The Go Programming Language
فهرست مطالب کتاب The Go Programming Language:
1. Tutorial
2. Pro gram Str ucture
3. Basic Data Typ es
4. Com posite Typ es
5. Func tions
6. Metho ds
7. Interfaces
8. Gor o utines and Channels
9. Concurrency with Shared Vari ables 257
10. Pack ages and the Go Tool
11. Testing
12. Reflecti on
13. Low-L evel Pro gramming
The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail
فهرست مطالب کتاب The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail:
Introduction
PART ONE: WHY GREAT COMPANIES CAN FAIL
1 How Can Great Firms Fail? Insights from the Hard Disk Drive Industry
2 Value Networks and the Impetus to Innovate
3 Disruptive Technological Change in the Mechanical Excavator Industry
4 What Goes Up, Can’t Go Down
PART TWO: MANAGING DISRUPTIVE TECHNOLOGICAL CHANGE
5 Give Responsibility for Disruptive Technologies to Organizations Whose Customers Need Them
6 Match the Size of the Organization to the Size of the Market
7 Discovering New and Emerging Markets
8 How to Appraise Your Organization’s Capabilities and Disabilities
9 Performance Provided, Market Demand, and the Product Life Cycle
10 Managing Disruptive Technological Change: A Case Study
11 The Dilemmas of Innovation: A Summary
The Innovator’s Dilemma Book Group Guide
About the Auth
The Lean Mindset: Ask the Right Questions
فهرست مطالب کتاب The Lean Mindset:
Preface
About the Authors
Introduction
Chapter 1 — The Purpose of Business
Chapter 2 — Energized Workers
Chapter 3 — Delighted Customers
Chapter 4 — Genuine Efficiency
Chapter 5 — Breakthrough Innovation
Epilogue
References
Index
The Lean Startup: How Today’s Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses
فهرست مطالب کتاب The Lean Startup:
Introduction
Part One VISION
Start
Define
Learn
Experiment
PartTwo STEER
Leap
Test
Measure
Pivot (orPersevere)
PartThree ACCELERATE
Batch
Grow
Adapt
Innovate
Epilogue: Waste Not
Jointhe Movement
The Linux Programming Interface A Linux and UNIX System Programming Handbook
فهرست مطالب کتاب The Linux Programming Interface:
Preface
Chapter 1: History and Standards
Chapter 2: Fundamental Concepts .
Chapter 3: System Programming Concepts.
Chapter 4: File I/O: The Universal I/O Model
Chapter 5: File I/O: Further Details
Chapter 6: Processes
Chapter 7: Memory Allocation.
Chapter 8: Users and Groups
Chapter 9: Process Credentials
Chapter 10: Time.
Chapter 11: System Limits and Options
Chapter 12: System and Process Information
Chapter 13: File I/O Buffering.
Chapter 14: File Systems
Chapter 15: File Attributes
Chapter 16: Extended Attributes
Chapter 17: Access Control Lists
Chapter 18: Directories and Links
Chapter 19: Monitoring File Events
viii Brief Contents
Chapter 20: Signals: Fundamental Concepts
Chapter 21: Signals: Signal Handlers
Chapter 22: Signals: Advanced Features
Chapter 23: Timers and Sleeping
Chapter 24: Process Creation
Chapter 25: Process Termination
Chapter 26: Monitoring Child Processes
Chapter 27: Program Execution.
Chapter 28: Process Creation and Program Execution in More Detail.
Chapter 29: Threads: Introduction
Chapter 30: Threads: Thread Synchronization
Chapter 31: Threads: Thread Safety and Per-Thread Storage
Chapter 32: Threads: Thread Cancellation.
Chapter 33: Threads: Further Details
Chapter 34: Process Groups, Sessions, and Job Control
Chapter 35: Process Priorities and Scheduling
Chapter 36: Process Resources
Chapter 37: Daemons
Chapter 38: Writing Secure Privileged Programs
Chapter 39: Capabilities
Chapter 40: Login Accounting
Chapter 41: Fundamentals of Shared Libraries
Chapter 42: Advanced Features of Shared Libraries
Chapter 43: Interprocess Communication Overview
Chapter 44: Pipes and FIFOs
Chapter 45: Introduction to System V IPC
Chapter 46: System V Message Queues
Brief Contents ix
Chapter 47: System V Semaphores
Chapter 48: System V Shared Memory
Chapter 49: Memory Mappings
Chapter 50: Virtual Memory Operations
Chapter 51: Introduction to POSIX IPC.
