The Startup Owners Manual: The Step‑by‑Step Guide for Building a Great Company
فهرست مطالب کتاب The Startup Owners Manual:
Step 1: The Startup Owner’s Manual Strategy Guide
Preface
Who Is This Book For?
Introduction
A Repeatable Path
Why a Second Decade?
The Four Steps: A New Path
Chapter 1: The Path to Disaster — A Startup Is Not a Small Version of a Big Company
Chapter 2: The Path to the Epiphany — The Customer Development Model
Chapter 3: The Customer Development Manifesto
Chapter 4: An Introduction to Customer Discovery
Chapter 5: Introduction to Customer Validation
Chapter 6: Customer Validation — The Toughest Question of All: Pivot or Proceed
Step 2: The Startup Owner’s Manual for Web/Mobile Channel Startups
How to Read This Book
Getting Started
Chapter 1: The Customer Development Manifesto
Step One: Customer Discovery
Chapter 2: An Introduction to Customer Discovery
Chapter 3: Customer Discovery, Phase One — State Your Business Model Hypotheses
Chapter 4: Customer Discovery, Phase Two — “Get Out of the Building” to Test the Problem: “Do People Care?”
Chapter 5: Customer Discovery, Phase Three — “Get Out of the Building” and Test the Product Solution
Chapter 6: Customer Discovery, Phase Four — Verify the Business Model and Pivot or Proceed
Step Two: Customer Validation
Chapter 7: Introduction to Customer Validation
Chapter 8: Customer Validation, Phase One — “Get Ready to Sell”
Chapter 9: Customer Validation, Phase Two — “Get Out of the Building and Sell!”
Chapter 10: Customer Validation, Phase Three — Develop Product and Company Positioning
Chapter 11: Customer Validation, Phase Four — The Toughest Question of All: Pivot or Proceed
How to Build a Web Startup — A Simple Overview
Step 3: The Startup Owner’s Manual for Physical Channel Startups
How to Read This Book
Getting Started
Chapter 1: The Customer Development Manifesto
Step One: Customer Discovery
Chapter 2: An Introduction to Customer Discovery
Chapter 3: Customer Discovery, Phase One — State Your Business Model Hypotheses
Chapter 4: Customer Discovery, Phase Two — “Get Out of the Building” to Test the Problem: “Do People Care?”
Chapter 5: Customer Discovery, Phase Three — “Get Out of the Building” and Test the Product Solution
Chapter 6: Customer Discovery, Phase Four — Verify the Business Model and Pivot or Proceed
Step Two: Customer Validation
Chapter 7: Introduction to Customer Validation
Chapter 8: Customer Validation, Phase One — “Get Ready to Sell”
Chapter 9: Customer Validation, Phase Two — “Get Out of the Building and Sell!”
Chapter 10: Customer Validation, Phase Three — Develop Product and Company Positioning
Chapter 11: Customer Validation, Phase Four — The Toughest Question of All: Pivot or Proceed
The Ultimate Kali Linux Book (Third Edition)
فهرست مطالب کتاب The Ultimate Kali Linux Book (Third Edition):
Chapter 1: Introduction to Ethical Hacking
Chapter 2: Building a Penetration Testing Lab
Chapter 3: Setting up for Advanced Penetration Testing Techniques
Chapter 4: Passive Reconnaissace
Chapter 5: Exploring Open Source Intelligence
Chapter 6: Active Reconnaissance
Chapter 7: Performing Vulnerability Assessments
Chapter 8: Understanding Network Penetration Testing
Chapter 9: Post Exploitation techniques
Chapter 10: Working with Active Directory attacks
Chapter 11: Advanced Active Directory attacks
Chapter 12: Delving into Command and Control tactics
Chapter 13: Advanced wireless penetration testing
Chapter 14: Exploring Social Engineering attacks
Chapter 15: Understanding Website Application security
Chapter 16: Advanced Website Penetration Testing Techniques
17. Chapter 17: Best Practices for the real world
The Ultimate Kali Linux Book, Second Edition
فهرست مطالب کتاب The Ultimate Kali Linux Book, Second Edition:
ندارد
The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition
فهرست مطالب کتاب The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition:
Introduction to Ethical Hacking
Building a Penetration Testing Lab
Setting up for Advanced Penetration Testing Techniques
Passive Reconnaissace
Exploring Open Source Intelligence
Active Reconnaissance
Performing Vulnerability Assessments
Understanding Network Penetration Testing
The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws
فهرست مطالب کتاب The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws:
Chapter 1 Web Application (In)security
Chapter 2 Core Defense Mechanisms
Chapter 3 Web Application Technologies
Chapter 4 Mapping the Application
Chapter 5 Bypassing Client-Side Controls
Chapter 6 Attacking Authentication
Chapter 7 Attacking Session Management
Chapter 8 Attacking Access Controls
Chapter 9 Injecting Code
