Active Directory Administration Cookbook (Second Edition)

فهرست مطالب:

Preface

1 Optimizing Forests, Domains, and Trusts

2 Managing Domain Controllers

3 Managing Active Directory Roles and Features

4 Managing Containers and Organizational Units

5 Managing Active Directory Sites and Troubleshooting Replication

6 Managing Active Directory Users

7 Managing Active Directory Groups

8 Managing Active Directory Computers

9 Managing DNS

10 Getting the Most Out of Group Policy

11 Securing Active Directory

12 Managing Certificates

13 Managing Federation

14 Handling Authentication in a Hybrid World (AD FS, PHS, PTA, and DSSO)

15 Handling Synchronization in a Hybrid World (Azure AD Connect)

16 Hardening Azure AD

Index

Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling

فهرست مطالب کتاب Advanced Microservices:

About the Author

About the Technical Reviewers

Preface

Chapter 1: Introduction

Chapter 2: HTTP API Design

Chapter 3: Deployments

Chapter 4: Service Discovery

Chapter 5: Service State

Chapter 6: Consumers

Chapter 7: Monitoring

Chapter 8: Documentation

Chapter 9: Collaboration

References

Index

Advanced Penetration Testing: Hacking the World’s Most Secure Networks

فهرست مطالب کتاب Advanced Penetration Testing:

Introduction

Coming Full Circle

Advanced Persistent Threat (APT)

Next Generation Technology

“Hackers”

Forget Everything You Think You Know About Penetration Testing

How This Book Is Organized

Chapter 1. Medical Records (In)security

An Introduction to Simulating Advanced Persistent Threat

Background and Mission Briefing

Payload Delivery – Part I: Learning How to Use the VBA Macro

Command and Control – Part I: Basics and Essentials

The Attack

Summary

Exercises

Chapter 2. Stealing Research

Background and Mission Briefing

Payload Delivery – Part II: Using the Java Applet for Payload Delivery

Notes on Payload Persistence

Command and Control – Part II: Advanced Attack Management

The Attack

Summary

Exercises

Chapter 3. Twenty-First Century Heist

What Might Work?

Nothing Is Secure

Organizational Politics

APT Modeling Versus Traditional Penetration Testing

Background and Mission Briefing

Command and Control – Part III: Advanced Channels and Data

Exfiltration

Payload Delivery – Part III: Physical Media

The Attack

Summary

Exercises

Chapter 4. Pharma Karma

Background and Mission Briefing

Payload Delivery – Part IV: Client-Side Exploits

Command and Control – Part IV: Metasploit Integration

The Attack

Summary

Exercises

Chapter 5. Guns and Ammo

Background and Mission Briefing

Payload Delivery – Part V: Simulating a Ransomware Attack

Command and Control – Part V: Creating a Covert C2 Solution

New Strategies in Stealth and Deployment

The Attack

Summary

Exercises

Chapter 6. Criminal Intelligence

Payload Delivery – Part VI: Deploying with HTA

Privilege Escalation in Microsoft Windows

Command and Control – Part VI: The Creeper Box

The Attack

Summary

Exercises

Chapter 7. War Games

Background and Mission Briefing

Payload Delivery – Part VII: USB Shotgun Attack

Command and Control – Part VII: Advanced Autonomous Data

Exfiltration

The Attack

Summary

Exercises

Chapter 8. Hack Journalists

Briefing

Advanced Concepts in Social Engineering

Command and Control – Part VIII: Experimental Concepts

Payload Delivery – Part VIII: Miscellaneous Rich Web Content

The Attack

Summary

Exercises

Chapter 9. Northern Exposure

Overview

Operating Systems

North Korean Public IP Space

The North Korean Telephone System

Approved Mobile Devices

The “Walled Garden”: The Kwangmyong Intranet

Audio and Video Eavesdropping

Summary

Exercises

End User License Agreement

Advanced Programming in the UNIX Environment

فهرست مطالب کتاب Advanced Programming in the UNIX Environment:

Chapter 1. UNIX System Overview

Chapter 2. UNIX Standardization and Implementations

Chapter 3. File I/O

Chapter 4. Files and Directories

Chapter 5. Standard I/O Library

Chapter 6. System Data Files and Information

Chapter 7. Process Environment

Chapter 8. Process Control

Chapter 9. Process Relationships

Chapter 10. Signals

Chapter 11. Threads

Chapter 12. Thread Control

Chapter 13. Daemon Processes

Chapter 14. Advanced I/O

Chapter 15. Interprocess Communication

Chapter 16. Network IPC: Sockets

Chapter 17. Advanced IPC

Chapter 18. Terminal I/O

Chapter 19. Pseudo Terminals

Chapter 20. A Database Library

Chapter 21. Communicating with a Network Printer

Agile Estimating and Planning

فهرست مطالب کتاب Agile Estimating and Planning:

