Pro Git (Second Edition)

فهرست مطالب کتاب Pro Git:

CHAPTER 1: Getting Started

CHAPTER 2: Git Basics

CHAPTER 3: Git Branching

CHAPTER 4: Git on the Server

CHAPTER 5: Distributed Git

CHAPTER 6: GitHub

CHAPTER 7: Git Tools

CHAPTER 8: Customizing Git

CHAPTER 9: Git and Other Systems

CHAPTER 10: Git Internals

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

فهرست مطالب کتاب Pro PHP Security:

Contents

About the Authors

Acknowledgments

Preface

Part 1: The Importance of Security

Chapter 1: Why Is Secure Programming a Concern?

Part 2: Practicing Secure PHP Programming

Chapter 2: Validating and Sanitizing User Input

Chapter 3: Preventing SQL Injection

Chapter 4: Preventing Cross-Site Scripting

Chapter 5: Preventing Remote Execution

Chapter 6: Enforcing Security for Temporary Files

Chapter 7: Preventing Session Hijacking

Chapter 8: Securing REST Services

Part 3: Practicing Secure Operations

Chapter 9: Using CAPTCHAs

Chapter 10: User Authentication, Authorization, and Logging

Chapter 11: Preventing Data Loss

Chapter 12: Safe Execution of System and Remote Procedure Calls

Part 4: Creating a Safe Environment

Chapter 13: Securing Unix

Chapter 14: Securing Your Database

Chapter 15: Using Encryption

Chapter 16: Securing Network Connections: SSL and SSH

Chapter 17: Final Recommendations

Index

Pro SQL Server 2019 Administration

فهرست مطالب کتاب Pro SQL Server 2019 Administration:

Chapter 2: GUI Installation

Chapter 3: Server Core Installation

Chapter 4: Installation on Heterogeneous Operating Systems

Chapter 5: Configuring the Instance

Chapter 6: Database Configuration

Chapter 7: Table Optimizations

Chapter 8: Indexes and Statistics

Chapter 9: Database Consistency

Chapter 10: SQL Server Security Mode

Chapter 11: Encryption

Chapter 12: Backups and Restores

Chapter 13: High Availability and Disaster Recovery Concepts

Chapter 14: Implementing Always On Availability Groups

Chapter 15: Implementing Log Shipping

Chapter 16: Scaling Workloads

Chapter 17: SQL Server Metadata

Chapter 18: Locking and Blocking

Chapter 19: Extended Events

Chapter 20: Query Store

Chapter 21: Distributed Replay

Chapter 22: Automating Maintenance Routines

Chapter 23: Policy-Based Management

Chapter 24: Resource Governor

Python Basics: A Practical Introduction to Python 3

فهرست مطالب:

Contents

Foreword

Introduction

Setting Up Python

Your First Python Program

Strings and String Methods

Numbers and Math

Functions and Loops

Finding and Fixing Code Bugs

Conditional Logic and Control Flow

Tuples, Lists, and Dictionaries

Object-Oriented Programming (OOP)

Modules and Packages

File Input and Output

Installing Packages With pip

Creating and Modifying PDF Files

Working With Databases

Interacting With the Web

Scientiрc Computing and Graphing

Graphical User Interfaces

Final Thoughts and Next Steps

Python for Kids: A Playful Introduction to Programming

فهرست مطالب کتاب Python for Kids: A Playful Introduction to Programming:

Part I: Learning to Program

Not All Snakes Slither

Calculations and Variables

Strings, Lists, Tuples, and Maps

Drawing with Turtles

Asking Questions with if and else

Going Loopy

Recycling Your Code with Functions and Modules

How to Use Classes and Objects

Python’s Built-in Functions

Useful Python Modules

More Turtle Graphics

Using tkinter for Better Graphics

Part II: Bounce!

Beginning Your First Game: Bounce!

Finishing Your First Game: Bounce!

