Android Notes For Professionals
فهرست مطالب کتاب Android Notes For Professionals:
Getting started with Android
Android Studio
Instant Run in Android Studio
TextView
AutoCompleteTextView
Autosizing TextViews
ListView
Layouts
ConstraintLayout
TextInputLayout
CoordinatorLayout and Behaviors
TabLayout
ViewPager
CardView
NavigationView
RecyclerView
RecyclerView Decorations
RecyclerView onClickListeners
RecyclerView and LayoutManagers
Pagination in RecyclerView
ImageView
VideoView
Optimized VideoView
WebView
SearchView
BottomNavigationView
Canvas drawing using SurfaceView
Creating Custom Views
Getting Calculated View Dimensions
Adding a FuseView to an Android Project
Supporting Screens With Different Resolutions, Sizes
ViewFlipper
Design Patterns
Activity
Activity Recognition
Split Screen / Multi-Screen Activities
Material Design
Resources
Data Binding Library
SharedPreferences
Intent
Fragments
Button
Emulator
Service
The Manifest File
Gradle for Android
FileIO with Android
FileProvider
Storing Files in Internal & External Storage
Zip file in android
Unzip File in Android
Camera and Gallery
Camera 2 API
Fingerprint API in android
Bluetooth and Bluetooth LE API
Runtime Permissions in API-23 +
Android Places API
Android NDK
DayNight Theme (AppCompat v23.2 / API 14+)
Glide
Dialog
Enhancing Alert Dialogs
Animated AlertDialog Box
GreenDAO
Tools Attributes
Formatting Strings
SpannableString
Notifications
AlarmManager
Handler
BroadcastReceiver
UI Lifecycle
HttpURLConnection
Callback URL
Snackbar
Widgets
Toast
Create Singleton Class for Toast Message
Interfaces
Animators
Location
Theme, Style, Attribute
MediaPlayer
Android Sound and Media
MediaSession
MediaStore
Multidex and the Dex Method Limit
Data Synchronization with Sync Adapter
PorterDuff Mode
Menu
Picasso
RoboGuice
ACRA
Parcelable
Retrofit2
ButterKnife
Volley
Date and Time Pickers
Localized Date/Time in Android
Time Utils
In-app Billing
FloatingActionButton
Touch Events
Handling touch and motion events
Detect Shake Event in Android
Hardware Button Events/Intents (PTT, LWP, etc.)
GreenRobot EventBus
Otto Event Bus
Vibration
ContentProvider
Dagger 2
Realm
Android Versions
Wi-Fi Connections
SensorManager
ProgressBar
Custom Fonts
Getting system font names and using the fonts
Text to Speech(TTS)
Spinner
Data Encryption/Decryption
OkHttp
Handling Deep Links
Crash Reporting Tools
Check Internet Connectivity
Creating your own libraries for Android applications
Device Display Metrics
Building Backwards Compatible Apps
Loader
ProGuard – Obfuscating and Shrinking your code
Typedef Annotations: @IntDef, @StringDef
Capturing Screenshots
MVP Architecture
Orientation Changes
Xposed
PackageManager
Gesture Detection
Doze Mode
Colors
Keyboard
RenderScript
Fresco
Swipe to Refresh
Creating Splash screen
IntentService
Implicit Intents
Publish to Play Store
Universal Image Loader
Image Compression
9-Patch Images
Email Validation
Bottom Sheets
EditText
Speech to Text Conversion
Installing apps with ADB
Count Down Timer
Barcode and QR code reading
Android PayPal Gateway Integration
Drawables
TransitionDrawable
Vector Drawables
VectorDrawable and AnimatedVectorDrawable
Port Mapping using Cling library in Android
Creating Overlay (always-on-top) Windows
ExoPlayer
XMPP register login and chat simple example
Android Authenticator
AudioManager
AudioTrack
Job Scheduling
Accounts and AccountManager
Integrate OpenCV into Android Studio
MVVM (Architecture)
ORMLite in android
Retrofit2 with RxJava
ShortcutManager
LruCache
Jenkins CI setup for Android Projects
fastlane
Define step value (increment) for custom RangeSeekBar
Getting started with OpenGL ES 2.0+
Check Data Connection
Java on Android
Android Java Native Interface (JNI)
Notification Channel Android O
Robolectric
Moshi
Strict Mode Policy : A tool to catch the bug in the Compile Time.