Part I: The Problem and The Goal

Part II: Estimating Size

Part III: Planning For Value

Part IV: Scheduling

Part V: Tracking and Communicating

Part VI: Why Agile Planning Works

Part VII: A Case Study

Algorithms Notes For Professionals

فهرست مطالب کتاب Algorithms Notes for Professionals:

Getting started with algorithms

Algorithm Complexity

Big-O Notation

Trees

Binary Search Trees

Check if a tree is BST or not

Binary Tree traversals

Lowest common ancestor of a Binary Tree

Graph

Graph Traversals

Dijkstra’s Algorithm

A* Pathfinding

A* Pathfinding Algorithm

Dynamic Programming

Applications of Dynamic Programming

Kruskal’s Algorithm

Greedy Algorithms

Applications of Greedy technique

Prim’s Algorithm

Bellman–Ford Algorithm

Line Algorithm

Floyd-Warshall Algorithm

Catalan Number Algorithm

Multithreaded Algorithms

Knuth Morris Pratt (KMP) Algorithm

Edit Distance Dynamic Algorithm

Online algorithms

Sorting

Bubble Sort

Merge Sort

Insertion Sort

Bucket Sort

Quicksort

Counting Sort

Heap Sort

Cycle Sort

Odd-Even Sort

Selection Sort

Searching

Substring Search

Breadth-First Search

Depth First Search

Hash Functions

Travelling Salesman

Knapsack Problem

Equation Solving

Longest Common Subsequence

Longest Increasing Subsequence

Check two strings are anagrams

Pascal’s Triangle

Algo:- Print a m*n matrix in square wise

Matrix Exponentiation

polynomial-time bounded algorithm for Minimum Vertex Cover

Dynamic Time Warping

Fast Fourier Transform

Pseudocode

AlmaLinux 9 Essentials

فهرست مطالب:

Introduction

A Brief History of AlmaLinux

Installing AlmaLinux 9 on a Clean Disk Drive

Dual Booting AlmaLinux 9 with Windows

Allocating Windows Disk Partitions to AlmaLinux 9

A Guided Tour of the GNOME 40 Desktop

An Overview of the Cockpit Web Interface

Using the Bash Shell on AlmaLinux 9

Managing AlmaLinux 9 Users and Groups

AlmaLinux 9 Software Installation and AppStreams

Managing AlmaLinux 9 systemd Units

AlmaLinux 9 Network Management

AlmaLinux 9 Firewall Basics

AlmaLinux 9 Firewall Configuration with firewalld

Configuring SSH Key-based Authentication on AlmaLinux 9

AlmaLinux 9 Remote Desktop Access with VNC

Displaying AlmaLinux 9 Applications Remotely (X11 Forwarding)

Using NFS on AlmaLinux 9 to Share Files with Remote Systems

Sharing Files between AlmaLinux 9 and Windows with Samba

An Overview of Virtualization Techniques

Installing KVM Virtualization on Creating KVM Virtual Machines on AlmaLinux 9 using Cockpit AlmaLinux 9

Creating KVM Virtual Machines on AlmaLinux 9 using virt-manager

Creating KVM Virtual Machines with virt-install and virsh

Creating an AlmaLinux 9 KVM Networked Bridge Interface

Managing KVM using the virsh Command-Line Tool

An Introduction to Linux Containers

Working with Containers on AlmaLinux 9

Setting Up an AlmaLinux 9 Web Server

Configuring an AlmaLinux 9 Postfix Email Server

Adding a New Disk Drive to an AlmaLinux 9 System

Adding a New Disk to an AlmaLinux 9 Volume Group and Logical Volume

Adding and Managing AlmaLinux 9 Swap Space

AlmaLinux 9 System and Process Monitoring

Index

An Introduction to Computer Security: The NIST Handbook

فهرست مطالب کتاب An Introduction to Computer Security: The NIST Handbook:

INTRODUCTION AND OVERVIEW

Chapter 1: INTRODUCTION

Chapter 2: ELEMENTS OF COMPUTER SECURITY

Chapter 3: ROLES AND RESPONSIBILITIES

Chapter 4: COMMON THREATS: A BRIEF OVERVIEW

MANAGEMENT CONTROLS

Chapter 5: COMPUTER SECURITY POLICY

Chapter 6: COMPUTER SECURITY PROGRAM MANAGEMENT

Chapter 7: COMPUTER SECURITY RISK MANAGEMENT

Chapter 8: SECURITY AND PLANNING IN THE COMPUTER SYSTEM LIFE CYCLE

Chapter 9: ASSURANCE

OPERATIONAL CONTROLS

Chapter 10: PERSONNEL / USER ISSUES

Chapter 11: PREPARING FOR CONTINGENCIES AND DISASTERS

Chapter 12: COMPUTER SECURITY INCIDENT HANDLING

Chapter 13: AWARENESS, TRAINING, AND EDUCATION

Chapter 14: SECURITY CONSIDERATIONS IN COMPUTER SUPPORT AND OPERATIONS

Chapter 15: PHYSICAL AND ENVIRONMENTAL SECURITY

TECHNICAL CONTROLS

Chapter 16: IDENTIFICATION AND AUTHENTICATION

Chapter 17: LOGICAL ACCESS CONTROL

Chapter 18: AUDIT TRAILS

Chapter 19: CRYPTOGRAPHY

EXAMPLE

Chapter 20: ASSESSING AND MITIGATING THE RISKS TO A HYPOTHETICAL COMPUTER SYSTEM

Android Notes For Professionals

فهرست مطالب  کتاب Android Notes For Professionals:

Getting started with Android

Android Studio

Instant Run in Android Studio

TextView

AutoCompleteTextView

Autosizing TextViews

ListView

Layouts

ConstraintLayout

TextInputLayout

CoordinatorLayout and Behaviors

TabLayout

ViewPager

CardView

NavigationView

RecyclerView

RecyclerView Decorations

RecyclerView onClickListeners

RecyclerView and LayoutManagers

Pagination in RecyclerView

ImageView

VideoView

Optimized VideoView

WebView

SearchView

BottomNavigationView

Canvas drawing using SurfaceView

Creating Custom Views

Getting Calculated View Dimensions

Adding a FuseView to an Android Project

Supporting Screens With Different Resolutions, Sizes

ViewFlipper

Design Patterns

Activity

Activity Recognition

Split Screen / Multi-Screen Activities

Material Design

Resources

Data Binding Library

SharedPreferences

Intent

Fragments

Button

Emulator

Service

The Manifest File

Gradle for Android

FileIO with Android

FileProvider

Storing Files in Internal & External Storage

Zip file in android

Unzip File in Android

Camera and Gallery

Camera 2 API

Fingerprint API in android

Bluetooth and Bluetooth LE API

Runtime Permissions in API-23 +

Android Places API

Android NDK

DayNight Theme (AppCompat v23.2 / API 14+)

Glide

Dialog

Enhancing Alert Dialogs

Animated AlertDialog Box

GreenDAO

Tools Attributes

Formatting Strings

SpannableString

Notifications

AlarmManager

Handler

BroadcastReceiver

UI Lifecycle

HttpURLConnection

Callback URL

Snackbar

Widgets

Toast

Create Singleton Class for Toast Message

Interfaces

Animators

Location

Theme, Style, Attribute

MediaPlayer

Android Sound and Media

MediaSession

MediaStore

Multidex and the Dex Method Limit

Data Synchronization with Sync Adapter

PorterDuff Mode

Menu

Picasso

RoboGuice

ACRA

Parcelable

Retrofit2

ButterKnife

Volley

Date and Time Pickers

Localized Date/Time in Android

Time Utils

In-app Billing

FloatingActionButton

Touch Events

Handling touch and motion events

Detect Shake Event in Android

Hardware Button Events/Intents (PTT, LWP, etc.)

GreenRobot EventBus

Otto Event Bus

Vibration

ContentProvider

Dagger 2

Realm

Android Versions

Wi-Fi Connections

SensorManager

ProgressBar

Custom Fonts

Getting system font names and using the fonts

Text to Speech(TTS)

Spinner

Data Encryption/Decryption

OkHttp

Handling Deep Links

Crash Reporting Tools

Check Internet Connectivity

Creating your own libraries for Android applications

Device Display Metrics

Building Backwards Compatible Apps

Loader

ProGuard – Obfuscating and Shrinking your code

Typedef Annotations: @IntDef, @StringDef

Capturing Screenshots

MVP Architecture

Orientation Changes

Xposed

PackageManager

Gesture Detection

Doze Mode

Colors

Keyboard

RenderScript

Fresco

Swipe to Refresh

Creating Splash screen

IntentService

Implicit Intents

Publish to Play Store

Universal Image Loader

Image Compression

9-Patch Images

Email Validation

Bottom Sheets

EditText

Speech to Text Conversion

Installing apps with ADB

Count Down Timer

Barcode and QR code reading

Android PayPal Gateway Integration

Drawables

TransitionDrawable

Vector Drawables

VectorDrawable and AnimatedVectorDrawable

Port Mapping using Cling library in Android

Creating Overlay (always-on-top) Windows

ExoPlayer

XMPP register login and chat simple example

Android Authenticator

AudioManager

AudioTrack

Job Scheduling

Accounts and AccountManager

Integrate OpenCV into Android Studio

MVVM (Architecture)

ORMLite in android

Retrofit2 with RxJava

ShortcutManager

LruCache

Jenkins CI setup for Android Projects

fastlane

Define step value (increment) for custom RangeSeekBar

Getting started with OpenGL ES 2.0+

Check Data Connection

Java on Android

Android Java Native Interface (JNI)

Notification Channel Android O

Robolectric

Moshi

Strict Mode Policy : A tool to catch the bug in the Compile Time.

