Pro Git (Second Edition)
فهرست مطالب کتاب Pro Git:
CHAPTER 1: Getting Started
CHAPTER 2: Git Basics
CHAPTER 3: Git Branching
CHAPTER 4: Git on the Server
CHAPTER 5: Distributed Git
CHAPTER 6: GitHub
CHAPTER 7: Git Tools
CHAPTER 8: Customizing Git
CHAPTER 9: Git and Other Systems
CHAPTER 10: Git Internals
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses
فهرست مطالب کتاب Pro PHP Security:
Contents
About the Authors
Acknowledgments
Preface
Part 1: The Importance of Security
Chapter 1: Why Is Secure Programming a Concern?
Part 2: Practicing Secure PHP Programming
Chapter 2: Validating and Sanitizing User Input
Chapter 3: Preventing SQL Injection
Chapter 4: Preventing Cross-Site Scripting
Chapter 5: Preventing Remote Execution
Chapter 6: Enforcing Security for Temporary Files
Chapter 7: Preventing Session Hijacking
Chapter 8: Securing REST Services
Part 3: Practicing Secure Operations
Chapter 9: Using CAPTCHAs
Chapter 10: User Authentication, Authorization, and Logging
Chapter 11: Preventing Data Loss
Chapter 12: Safe Execution of System and Remote Procedure Calls
Part 4: Creating a Safe Environment
Chapter 13: Securing Unix
Chapter 14: Securing Your Database
Chapter 15: Using Encryption
Chapter 16: Securing Network Connections: SSL and SSH
Chapter 17: Final Recommendations
Index
Pro SQL Server 2019 Administration
فهرست مطالب کتاب Pro SQL Server 2019 Administration:
Chapter 2: GUI Installation
Chapter 3: Server Core Installation
Chapter 4: Installation on Heterogeneous Operating Systems
Chapter 5: Configuring the Instance
Chapter 6: Database Configuration
Chapter 7: Table Optimizations
Chapter 8: Indexes and Statistics
Chapter 9: Database Consistency
Chapter 10: SQL Server Security Mode
Chapter 11: Encryption
Chapter 12: Backups and Restores
Chapter 13: High Availability and Disaster Recovery Concepts
Chapter 14: Implementing Always On Availability Groups
Chapter 15: Implementing Log Shipping
Chapter 16: Scaling Workloads
Chapter 17: SQL Server Metadata
Chapter 18: Locking and Blocking
Chapter 19: Extended Events
Chapter 20: Query Store
Chapter 21: Distributed Replay
Chapter 22: Automating Maintenance Routines
Chapter 23: Policy-Based Management
Chapter 24: Resource Governor
Python Basics: A Practical Introduction to Python 3
فهرست مطالب:
Contents
Foreword
Introduction
Setting Up Python
Your First Python Program
Strings and String Methods
Numbers and Math
Functions and Loops
Finding and Fixing Code Bugs
Conditional Logic and Control Flow
Tuples, Lists, and Dictionaries
Object-Oriented Programming (OOP)
Modules and Packages
File Input and Output
Installing Packages With pip
Creating and Modifying PDF Files
Working With Databases
Interacting With the Web
Scientiрc Computing and Graphing
Graphical User Interfaces
Final Thoughts and Next Steps
Python for Kids: A Playful Introduction to Programming
فهرست مطالب کتاب Python for Kids: A Playful Introduction to Programming:
Part I: Learning to Program
Not All Snakes Slither
Calculations and Variables
Strings, Lists, Tuples, and Maps
Drawing with Turtles
Asking Questions with if and else
Going Loopy
Recycling Your Code with Functions and Modules
How to Use Classes and Objects
Python’s Built-in Functions
Useful Python Modules
More Turtle Graphics
Using tkinter for Better Graphics
Part II: Bounce!
Beginning Your First Game: Bounce!
Finishing Your First Game: Bounce!
