SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling
فهرست مطالب SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling:
Step 4: Keeping Access
Application-Level Trojan Horse Suites
Virtual Network Computing Overview
Common Remote Control Backdoor Capabilities
Wrappers and Packers
Memory Analysis
LAB 5.1:Windows Analysis with Rekall
Rootkit Techniques
Kernel-Mode RootkitTechniques
Rootkit Examples
LAB 5.2: Fun with Rootkits
Covering Tracks In Linux Ln and UNIX
Hiding Files in UNIX
UNIX Log Editing Ed
nting E Editing
LAB 5.3: Shell HistoryAnalysis
Covering Tracks in Windows
Hiding Filles in NTFS
Alternate Data Streams in NTFS
LAB 5.4: Alternate Data Streams
Log Editing
LAB 5.5: Windows Log Editing
Covering Tracks on the Network
Reverse HTTP Shells
ICMP Tunnels
Covert_TCP
LAB 5.6: Covert Channels
Steganography
Hydan
Putting It All Together
Conclusions and References
Security in Wireless Mesh Networks
فهرست مطالب کتاب Security in Wireless Mesh Networks:
Contributors
PART I: INTRODUCTION
1 An Introduction to Wireless Mesh Networks
2 Mesh Networking in Wireless PANs, LANs,MANs, and WANs
PART II: SECURITY PROTOCOLS AND TECHNIQUES
3 Attacks and Security Mechanisms
4 Intrusion Detection in Wireless Mesh Networks
5 Secure Routing in Wireless Mesh Networks
6 Hop Integrity in Wireless Mesh Networks
7 Privacy Preservation in Wireless Mesh Networks
8 Providing Authentication, Trust, and Privacy in
9 Non-Interactive Key Establishment in Wireless Mesh Networks
10 Key Management in Wireless Mesh Networks
PART III: SECURITY STANDARDS, APPLICATIONS, AND ENABLING TECHNOLOGIES
11 Security in Wireless PANMesh Networks
12 Security in Wireless LANMesh Networks
13 Security in IEEE802.15.4 Cluster-Based Networks
14 Security in Wireless Sensor Networks
15 Key Management in Wireless Sensor Networks
Index
Serious Cryptography (2nd Edition) – A Practical Introduction to Modern Encryption
فهرست مطالب کتاب Serious Cryptography (2nd Edition):
Part I: Fundamentals
Chapter 1: Encryption
Chapter 2: Randomness
Chapter 3: Cryptographic Security
Part II: Symmetric Crypto
Chapter 4: Block Ciphers
Chapter 5: Stream Ciphers
Chapter 6: Hash Functions
Chapter 7: Keyed Hashing
Chapter 8: Authenticated Encryption
Part III: Asymmetric Crypto
Chapter 9: Hard Problems
Chapter 10: RSA
Chapter 11: Diffie–Hellman
Chapter 12: Elliptic Curves
Part IV: Applications
Chapter 13: TLS
Chapter 14: Quantum and Post-Quantum
Chapter 15: Cryptocurrency Cryptography
Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services
فهرست مطالب کتاب Service Design Patterns:
Chapter 1: From Objects to Web Services
Chapter 2: Web Service API Styles
Chapter 3: Client-Service Interactions
Chapter 4: Request and Response Management
Chapter 5: Web Service Implementation Styles
Chapter 6: Web Service Infrastructures
Chapter 7: Web Service Evolution
SQL Injection Attacks and Defense, Second Edition
فهرست مطالب کتاب SQL Injection Attacks and Defense:
Chapter 1. What Is SQL Injection?
Chapter 2. Testing for SQL Injection
Chapter 3. Reviewing Code for SQL Injection
Chapter 4. Exploiting SQL injection
Chapter 5. Blind SQL Injection Exploitation
Chapter 6. Exploiting the operating system
Chapter 7. Advanced topics
Chapter 8. Code-level defenses
Chapter 9. Platform level defenses
Chapter 10. Confirming and Recovering from SQL Injection Attacks
Chapter 11. References
SQL Notes For Professionals
فهرست مطالب کتاب SQL Notes For Professionals:
Getting started with SQL
Identifier
Data Types
NULL
Example Databases and Tables
SELECT
GROUP BY
ORDER BY
AND & OR Operators
CASE
LIKE operator
IN clause
Filter results using WHERE and HAVING
SKIP TAKE (Pagination)
EXCEPT
EXPLAIN and DESCRIBE
EXISTS CLAUSE
JOIN
UPDATE
CREATE Database
CREATE TABLE
CREATE FUNCTION
TRY/CATCH
UNION / UNION ALL
ALTER TABLE
INSERT
MERGE
cross apply, outer apply
DELETE
TRUNCATE
DROP Table
DROP or DELETE Database
Cascading Delete
GRANT and REVOKE
XML
Primary Keys
Indexes
Row number
SQL Group By vs Distinct
Finding Duplicates on a Column Subset with Detail
String Functions
Functions (Aggregate)
Functions (Scalar/Single Row)
Functions (Analytic)
Window Functions
Common Table Expressions
Views
Materialized Views
Comments
Foreign Keys
Sequence
Subqueries
Execution blocks
Stored Procedures
Triggers
Transactions
Table Design
Synonyms
Information Schema
Order of Execution
Clean Code in SQL
SQL Injection
Start With Why: How Great Leaders Inspire Everyone to Take Action
فهرست مطالب کتاب Start With Why: How Great Leaders Inspire Everyone to Take Action:
PART 1: A WORLD THAT DOESN’T START WITH WHY
PART 2: AN ALTERNATIVE PERSPECTIVE PART
PART 3: LEADERS NEED A FOLLOWING PART
PART 4: HOW TO RALLY THOSE WHO BELIEVE
