The Startup Owners Manual: The Step‑by‑Step Guide for Building a Great Company

فهرست مطالب کتاب The Startup Owners Manual:

Step 1: The Startup Owner’s Manual Strategy Guide

Preface

Who Is This Book For?

Introduction

A Repeatable Path

Why a Second Decade?

The Four Steps: A New Path

Chapter 1: The Path to Disaster — A Startup Is Not a Small Version of a Big Company

Chapter 2: The Path to the Epiphany — The Customer Development Model

Chapter 3: The Customer Development Manifesto

Chapter 4: An Introduction to Customer Discovery

Chapter 5: Introduction to Customer Validation

Chapter 6: Customer Validation — The Toughest Question of All: Pivot or Proceed

Step 2: The Startup Owner’s Manual for Web/Mobile Channel Startups

How to Read This Book

Getting Started

Chapter 1: The Customer Development Manifesto

Step One: Customer Discovery

Chapter 2: An Introduction to Customer Discovery

Chapter 3: Customer Discovery, Phase One — State Your Business Model Hypotheses

Chapter 4: Customer Discovery, Phase Two — “Get Out of the Building” to Test the Problem: “Do People Care?”

Chapter 5: Customer Discovery, Phase Three — “Get Out of the Building” and Test the Product Solution

Chapter 6: Customer Discovery, Phase Four — Verify the Business Model and Pivot or Proceed

Step Two: Customer Validation

Chapter 7: Introduction to Customer Validation

Chapter 8: Customer Validation, Phase One — “Get Ready to Sell”

Chapter 9: Customer Validation, Phase Two — “Get Out of the Building and Sell!”

Chapter 10: Customer Validation, Phase Three — Develop Product and Company Positioning

Chapter 11: Customer Validation, Phase Four — The Toughest Question of All: Pivot or Proceed

How to Build a Web Startup — A Simple Overview

Step 3: The Startup Owner’s Manual for Physical Channel Startups

How to Read This Book

Getting Started

Chapter 1: The Customer Development Manifesto

Step One: Customer Discovery

Chapter 2: An Introduction to Customer Discovery

Chapter 3: Customer Discovery, Phase One — State Your Business Model Hypotheses

Chapter 4: Customer Discovery, Phase Two — “Get Out of the Building” to Test the Problem: “Do People Care?”

Chapter 5: Customer Discovery, Phase Three — “Get Out of the Building” and Test the Product Solution

Chapter 6: Customer Discovery, Phase Four — Verify the Business Model and Pivot or Proceed

Step Two: Customer Validation

Chapter 7: Introduction to Customer Validation

Chapter 8: Customer Validation, Phase One — “Get Ready to Sell”

Chapter 9: Customer Validation, Phase Two — “Get Out of the Building and Sell!”

Chapter 10: Customer Validation, Phase Three — Develop Product and Company Positioning

Chapter 11: Customer Validation, Phase Four — The Toughest Question of All: Pivot or Proceed

The Ultimate Kali Linux Book (Third Edition)

فهرست مطالب کتاب The Ultimate Kali Linux Book (Third Edition): 

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Building a Penetration Testing Lab

Chapter 3: Setting up for Advanced Penetration Testing Techniques

Chapter 4: Passive Reconnaissace

Chapter 5: Exploring Open Source Intelligence

Chapter 6: Active Reconnaissance

Chapter 7: Performing Vulnerability Assessments

Chapter 8: Understanding Network Penetration Testing

Chapter 9: Post Exploitation techniques

Chapter 10: Working with Active Directory attacks

Chapter 11: Advanced Active Directory attacks

Chapter 12: Delving into Command and Control tactics

Chapter 13: Advanced wireless penetration testing

Chapter 14: Exploring Social Engineering attacks

Chapter 15: Understanding Website Application security

Chapter 16: Advanced Website Penetration Testing Techniques

17. Chapter 17: Best Practices for the real world

The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition

فهرست مطالب کتاب The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition:

Introduction to Ethical Hacking

Building a Penetration Testing Lab

Setting up for Advanced Penetration Testing Techniques

Passive Reconnaissace

Exploring Open Source Intelligence

Active Reconnaissance

Performing Vulnerability Assessments

Understanding Network Penetration Testing

The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws

فهرست مطالب کتاب The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws:

Chapter 1 Web Application (In)security

Chapter 2 Core Defense Mechanisms

Chapter 3 Web Application Technologies

Chapter 4 Mapping the Application

Chapter 5 Bypassing Client-Side Controls

Chapter 6 Attacking Authentication

Chapter 7 Attacking Session Management

Chapter 8 Attacking Access Controls

Chapter 9 Injecting Code

Chapter 10 Exploiting Path Traversal

Chapter 11 Attacking Application Logic

Chapter 12 Attacking Other Users

Chapter 13 Automating Bespoke Attacks

Chapter 14 Exploiting Information Disclosure

Chapter 15 Attacking Compiled Applications

Chapter 16 Attacking Application Architecture

Chapter 17 Attacking the Web Server

Chapter 18 Finding Vulnerabilities in Source Code

Chapter 19 A Web Application Hacker’s Toolkit

Chapter 20 A Web Application Hacker’s Methodology

Training Guide: Installing and Configuring Windows Server 2012 R2

فهرست مطالب کتاب Training Guide: Installing and Configuring Windows Server 2012 R2:

