The Go Programming Language

فهرست مطالب کتاب The Go Programming Language:

1. Tutorial

2. Pro gram Str ucture

3. Basic Data Typ es

4. Com posite Typ es

5. Func tions

6. Metho ds

7. Interfaces

8. Gor o utines and Channels

9. Concurrency with Shared Vari ables 257

10. Pack ages and the Go Tool

11. Testing

12. Reflecti on

13. Low-L evel Pro gramming

The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail

فهرست مطالب کتاب The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail:

Introduction

PART ONE: WHY GREAT COMPANIES CAN FAIL

1 How Can Great Firms Fail? Insights from the Hard Disk Drive Industry

2 Value Networks and the Impetus to Innovate

3 Disruptive Technological Change in the Mechanical Excavator Industry

4 What Goes Up, Can’t Go Down

PART TWO: MANAGING DISRUPTIVE TECHNOLOGICAL CHANGE

5 Give Responsibility for Disruptive Technologies to Organizations Whose Customers Need Them

6 Match the Size of the Organization to the Size of the Market

7 Discovering New and Emerging Markets

8 How to Appraise Your Organization’s Capabilities and Disabilities

9 Performance Provided, Market Demand, and the Product Life Cycle

10 Managing Disruptive Technological Change: A Case Study

11 The Dilemmas of Innovation: A Summary

The Innovator’s Dilemma Book Group Guide

About the Auth

The Lean Mindset: Ask the Right Questions

فهرست مطالب کتاب The Lean Mindset:

Preface

About the Authors

Introduction

Chapter 1 — The Purpose of Business

Chapter 2 — Energized Workers

Chapter 3 — Delighted Customers

Chapter 4 — Genuine Efficiency

Chapter 5 — Breakthrough Innovation

Epilogue

References

Index

The Lean Startup: How Today’s Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses

فهرست مطالب کتاب The Lean Startup:

Introduction

Part One VISION

Start

Define

Learn

Experiment

PartTwo STEER

Leap

Test

Measure

Pivot (orPersevere)

PartThree ACCELERATE

Batch

Grow

Adapt

Innovate

Epilogue: Waste Not

Jointhe Movement

The Linux Programming Interface A Linux and UNIX System Programming Handbook

فهرست مطالب کتاب The Linux Programming Interface:

Preface

Chapter 1: History and Standards

Chapter 2: Fundamental Concepts .

Chapter 3: System Programming Concepts.

Chapter 4: File I/O: The Universal I/O Model

Chapter 5: File I/O: Further Details

Chapter 6: Processes

Chapter 7: Memory Allocation.

Chapter 8: Users and Groups

Chapter 9: Process Credentials

Chapter 10: Time.

Chapter 11: System Limits and Options

Chapter 12: System and Process Information

Chapter 13: File I/O Buffering.

Chapter 14: File Systems

Chapter 15: File Attributes

Chapter 16: Extended Attributes

Chapter 17: Access Control Lists

Chapter 18: Directories and Links

Chapter 19: Monitoring File Events

viii Brief Contents

Chapter 20: Signals: Fundamental Concepts

Chapter 21: Signals: Signal Handlers

Chapter 22: Signals: Advanced Features

Chapter 23: Timers and Sleeping

Chapter 24: Process Creation

Chapter 25: Process Termination

Chapter 26: Monitoring Child Processes

Chapter 27: Program Execution.

Chapter 28: Process Creation and Program Execution in More Detail.

Chapter 29: Threads: Introduction

Chapter 30: Threads: Thread Synchronization

Chapter 31: Threads: Thread Safety and Per-Thread Storage

Chapter 32: Threads: Thread Cancellation.

Chapter 33: Threads: Further Details

Chapter 34: Process Groups, Sessions, and Job Control

Chapter 35: Process Priorities and Scheduling

Chapter 36: Process Resources

Chapter 37: Daemons

Chapter 38: Writing Secure Privileged Programs

Chapter 39: Capabilities

Chapter 40: Login Accounting

Chapter 41: Fundamentals of Shared Libraries

Chapter 42: Advanced Features of Shared Libraries

Chapter 43: Interprocess Communication Overview

Chapter 44: Pipes and FIFOs

Chapter 45: Introduction to System V IPC

Chapter 46: System V Message Queues

Brief Contents ix

Chapter 47: System V Semaphores

Chapter 48: System V Shared Memory

Chapter 49: Memory Mappings

Chapter 50: Virtual Memory Operations

Chapter 51: Introduction to POSIX IPC.

