Android Notes For Professionals

فهرست مطالب  کتاب Android Notes For Professionals:

Getting started with Android

Android Studio

Instant Run in Android Studio

TextView

AutoCompleteTextView

Autosizing TextViews

ListView

Layouts

ConstraintLayout

TextInputLayout

CoordinatorLayout and Behaviors

TabLayout

ViewPager

CardView

NavigationView

RecyclerView

RecyclerView Decorations

RecyclerView onClickListeners

RecyclerView and LayoutManagers

Pagination in RecyclerView

ImageView

VideoView

Optimized VideoView

WebView

SearchView

BottomNavigationView

Canvas drawing using SurfaceView

Creating Custom Views

Getting Calculated View Dimensions

Adding a FuseView to an Android Project

Supporting Screens With Different Resolutions, Sizes

ViewFlipper

Design Patterns

Activity

Activity Recognition

Split Screen / Multi-Screen Activities

Material Design

Resources

Data Binding Library

SharedPreferences

Intent

Fragments

Button

Emulator

Service

The Manifest File

Gradle for Android

FileIO with Android

FileProvider

Storing Files in Internal & External Storage

Zip file in android

Unzip File in Android

Camera and Gallery

Camera 2 API

Fingerprint API in android

Bluetooth and Bluetooth LE API

Runtime Permissions in API-23 +

Android Places API

Android NDK

DayNight Theme (AppCompat v23.2 / API 14+)

Glide

Dialog

Enhancing Alert Dialogs

Animated AlertDialog Box

GreenDAO

Tools Attributes

Formatting Strings

SpannableString

Notifications

AlarmManager

Handler

BroadcastReceiver

UI Lifecycle

HttpURLConnection

Callback URL

Snackbar

Widgets

Toast

Create Singleton Class for Toast Message

Interfaces

Animators

Location

Theme, Style, Attribute

MediaPlayer

Android Sound and Media

MediaSession

MediaStore

Multidex and the Dex Method Limit

Data Synchronization with Sync Adapter

PorterDuff Mode

Menu

Picasso

RoboGuice

ACRA

Parcelable

Retrofit2

ButterKnife

Volley

Date and Time Pickers

Localized Date/Time in Android

Time Utils

In-app Billing

FloatingActionButton

Touch Events

Handling touch and motion events

Detect Shake Event in Android

Hardware Button Events/Intents (PTT, LWP, etc.)

GreenRobot EventBus

Otto Event Bus

Vibration

ContentProvider

Dagger 2

Realm

Android Versions

Wi-Fi Connections

SensorManager

ProgressBar

Custom Fonts

Getting system font names and using the fonts

Text to Speech(TTS)

Spinner

Data Encryption/Decryption

OkHttp

Handling Deep Links

Crash Reporting Tools

Check Internet Connectivity

Creating your own libraries for Android applications

Device Display Metrics

Building Backwards Compatible Apps

Loader

ProGuard – Obfuscating and Shrinking your code

Typedef Annotations: @IntDef, @StringDef

Capturing Screenshots

MVP Architecture

Orientation Changes

Xposed

PackageManager

Gesture Detection

Doze Mode

Colors

Keyboard

RenderScript

Fresco

Swipe to Refresh

Creating Splash screen

IntentService

Implicit Intents

Publish to Play Store

Universal Image Loader

Image Compression

9-Patch Images

Email Validation

Bottom Sheets

EditText

Speech to Text Conversion

Installing apps with ADB

Count Down Timer

Barcode and QR code reading

Android PayPal Gateway Integration

Drawables

TransitionDrawable

Vector Drawables

VectorDrawable and AnimatedVectorDrawable

Port Mapping using Cling library in Android

Creating Overlay (always-on-top) Windows

ExoPlayer

XMPP register login and chat simple example

Android Authenticator

AudioManager

AudioTrack

Job Scheduling

Accounts and AccountManager

Integrate OpenCV into Android Studio

MVVM (Architecture)

ORMLite in android

Retrofit2 with RxJava

ShortcutManager

LruCache

Jenkins CI setup for Android Projects

fastlane

Define step value (increment) for custom RangeSeekBar

Getting started with OpenGL ES 2.0+

Check Data Connection

Java on Android

Android Java Native Interface (JNI)

Notification Channel Android O

Robolectric

Moshi

Strict Mode Policy : A tool to catch the bug in the Compile Time.