Introduction

CHAPTER 1 Preparing for Windows Server 2012 R2

CHAPTER 2 Deploying servers

CHAPTER 3 Server remote management

CHAPTER 4 Deploying domain controllers

CHAPTER 5 Active Directory administration

CHAPTER 6 Network administration

CHAPTER 7 Hyper-V virtualization

CHAPTER 8 File services and storage

CHAPTER 9 Print and document services

CHAPTER 10 Implementing Group Policy

CHAPTER 11 Configuring Windows Firewall and IPsec

Index

Ubuntu Linux Unleashed 2021 Edition

فهرست مطالب کتاب Ubuntu Linux Unleashed 2021 Edition:

Part I Getting Started

Part II Desktop Ubuntu

Part III System Administration

Part IV Ubuntu as a Server

Part V Programming Linux

Part VI Bonus Online Chapters

Ultimate VMware NSX for Professionals

فهرست مطالب کتاب Ultimate VMware NSX for Professionals:

Introduction to NSX Datacenter

Deploying NSX Infrastructure

Logical Switching

Logical Routing – NSX Edge Nodes

Logical Routing – NSX Gateways

Logical Routing – VRF and EVPN

Logical Bridging

Security – Micro‑Segmentation

Security – Advanced Threat Prevention

Security – Network Detection and Response

NSX Datacenter Services – 4

NSX Datacenter Services – 5

NSX Multisite Deployment

Monitoring and Managing NSX

Unauthorised Access: Physical Penetration Testing for IT Security Teams

فهرست مطالب کتاب Unauthorised Access: Physical Penetration Testing for IT Security Teams:

Preface

Acknowledgements

Foreword

1 The Basics of Physical Penetration Testing

2 Planning Your Physical Penetration Tests 11

3 Executing Tests 29

4 An Introduction to Social Engineering

5 Lock Picking 67

6 Information Gathering 89

7 Hacking Wireless Equipment 121

8 Gathering the Right Equipment 155

9 Tales from the Front Line 177

10 Introducing Security Policy Concepts 207

11 Counter Intelligence 229

Appendix A: UK Law 249

Appendix B: US Law 255

Appendix C: EU Law 261

Appendix D: Security Clearances 265

Appendix E: Security Accreditations 271

Index

UX for Lean Startups: Faster, Smarter User Experience Research and Design

فهرست مطالب کتاب UX for Lean Startups:

Foreword

Preface

Introduction

Part One: Validation

Chapter 1 – Early Validation

Chapter 2 – The Right Sort of Research at the Right Time

Chapter 3 – Faster User Research

Chapter 4 – Qualitative Research Is Great…Except When It’s Terrible

Part Two: Design

Chapter 5 – Designing for Validation

Chapter 6 – Just Enough Design

Chapter 7 – Design Hacks

Chapter 8 – Diagrams, Sketches, Wireframes, and Prototypes

Chapter 9 – An MVP Is Both M & V

Chapter 10 – The Right Amount of Visual Design

Part Three: Product

Chapter 11 – Measure It!

Chapter 12 – Go Faster!

Chapter 13 – The Big Finish

Index

VBA Notes For Professionals

فهرست مطالب کتاب VBA Notes For Professionals:

Getting started with VBA

Comments

String Literals – Escaping, non-printable characters and line-continuations

VBA Option Keyword

Declaring Variables

Declaring and assigning strings

Concatenating strings

Frequently used string manipulation

Substrings

Searching within strings for the presence of substrings

Assigning strings with repeated characters

Measuring the length of strings

Converting other types to strings

Date Time Manipulation

Data Types and Limits

Naming Conventions

Data Structures

Arrays

Copying, returning and passing arrays

Collections

Operators

Sorting

Flow control structures

Passing Arguments ByRef or ByVal

FileSystemObject

Working With Files and Directories Without Using FileSystemObject

Reading 2GB+ files in binary in VBA and File Hashes

Creating a procedure

Procedure Calls

Conditional Compilation

Object-Oriented VBA

Creating a Custom Class

Interfaces

Recursion

Events

Dictionary object

Working with ADO

Attributes

User Forms

CreateObject vs. GetObject

Non-Latin Characters

API Calls

Automation or Using other applications Libraries

Macro security and signing of VBA-projects/-modules

VBA Run-Time Errors

Error Handling

VCP-DCV for vSphere 8.x Official Cert Guide

فهرست مطالب:

Introduction

PART I: VSPHERE ARCHITECTURE, INTEGRATION, AND

PART II: VSPHERE INSTALLATION/CONFIGURATION

PART III: VSPHERE MANAGEMENT AND OPTIMIZATION

APPENDIX