Chapter 52: POSIX Message Queues

Chapter 53: POSIX Semaphores

Chapter 54: POSIX Shared Memory

Chapter 55: File Locking.

Chapter 56: Sockets: Introduction

Chapter 57: Sockets: UNIX Domain

Chapter 58: Sockets: Fundamentals of TCP/IP Networks

Chapter 59: Sockets: Internet Domains

Chapter 60: Sockets: Server Design

Chapter 61: Sockets: Advanced Topics

Chapter 62: Terminals

Chapter 63: Alternative I/O Models

Chapter 64: Pseudoterminals

Appendix A: Tracing System Calls

Appendix B: Parsing Command-Line Options

Appendix C: Casting the NULL Pointer

Appendix D: Kernel Configuration

Appendix E: Further Sources of Information

Appendix F: Solutions to Selected Exercises

Bibliography

Index

The LISP Network Evolution to the Next-Generation of Data Networks

فهرست مطالب کتاب The LISP Network:

Chapter 1: LISP and the Future of Networking

Chapter 2: LISP Architecture

Chapter 3: Data Center Trends

Chapter 4: The Wide­Area Network: Bringing Traffic from Access to the Data Center

Chapter 5: Mega­Scale Access Networks: LISP, User Access, and the Internet of Things

Chapter 6: Security

Chapter 7: LISP and the Next­Generation Mobile Network

The Official CompTIA Network+ Student Guide (Exam N10-008)

فهرست مطالب کتابThe Official CompTIA Network+ Student Guide (Exam N10-008):

Lesson 1: Comparing OSI Model Network

Lesson 3: Deploying Ethernet Switching

Lesson 4: Troubleshooting Ethernet Networks

Lesson 5: Explaining IPv4 Addressing

Lesson 6: Supporting IPv4 and IPv6 Networks

Lesson 7: Configuring and Troubleshooting Routers

Lesson 8: Explaining Network Topologies and Types

Lesson 9: Explaining Transport Layer Protocols

Lesson 10: Explaining Network Services

Lesson 11: Explaining Network

Lesson 12: Ensuring Network Availability

Lesson 13: Explaining Common Security Concepts

Lesson 14: Supporting and Troubleshooting Secure Networks

Lesson 15: Deploying and Troubleshooting Wireless Networks

Lesson 16: Comparing WAN Links and Remote Access Methods

Lesson 17: Explaining Organizational and Physical Security Concepts

Lesson 18: Explaining Disaster Recovery and High Availability Concepts

Lesson 19: Applying Network Hardening Techniques

Lesson 20: Summarizing Cloud and Datacenter Architecture

Appendix A

Solutions

Glossary

Index

The Official CompTIA PenTest+ Student Guide (Exam PT0-002)

فهرست مطالب کتاب The Official CompTIA PenTest+ Student Guide:

Lesson 1: Scoping Organizational/Customer Requirements

Lesson 2: Defining the Rules of Engagement

Lesson 3: Footprinting and Gathering Intelligence

Lesson 4: Evaluating Human and Physical Vulnerabilities

Lesson 5: Preparing the Vulnerability Scan

Lesson 6: Scanning Logical Vulnerabilities

Lesson 7: Analyzing Scanning Results

Lesson 8: Avoiding Detection and Covering Tracks

Lesson 9: Exploiting the LAN and Cloud

Lesson 10: Testing Wireless Networks

Lesson 11: Targeting Mobile Devices

Lesson 12: Attacking Specialized Systems

Lesson 13: Web Application-Based Attacks

Lesson 14: Performing System Hacking

Lesson 15: Scripting and Software Development

Lesson 16: Leveraging the Attack: Pivot and Penetrate

Lesson 17: Communicating During the PenTesting Process

Lesson 18: Summarizing Report Components

Lesson 19: Recommending Remediation

Lesson 20: Performing Post-Report Delivery Activities

The Official CompTIA Security+ Study Guide (Exam SY0-601)

