The Art of Agile Development
فهرست مطالب کتاب The Art of Agile Development:
Preface
Part I: Getting Started
Chapter 1: Why Agile?
Chapter 2: How to Be Agile
Chapter 3: Understanding X
Chapter 4: Adopting XP
Part II: Practicing XP
Chapter 5: Thinking
Chapter 6: Collaborating
Chapter 7: Releasing
Chapter 8: Planning
Chapter 9: Developing
Part III: Mastering Agility
Chapter 10: Values and Principles
Chapter 11: Improve the Process
Chapter 12: Rely on People
Chapter 13: Eliminate Waste
Chapter 14: Deliver Value
Chapter 15: Seek Technical Excellence
References
Index
The Art of Deception: Controlling the Human Element of Security
فهرست مطالب کتاب The Art of Deception:
Introduction
Part 1 Behind the Scenes
Chapter 1 Security’s Weakest Link
Part 2 The Art of the Attacker
Chapter 2 When Innocuous Information Isn’t
Chapter 3 The Direct Attack: Just Asking for it
Chapter 4 Building Trust
Chapter 5 “Let Me Help You”
Chapter 6 “Can You Help Me?”
Chapter 7 Phony Sites and Dangerous Attachments
Chapter 8 Using Sympathy, Guilt and Intimidation
Chapter 9 The Reverse Sting
Part 3 Intruder Alert
Chapter 10 Entering the Premises
Chapter 11 Combining Technology and Social Engineering
Chapter 12 Attacks on the Entry-Level Employee
Chapter 13 Clever Cons
Chapter 14 Industrial Espionage
Part 4 Raising the Bar
Chapter 15 Information Security Awareness and Training
Chapter 16 Recommended Corporate Information Security Policies
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
فهرست مطالب کتاب The Art of Intrusion:
Chapter 1 Hacking the Casinos for a Million Bucks
Chapter 2 When Terrorists Come Calling
Chapter 3 The Texas Prison Hack
Chapter 4 Cops and Robbers
Chapter 5 The Robin Hood Hacker
Chapter 6 The Wisdom and Folly of Penetration Testing
Chapter 7 Of Course Your Bank Is Secure — Right?
Chapter 8 Your Intellectual Property Isn’t Safe
Chapter 9 On the Continent
Chapter 10 Social Engineers — How They Work
and How to Stop Them
Chapter 11 Short Takes
Index
The Art of War
فهرست مطالب کتاب The Art of War:
THE ART OF WAR
Translator’s Preface
Translator’s Introduction
Strategic Assessments
Doing Battle
Planning a Siege
Formation
Force
Emptiness and Fullness
Armed Struggle
Adaptations
Maneuvering Armies
Terrain
Nine Grounds
Fire Attack
On the Use of Spies
MASTERING THE ART OF WAR
Note on Pronunciation
Translator’s Introduction
The Art of War and the I Ching: Strategy and Change
Notes on Sources
Part One: The Way of the General – Essays on Leadership and Crisis Management
Part Two: Lessons of War – Studies in Strategy
THE LOST ART OF WAR
Introduction
Sun Bin’s Art of War
Leadership, Organization, and Strategy: How Sun Tzu and Sun Tzu II Complement Each Other
THE SILVER SPARROW ART OF WAR
Translator’s Introduction
Strategic Measurements
Combat
Planning Attack
Formations
Disposition and Momentum
Vulnerability and Substantiality
Armed Struggle
Adapting to All Changes
Maneuvering Forces
The Lay of the Land
Nine Grounds
Fire Assault
Employing Secret Agents
Sources
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
فهرست مطالب کتاب The Basics of Hacking and Penetration Testing:
Acknowledgments
About the Author
About the Technical Editor
Introduction
Chapter 1: What Is Penetration Testing?
Chapter 2: Reconnaissance
Chapter 3: Scanning
Chapter 4: Exploitation
Chapter 5: Web-based Exploitation
Chapter 6: Maintaining Access with Backdoors and Rootkits
Chapter 7: Wrapping Up the Penetration Test
Index
The Basics of Web Hacking: Tools and Techniques to Attack the Web
فهرست مطالب کتاب The Basics of Web Hacking:
Introduction
About This Book
A Hands-On Approach
What’s In This Book?
A Quick Disclaimer
Chapter 1. The Basics of Web Hacking
Introduction
What Is a Web Application?