Chapter 52: POSIX Message Queues
Chapter 53: POSIX Semaphores
Chapter 54: POSIX Shared Memory
Chapter 55: File Locking.
Chapter 56: Sockets: Introduction
Chapter 57: Sockets: UNIX Domain
Chapter 58: Sockets: Fundamentals of TCP/IP Networks
Chapter 59: Sockets: Internet Domains
Chapter 60: Sockets: Server Design
Chapter 61: Sockets: Advanced Topics
Chapter 62: Terminals
Chapter 63: Alternative I/O Models
Chapter 64: Pseudoterminals
Appendix A: Tracing System Calls
Appendix B: Parsing Command-Line Options
Appendix C: Casting the NULL Pointer
Appendix D: Kernel Configuration
Appendix E: Further Sources of Information
Appendix F: Solutions to Selected Exercises
Bibliography
Index
The LISP Network Evolution to the Next-Generation of Data Networks
فهرست مطالب کتاب The LISP Network:
Chapter 1: LISP and the Future of Networking
Chapter 2: LISP Architecture
Chapter 3: Data Center Trends
Chapter 4: The WideArea Network: Bringing Traffic from Access to the Data Center
Chapter 5: MegaScale Access Networks: LISP, User Access, and the Internet of Things
Chapter 6: Security
Chapter 7: LISP and the NextGeneration Mobile Network
The Official CompTIA Network+ Student Guide (Exam N10-008)
فهرست مطالب کتابThe Official CompTIA Network+ Student Guide (Exam N10-008):
Lesson 1: Comparing OSI Model Network
Lesson 3: Deploying Ethernet Switching
Lesson 4: Troubleshooting Ethernet Networks
Lesson 5: Explaining IPv4 Addressing
Lesson 6: Supporting IPv4 and IPv6 Networks
Lesson 7: Configuring and Troubleshooting Routers
Lesson 8: Explaining Network Topologies and Types
Lesson 9: Explaining Transport Layer Protocols
Lesson 10: Explaining Network Services
Lesson 11: Explaining Network
Lesson 12: Ensuring Network Availability
Lesson 13: Explaining Common Security Concepts
Lesson 14: Supporting and Troubleshooting Secure Networks
Lesson 15: Deploying and Troubleshooting Wireless Networks
Lesson 16: Comparing WAN Links and Remote Access Methods
Lesson 17: Explaining Organizational and Physical Security Concepts
Lesson 18: Explaining Disaster Recovery and High Availability Concepts
Lesson 19: Applying Network Hardening Techniques
Lesson 20: Summarizing Cloud and Datacenter Architecture
Appendix A
Solutions
Glossary
Index
The Official CompTIA PenTest+ Student Guide (Exam PT0-002)
فهرست مطالب کتاب The Official CompTIA PenTest+ Student Guide:
Lesson 1: Scoping Organizational/Customer Requirements
Lesson 2: Defining the Rules of Engagement
Lesson 3: Footprinting and Gathering Intelligence
Lesson 4: Evaluating Human and Physical Vulnerabilities
Lesson 5: Preparing the Vulnerability Scan
Lesson 6: Scanning Logical Vulnerabilities
Lesson 7: Analyzing Scanning Results
Lesson 8: Avoiding Detection and Covering Tracks
Lesson 9: Exploiting the LAN and Cloud
Lesson 10: Testing Wireless Networks
Lesson 11: Targeting Mobile Devices
Lesson 12: Attacking Specialized Systems
Lesson 13: Web Application-Based Attacks
Lesson 14: Performing System Hacking
Lesson 15: Scripting and Software Development
Lesson 16: Leveraging the Attack: Pivot and Penetrate
Lesson 17: Communicating During the PenTesting Process
Lesson 18: Summarizing Report Components
Lesson 19: Recommending Remediation
Lesson 20: Performing Post-Report Delivery Activities
