The Art of Agile Development

فهرست مطالب کتاب The Art of Agile Development:

Preface

Part I: Getting Started

Chapter 1: Why Agile?

Chapter 2: How to Be Agile

Chapter 3: Understanding X

Chapter 4: Adopting XP

Part II: Practicing XP

Chapter 5: Thinking

Chapter 6: Collaborating

Chapter 7: Releasing

Chapter 8: Planning

Chapter 9: Developing

Part III: Mastering Agility

Chapter 10: Values and Principles

Chapter 11: Improve the Process

Chapter 12: Rely on People

Chapter 13: Eliminate Waste

Chapter 14: Deliver Value

Chapter 15: Seek Technical Excellence

References

Index

The Art of Deception: Controlling the Human Element of Security

فهرست مطالب کتاب The Art of Deception:

Introduction

Part 1 Behind the Scenes

Chapter 1 Security’s Weakest Link

Part 2 The Art of the Attacker

Chapter 2 When Innocuous Information Isn’t

Chapter 3 The Direct Attack: Just Asking for it

Chapter 4 Building Trust

Chapter 5 “Let Me Help You”

Chapter 6 “Can You Help Me?”

Chapter 7 Phony Sites and Dangerous Attachments

Chapter 8 Using Sympathy, Guilt and Intimidation

Chapter 9 The Reverse Sting

Part 3 Intruder Alert

Chapter 10 Entering the Premises

Chapter 11 Combining Technology and Social Engineering

Chapter 12 Attacks on the Entry-Level Employee

Chapter 13 Clever Cons

Chapter 14 Industrial Espionage

Part 4 Raising the Bar

Chapter 15 Information Security Awareness and Training

Chapter 16 Recommended Corporate Information Security Policies

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers

فهرست مطالب کتاب The Art of Intrusion:

Chapter 1 Hacking the Casinos for a Million Bucks

Chapter 2 When Terrorists Come Calling

Chapter 3 The Texas Prison Hack

Chapter 4 Cops and Robbers

Chapter 5 The Robin Hood Hacker

Chapter 6 The Wisdom and Folly of Penetration Testing

Chapter 7 Of Course Your Bank Is Secure — Right?

Chapter 8 Your Intellectual Property Isn’t Safe

Chapter 9 On the Continent

Chapter 10 Social Engineers — How They Work

and How to Stop Them

Chapter 11 Short Takes

Index

The Art of War

فهرست مطالب کتاب The Art of War:

THE ART OF WAR

Translator’s Preface

Translator’s Introduction

Strategic Assessments

Doing Battle

Planning a Siege

Formation

Force

Emptiness and Fullness

Armed Struggle

Adaptations

Maneuvering Armies

Terrain

Nine Grounds

Fire Attack

On the Use of Spies

MASTERING THE ART OF WAR

Note on Pronunciation

Translator’s Introduction

The Art of War and the I Ching: Strategy and Change

Notes on Sources

Part One: The Way of the General – Essays on Leadership and Crisis Management

Part Two: Lessons of War – Studies in Strategy

THE LOST ART OF WAR

Introduction

Sun Bin’s Art of War

Leadership, Organization, and Strategy: How Sun Tzu and Sun Tzu II Complement Each Other

THE SILVER SPARROW ART OF WAR

Translator’s Introduction

Strategic Measurements

Combat

Planning Attack

Formations

Disposition and Momentum

Vulnerability and Substantiality

Armed Struggle

Adapting to All Changes

Maneuvering Forces

The Lay of the Land

Nine Grounds

Fire Assault

Employing Secret Agents

Sources

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

فهرست مطالب کتاب The Basics of Hacking and Penetration Testing:

Acknowledgments

About the Author

About the Technical Editor

Introduction

Chapter 1: What Is Penetration Testing?

Chapter 2: Reconnaissance

Chapter 3: Scanning

Chapter 4: Exploitation

Chapter 5: Web-based Exploitation

Chapter 6: Maintaining Access with Backdoors and Rootkits

Chapter 7: Wrapping Up the Penetration Test

Index

The Basics of Web Hacking: Tools and Techniques to Attack the Web

فهرست مطالب کتاب The Basics of Web Hacking:

Introduction

About This Book

A Hands-On Approach

What’s In This Book?

A Quick Disclaimer

Chapter 1. The Basics of Web Hacking

Introduction

What Is a Web Application?

