuration
Chapter 8: ISE Profiling
Chapter 9: ISE Portals and Guest Access
Chapter 10: Deployment Strategies
Chapter 11: ISE Policy Design Practices
Chapter 12: Corporate Authentication Designs
Chapter 13: BYOD Designs
Chapter 14: ISE Posture Assessment
Chapter 15: VPN Integrations
Chapter 16: ISE Reporting and Logging
Chapter 17: ISE CLI
Chapter 18: ISE Administration
Practical Hacking Techniques and Countermeasures
فهرست مطالب کتاب Practical Hacking Techniques and Countermeasures:
1 Preparation
2 Banner Identification
3 Target Enumeration
4 Scanning
5 Sniffing Traffic
6 Spoofing
7 Brute Force
8 Vulnerability Scanning
9 Wireless
10 Redirection
11 Denial-of-Service (DoS)
Appendix A: References
Appendix B: Tool Syntax
Index
Practical Hardware Pentesting Learn attack and defense techniques for embedded sys
فهرست مطالب کتاب Practical Hardware Pentesting:
Practical Hardware Pentesting Second Edition Learn attack and defense
techniques for embedded systems in IoT and other devices
Feedback
Prerequisites the basics you will need
Approach to buying test equipment
The component pantry
Sample labs
Summary
Questions
Feedback
Technical requirements
Introduction to the boards
Why C and not Arduino
The toolchain
Introduction to C
Summary
Questions
Further reading
Feedback
Technical requirements
Understanding I2C
Understanding SPI
Understanding UART
Understanding D1W
Summary
Questions
Feedback
Technical requirements
Finding the data
Extracting the data
Understanding unknown storage structures
Mounting filesystems
Repacking
Summary
Questions
Further reading
Practical Social Engineering A Primer for the Ethical Hacker
فهرست مطالب کتاب Practical Social Engineering:
Acknowledgments
Introduction
PART I: THE BASICS
Chapter 1: What Is Social Engineering?
Chapter 2: Ethical Considerations in Social Engineering
PART II: OFFENSIVE SOCIAL ENGINEERING
Chapter 3: Preparing for an Attack
Chapter 4: Gathering Business OSINT
Chapter 5: Social Media and Public Documents
Chapter 6: Gathering OSINT About People
Chapter 7: Phishing
Chapter 8: Cloning a Landing Page
Chapter 9: Detection, Measurement, and Reporting
PART III: DEFENDING AGAINST SOCIAL ENGINEERING
Chapter 10: Proactive Defense Techniques
Chapter 11: Technical Email Controls
Chapter 12: Producing Threat Intelligence
Appendix A: Scoping Worksheet
Appendix B: Reporting Template
Appendix C: Information-Gathering Worksheet
Appendix D: Pretexting Sample
Appendix E: Exercises to Improve Your Social Engineering
Index
Principles: Life and Work
فهرست مطالب کتاب Principles: Life and Work:
PART I WHERE I’M COMING FROM
1 My Call to Adventure: 1949-1967
2 Crossing the Threshold: 1967-1979
3 My Abyss: 1979-1982
4 My Road of Trials: 1983-1994
5 The Ultimate Boon: 1995-2010
6 Returning the Boon: 2011-2015
7 My Last Year and My Greatest Challenge: 2016-2017
8 Looking Backfrom a Higher Level
PART II LIFE PRINCIPLES
1 Embrace Reality and Deal with It
2 Use the 5-Step Process to Get What You Want Out of Life
3 Be Radically Open-Minded
4 Understand That People Are Wired Very Differently
5 Learn How to Make Decisions Effectively
PART III WORK PRINCIPLES
1 Trust in Radical Truth and Radical Transparency
2 Cultivate Meaningful Workand Meaningful Relationships
3 Create a Culture in Which It Is Okay to Make Mistakes and Unacceptable Not to Learn from Them
4 Get and Stay in Sync
5 Believability Weight Your Decision Maling
6 Recognize How to Get Beyond Disagreements
7 Remember That the WHO Is More Important than the WHAT
8 Hire Right, Because the Penalties for Hiring Wrong Are Huge
9 Constantly Train, Test, Evaluate, and Sort People
10 Manage as Someone Operating a Machine to Achieve a Goal
11 Perceive and Don’t Tolerate Problems
12 Diagnose Problems to Get at Their Root Causes
13 Design Improvements to Your Machine to Get Around Your Problems
14 Do What You Set Out to Do
15 Use Tools and Protocols to Shape How Work Is Done
16 And for Heaven’s Sake, Don’t Overlook Governance!