Internationalization and localization (I18N and L10N)

Fast way to setup Retrolambda on an android project.

How to use SparseArray

Shared Element Transitions

Android Things

Library Dagger 2: Dependency Injection in Applications

JCodec

Formatting phone numbers with pattern.

Paint

What is ProGuard? What is use in Android?

Create Android Custom ROMs

Genymotion for android

ConstraintSet

CleverTap

Publish a library to Maven Repositories

adb shell

Ping ICMP

AIDL

Android game development

Android programming with Kotlin

Android-x86 in VirtualBox

Leakcanary

Okio

Bluetooth Low Energy

Looper

Annotation Processor

SyncAdapter with periodically do sync of data

Fastjson

JSON in Android with org.json

Gson

Android Architecture Components

Jackson

Smartcard

Security

How to store passwords securely

Secure SharedPreferences

Secure SharedPreferences

SQLite

Accessing SQLite databases using the ContentValues class

Firebase

Firebase Cloud Messaging

Firebase Realtime DataBase

Firebase App Indexing

Firebase Crash Reporting

Twitter APIs

Youtube-API

Integrate Google Sign In

Google signin integration on android

Google Awareness APIs

Google Maps API v2 for Android

Google Drive API

Displaying Google Ads

AdMob

Google Play Store

Sign your Android App for Release

TensorFlow

Android Vk Sdk

Project SDK versions

Facebook SDK for Android

Thread

AsyncTask

Testing UI with Espresso

Writing UI tests – Android

Unit testing in Android with JUnit

Inter-app UI testing with UIAutomator

Lint Warnings

Performance Optimization

Android Kernel Optimization

Memory Leaks

Enhancing Android Performance Using Icon Fonts

Bitmap Cache

Loading Bitmaps Effectively

Exceptions

Logging and using Logcat

ADB (Android Debug Bridge)

Localization with resources in Android

Convert vietnamese string to english string Android

AngularJS Notes for Professionals

فهرست مطالب کتاب AngularJS Notes for Professionals:

Getting started with AngularJS

Modules

Components

Built-in directives

Use of in-built directives

Custom Directives

How data binding works

Angular Project – Directory Structure

Filters

Custom filters

Constants

Custom filters with ES6

Directives using ngModelController

Controllers

Controllers with ES6

The Self Or This Variable In A Controller

Services

Distinguishing Service vs Factory

Angular promises with $q service

Dependency Injection

Events

Sharing Data

Form Validation

Routing using ngRoute

ng-class directive

ng-repeat

ng-style

ng-view

AngularJS bindings options (`=`, `@`, `&` etc.)

Providers

Decorators

Print

ui-router

Built-in helper Functions

digest loop walkthrough

Angular $scopes

Using AngularJS with TypeScript

$http request

Prepare for Production – Grunt

Grunt tasks

Lazy loading

HTTP Interceptor

Session storage

Angular MVC

SignalR with AngularJS

Migration to Angular 2+

AngularJS with data filter, pagination etc

Profiling and Performance

Performance Profiling

Debugging

Unit tests

AngularJS gotchas and traps

Attacking and Exploiting Modern Web Applications

فهرست مطالب Attacking and Exploiting Modern Web Applications:

Part 1: Attack Preparation

1 Mindset and Methodologies 3

2 Toolset for Web Attacks and Exploitation 25

Part 2: Evergreen Attacks

3 Attacking the Authentication Layer – a SAML Use Case 63

4 Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress 103

5 Attacking IoT Devices – Command Injection and Path Traversal 141

Part 3: Novel Attacks

6 Attacking Electron JavaScript Applications – from Cross-Site Scripting (XSS) to Remote Command Execution (RCE) 201

7 Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic 247

8 Continuing the Journey of Vulnerability Discovery 297

Attacking and Exploiting Modern Web Applications: Discover the Mindset, Techniques, and Tools to Perform Modern Web Attacks and Exploitation

فهرست مطالب:

Part 1: Attack Preparation

Mindset and Methodologies

Toolset for Web Attacks and Exploitation

Part 2: Evergreen Attacks

Attacking the Authentication Layer – a SAML Use Case

Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress

Attacking IoT Devices – Command Injection and Path Traversal

Part 3: Novel Attacks

Attacking Electron JavaScript Applications – from CrossSite Scripting (XSS) to Remote Command Execution (RCE)

Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic

Continuing the Journey of Vulnerability Discovery

Index