What You Need to Know About Web Servers

What You Need to Know About HTTP

The Basics of Web Hacking: Our Approach

Web Apps Touch Every Part of IT

Existing Methodologies

Most Common Web Vulnerabilities

Setting Up a Test Environment

Chapter 2. Web Server Hacking

Introduction

Reconnaissance

Port Scanning

Vulnerability Scanning

Exploitation

Maintaining Access

Chapter 3. Web Application Recon and Scanning

Introduction

Web Application Recon

Web Application Scanning

Chapter 4. Web Application Exploitation with Injection

Introduction

SQL Injection Vulnerabilities

SQL Injection Attacks

Sqlmap

Operating System Command Injection Vulnerabilities

Operating System Command Injection Attacks

Web Shells

Chapter 5. Web Application Exploitation with Broken Authentication and Path Traversal

Introduction

Authentication and Session Vulnerabilities

Path Traversal Vulnerabilities

Brute Force Authentication Attacks

Session Attacks

Path Traversal Attacks

Chapter 6. Web User Hacking

Introduction

Cross-Site Scripting (XSS) Vulnerabilities

Cross-Site Request Forgery (CSRF) Vulnerabilities

Technical Social Engineering Vulnerabilities

Web User Recon

Web User Scanning

Web User Exploitation

Cross-Site Scripting (XSS) Attacks

Reflected XSS Attacks

Stored XSS Attacks

Cross-Site Request Forgery (CSRF) Attacks

User Attack Frameworks

Chapter 7. Fixes

Introduction

Web Server Fixes

Web Application Fixes

Web User Fixes

Chapter 8. Next Steps

Introduction

Security Community Groups and Events

Formal Education

Certifications

Additional Books

Index

The C Programming Language (Second Edition)

فهرست مطالب کتاب The C Programming Language:

A Tutorial Introduction

Types, Operators, and Expressions

Control Flow

Functions and Program Structure

Pointers and Arrays

Structures

Input and Output

The UNIX System Interface

The C++ Programming Language (Fourth Edition)

فهرست مطالب کتاب The C++ Programming Language:

Preface

Preface to the Fourth Edition

Preface to the Third Edition

Preface to the Second Edition

Preface to the First Edition

Part I: Introductory Material

Notes to the Reader

A Tour of C++: The Basics

A Tour of C++: Abstraction Mechanisms

A Tour of C++: Containers and Algorithms

A Tour of C++: Concurrency and Utilities

Part II: Basic Facilities

Types and Declarations

Pointers, Arrays, and References

Structures, Unions, and Enumerations

Statements

Expressions

Select Operations

Functions

Exception Handling

Namespaces

Source Files and Programs

Part III: Abstraction Mechanisms

Classes

Construction, Cleanup, Copy, and Move

Overloading

Special Operators

Derived Classes

Class Hierarchies

Run-Time Type Information

Templates

Generic Programming

Specialization

Instantiation

Templates and Hierarchies

Metaprogramming

A Matrix Design

Part IV: The Standard Library

Standard Library Summary

STL Containers

STL Algorithms

STL Iterators

Memory and Resources

Utilities

Strings

Regular Expressions

I/O Streams

Locales

Numerics

Concurrency

Threads and Tasks

The C Standard Library

Compatibility

Index

The Clean Coder: A Code of Conduct for Professional Programmers

فهرست مطالب کتاب The Clean Coder:

Chapter 1 Professionalism

Chapter 2 Saying No

Chapter 3 Saying Yes

Chapter 4 Coding

Chapter 5 Test Driven Development

Chapter 6 Practicing

Chapter 7 Acceptance Testing

Chapter 8 Testing Strategies

Chapter 9 Time Management

Chapter 10 Estimation

Chapter 11 Pressure

Chapter 12 Collaboration

Chapter 13 Teams and Projects

Chapter 14 Mentoring, Apprenticeship, and Craftsmanship

The Complete Guide to YouTube for Business

فهرست مطالب:

Introduction Marketing + You(Tube): Your Business on the Platform

Chapter ONE Identifying + Refining Goals for Your YouTube Presence

Chapter TWO Like + Subscribe to a YouTube Marketing Strategy

Chapter THREE Shorts, Sweet, + to the Point: YouTube Video Formats

Chapter FOUR Everything You Need to Know About the Algorithm

Chapter FIVE Tips + Tricks for Developing Engaging YouTube Videos

Chapter SIX Measurement + Monetization Strategies

Conclusion  Subscribe Worthy Software for Your Social Strategy

The Complete VMware vSphere Guide

فهرست مطالب:

Preface

The Virtual Data Center

The Discovery Process

The Design Factors

vSphere Management Design

vSphere Storage Design

vSphere Network Design

vSphere Compute Design

vSphere Physical Design

Virtual Machine Design

Deployment Workflow and Component Installation

Configuring and Managing vSphere 6.7

Life Cycle Management, Patching, and Upgrading

VM Deployment and Management

VM Resource Management

Availability and Disaster Recovery

Securing and Protecting Your Environment

Analyzing and Optimizing Your Environment

Troubleshooting Your Environment

Building Your Own VMware vSphere Lab

Index

The Do’s and Don’ts of Reddit Marketing – Masters in Marketing Series

فهرست مطالب:

Why Reddit Matters in 2025

The Do’s of Reddit Marketing

The Don’ts of Reddit Marketing

Ad Strategies on Reddit

Engagement Tactics for Brands

Crisis Management on Reddit

Actionable Checklist

HubSpot’s Reddit Playbook: Frontline Insights