Part III: Mr. Stick Man Races for the Exit
Creating Graphics for the Mr. Stick Man Game
Developing the Mr. Stick Man Game
Creating Mr. Stick Man
Completing the Mr. Stick Man Game
Python Notes For Professionals
فهرست مطالب کتاب Python Notes For Professionals:
Getting started with Python Language
Python Data Types
Indentation
Comments and Documentation
Date and Time
Date Formatting
Enum
Set
Simple Mathematical Operators
Bitwise Operators
Boolean Operators
Operator Precedence
Variable Scope and Binding
Conditionals
Comparisons
Loops
Arrays
Multidimensional arrays
Dictionary
List
List comprehensions
List slicing (selecting parts of lists)
groupby()
Linked lists
Linked List Node
Filter
Heapq
Tuple
Basic Input and Output
Files & Folders I/O
path
Iterables and Iterators
Functions
Defining functions with list arguments
Functional Programming in Python
Partial functions
Decorators
Classes
Metaclasses
String Formatting
String Methods
Using loops within functions
Importing modules
Difference between Module and Package
Math Module
Complex math
Collections module
Operator module
JSON Module
Sqlite3 Module
The os Module
The locale Module
Itertools Module
Asyncio Module
Random module
Functools Module
The dis module
The base64 Module
Queue Module
Deque Module
Webbrowser Module
tkinter
pyautogui module
Indexing and Slicing
Plotting with Matplotlib
graph-tool
Generators
Reduce
Map Function
Exponentiation
Searching
Sorting, Minimum and Maximum
Counting
The Print Function
Regular Expressions (Regex)
Copying data
Context Managers (“with” Statement)
The __name__ special variable
Checking Path Existence and Permissions
Creating Python packages
Usage of “pip” module: PyPI Package Manager
pip: PyPI Package Manager
Parsing Command Line arguments
Subprocess Library
py
Recursion
Type Hints
Exceptions
Raise Custom Errors / Exceptions
Commonwealth Exceptions
urllib
Web scraping with Python
HTML Parsing
Manipulating XML
Python Requests Post
Distribution
Property Objects
Overloading
Polymorphism
Method Overriding
User-Defined Methods
String representations of class instances: __str__ and __repr__ methods
Debugging
Reading and Writing CSV
Writing to CSV from String or List
Dynamic code execution with `exec` and `eval`
PyInstaller – Distributing Python Code
Data Visualization with Python
The Interpreter (Command Line Console)
*args and **kwargs
Garbage Collection
Pickle data serialisation
Binary Data
Idioms
Data Serialization
Multiprocessing
Multithreading
Processes and Threads
Python concurrency
Parallel computation
Sockets
Websockets
Sockets And Message Encryption/Decryption Between Client and Server
Python Networking
Python HTTP Server
Flask
Introduction to RabbitMQ using AMQPStorm
Descriptor
tempfile NamedTemporaryFile
Input, Subset and Output External Data Files using Pandas
Unzipping Files
Working with ZIP archives
Getting start with GZip
Stack
Working around the Global Interpreter Lock (GIL)
Deployment
Logging
Web Server Gateway Interface (WSGI)
Python Server Sent Events
Alternatives to switch statement from other languages
List destructuring (aka packing and unpacking)
Accessing Python source code and bytecode
Mixins
Attribute Access
ArcPy
Abstract Base Classes (abc)
Plugin and Extension Classes
Immutable datatypes(int, float, str, tuple and frozensets)
Incompatibilities moving from Python 2 to Python 3
2to3 tool
Non-official Python implementations
Abstract syntax tree
Unicode and bytes
Python Serial Communication (pyserial)
Neo4j and Cypher using Py2Neo
Basic Curses with Python
Templates in python
Pillow
The pass statement
CLI subcommands with precise help output
Database Access
Connecting Python to SQL Server
PostgreSQL
Python and Excel
Turtle Graphics
Python Persistence
Design Patterns
hashlib
Creating a Windows service using Python
Mutable vs Immutable (and Hashable) in Python
configparser
Optical Character Recognition
Virtual environments
Python Virtual Environment – virtualenv
Virtual environment with virtualenvwrapper
Create virtual environment with virtualenvwrapper in windows
sys
ChemPy – python package
pygame
Pyglet
Audio
pyaudio
shelve
IoT Programming with Python and Raspberry PI
kivy – Cross-platform Python Framework for NUI Development