Internationalization and localization (I18N and L10N)
Fast way to setup Retrolambda on an android project.
How to use SparseArray
Shared Element Transitions
Android Things
Library Dagger 2: Dependency Injection in Applications
JCodec
Formatting phone numbers with pattern.
Paint
What is ProGuard? What is use in Android?
Create Android Custom ROMs
Genymotion for android
ConstraintSet
CleverTap
Publish a library to Maven Repositories
adb shell
Ping ICMP
AIDL
Android game development
Android programming with Kotlin
Android-x86 in VirtualBox
Leakcanary
Okio
Bluetooth Low Energy
Looper
Annotation Processor
SyncAdapter with periodically do sync of data
Fastjson
JSON in Android with org.json
Gson
Android Architecture Components
Jackson
Smartcard
Security
How to store passwords securely
Secure SharedPreferences
Secure SharedPreferences
SQLite
Accessing SQLite databases using the ContentValues class
Firebase
Firebase Cloud Messaging
Firebase Realtime DataBase
Firebase App Indexing
Firebase Crash Reporting
Twitter APIs
Youtube-API
Integrate Google Sign In
Google signin integration on android
Google Awareness APIs
Google Maps API v2 for Android
Google Drive API
Displaying Google Ads
AdMob
Google Play Store
Sign your Android App for Release
TensorFlow
Android Vk Sdk
Project SDK versions
Facebook SDK for Android
Thread
AsyncTask
Testing UI with Espresso
Writing UI tests – Android
Unit testing in Android with JUnit
Inter-app UI testing with UIAutomator
Lint Warnings
Performance Optimization
Android Kernel Optimization
Memory Leaks
Enhancing Android Performance Using Icon Fonts
Bitmap Cache
Loading Bitmaps Effectively
Exceptions
Logging and using Logcat
ADB (Android Debug Bridge)
Localization with resources in Android
Convert vietnamese string to english string Android
AngularJS Notes for Professionals
فهرست مطالب کتاب AngularJS Notes for Professionals:
Getting started with AngularJS
Modules
Components
Built-in directives
Use of in-built directives
Custom Directives
How data binding works
Angular Project – Directory Structure
Filters
Custom filters
Constants
Custom filters with ES6
Directives using ngModelController
Controllers
Controllers with ES6
The Self Or This Variable In A Controller
Services
Distinguishing Service vs Factory
Angular promises with $q service
Dependency Injection
Events
Sharing Data
Form Validation
Routing using ngRoute
ng-class directive
ng-repeat
ng-style
ng-view
AngularJS bindings options (`=`, `@`, `&` etc.)
