Bash Notes For Professionals
فهرست مطالب Bash Notes for Professionals:
Getting started with Bash
Script shebang
Navigating directories
Listing Files
Using cat
Grep
Aliasing
Jobs and Processes
Redirection
Control Structures
true, false and : commands
Arrays
Associative arrays
Functions
Bash Parameter Expansion
Copying (cp)
Find
Using sort
Sourcing
Here documents and here strings
Quoting
Conditional Expressions
Scripting with Parameters
Bash history substitutions
Math
Bash Arithmetic
Scoping
Process substitution
Programmable completion
Customizing PS1
Brace Expansion
getopts : smart positional-parameter parsing
Debugging
Pattern matching and regular expressions
Change shell
Internal variables
Job Control
Case statement
Read a file (data stream, variable) line-by-line (and/or field-by-field)?
File execution sequence
Splitting Files
File Transfer using scp
Pipelines
Managing PATH environment variable
Word splitting
Avoiding date using printf
Using “trap” to react to signals and system events
Chain of commands and operations
Type of Shells
Color script output (cross-platform)
co-processes
Typing variables
Jobs at specific times
Handling the system prompt
The cut command
Bash on Windows 10
Cut Command
global and local variables
CGI Scripts
Select keyword
When to use eval
Networking With Bash
Parallel
Decoding URL
Design Patterns
Pitfalls
Keyboard shortcuts
Beautiful Code: Leading Programmers Explain How They Think
فهرست مطالب کتاب Beautiful Code:
A Regular Expression Matcher
Subversion’s Delta Editor: Interface as Ontology
The Most Beautiful Code I Never Wrote
Finding Things
Correct, Beautiful, Fast (In That Order): Lessons from Designing XML Verifiers
Framework for Integrated Test: Beauty Through Fragility
Beautiful Tests
On-the-Fly Code Generation for Image Processing
Top Down Operator Precedence
The Quest for an Accelerated Population Count
Secure Communication: The Technology of Freedom
Growing Beautiful Code in BioPerl
The Design of the Gene Sorter
How Elegant Code Evolves with Hardware: The Case of Gaussian Elimination
The Long-Term Benefits of Beautiful Design
The Linux Kernel Driver Model: The Benefits of Working Together
Another Level of Indirection
Python’s Dictionary Implementation: Being All Things to All People
Multidimensional Iterators in NumPy
A Highly Reliable Enterprise System for NASA’s Mars Rover Mission
ERP5: Designing for Maximum Adaptability
A Spoonful of Sewage
Distributed Programming with MapReduce
Beautiful Concurrency
Syntactic Abstraction: The Syntax-Case Expander
Labor-Saving Architecture: An Object-Oriented Framework for Networked Software
Integrating Business Partners the RESTful Way
Beautiful Debugging
Treating Code as an Essay
When a Button Is All That Connects You to the World
Emacspeak: The Complete Audio Desktop
Code in Motion
Writing Programs for “The Book”
Beginning DAX with Power BI: The SQL Pro’s Guide to Better Business Intelligence
فهرست مطالب:
About the Author
About the Technical Reviewer
Foreword
Acknowledgments
CHAPTER 1 Introduction to DAX
CHAPTER 2 Variables
CHAPTER 3 Context
CHAPTER 4 Summarizing and Aggregating
CHAPTER 5 Joins
CHAPTER 6 Filtering
CHAPTER 8 Debugging and Optimizing
CHAPTER 9 Practical DAX
Index
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
فهرست مطالب:
About the Author
About the Technical Reviewer
Acknowledgments
Introduction
Chapter 1: Security Trends
Chapter 2: Setting Up a Penetration Testing and Network Security Lab
Chapter 3: Elementary Linux Commands
Chapter 4: Know Your Network
Chapter 5: How to Build a Kali Web Server
Chapter 6: Kali Linux from the Inside Out
Chapter 7: Kali Linux and Python
Chapter 8: Information Gathering
Chapter 9: SQL Mapping
Chapter 10: Vulnerability Analysis
Chapter 11: Information Assurance Model
Chapter 12: Introducing Metasploit in Kali Linux
Chapter 13: Hashes and Passwords
Chapter 14: Classic and Modern Encryption
Chapter 15: Exploiting Targets
Index
Beginning Python: From Novice to Professional – Third Edition
فهرست مطالب:
About the Author
About the Technical Reviewer
Preface
Introduction
Chapter 1: Instant Hacking: The Basics
Chapter 2: Lists and Tuples
Chapter 3: Working with Strings
Chapter 4: Dictionaries: When Indices Won’t Do
Chapter 5: Conditionals, Loops, and Some Other Statements
Chapter 6: Abstraction
Chapter 7: More Abstraction
Chapter 8: Exceptions
Chapter 9: Magic Methods, Properties, and Iterators
Chapter 10: Batteries Included
Chapter 11: Files and Stuff
Chapter 12: Graphical User Interfaces
Chapter 13: Database Support
Chapter 14: Network Programming
Chapter 15: Python and the Web
Chapter 16: Testing, 1-2-3
Chapter 17: Extending Python
Chapter 18: Packaging Your Programs
Chapter 19: Playful Programming
Chapter 20: Project 1: Instant Markup
Chapter 21: Project 2: Painting a Pretty Picture
Chapter 22: Project 3: XML for All Occasions
Chapter 23: Project 4: In the News
Chapter 24: Project 5: A Virtual Tea Party
Chapter 25: Project 6: Remote Editing with CGI
Chapter 26: Project 7: Your Own Bulletin Board
Chapter 27: Project 8: File Sharing with XML-RPC
Chapter 28: Project 9: File Sharing II—Now with GUI!