PART 5: THE BIGGEST CHALLENGE IS SUCCESS
PART 6: DISCOVER WHY
Steve Jobs by Walter Isaacson
فهرست مطالب کتاب Steve Jobs:
Chapter 1: Childhood — Abandoned and Chosen
Chapter 2: Odd Couple — The Two Steves
Chapter 3: The Dropout — Turn On, Tune In …
Chapter 4: Atari and India — Zen and the Art of Game Design
Chapter 5: The Apple I — Turn On, Boot Up, Jack In …
Chapter 6: The Apple II — Dawn of a New Age
Chapter 7: Chrisann and Lisa — He Who Is Abandoned …
Chapter 8: Xerox and Lisa — Graphical User Interfaces
Chapter 9: Going Public — A Man of Wealth and Fame
Chapter 10: The Mac Is Born — You Say You Want a Revolution
Chapter 11: The Reality Disortion Field — Playing by His Own Set of Rules
Chapter 12: The Design — Real Artists Simplify
Chapter 13: Building the Mac — The Journey Is the Reward
Chapter 14: Enter Sculley — The Pepsi Challenge
Chapter 15: The Launch — A Dent in the Universe
Chapter 16: Gates and Jobs — When Orbits Intersect
Chapter 17: Icarus — What Goes Up …
Chapter 18: NeXT — Prometheus Unbound
Chapter 19: Pixar — Technology Meets Art
Chapter 20: A Regular Guy — Love Is Just a Four-Letter Word
Chapter 21: Family Man — At Home with the Jobs Clan
Chapter 22: Toy Story — Buzz and Woody to the Rescue
Chapter 23: The Second Coming — What Rough Beast, Its Hour Come Round at Last …
Chapter 24: The Restoration — The Loser Now Will Be Later to Win
Chapter 25: Think Different — Jobs as iCEO
Chapter 26: Design Principles — The Studio of Jobs and Ive
Chapter 27: The iMac — Hello (Again)
Chapter 28: CEO — Still Crazy after All These Years
Chapter 29: Apple Stores — Genius Bars and Siena Sandstone
Chapter 30: The Digital Hub — From iTunes to the iPod
Chapter 31: The iTunes Store — I’m the Pied Piper
Chapter 32: Music Man — The Sound Track of His Life
Chapter 33: Pixar’s Friends — … and Foes
Chapter 34: Twenty-First-Century Macs — Setting Apple Apart
Chapter 35: Round One — Memento Mori
Chapter 36: The iPhone — Three Revolutionary Products in One
Chapter 37: Round Two — The Cancer Recurs
Chapter 38: The iPad — Into the Post-PC Era
Chapter 39: New Battles — And Echoes of Old Ones
Chapter 40: To Infinity — The Cloud, the Spaceship, and Beyond
Chapter 41: Round Three — The Twilight Struggle
Chapter 42: Legacy — The Brightest Heaven of Invention
Summary of Start With Why
فهرست مطالب کتاب Summary of Start With Why:
PART 1: A WORLD THAT DOESN’T START WITH WHY
PART 2: AN ALTERNATIVE PERSPECTIVE
PART 3: LEADERS NEED A FOLLOWING
PART 4: HOW TO RALLY THOSE WHO BELIEVE
PART 5: THE BIGGEST CHALLENGE IS SUCCESS
PART 6: DISCOVER WHY
Testing Web Security: Assessing the Security of Web Sites and Applications
فهرست مطالب کتاب Testing Web Security: Assessing the Security of Web Sites and Applications:
Part I – An Introduction to the Book
Chapter 1 – Introduction
Part II – Planning the Testing Effort
Chapter 2 – Test Planning
Part III – Test Design
Chapter 3 – Network Security
Chapter 4 – System Software Security
Chapter 5 – Client-Side Application Security
Chapter 6 – Server-Side Application Security
Chapter 7 – Sneak Attacks: Guarding Against the LessThought-of Security Threats
Chapter 8 – Intruder Confusion, Detection, and Response
Part IV – Test Implementation
Chapter 9 – Assessment and Penetration Options
Chapter 10 – Risk Analysis Epilogue
Part V – Appendixes
Appendix A – An Overview of Network Protocols, Addresses, and Devices
Appendix B – SANS Institute Top 20 Critical Internet Security Vulnerabilities
Appendix C – Test-Deliverable Templates Additional Resources
Index
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
فهرست مطالب کتاب The AI Revolution in Networking, Cybersecurity, and Emerging Technologies:
Preface
Introducing the Age of AI: Emergence, Growth, and Impact on Technology
Connected Intelligence: AI in Computer Networking
Securing the Digital Frontier: AI’s Role in Cybersecurity
AI and Collaboration: Building Bridges, Not Walls
AI in the Internet of Things (AIoT)
Revolutionizing Cloud Computing with AI
Impact of AI in Other Emerging Technologies
Index
The Algorithm Design Manual (Second Edition)
فهرست مطالب کتاب The Algorithm Design Manual:
1 Introduction to Algorithm Design
2 Algorithm Analysis
3 Data Structures
4 Sorting and Searching
5 Graph Traversal
6 Weighted Graph Algorithms
7 Combinatorial Search and Heuristic Methods
8 Dynamic Programming
9 Intractable Problems and Approximation Algorithms
10 How to Design Algorithms
11 A Catalog of Algorithmic Problems
12 Data Structures
13 Numerical Problems
14 Combinatorial Problems
15 Graph Problems: Polynomial-Time
16 Graph Problems: Hard Problems
17 Computational Geometry
18 Set and String Problem
19 Algorithmic Resources