SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling

فهرست مطالب SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling:

Step 4: Keeping Access

Application-Level Trojan Horse Suites

Virtual Network Computing Overview

Common Remote Control Backdoor Capabilities

Wrappers and Packers

Memory Analysis

LAB 5.1:Windows Analysis with Rekall

Rootkit Techniques

Kernel-Mode RootkitTechniques

Rootkit Examples

LAB 5.2: Fun with Rootkits

Covering Tracks In Linux Ln and UNIX

Hiding Files in UNIX

UNIX Log Editing Ed

nting E Editing

LAB 5.3: Shell HistoryAnalysis

Covering Tracks in Windows

Hiding Filles in NTFS

Alternate Data Streams in NTFS

LAB 5.4: Alternate Data Streams

Log Editing

LAB 5.5: Windows Log Editing

Covering Tracks on the Network

Reverse HTTP Shells

ICMP Tunnels

Covert_TCP

LAB 5.6: Covert Channels

Steganography

Hydan

Putting It All Together

Conclusions and References

Security in Wireless Mesh Networks

فهرست مطالب کتاب Security in Wireless Mesh Networks:

Contributors

PART I: INTRODUCTION

1 An Introduction to Wireless Mesh Networks

2 Mesh Networking in Wireless PANs, LANs,MANs, and WANs

PART II: SECURITY PROTOCOLS AND TECHNIQUES

3 Attacks and Security Mechanisms

4 Intrusion Detection in Wireless Mesh Networks

5 Secure Routing in Wireless Mesh Networks

6 Hop Integrity in Wireless Mesh Networks

7 Privacy Preservation in Wireless Mesh Networks

8 Providing Authentication, Trust, and Privacy in

9 Non-Interactive Key Establishment in Wireless Mesh Networks

10 Key Management in Wireless Mesh Networks

PART III: SECURITY STANDARDS, APPLICATIONS, AND ENABLING TECHNOLOGIES

11 Security in Wireless PANMesh Networks

12 Security in Wireless LANMesh Networks

13 Security in IEEE802.15.4 Cluster-Based Networks

14 Security in Wireless Sensor Networks

15 Key Management in Wireless Sensor Networks

Index

Serious Cryptography (2nd Edition) – A Practical Introduction to Modern Encryption

فهرست مطالب کتاب Serious Cryptography (2nd Edition):

Part I: Fundamentals

Chapter 1: Encryption

Chapter 2: Randomness

Chapter 3: Cryptographic Security

Part II: Symmetric Crypto

Chapter 4: Block Ciphers

Chapter 5: Stream Ciphers

Chapter 6: Hash Functions

Chapter 7: Keyed Hashing

Chapter 8: Authenticated Encryption

Part III: Asymmetric Crypto

Chapter 9: Hard Problems

Chapter 10: RSA

Chapter 11: Diffie–Hellman

Chapter 12: Elliptic Curves

Part IV: Applications

Chapter 13: TLS

Chapter 14: Quantum and Post-Quantum

Chapter 15: Cryptocurrency Cryptography

Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services

فهرست مطالب کتاب Service Design Patterns:

Chapter 1: From Objects to Web Services

Chapter 2: Web Service API Styles

Chapter 3: Client-Service Interactions

Chapter 4: Request and Response Management

Chapter 5: Web Service Implementation Styles

Chapter 6: Web Service Infrastructures

Chapter 7: Web Service Evolution

SQL Injection Attacks and Defense, Second Edition

فهرست مطالب کتاب SQL Injection Attacks and Defense:

Chapter 1. What Is SQL Injection?

Chapter 2. Testing for SQL Injection

Chapter 3. Reviewing Code for SQL Injection

Chapter 4. Exploiting SQL injection

Chapter 5. Blind SQL Injection Exploitation

Chapter 6. Exploiting the operating system

Chapter 7. Advanced topics

Chapter 8. Code-level defenses

Chapter 9. Platform level defenses

Chapter 10. Confirming and Recovering from SQL Injection Attacks

Chapter 11. References

SQL Notes For Professionals

فهرست مطالب کتاب SQL Notes For Professionals:

Getting started with SQL

Identifier

Data Types

NULL

Example Databases and Tables

SELECT

GROUP BY

ORDER BY

AND & OR Operators

CASE

LIKE operator

IN clause

Filter results using WHERE and HAVING

SKIP TAKE (Pagination)

EXCEPT

EXPLAIN and DESCRIBE

EXISTS CLAUSE

JOIN

UPDATE

CREATE Database

CREATE TABLE

CREATE FUNCTION

TRY/CATCH

UNION / UNION ALL

ALTER TABLE

INSERT

MERGE

cross apply, outer apply

DELETE

TRUNCATE

DROP Table

DROP or DELETE Database

Cascading Delete

GRANT and REVOKE

XML

Primary Keys

Indexes

Row number

SQL Group By vs Distinct

Finding Duplicates on a Column Subset with Detail

String Functions

Functions (Aggregate)

Functions (Scalar/Single Row)

Functions (Analytic)

Window Functions

Common Table Expressions

Views

Materialized Views

Comments

Foreign Keys

Sequence

Subqueries

Execution blocks

Stored Procedures

Triggers

Transactions

Table Design

Synonyms

Information Schema

Order of Execution

Clean Code in SQL

SQL Injection

Start With Why: How Great Leaders Inspire Everyone to Take Action

فهرست مطالب کتاب Start With Why: How Great Leaders Inspire Everyone to Take Action:

PART 1: A WORLD THAT DOESN’T START WITH WHY

PART 2: AN ALTERNATIVE PERSPECTIVE PART

PART 3: LEADERS NEED A FOLLOWING PART

PART 4: HOW TO RALLY THOSE WHO BELIEVE

PART 5: THE BIGGEST CHALLENGE IS SUCCESS

PART 6: DISCOVER WHY

Steve Jobs by Walter Isaacson

فهرست مطالب کتاب Steve Jobs:

Chapter 1: Childhood — Abandoned and Chosen

Chapter 2: Odd Couple — The Two Steves

Chapter 3: The Dropout — Turn On, Tune In …

Chapter 4: Atari and India — Zen and the Art of Game Design

Chapter 5: The Apple I — Turn On, Boot Up, Jack In …

Chapter 6: The Apple II — Dawn of a New Age

Chapter 7: Chrisann and Lisa — He Who Is Abandoned …

Chapter 8: Xerox and Lisa — Graphical User Interfaces

Chapter 9: Going Public — A Man of Wealth and Fame

Chapter 10: The Mac Is Born — You Say You Want a Revolution

Chapter 11: The Reality Disortion Field — Playing by His Own Set of Rules

Chapter 12: The Design — Real Artists Simplify

Chapter 13: Building the Mac — The Journey Is the Reward

Chapter 14: Enter Sculley — The Pepsi Challenge

Chapter 15: The Launch — A Dent in the Universe

Chapter 16: Gates and Jobs — When Orbits Intersect

Chapter 17: Icarus — What Goes Up …

Chapter 18: NeXT — Prometheus Unbound

Chapter 19: Pixar — Technology Meets Art

Chapter 20: A Regular Guy — Love Is Just a Four-Letter Word

Chapter 21: Family Man — At Home with the Jobs Clan

Chapter 22: Toy Story — Buzz and Woody to the Rescue

Chapter 23: The Second Coming — What Rough Beast, Its Hour Come Round at Last …

Chapter 24: The Restoration — The Loser Now Will Be Later to Win

Chapter 25: Think Different — Jobs as iCEO

Chapter 26: Design Principles — The Studio of Jobs and Ive

Chapter 27: The iMac — Hello (Again)

Chapter 28: CEO — Still Crazy after All These Years

Chapter 29: Apple Stores — Genius Bars and Siena Sandstone

Chapter 30: The Digital Hub — From iTunes to the iPod

Chapter 31: The iTunes Store — I’m the Pied Piper

Chapter 32: Music Man — The Sound Track of His Life

Chapter 33: Pixar’s Friends — … and Foes

Chapter 34: Twenty-First-Century Macs — Setting Apple Apart

Chapter 35: Round One — Memento Mori

Chapter 36: The iPhone — Three Revolutionary Products in One

Chapter 37: Round Two — The Cancer Recurs

Chapter 38: The iPad — Into the Post-PC Era

Chapter 39: New Battles — And Echoes of Old Ones

Chapter 40: To Infinity — The Cloud, the Spaceship, and Beyond

Chapter 41: Round Three — The Twilight Struggle

Chapter 42: Legacy — The Brightest Heaven of Invention

Summary of Start With Why

فهرست مطالب کتاب Summary of Start With Why:

PART 1: A WORLD THAT DOESN’T START WITH WHY

PART 2: AN ALTERNATIVE PERSPECTIVE

PART 3: LEADERS NEED A FOLLOWING

PART 4: HOW TO RALLY THOSE WHO BELIEVE

PART 5: THE BIGGEST CHALLENGE IS SUCCESS

PART 6: DISCOVER WHY

Testing Web Security: Assessing the Security of Web Sites and Applications

فهرست مطالب کتاب Testing Web Security: Assessing the Security of Web Sites and Applications:

Part I – An Introduction to the Book

Chapter 1 – Introduction

Part II – Planning the Testing Effort

Chapter 2 – Test Planning

Part III – Test Design

Chapter 3 – Network Security

Chapter 4 – System Software Security

Chapter 5 – Client-Side Application Security

Chapter 6 – Server-Side Application Security

Chapter 7 – Sneak Attacks: Guarding Against the LessThought-of Security Threats

Chapter 8 – Intruder Confusion, Detection, and Response

Part IV – Test Implementation

Chapter 9 – Assessment and Penetration Options

Chapter 10 – Risk Analysis Epilogue

Part V – Appendixes

Appendix A – An Overview of Network Protocols, Addresses, and Devices

Appendix B – SANS Institute Top 20 Critical Internet Security Vulnerabilities

Appendix C – Test-Deliverable Templates Additional Resources

Index

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

فهرست مطالب کتاب The AI Revolution in Networking, Cybersecurity, and Emerging Technologies:

Preface

Introducing the Age of AI: Emergence, Growth, and Impact on Technology

Connected Intelligence: AI in Computer Networking

Securing the Digital Frontier: AI’s Role in Cybersecurity

AI and Collaboration: Building Bridges, Not Walls

AI in the Internet of Things (AIoT)

Revolutionizing Cloud Computing with AI

Impact of AI in Other Emerging Technologies

Index

The Algorithm Design Manual (Second Edition)

فهرست مطالب کتاب The Algorithm Design Manual:

1 Introduction to Algorithm Design

2 Algorithm Analysis

3 Data Structures

4 Sorting and Searching

5 Graph Traversal

6 Weighted Graph Algorithms

7 Combinatorial Search and Heuristic Methods

8 Dynamic Programming

9 Intractable Problems and Approximation Algorithms

10 How to Design Algorithms

11 A Catalog of Algorithmic Problems

12 Data Structures

13 Numerical Problems

14 Combinatorial Problems

15 Graph Problems: Polynomial-Time

16 Graph Problems: Hard Problems

17 Computational Geometry

18 Set and String Problem

19 Algorithmic Resources