Chapter 29: Project 10: Do-It-Yourself Arcade Game
Appendix A: The Short Version
Appendix B: Python Reference
Index
Black Hat Bash: Bash Scripting for Hackers and Pentesters
فهرست مطالب:
Chapter 1: Bash Basics
Chapter 2: Advanced Bash Concepts
Chapter 3: Setting Up a Hacking Lab
Chapter 4: Reconnaissance
Chapter 5: Vulnerability Scanning and Fuzzing
Chapter 6: Gaining a Web Shell
Chapter 7: Reverse Shells
Chapter 8: Local Information Gathering
Chapter 9: Privilege Escalation
Chapter 10: Persistence
Chapter 11: Network Probing and Lateral Movement
Chapter 12: Defense Evasion
Chapter 13: Exfiltration and Counter-Forensics
Bluetooth Security
فهرست مطالب کتاب Bluetooth Security:
Preface
Part I: Bluetooth Security Basics
1 Introduction
2 Overview of the Bluetooth Security Architecture
3 Bluetooth Pairing and Key Management
4 Algorithms
5 Broadcast Encryption
6 Security Policies and Access Control
7 Attacks, Strengths, and Weaknesses
Part II: Bluetooth Security Enhancements
8 Providing Anonymity
9 Key Management Extensions
10 Security for Bluetooth Applications
References
Glossary
List of Acronyms and Abbreviations
About the Authors
Index
Bug Bounty Hunting Essentials
فهرست مطالب:
Preface
Chapter 1: Basics of Bug Bounty Hunting
Chapter 2: How to Write a Bug Bounty Report
Chapter 3: SQL Injection Vulnerabilities
Chapter 4: Cross-Site Request Forgery
Chapter 5: Application Logic Vulnerabilities
Chapter 6: Cross-Site Scripting Attacks
Chapter 7: SQL Injection
Chapter 8: Open Redirect Vulnerabilities
Chapter 9: Sub-Domain Takeovers
Chapter 10: XML External Entity Vulnerability
Chapter 11: Template Injection
Chapter 12: Top Bug Bounty Hunting Tools
Chapter 13: Top Learning Resources
Other Books You May Enjoy
Index
Building Data Centers with VXLAN BGP EVPN
فهرست مطالب:
Introduction
Chapter 1 Introduction to Programmable Fabric
Chapter 2 VXLAN BGP EVPN Basics
Chapter 3 VXLAN/EVPN Forwarding Characteristics
Chapter 4 The Underlay
Chapter 5 Multitenancy
Chapter 6 Unicast Forwarding
Chapter 7 Multicast Forwarding
Chapter 8 External Connectivity
Chapter 9 Multi-pod, Multifabric, and Data Center Interconnect (DCI)
Chapter 10 Layer 4–7 Services Integration
Chapter 11 Introduction to Fabric Management
Appendix A VXLAN BGP EVPN Implementation Options
Index
Building Microservices: Designing Fine-Grained Systems
فهرست مطالب کتاب Building Microservices:
Preface
1. Microservices
2. The Evolutionary Architect
3. How to Model Services
4. Integration
5. Splitting the Monolith
6. Deployment
7. Testing
8. Monitoring
9. Security
10. Conway’s Law and System Design
11. Microservices at Scale
12. Bringing It All Together
Index
Burp Suite Cookbook: Web Application Security Made Easy with Burp Suite – Second Edition
فهرست مطالب:
Preface
Getting Started with Burp Suite
Getting to Know the Burp Suite of Tools
Configuring, Crawling, Auditing, and Reporting with Burp
Assessing Authentication Schemes
Assessing Authorization Checks
Assessing Session Management Mechanisms
Assessing Business Logic
Evaluating Input Validation Checks
Attacking the Client
Working with Burp Suite Macros and Extensions
Implementing Advanced Topic Attacks
Index
C Interfaces and Implementations: Techniques for Creating Reusable Software
فهرست مطالب کتاب C Interfaces and Implementations:
Chapter 1. Introduction
Chapter 2. Interfaces and Implementations
Chapter 3. Atoms
Chapter 4. Exceptions and Assertions
Chapter 5. Memory Management
Chapter 6. More Memory Management
Chapter 7. Lists
Chapter 8. Tables
Chapter 9. Sets
Chapter 10. Dynamic Arrays
Chapter 11. Sequences
Chapter 12. Rings
Chapter 13. Bit Vectors
Chapter 14. Formatting
Chapter 15. Low-Level Strings
Chapter 16. High-Level Strings
Chapter 17. Extended-Precision Arithmetic
Chapter 18. Arbitrary-Precision Arithmetic
Chapter 19. Multiple-Precision Arithmetic
Chapter 20. Threads