The Official CompTIA Security+ Study Guide (Exam SY0-601)
فهرست مطالب کتاب The Official CompTIA Security+ Study Guide (Exam SY0‑601):
Lesson 1: Comparing Security Roles and Security Controls
Lesson 2: Explaining Threat Actors and Threat Intelligence
Lesson 3: Performing Security Assessments
Lesson 4: Identifying Social Engineering and Malware
Lesson 5: Summarizing Basic Cryptographic Concepts
Lesson 6: Implementing Public Key Infrastructure
Lesson 7: Implementing Authentication Controls
Lesson 8: Implementing Identity and Account Management Controls
Lesson 9: Implementing Secure Network Designs
Lesson 10: Implementing Network Security Appliances
Lesson 11: Implementing Secure Network Protocols
Lesson 12: Implementing Host Security Solutions
Lesson 13: Implementing Secure Mobile Solutions
Lesson 14: Summarizing Secure Application Concepts
Lesson 15: Implementing Secure Cloud Solutions
Lesson 16: Explaining Data Privacy and Protection Concepts
Lesson 17: Performing Incident Response
Lesson 18: Explaining Digital Forensics
Lesson 19: Summarizing Risk Management Concepts
Lesson 20: Implementing Cybersecurity Resilience
Lesson 21: Explaining Physical Security
The Practice of Management
فهرست مطالب کتاب The Practice of Management:
INTRODUCTION: THE NATURE OF MANAGEMENT
PART I: MANAGING A BUSINESS
PART II: MANAGING MANAGERS
PART III: THE STRUCTURE OF MANAGEMENT
PART IV: THE MANAGEMENT OF WORKER AND WORK
PART V: WHAT IT MEANS TO BE A MANAGER
CONCLUSION: THE RESPONSIBILITIES OF MANAGEMENT
The Pragmatic Programmer: From Journeyman to Master
فهرست مطالب کتاب The Pragmatic Programmer:
1. A Pragmatic Philosophy
2. A Pragmatic Approach
3. The Basic Tools
4. Pragmatic Paranoia
5. Bend or Break
6. While You Are Coding
7. Before the Project
8. Pragmatic Projects
Resources
Answers to Exercises
The Shellcoders Handbook: Discovering and Exploiting Security Holes (Second Edition)
فهرست مطالب کتاب The Shellcoders Handbook: Discovering and Exploiting Security Holes:
Part I: Introduction to Exploitation: Linux on x86
Chapter 1: Before You Begin
Chapter 2: Stack Overflows
Chapter 3: Shellcode
Chapter 4: Introduction to Format String Bugs
Chapter 5: Introduction to Heap Overflows
Part II: Other Platforms — Windows, Solaris, OS X, and Cisco
Chapter 6: The Wild World of Windows
Chapter 7: Windows Shellcode
Chapter 8: Windows Overflows
Chapter 9: Overcoming Filters
Chapter 10: Introduction to Solaris Exploitation
Chapter 11: Advanced Solaris Exploitation
Chapter 12: OS X Shellcode
Chapter 13: Cisco IOS Exploitation
Chapter 14: Protection Mechanisms
Part III: Vulnerability Discovery
Chapter 15: Establishing a Working Environment
Chapter 16: Fault Injection
Chapter 17: The Art of Fuzzing
Chapter 18: Source Code Auditing: Finding Vulnerabilities in C-Based Languages
Chapter 19: Instrumented Investigation: A Manual Approach
Chapter 20: Tracing for Vulnerabilities
Chapter 21: Binary Auditing: Hacking Closed Source Software
Part IV: Advanced Materials
Chapter 22: Alternative Payload Strategies
Chapter 23: Writing Exploits that Work in the Wild
Chapter 24: Attacking Database Software
Chapter 25: Unix Kernel Overflows
Chapter 26: Exploiting Unix Kernel Vulnerabilities
Chapter 27: Hacking the Windows Kernel