What You Need to Know About Web Servers
What You Need to Know About HTTP
The Basics of Web Hacking: Our Approach
Web Apps Touch Every Part of IT
Existing Methodologies
Most Common Web Vulnerabilities
Setting Up a Test Environment
Chapter 2. Web Server Hacking
Introduction
Reconnaissance
Port Scanning
Vulnerability Scanning
Exploitation
Maintaining Access
Chapter 3. Web Application Recon and Scanning
Introduction
Web Application Recon
Web Application Scanning
Chapter 4. Web Application Exploitation with Injection
Introduction
SQL Injection Vulnerabilities
SQL Injection Attacks
Sqlmap
Operating System Command Injection Vulnerabilities
Operating System Command Injection Attacks
Web Shells
Chapter 5. Web Application Exploitation with Broken Authentication and Path Traversal
Introduction
Authentication and Session Vulnerabilities
Path Traversal Vulnerabilities
Brute Force Authentication Attacks
Session Attacks
Path Traversal Attacks
Chapter 6. Web User Hacking
Introduction
Cross-Site Scripting (XSS) Vulnerabilities
Cross-Site Request Forgery (CSRF) Vulnerabilities
Technical Social Engineering Vulnerabilities
Web User Recon
Web User Scanning
Web User Exploitation
Cross-Site Scripting (XSS) Attacks
Reflected XSS Attacks
Stored XSS Attacks
Cross-Site Request Forgery (CSRF) Attacks
User Attack Frameworks
Chapter 7. Fixes
Introduction
Web Server Fixes
Web Application Fixes
Web User Fixes
Chapter 8. Next Steps
Introduction
Security Community Groups and Events
Formal Education
Certifications
Additional Books
Index
The C Programming Language (Second Edition)
فهرست مطالب کتاب The C Programming Language:
A Tutorial Introduction
Types, Operators, and Expressions
Control Flow
Functions and Program Structure
Pointers and Arrays
Structures
Input and Output
The UNIX System Interface
The C++ Programming Language (Fourth Edition)
فهرست مطالب کتاب The C++ Programming Language:
Preface
Preface to the Fourth Edition
Preface to the Third Edition
Preface to the Second Edition
Preface to the First Edition
Part I: Introductory Material
Notes to the Reader
A Tour of C++: The Basics
A Tour of C++: Abstraction Mechanisms
A Tour of C++: Containers and Algorithms
A Tour of C++: Concurrency and Utilities
Part II: Basic Facilities
Types and Declarations
Pointers, Arrays, and References
Structures, Unions, and Enumerations
Statements
Expressions
Select Operations
Functions
Exception Handling
Namespaces
Source Files and Programs
Part III: Abstraction Mechanisms
Classes
Construction, Cleanup, Copy, and Move
Overloading
Special Operators
Derived Classes
Class Hierarchies
Run-Time Type Information
Templates
Generic Programming
Specialization
Instantiation
Templates and Hierarchies
Metaprogramming
A Matrix Design
Part IV: The Standard Library
Standard Library Summary
STL Containers
STL Algorithms
STL Iterators
Memory and Resources
Utilities
Strings
Regular Expressions
I/O Streams
Locales
Numerics
Concurrency
Threads and Tasks
The C Standard Library
Compatibility
Index
The Clean Coder: A Code of Conduct for Professional Programmers
فهرست مطالب کتاب The Clean Coder:
Chapter 1 Professionalism
Chapter 2 Saying No
Chapter 3 Saying Yes
Chapter 4 Coding
Chapter 5 Test Driven Development
Chapter 6 Practicing
Chapter 7 Acceptance Testing
Chapter 8 Testing Strategies
Chapter 9 Time Management
Chapter 10 Estimation
Chapter 11 Pressure
Chapter 12 Collaboration
Chapter 13 Teams and Projects
Chapter 14 Mentoring, Apprenticeship, and Craftsmanship
The Complete Guide to YouTube for Business
فهرست مطالب:
Introduction Marketing + You(Tube): Your Business on the Platform
Chapter ONE Identifying + Refining Goals for Your YouTube Presence
Chapter TWO Like + Subscribe to a YouTube Marketing Strategy
Chapter THREE Shorts, Sweet, + to the Point: YouTube Video Formats
Chapter FOUR Everything You Need to Know About the Algorithm
Chapter FIVE Tips + Tricks for Developing Engaging YouTube Videos
Chapter SIX Measurement + Monetization Strategies
Conclusion Subscribe Worthy Software for Your Social Strategy
The Complete VMware vSphere Guide
فهرست مطالب:
Preface
The Virtual Data Center
The Discovery Process
The Design Factors
vSphere Management Design
vSphere Storage Design
vSphere Network Design
vSphere Compute Design
vSphere Physical Design
Virtual Machine Design
Deployment Workflow and Component Installation
Configuring and Managing vSphere 6.7
Life Cycle Management, Patching, and Upgrading
VM Deployment and Management
VM Resource Management
Availability and Disaster Recovery
Securing and Protecting Your Environment
Analyzing and Optimizing Your Environment
Troubleshooting Your Environment
Building Your Own VMware vSphere Lab
Index
The Do’s and Don’ts of Reddit Marketing – Masters in Marketing Series
فهرست مطالب:
Why Reddit Matters in 2025
The Do’s of Reddit Marketing
The Don’ts of Reddit Marketing
Ad Strategies on Reddit
Engagement Tactics for Brands
Crisis Management on Reddit
Actionable Checklist
HubSpot’s Reddit Playbook: Frontline Insights