فهرست مطالب کتاب The Official CompTIA Security+ Study Guide (Exam SY0601):

Lesson 1: Comparing Security Roles and Security Controls

Lesson 2: Explaining Threat Actors and Threat Intelligence

Lesson 3: Performing Security Assessments

Lesson 4: Identifying Social Engineering and Malware

Lesson 5: Summarizing Basic Cryptographic Concepts

Lesson 6: Implementing Public Key Infrastructure

Lesson 7: Implementing Authentication Controls

Lesson 8: Implementing Identity and Account Management Controls

Lesson 9: Implementing Secure Network Designs

Lesson 10: Implementing Network Security Appliances

Lesson 11: Implementing Secure Network Protocols

Lesson 12: Implementing Host Security Solutions

Lesson 13: Implementing Secure Mobile Solutions

Lesson 14: Summarizing Secure Application Concepts

Lesson 15: Implementing Secure Cloud Solutions

Lesson 16: Explaining Data Privacy and Protection Concepts

Lesson 17: Performing Incident Response

Lesson 18: Explaining Digital Forensics

Lesson 19: Summarizing Risk Management Concepts

Lesson 20: Implementing Cybersecurity Resilience

Lesson 21: Explaining Physical Security

The Practice of Management

فهرست مطالب کتاب The Practice of Management:

INTRODUCTION: THE NATURE OF MANAGEMENT

PART I: MANAGING A BUSINESS

PART II: MANAGING MANAGERS

PART III: THE STRUCTURE OF MANAGEMENT

PART IV: THE MANAGEMENT OF WORKER AND WORK

PART V: WHAT IT MEANS TO BE A MANAGER

CONCLUSION: THE RESPONSIBILITIES OF MANAGEMENT

The Pragmatic Programmer: From Journeyman to Master

فهرست مطالب کتاب The Pragmatic Programmer:

1. A Pragmatic Philosophy

2. A Pragmatic Approach

3. The Basic Tools

4. Pragmatic Paranoia

5. Bend or Break

6. While You Are Coding

7. Before the Project

8. Pragmatic Projects

Resources

Answers to Exercises

The Shellcoders Handbook: Discovering and Exploiting Security Holes (Second Edition)

فهرست مطالب کتاب The Shellcoders Handbook: Discovering and Exploiting Security Holes:

Part I: Introduction to Exploitation: Linux on x86

Chapter 1: Before You Begin

Chapter 2: Stack Overflows

Chapter 3: Shellcode

Chapter 4: Introduction to Format String Bugs

Chapter 5: Introduction to Heap Overflows

Part II: Other Platforms — Windows, Solaris, OS X, and Cisco

Chapter 6: The Wild World of Windows

Chapter 7: Windows Shellcode

Chapter 8: Windows Overflows

Chapter 9: Overcoming Filters

Chapter 10: Introduction to Solaris Exploitation

Chapter 11: Advanced Solaris Exploitation

Chapter 12: OS X Shellcode

Chapter 13: Cisco IOS Exploitation

Chapter 14: Protection Mechanisms

Part III: Vulnerability Discovery

Chapter 15: Establishing a Working Environment

Chapter 16: Fault Injection

Chapter 17: The Art of Fuzzing

Chapter 18: Source Code Auditing: Finding Vulnerabilities in C-Based Languages

Chapter 19: Instrumented Investigation: A Manual Approach

Chapter 20: Tracing for Vulnerabilities

Chapter 21: Binary Auditing: Hacking Closed Source Software

Part IV: Advanced Materials

Chapter 22: Alternative Payload Strategies

Chapter 23: Writing Exploits that Work in the Wild

Chapter 24: Attacking Database Software

Chapter 25: Unix Kernel Overflows

Chapter 26: Exploiting Unix Kernel Vulnerabilities

Chapter 27: Hacking the Windows Kernel