Part III: Mr. Stick Man Races for the Exit

Creating Graphics for the Mr. Stick Man Game

Developing the Mr. Stick Man Game

Creating Mr. Stick Man

Completing the Mr. Stick Man Game

Python Notes For Professionals

فهرست مطالب کتاب Python Notes For Professionals:

Getting started with Python Language

Python Data Types

Indentation

Comments and Documentation

Date and Time

Date Formatting

Enum

Set

Simple Mathematical Operators

Bitwise Operators

Boolean Operators

Operator Precedence

Variable Scope and Binding

Conditionals

Comparisons

Loops

Arrays

Multidimensional arrays

Dictionary

List

List comprehensions

List slicing (selecting parts of lists)

groupby()

Linked lists

Linked List Node

Filter

Heapq

Tuple

Basic Input and Output

Files & Folders I/O

path

Iterables and Iterators

Functions

Defining functions with list arguments

Functional Programming in Python

Partial functions

Decorators

Classes

Metaclasses

String Formatting

String Methods

Using loops within functions

Importing modules

Difference between Module and Package

Math Module

Complex math

Collections module

Operator module

JSON Module

Sqlite3 Module

The os Module

The locale Module

Itertools Module

Asyncio Module

Random module

Functools Module

The dis module

The base64 Module

Queue Module

Deque Module

Webbrowser Module

tkinter

pyautogui module

Indexing and Slicing

Plotting with Matplotlib

graph-tool

Generators

Reduce

Map Function

Exponentiation

Searching

Sorting, Minimum and Maximum

Counting

The Print Function

Regular Expressions (Regex)

Copying data

Context Managers (“with” Statement)

The __name__ special variable

Checking Path Existence and Permissions

Creating Python packages

Usage of “pip” module: PyPI Package Manager

pip: PyPI Package Manager

Parsing Command Line arguments

Subprocess Library

py

Recursion

Type Hints

Exceptions

Raise Custom Errors / Exceptions

Commonwealth Exceptions

urllib

Web scraping with Python

HTML Parsing

Manipulating XML

Python Requests Post

Distribution

Property Objects

Overloading

Polymorphism

Method Overriding

User-Defined Methods

String representations of class instances: __str__ and __repr__ methods

Debugging

Reading and Writing CSV

Writing to CSV from String or List

Dynamic code execution with `exec` and `eval`

PyInstaller – Distributing Python Code

Data Visualization with Python

The Interpreter (Command Line Console)

*args and **kwargs

Garbage Collection

Pickle data serialisation

Binary Data

Idioms

Data Serialization

Multiprocessing

Multithreading

Processes and Threads

Python concurrency

Parallel computation

Sockets

Websockets

Sockets And Message Encryption/Decryption Between Client and Server

Python Networking

Python HTTP Server

Flask

Introduction to RabbitMQ using AMQPStorm

Descriptor

tempfile NamedTemporaryFile

Input, Subset and Output External Data Files using Pandas

Unzipping Files

Working with ZIP archives

Getting start with GZip

Stack

Working around the Global Interpreter Lock (GIL)

Deployment

Logging

Web Server Gateway Interface (WSGI)

Python Server Sent Events

Alternatives to switch statement from other languages

List destructuring (aka packing and unpacking)

Accessing Python source code and bytecode

Mixins

Attribute Access

ArcPy

Abstract Base Classes (abc)

Plugin and Extension Classes

Immutable datatypes(int, float, str, tuple and frozensets)

Incompatibilities moving from Python 2 to Python 3

2to3 tool

Non-official Python implementations

Abstract syntax tree

Unicode and bytes

Python Serial Communication (pyserial)

Neo4j and Cypher using Py2Neo

Basic Curses with Python

Templates in python

Pillow

The pass statement

CLI subcommands with precise help output

Database Access

Connecting Python to SQL Server

PostgreSQL

Python and Excel

Turtle Graphics

Python Persistence

Design Patterns

hashlib

Creating a Windows service using Python

Mutable vs Immutable (and Hashable) in Python

configparser

Optical Character Recognition

Virtual environments

Python Virtual Environment – virtualenv

Virtual environment with virtualenvwrapper

Create virtual environment with virtualenvwrapper in windows

sys

ChemPy – python package

pygame

Pyglet

Audio

pyaudio

shelve

IoT Programming with Python and Raspberry PI

kivy – Cross-platform Python Framework for NUI Development

Pandas Transform: Preform operations on groups and concatenate the results

Similarities in syntax, Differences in meaning: Python vs. JavaScript

Call Python from C#

ctypes

Writing extensions

Python Lex-Yacc

Unit Testing

test

Profiling

Python speed of program

Performance optimization

Security and Cryptography

Secure Shell Connection in Python

Python Anti-Patterns

Common Pitfalls

Hidden Features

Python Web Penetration Testing Cookbook

فهرست مطالب کتاب Python Web Penetration Testing Cookbook:

Chapter 1: Gathering Open Source Intelligence

Chapter 2: Enumeration

Chapter 3: Vulnerability Identification

Chapter 4: SQL Injection

Chapter 5: Web Header Manipulation

Chapter 6: Image Analysis and Manipulation

Chapter 7: Encryption and Encoding

Chapter 8: Payloads and Shells

Chapter 9: Reporting

Index

React JS Notes for Professionals

فهرست مطالب کتاب React JS Notes for Professionals:

Getting started with React

Components

Using ReactJS with TypeScript

State in React

Props in React

React Component Lifecycle

Forms and User Input

React Boilerplate [React + Babel + Webpack]

Using ReactJS with jQuery

React Routing

Communicate Between Components

How to setup a basic webpack, react and babel environment

createClass vs extends React.Component

React AJAX call

Communication Between Components

Stateless Functional Components

Performance

Introduction to Server-Side Rendering

Setting Up React Environment

Using React with Flow

JSX

React Forms

User interface solutions

Using ReactJS in Flux way

React, Webpack & TypeScript installation

How and why to use keys in React

Keys in react

Higher Order Components

React with Redux

Installation

React Tools

Red Hat Linux Security and Optimization

فهرست مطالب کتاب Red Hat Linux Security and Optimization:

Preface

Acknowledgments

Part I System Performance

Chapter 1 Performance Basics

Chapter 2 Kernel Tuning

Chapter 3 Filesystem Tuning

Part II Network and Service Performance

Chapter 4 Network Performance

Chapter 5 Web Server Performance

Chapter 6 E-Mail Server Performance

Chapter 7 NFS and Samba Server Performance

Part III System Security

Chapter 8 Kernel Security

Chapter 9 Securing Files and Filesystems

Chapter 10 PAM

Chapter 11 OpenSSL

Chapter 12 Shadow Passwords and OpenSSH

Chapter 13 Secure Remote Passwords

Chapter 14 xinetd

Part IV Network Service Security

Chapter 15 Web Server Security

Chapter 16 DNS Server Security

Chapter 17 E-Mail Server Security

Chapter 18 FTP Server Security

Chapter 19 Samba and NFS Server Security

Part V Firewalls

Chapter 20 Firewalls, VPNs, and SSL Tunnels

Chapter 21 Firewall Security Tools

Appendix A IP Network Address Classification

Appendix B Common Linux Commands

Appendix C Internet Resources

Appendix D Dealing with Compromised Systems

Appendix E What’s On the CD-ROM?

Index

End-User License Agreement

Refactoring: Improving the Design of Existing Code

فهرست مطالب کتاب Refactoring: Improving the Design of Existing Code:

Chapter 1. Refactoring, a First Example

Chapter 2. Principles in Refactoring

Chapter 3. Bad Smells in Code

Chapter 4. Building Tests

Chapter 5. Toward a Catalog of Refactorings

Chapter 6. Composing Methods

Chapter 7. Moving Features Between Objects

Chapter 8. Organizing Data

Chapter 9. Simplifying Conditional Expressions

Chapter 10. Making Method Calls Simpler

Chapter 11. Dealing with Generalization

Chapter 12. Big Refactorings

Chapter 13. Refactoring, Reuse, and Reality

Chapter 14. Refactoring Tools

Chapter 15. Putting It All Together

Reversing: Secrets of Reverse Engineering

فهرست مطالب کتاب Reversing: Secrets of Reverse Engineering:

Part I Reversing Fundamentals

Chapter 1 The Reversing Process

Chapter 2 Low-Level Software

Chapter 3 Windows Fundamentals

Chapter 4 Reversing Tools

Part II Applied Reversing

Chapter 5 Beyond the Documentation

Chapter 6 Deciphering File Formats

Chapter 7 Auditing Program Binaries

Chapter 8 Reversing Malware

Part III Cracking

Chapter 9 Piracy and Copy Protection

Chapter 10 Antireversing Techniques

Chapter 11 Breaking Protections

Part IV Beyond Disassembly

Chapter 12 Reversing .NET

Chapter 13 Decompilation