Chapter 10 Exploiting Path Traversal
Chapter 11 Attacking Application Logic
Chapter 12 Attacking Other Users
Chapter 13 Automating Bespoke Attacks
Chapter 14 Exploiting Information Disclosure
Chapter 15 Attacking Compiled Applications
Chapter 16 Attacking Application Architecture
Chapter 17 Attacking the Web Server
Chapter 18 Finding Vulnerabilities in Source Code
Chapter 19 A Web Application Hacker’s Toolkit
Chapter 20 A Web Application Hacker’s Methodology
Training Guide: Installing and Configuring Windows Server 2012 R2
فهرست مطالب کتاب Training Guide: Installing and Configuring Windows Server 2012 R2:
Introduction
CHAPTER 1 Preparing for Windows Server 2012 R2
CHAPTER 2 Deploying servers
CHAPTER 3 Server remote management
CHAPTER 4 Deploying domain controllers
CHAPTER 5 Active Directory administration
CHAPTER 6 Network administration
CHAPTER 7 Hyper-V virtualization
CHAPTER 8 File services and storage
CHAPTER 9 Print and document services
CHAPTER 10 Implementing Group Policy
CHAPTER 11 Configuring Windows Firewall and IPsec
Index
Ubuntu Linux Unleashed 2021 Edition
فهرست مطالب کتاب Ubuntu Linux Unleashed 2021 Edition:
Part I Getting Started
Part II Desktop Ubuntu
Part III System Administration
Part IV Ubuntu as a Server
Part V Programming Linux
Part VI Bonus Online Chapters
Ultimate VMware NSX for Professionals
فهرست مطالب کتاب Ultimate VMware NSX for Professionals:
Introduction to NSX Datacenter
Deploying NSX Infrastructure
Logical Switching
Logical Routing – NSX Edge Nodes
Logical Routing – NSX Gateways
Logical Routing – VRF and EVPN
Logical Bridging
Security – Micro‑Segmentation
Security – Advanced Threat Prevention
Security – Network Detection and Response
NSX Datacenter Services – 4
NSX Datacenter Services – 5
NSX Multisite Deployment
Monitoring and Managing NSX
Unauthorised Access: Physical Penetration Testing for IT Security Teams
فهرست مطالب کتاب Unauthorised Access: Physical Penetration Testing for IT Security Teams:
Preface
Acknowledgements
Foreword
1 The Basics of Physical Penetration Testing
2 Planning Your Physical Penetration Tests 11
3 Executing Tests 29
4 An Introduction to Social Engineering
5 Lock Picking 67
6 Information Gathering 89
7 Hacking Wireless Equipment 121
8 Gathering the Right Equipment 155
9 Tales from the Front Line 177
10 Introducing Security Policy Concepts 207
11 Counter Intelligence 229
Appendix A: UK Law 249
Appendix B: US Law 255
Appendix C: EU Law 261
Appendix D: Security Clearances 265
Appendix E: Security Accreditations 271
Index
UX for Lean Startups: Faster, Smarter User Experience Research and Design
فهرست مطالب کتاب UX for Lean Startups:
Foreword
Preface
Introduction
Part One: Validation
Chapter 1 – Early Validation
Chapter 2 – The Right Sort of Research at the Right Time
Chapter 3 – Faster User Research
Chapter 4 – Qualitative Research Is Great…Except When It’s Terrible
Part Two: Design
Chapter 5 – Designing for Validation
Chapter 6 – Just Enough Design
Chapter 7 – Design Hacks
Chapter 8 – Diagrams, Sketches, Wireframes, and Prototypes
Chapter 9 – An MVP Is Both M & V
Chapter 10 – The Right Amount of Visual Design
Part Three: Product
Chapter 11 – Measure It!
Chapter 12 – Go Faster!
Chapter 13 – The Big Finish
Index
VBA Notes For Professionals
فهرست مطالب کتاب VBA Notes For Professionals:
Getting started with VBA
Comments
String Literals – Escaping, non-printable characters and line-continuations
VBA Option Keyword
Declaring Variables
Declaring and assigning strings
Concatenating strings
Frequently used string manipulation
Substrings
Searching within strings for the presence of substrings
Assigning strings with repeated characters
Measuring the length of strings
Converting other types to strings
Date Time Manipulation
Data Types and Limits
Naming Conventions
Data Structures
Arrays
Copying, returning and passing arrays
Collections
Operators
Sorting
Flow control structures
Passing Arguments ByRef or ByVal
FileSystemObject
Working With Files and Directories Without Using FileSystemObject
Reading 2GB+ files in binary in VBA and File Hashes
Creating a procedure
Procedure Calls
Conditional Compilation
Object-Oriented VBA
Creating a Custom Class
Interfaces
Recursion
Events
Dictionary object
Working with ADO
Attributes
User Forms
CreateObject vs. GetObject
Non-Latin Characters
API Calls
Automation or Using other applications Libraries
Macro security and signing of VBA-projects/-modules
VBA Run-Time Errors
Error Handling
VCP-DCV for vSphere 8.x Official Cert Guide
فهرست مطالب:
Introduction
PART I: VSPHERE ARCHITECTURE, INTEGRATION, AND
PART II: VSPHERE INSTALLATION/CONFIGURATION
PART III: VSPHERE MANAGEMENT AND OPTIMIZATION
APPENDIX