Internationalization and localization (I18N and L10N)

Fast way to setup Retrolambda on an android project.

How to use SparseArray

Shared Element Transitions

Android Things

Library Dagger 2: Dependency Injection in Applications

JCodec

Formatting phone numbers with pattern.

Paint

What is ProGuard? What is use in Android?

Create Android Custom ROMs

Genymotion for android

ConstraintSet

CleverTap

Publish a library to Maven Repositories

adb shell

Ping ICMP

AIDL

Android game development

Android programming with Kotlin

Android-x86 in VirtualBox

Leakcanary

Okio

Bluetooth Low Energy

Looper

Annotation Processor

SyncAdapter with periodically do sync of data

Fastjson

JSON in Android with org.json

Gson

Android Architecture Components

Jackson

Smartcard

Security

How to store passwords securely

Secure SharedPreferences

Secure SharedPreferences

SQLite

Accessing SQLite databases using the ContentValues class

Firebase

Firebase Cloud Messaging

Firebase Realtime DataBase

Firebase App Indexing

Firebase Crash Reporting

Twitter APIs

Youtube-API

Integrate Google Sign In

Google signin integration on android

Google Awareness APIs

Google Maps API v2 for Android

Google Drive API

Displaying Google Ads

AdMob

Google Play Store

Sign your Android App for Release

TensorFlow

Android Vk Sdk

Project SDK versions

Facebook SDK for Android

Thread

AsyncTask

Testing UI with Espresso

Writing UI tests – Android

Unit testing in Android with JUnit

Inter-app UI testing with UIAutomator

Lint Warnings

Performance Optimization

Android Kernel Optimization

Memory Leaks

Enhancing Android Performance Using Icon Fonts

Bitmap Cache

Loading Bitmaps Effectively

Exceptions

Logging and using Logcat

ADB (Android Debug Bridge)

Localization with resources in Android

Convert vietnamese string to english string Android

AngularJS Notes for Professionals

فهرست مطالب کتاب AngularJS Notes for Professionals:

Getting started with AngularJS

Modules

Components

Built-in directives

Use of in-built directives

Custom Directives

How data binding works

Angular Project – Directory Structure

Filters

Custom filters

Constants

Custom filters with ES6

Directives using ngModelController

Controllers

Controllers with ES6

The Self Or This Variable In A Controller

Services

Distinguishing Service vs Factory

Angular promises with $q service

Dependency Injection

Events

Sharing Data

Form Validation

Routing using ngRoute

ng-class directive

ng-repeat

ng-style

ng-view

AngularJS bindings options (`=`, `@`, `&` etc.)

Providers

Decorators

Print

ui-router

Built-in helper Functions

digest loop walkthrough

Angular $scopes

Using AngularJS with TypeScript

$http request

Prepare for Production – Grunt

Grunt tasks

Lazy loading

HTTP Interceptor

Session storage

Angular MVC

SignalR with AngularJS

Migration to Angular 2+

AngularJS with data filter, pagination etc

Profiling and Performance

Performance Profiling

Debugging

Unit tests

AngularJS gotchas and traps

Attacking and Exploiting Modern Web Applications

فهرست مطالب Attacking and Exploiting Modern Web Applications:

Part 1: Attack Preparation

1 Mindset and Methodologies 3

2 Toolset for Web Attacks and Exploitation 25

Part 2: Evergreen Attacks

3 Attacking the Authentication Layer – a SAML Use Case 63

4 Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress 103

5 Attacking IoT Devices – Command Injection and Path Traversal 141

Part 3: Novel Attacks

6 Attacking Electron JavaScript Applications – from Cross-Site Scripting (XSS) to Remote Command Execution (RCE) 201

7 Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic 247

8 Continuing the Journey of Vulnerability Discovery 297

Attacking and Exploiting Modern Web Applications: Discover the Mindset, Techniques, and Tools to Perform Modern Web Attacks and Exploitation

فهرست مطالب:

Part 1: Attack Preparation

Mindset and Methodologies

Toolset for Web Attacks and Exploitation

Part 2: Evergreen Attacks

Attacking the Authentication Layer – a SAML Use Case

Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress

Attacking IoT Devices – Command Injection and Path Traversal

Part 3: Novel Attacks

Attacking Electron JavaScript Applications – from CrossSite Scripting (XSS) to Remote Command Execution (RCE)

Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic

Continuing the Journey of Vulnerability Discovery

Index

Bash Notes For Professionals

فهرست مطالب Bash Notes for Professionals:

Getting started with Bash

Script shebang

Navigating directories

Listing Files

Using cat

Grep

Aliasing

Jobs and Processes

Redirection

Control Structures

true, false and : commands

Arrays

Associative arrays

Functions

Bash Parameter Expansion

Copying (cp)

Find

Using sort

Sourcing

Here documents and here strings

Quoting

Conditional Expressions

Scripting with Parameters

Bash history substitutions

Math

Bash Arithmetic

Scoping

Process substitution

Programmable completion

Customizing PS1

Brace Expansion

getopts : smart positional-parameter parsing

Debugging

Pattern matching and regular expressions

Change shell

Internal variables

Job Control

Case statement

Read a file (data stream, variable) line-by-line (and/or field-by-field)?

File execution sequence

Splitting Files

File Transfer using scp

Pipelines

Managing PATH environment variable

Word splitting

Avoiding date using printf

Using “trap” to react to signals and system events

Chain of commands and operations

Type of Shells

Color script output (cross-platform)

co-processes

Typing variables

Jobs at specific times

Handling the system prompt

The cut command

Bash on Windows 10

Cut Command

global and local variables

CGI Scripts

Select keyword

When to use eval

Networking With Bash

Parallel

Decoding URL

Design Patterns

Pitfalls

Keyboard shortcuts

Beginning DAX with Power BI: The SQL Pro’s Guide to Better Business Intelligence

فهرست مطالب:

About the Author

About the Technical Reviewer

Foreword

Acknowledgments

CHAPTER 1 Introduction to DAX

CHAPTER 2 Variables

CHAPTER 3 Context

CHAPTER 4 Summarizing and Aggregating

CHAPTER 5 Joins

CHAPTER 6 Filtering

CHAPTER 8 Debugging and Optimizing

CHAPTER 9 Practical DAX

Index

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

فهرست مطالب:

About the Author

About the Technical Reviewer

Acknowledgments

Introduction

Chapter 1: Security Trends

Chapter 2: Setting Up a Penetration Testing and Network Security Lab

Chapter 3: Elementary Linux Commands

Chapter 4: Know Your Network

Chapter 5: How to Build a Kali Web Server

Chapter 6: Kali Linux from the Inside Out

Chapter 7: Kali Linux and Python

Chapter 8: Information Gathering

Chapter 9: SQL Mapping

Chapter 10: Vulnerability Analysis

Chapter 11: Information Assurance Model

Chapter 12: Introducing Metasploit in Kali Linux

Chapter 13: Hashes and Passwords

Chapter 14: Classic and Modern Encryption

Chapter 15: Exploiting Targets

Index

Beginning Python: From Novice to Professional – Third Edition

فهرست مطالب:

About the Author

About the Technical Reviewer

Preface

Introduction

Chapter 1: Instant Hacking: The Basics

Chapter 2: Lists and Tuples

Chapter 3: Working with Strings

Chapter 4: Dictionaries: When Indices Won’t Do

Chapter 5: Conditionals, Loops, and Some Other Statements

Chapter 6: Abstraction

Chapter 7: More Abstraction

Chapter 8: Exceptions

Chapter 9: Magic Methods, Properties, and Iterators

Chapter 10: Batteries Included

Chapter 11: Files and Stuff

Chapter 12: Graphical User Interfaces

Chapter 13: Database Support

Chapter 14: Network Programming

Chapter 15: Python and the Web

Chapter 16: Testing, 1-2-3

Chapter 17: Extending Python

Chapter 18: Packaging Your Programs

Chapter 19: Playful Programming

Chapter 20: Project 1: Instant Markup

Chapter 21: Project 2: Painting a Pretty Picture

Chapter 22: Project 3: XML for All Occasions

Chapter 23: Project 4: In the News

Chapter 24: Project 5: A Virtual Tea Party

Chapter 25: Project 6: Remote Editing with CGI

Chapter 26: Project 7: Your Own Bulletin Board

Chapter 27: Project 8: File Sharing with XML-RPC

Chapter 28: Project 9: File Sharing II—Now with GUI!

Chapter 29: Project 10: Do-It-Yourself Arcade Game

Appendix A: The Short Version

Appendix B: Python Reference

Index

Black Hat Bash: Bash Scripting for Hackers and Pentesters

فهرست مطالب:

Chapter 1: Bash Basics

Chapter 2: Advanced Bash Concepts

Chapter 3: Setting Up a Hacking Lab

Chapter 4: Reconnaissance

Chapter 5: Vulnerability Scanning and Fuzzing

Chapter 6: Gaining a Web Shell

Chapter 7: Reverse Shells

Chapter 8: Local Information Gathering

Chapter 9: Privilege Escalation

Chapter 10: Persistence

Chapter 11: Network Probing and Lateral Movement

Chapter 12: Defense Evasion

Chapter 13: Exfiltration and Counter-Forensics

Bug Bounty Hunting Essentials

فهرست مطالب:

Preface

Chapter 1: Basics of Bug Bounty Hunting

Chapter 2: How to Write a Bug Bounty Report

Chapter 3: SQL Injection Vulnerabilities

Chapter 4: Cross-Site Request Forgery

Chapter 5: Application Logic Vulnerabilities

Chapter 6: Cross-Site Scripting Attacks

Chapter 7: SQL Injection

Chapter 8: Open Redirect Vulnerabilities

Chapter 9: Sub-Domain Takeovers

Chapter 10: XML External Entity Vulnerability

Chapter 11: Template Injection

Chapter 12: Top Bug Bounty Hunting Tools

Chapter 13: Top Learning Resources

Other Books You May Enjoy

Index

Building Data Centers with VXLAN BGP EVPN

فهرست مطالب:

Introduction

Chapter 1 Introduction to Programmable Fabric

Chapter 2 VXLAN BGP EVPN Basics

Chapter 3 VXLAN/EVPN Forwarding Characteristics

Chapter 4 The Underlay

Chapter 5 Multitenancy

Chapter 6 Unicast Forwarding

Chapter 7 Multicast Forwarding

Chapter 8 External Connectivity

Chapter 9 Multi-pod, Multifabric, and Data Center Interconnect (DCI)

Chapter 10 Layer 4–7 Services Integration

Chapter 11 Introduction to Fabric Management

Appendix A VXLAN BGP EVPN Implementation Options

Index

Burp Suite Cookbook: Web Application Security Made Easy with Burp Suite – Second Edition

فهرست مطالب:

Preface

Getting Started with Burp Suite

Getting to Know the Burp Suite of Tools

Configuring, Crawling, Auditing, and Reporting with Burp

Assessing Authentication Schemes

Assessing Authorization Checks

Assessing Session Management Mechanisms

Assessing Business Logic

Evaluating Input Validation Checks

Attacking the Client

Working with Burp Suite Macros and Extensions

Implementing Advanced Topic Attacks

Index