Providers
Decorators
ui-router
Built-in helper Functions
digest loop walkthrough
Angular $scopes
Using AngularJS with TypeScript
$http request
Prepare for Production – Grunt
Grunt tasks
Lazy loading
HTTP Interceptor
Session storage
Angular MVC
SignalR with AngularJS
Migration to Angular 2+
AngularJS with data filter, pagination etc
Profiling and Performance
Performance Profiling
Debugging
Unit tests
AngularJS gotchas and traps
Attacking and Exploiting Modern Web Applications
فهرست مطالب Attacking and Exploiting Modern Web Applications:
Part 1: Attack Preparation
1 Mindset and Methodologies 3
2 Toolset for Web Attacks and Exploitation 25
Part 2: Evergreen Attacks
3 Attacking the Authentication Layer – a SAML Use Case 63
4 Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress 103
5 Attacking IoT Devices – Command Injection and Path Traversal 141
Part 3: Novel Attacks
6 Attacking Electron JavaScript Applications – from Cross-Site Scripting (XSS) to Remote Command Execution (RCE) 201
7 Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic 247
8 Continuing the Journey of Vulnerability Discovery 297
Attacking and Exploiting Modern Web Applications: Discover the Mindset, Techniques, and Tools to Perform Modern Web Attacks and Exploitation
فهرست مطالب:
Part 1: Attack Preparation
Mindset and Methodologies
Toolset for Web Attacks and Exploitation
Part 2: Evergreen Attacks
Attacking the Authentication Layer – a SAML Use Case
Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress
Attacking IoT Devices – Command Injection and Path Traversal
Part 3: Novel Attacks
Attacking Electron JavaScript Applications – from CrossSite Scripting (XSS) to Remote Command Execution (RCE)
Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic
Continuing the Journey of Vulnerability Discovery
Index
Bash Notes For Professionals
فهرست مطالب Bash Notes for Professionals:
Getting started with Bash
Script shebang
Navigating directories
Listing Files
Using cat
Grep
Aliasing
Jobs and Processes
Redirection
Control Structures
true, false and : commands
Arrays
Associative arrays
Functions
Bash Parameter Expansion
Copying (cp)
Find
Using sort
Sourcing
Here documents and here strings
Quoting
Conditional Expressions
Scripting with Parameters
Bash history substitutions
Math
Bash Arithmetic
Scoping
Process substitution
Programmable completion
Customizing PS1
Brace Expansion
getopts : smart positional-parameter parsing
Debugging
Pattern matching and regular expressions
Change shell
Internal variables
Job Control
Case statement
Read a file (data stream, variable) line-by-line (and/or field-by-field)?
File execution sequence
Splitting Files
File Transfer using scp
Pipelines
Managing PATH environment variable
Word splitting
Avoiding date using printf
Using “trap” to react to signals and system events
Chain of commands and operations
Type of Shells
Color script output (cross-platform)
co-processes
Typing variables
Jobs at specific times
Handling the system prompt
The cut command
Bash on Windows 10
Cut Command
global and local variables
CGI Scripts
Select keyword
When to use eval
Networking With Bash
Parallel
Decoding URL
Design Patterns
Pitfalls
Keyboard shortcuts
Beginning DAX with Power BI: The SQL Pro’s Guide to Better Business Intelligence
فهرست مطالب:
About the Author
About the Technical Reviewer
Foreword
Acknowledgments
CHAPTER 1 Introduction to DAX
CHAPTER 2 Variables
CHAPTER 3 Context
CHAPTER 4 Summarizing and Aggregating
CHAPTER 5 Joins
CHAPTER 6 Filtering
CHAPTER 8 Debugging and Optimizing
CHAPTER 9 Practical DAX
Index
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
فهرست مطالب:
About the Author
About the Technical Reviewer
Acknowledgments
Introduction
Chapter 1: Security Trends
Chapter 2: Setting Up a Penetration Testing and Network Security Lab
Chapter 3: Elementary Linux Commands
Chapter 4: Know Your Network
Chapter 5: How to Build a Kali Web Server
Chapter 6: Kali Linux from the Inside Out
Chapter 7: Kali Linux and Python
Chapter 8: Information Gathering
Chapter 9: SQL Mapping
Chapter 10: Vulnerability Analysis
Chapter 11: Information Assurance Model
Chapter 12: Introducing Metasploit in Kali Linux
Chapter 13: Hashes and Passwords
Chapter 14: Classic and Modern Encryption
Chapter 15: Exploiting Targets
Index
Beginning Python: From Novice to Professional – Third Edition
فهرست مطالب:
About the Author
About the Technical Reviewer
Preface
Introduction
Chapter 1: Instant Hacking: The Basics
Chapter 2: Lists and Tuples
Chapter 3: Working with Strings
Chapter 4: Dictionaries: When Indices Won’t Do
Chapter 5: Conditionals, Loops, and Some Other Statements
Chapter 6: Abstraction
Chapter 7: More Abstraction
Chapter 8: Exceptions
Chapter 9: Magic Methods, Properties, and Iterators
Chapter 10: Batteries Included
Chapter 11: Files and Stuff
Chapter 12: Graphical User Interfaces
Chapter 13: Database Support
Chapter 14: Network Programming
Chapter 15: Python and the Web
Chapter 16: Testing, 1-2-3
Chapter 17: Extending Python
Chapter 18: Packaging Your Programs
Chapter 19: Playful Programming
Chapter 20: Project 1: Instant Markup
Chapter 21: Project 2: Painting a Pretty Picture
Chapter 22: Project 3: XML for All Occasions
Chapter 23: Project 4: In the News
Chapter 24: Project 5: A Virtual Tea Party
Chapter 25: Project 6: Remote Editing with CGI
Chapter 26: Project 7: Your Own Bulletin Board
Chapter 27: Project 8: File Sharing with XML-RPC
Chapter 28: Project 9: File Sharing II—Now with GUI!