Pandas Transform: Preform operations on groups and concatenate the results
Similarities in syntax, Differences in meaning: Python vs. JavaScript
Call Python from C#
ctypes
Writing extensions
Python Lex-Yacc
Unit Testing
test
Profiling
Python speed of program
Performance optimization
Security and Cryptography
Secure Shell Connection in Python
Python Anti-Patterns
Common Pitfalls
Hidden Features
Python Web Penetration Testing Cookbook
فهرست مطالب کتاب Python Web Penetration Testing Cookbook:
Chapter 1: Gathering Open Source Intelligence
Chapter 2: Enumeration
Chapter 3: Vulnerability Identification
Chapter 4: SQL Injection
Chapter 5: Web Header Manipulation
Chapter 6: Image Analysis and Manipulation
Chapter 7: Encryption and Encoding
Chapter 8: Payloads and Shells
Chapter 9: Reporting
Index
React JS Notes for Professionals
فهرست مطالب کتاب React JS Notes for Professionals:
Getting started with React
Components
Using ReactJS with TypeScript
State in React
Props in React
React Component Lifecycle
Forms and User Input
React Boilerplate [React + Babel + Webpack]
Using ReactJS with jQuery
React Routing
Communicate Between Components
How to setup a basic webpack, react and babel environment
createClass vs extends React.Component
React AJAX call
Communication Between Components
Stateless Functional Components
Performance
Introduction to Server-Side Rendering
Setting Up React Environment
Using React with Flow
JSX
React Forms
User interface solutions
Using ReactJS in Flux way
React, Webpack & TypeScript installation
How and why to use keys in React
Keys in react
Higher Order Components
React with Redux
Installation
React Tools
React Native Notes For Professionals
فهرست مطالب کتاب React Native Notes For Professionals:
ندارد
Red Hat Linux Security and Optimization
فهرست مطالب کتاب Red Hat Linux Security and Optimization:
Preface
Acknowledgments
Part I System Performance
Chapter 1 Performance Basics
Chapter 2 Kernel Tuning
Chapter 3 Filesystem Tuning
Part II Network and Service Performance
Chapter 4 Network Performance
Chapter 5 Web Server Performance
Chapter 6 E-Mail Server Performance
Chapter 7 NFS and Samba Server Performance
Part III System Security
Chapter 8 Kernel Security
Chapter 9 Securing Files and Filesystems
Chapter 10 PAM
Chapter 11 OpenSSL
Chapter 12 Shadow Passwords and OpenSSH
Chapter 13 Secure Remote Passwords
Chapter 14 xinetd
Part IV Network Service Security
Chapter 15 Web Server Security
Chapter 16 DNS Server Security
Chapter 17 E-Mail Server Security
Chapter 18 FTP Server Security
Chapter 19 Samba and NFS Server Security
Part V Firewalls
Chapter 20 Firewalls, VPNs, and SSL Tunnels
Chapter 21 Firewall Security Tools
Appendix A IP Network Address Classification
Appendix B Common Linux Commands
Appendix C Internet Resources
Appendix D Dealing with Compromised Systems
Appendix E What’s On the CD-ROM?
Index
End-User License Agreement
Refactoring: Improving the Design of Existing Code
فهرست مطالب کتاب Refactoring: Improving the Design of Existing Code:
Chapter 1. Refactoring, a First Example
Chapter 2. Principles in Refactoring
Chapter 3. Bad Smells in Code
Chapter 4. Building Tests
Chapter 5. Toward a Catalog of Refactorings
Chapter 6. Composing Methods
Chapter 7. Moving Features Between Objects
Chapter 8. Organizing Data
Chapter 9. Simplifying Conditional Expressions
Chapter 10. Making Method Calls Simpler
Chapter 11. Dealing with Generalization
Chapter 12. Big Refactorings
Chapter 13. Refactoring, Reuse, and Reality
Chapter 14. Refactoring Tools
Chapter 15. Putting It All Together
Reversing: Secrets of Reverse Engineering
فهرست مطالب کتاب Reversing: Secrets of Reverse Engineering:
Part I Reversing Fundamentals
Chapter 1 The Reversing Process
Chapter 2 Low-Level Software
Chapter 3 Windows Fundamentals
Chapter 4 Reversing Tools
Part II Applied Reversing
Chapter 5 Beyond the Documentation
Chapter 6 Deciphering File Formats
Chapter 7 Auditing Program Binaries
Chapter 8 Reversing Malware
Part III Cracking
Chapter 9 Piracy and Copy Protection
Chapter 10 Antireversing Techniques
Chapter 11 Breaking Protections
Part IV Beyond Disassembly
Chapter 12 Reversing .NET
Chapter 13 Decompilation