NSX-T Data Center Administration Guide (VMware NSX-T Data Center 3.0)

فهرست مطالب کتاب NSX-T Data Center Administration Guide (VMware NSX-T Data Center 3.0):

1 NSX Manager

2 Tier-0 Gateways

3 Tier-1 Gateway

4 Segments

5 Host Switches

6 Virtual Private Network (VPN)

7 Network Address Translation (NAT)

8 Load Balancing

9 Distributed Load Balancer

10 Forwarding Policies

11 IP Address Management (IPAM)

12 Networking Settings

13 Security

14 Inventory

15 Multisite and Federation

16 System Monitoring

17 Network Monitoring

18 Authentication and Authorization

19 Certificates

20 Configuring NSX-T Data Center in Manager Mode

21 Backing Up and Restoring NSX Manager

22 Operations and Management 886

23 Using NSX Cloud 965

ntroducing Windows Server 2016 Technical Preview

فهرست مطالب کتاب Windows Server 2016 Technical Preview:

Introduction

Chapter 1: The software-defined datacenter

Chapter 2: Compute

Chapter 3: Storage

Chapter 4: Networking

Chapter 5: Security

Chapter 6: App Plat

Chapter 7: Systems management

Offensive Security Wireless Attacks – WiFu (v3.0)

فهرست مطالب کتاب Offensive Security Wireless Attacks – WiFu:

IEEE 802.11

Wireless Networks

Packets and Network Interaction

Getting Started

Linux Wireless Stack and Drivers

Aircrack-ng Essentials

Cracking WEP with Connected Clients

Cracking WEP via a Client

Cracking Clientless WEP Networks

Bypassing WEP Shared Key Authentication

Cracking WPA/WPA2 PSK with Aircrack-ng

Cracking WPA with JTR and Aircrack-ng

Cracking WPA with coWPAtty

Cracking WPA with Pyrit

Additional Aircrack-ng Tools

Wireless Reconnaissance

Rogue Access Points

Appendix A: Cracking WEP via a Client – Alternate Solutions

Appendix B: ARP Amplification

Oracle Database Notes For Professionals

فهرست مطالب کتاب Oracle Database Notes For Professionals:

Getting started with Oracle Database

Getting started with PL/SQL

Anonymous PL/SQL Block

PL/SQL procedure

Data Dictionary

Dates

Working with Dates

DUAL table

JOINS

Handling NULL values

String Manipulation

IF-THEN-ELSE Statement

Limiting the rows returned by a query (Pagination)

Recursive Sub-Query Factoring using the WITH Clause (A.K.A. Common Table Expressions)

Different ways to update records

Update with Joins

Functions

Statistical functions

Window Functions

Creating a Context

Splitting Delimited Strings

Collections and Records

Object Types

Loop

Cursors

Sequences

Indexes

Hints

Packages

Exception Handling

Error logging

Database Links

Table partitioning

Oracle Advanced Queuing (AQ)

constraints

Autonomous Transactions

Oracle MAF

level query

Hierarchical Retrieval With Oracle Database 12C

Data Pump

Bulk collect

Real Application Security

Assignments model and language

Triggers

Dynamic SQL

Penetration Testing and Network Defense

فهرست مطالب کتاب Penetration Testing and Network Defense:

Foreword

Introduction

Part I Overview of Penetration Testing

Chapter 1 Understanding Penetration Testing

Chapter 2 Legal and Ethical Considerations

Chapter 3 Creating a Test Plan

Part II Performing the Test

Chapter 4 Performing Social Engineering

Chapter 5 Performing Host Reconnaissance

Chapter 6 Understanding and Attempting Session Hijacking

Chapter 7 Performing Web Server Attacks

Chapter 8 Performing Database Attacks

Chapter 9 Password Cracking

Chapter 10 Attacking the Network

Chapter 11 Scanning and Penetrating Wireless Networks

Chapter 12 Using Trojans and Backdoor Applications

Chapter 13 Penetrating UNIX, Microsoft, and Novell Servers

Chapter 14 Understanding and Attempting Buffer Overflows

Chapter 15 Denial-of-Service Attacks

Chapter 16 Case Study: A Methodical Step-By-Step Penetration Test

Part III Appendixes

Appendix A Preparing a Security Policy

Appendix B Tools

Glossary

Index

Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits

فهرست مطالب:

Introduction

1 Introduction to Penetration Testing

2 Standards

3 Cryptography

4 Reconnaissance

5 Malware

6 Hacking Windows

7 Web Hacking

8 Vulnerability Scanning

9 Introduction to Linux

10 Linux Hacking

11 Introduction to Kali Linux

12 General Hacking Techniques

13 Introduction to Metasploit

14 More with Metasploit

15 Introduction to Scripting with Ruby

16 Write Your Own Metasploit Exploits with Ruby

17 General Hacking Knowledge

18 Additional Pen Testing Topics

19 A Sample Pen Test Project

Appendix A: Answers to Chapter Multiple Choice Questions

Index Index

Pentesting Active Directory and Windows-based Infrastructure

فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:

1 Getting the Lab Ready and Attacking Exchange Server

2 Defense Evasion 25

3 Domain Reconnaissance and Discovery 51

4 Credential Access in Domain 71

5 Lateral Movement in Domain and Across Forests 101

6 Domain Privilege Escalation 141

7 Persistence on Domain Level 179

8 Abusing Active Directory Certificate Services 221

9 Compromising Microsoft SQL Server 267

10 Taking Over WSUS and SCCM

Practical Deployment of Cisco Identity Services Engine

فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:

Chapter 1: Introduction

Chapter 2: ISE Clustering and Basic Setup

Chapter 3: Authentication Methods

Chapter 4: Policy Elements

Chapter 5: Authentication

Chapter 6: Authorization

Chapter 7: Network Access Device Configuration

Chapter 8: ISE Profiling

Chapter 9: ISE Portals and Guest Access

Chapter 10: Deployment Strategies

Chapter 11: ISE Policy Design Practices

Chapter 12: Corporate Authentication Designs

Chapter 13: BYOD Designs

Chapter 14: ISE Posture Assessment

Chapter 15: VPN Integrations

Chapter 16: ISE Reporting and Logging

Chapter 17: ISE CLI

Chapter 18: ISE Administration

Practical Hacking Techniques and Countermeasures

فهرست مطالب کتاب Practical Hacking Techniques and Countermeasures:

1 Preparation

2 Banner Identification

3 Target Enumeration

4 Scanning

5 Sniffing Traffic

6 Spoofing

7 Brute Force

8 Vulnerability Scanning

9 Wireless

10 Redirection

11 Denial-of-Service (DoS)

Appendix A: References

Appendix B: Tool Syntax

Index

Practical Hardware Pentesting Learn attack and defense techniques for embedded sys

فهرست مطالب کتاب Practical Hardware Pentesting:

Practical Hardware Pentesting Second Edition Learn attack and defense

techniques for embedded systems in IoT and other devices

Feedback

Prerequisites the basics you will need

Approach to buying test equipment

The component pantry

Sample labs

Summary

Questions

Feedback

Technical requirements

Introduction to the boards

Why C and not Arduino

The toolchain

Introduction to C

Summary

Questions

Further reading

Feedback

Technical requirements

Understanding I2C

Understanding SPI

Understanding UART

Understanding D1W

Summary

Questions

Feedback

Technical requirements

Finding the data

Extracting the data

Understanding unknown storage structures

Mounting filesystems

Repacking

Summary

Questions

Further reading

Practical Social Engineering A Primer for the Ethical Hacker

فهرست مطالب کتاب Practical Social Engineering:

Acknowledgments

Introduction

PART I: THE BASICS

Chapter 1: What Is Social Engineering?

Chapter 2: Ethical Considerations in Social Engineering

PART II: OFFENSIVE SOCIAL ENGINEERING

Chapter 3: Preparing for an Attack

Chapter 4: Gathering Business OSINT

Chapter 5: Social Media and Public Documents

Chapter 6: Gathering OSINT About People

Chapter 7: Phishing

Chapter 8: Cloning a Landing Page

Chapter 9: Detection, Measurement, and Reporting

PART III: DEFENDING AGAINST SOCIAL ENGINEERING

Chapter 10: Proactive Defense Techniques

Chapter 11: Technical Email Controls

Chapter 12: Producing Threat Intelligence

Appendix A: Scoping Worksheet

Appendix B: Reporting Template

Appendix C: Information-Gathering Worksheet

Appendix D: Pretexting Sample

Appendix E: Exercises to Improve Your Social Engineering

Index

Principles: Life and Work

فهرست مطالب کتاب Principles: Life and Work:

PART I WHERE I’M COMING FROM

1 My Call to Adventure: 1949-1967

2 Crossing the Threshold: 1967-1979

3 My Abyss: 1979-1982

4 My Road of Trials: 1983-1994

5 The Ultimate Boon: 1995-2010

6 Returning the Boon: 2011-2015

7 My Last Year and My Greatest Challenge: 2016-2017

8 Looking Backfrom a Higher Level

PART II LIFE PRINCIPLES

1 Embrace Reality and Deal with It

2 Use the 5-Step Process to Get What You Want Out of Life

3 Be Radically Open-Minded

4 Understand That People Are Wired Very Differently

5 Learn How to Make Decisions Effectively

PART III WORK PRINCIPLES

1 Trust in Radical Truth and Radical Transparency

2 Cultivate Meaningful Workand Meaningful Relationships

3 Create a Culture in Which It Is Okay to Make Mistakes and Unacceptable Not to Learn from Them

4 Get and Stay in Sync

5 Believability Weight Your Decision Maling

6 Recognize How to Get Beyond Disagreements

7 Remember That the WHO Is More Important than the WHAT

8 Hire Right, Because the Penalties for Hiring Wrong Are Huge

9 Constantly Train, Test, Evaluate, and Sort People

10 Manage as Someone Operating a Machine to Achieve a Goal

11 Perceive and Don’t Tolerate Problems

12 Diagnose Problems to Get at Their Root Causes

13 Design Improvements to Your Machine to Get Around Your Problems

14 Do What You Set Out to Do

15 Use Tools and Protocols to Shape How Work Is Done

16 And for Heaven’s Sake, Don’t Overlook Governance!