Chapter 29: Project 10: Do-It-Yourself Arcade Game
Appendix A: The Short Version
Appendix B: Python Reference
Index
Black Hat Bash: Bash Scripting for Hackers and Pentesters
فهرست مطالب:
Chapter 1: Bash Basics
Chapter 2: Advanced Bash Concepts
Chapter 3: Setting Up a Hacking Lab
Chapter 4: Reconnaissance
Chapter 5: Vulnerability Scanning and Fuzzing
Chapter 6: Gaining a Web Shell
Chapter 7: Reverse Shells
Chapter 8: Local Information Gathering
Chapter 9: Privilege Escalation
Chapter 10: Persistence
Chapter 11: Network Probing and Lateral Movement
Chapter 12: Defense Evasion
Chapter 13: Exfiltration and Counter-Forensics
Bug Bounty Hunting Essentials
فهرست مطالب:
Preface
Chapter 1: Basics of Bug Bounty Hunting
Chapter 2: How to Write a Bug Bounty Report
Chapter 3: SQL Injection Vulnerabilities
Chapter 4: Cross-Site Request Forgery
Chapter 5: Application Logic Vulnerabilities
Chapter 6: Cross-Site Scripting Attacks
Chapter 7: SQL Injection
Chapter 8: Open Redirect Vulnerabilities
Chapter 9: Sub-Domain Takeovers
Chapter 10: XML External Entity Vulnerability
Chapter 11: Template Injection
Chapter 12: Top Bug Bounty Hunting Tools
Chapter 13: Top Learning Resources
Other Books You May Enjoy
Index
Building Data Centers with VXLAN BGP EVPN
فهرست مطالب:
Introduction
Chapter 1 Introduction to Programmable Fabric
Chapter 2 VXLAN BGP EVPN Basics
Chapter 3 VXLAN/EVPN Forwarding Characteristics
Chapter 4 The Underlay
Chapter 5 Multitenancy
Chapter 6 Unicast Forwarding
Chapter 7 Multicast Forwarding
Chapter 8 External Connectivity
Chapter 9 Multi-pod, Multifabric, and Data Center Interconnect (DCI)
Chapter 10 Layer 4–7 Services Integration
Chapter 11 Introduction to Fabric Management
Appendix A VXLAN BGP EVPN Implementation Options
Index
Burp Suite Cookbook: Web Application Security Made Easy with Burp Suite – Second Edition
فهرست مطالب:
Preface
Getting Started with Burp Suite
Getting to Know the Burp Suite of Tools
Configuring, Crawling, Auditing, and Reporting with Burp
Assessing Authentication Schemes
Assessing Authorization Checks
Assessing Session Management Mechanisms
Assessing Business Logic
Evaluating Input Validation Checks
Attacking the Client
Working with Burp Suite Macros and Extensions
Implementing Advanced Topic Attacks
Index