Bash Notes For Professionals

فهرست مطالب Bash Notes for Professionals:

Getting started with Bash

Script shebang

Navigating directories

Listing Files

Using cat

Grep

Aliasing

Jobs and Processes

Redirection

Control Structures

true, false and : commands

Arrays

Associative arrays

Functions

Bash Parameter Expansion

Copying (cp)

Find

Using sort

Sourcing

Here documents and here strings

Quoting

Conditional Expressions

Scripting with Parameters

Bash history substitutions

Math

Bash Arithmetic

Scoping

Process substitution

Programmable completion

Customizing PS1

Brace Expansion

getopts : smart positional-parameter parsing

Debugging

Pattern matching and regular expressions

Change shell

Internal variables

Job Control

Case statement

Read a file (data stream, variable) line-by-line (and/or field-by-field)?

File execution sequence

Splitting Files

File Transfer using scp

Pipelines

Managing PATH environment variable

Word splitting

Avoiding date using printf

Using “trap” to react to signals and system events

Chain of commands and operations

Type of Shells

Color script output (cross-platform)

co-processes

Typing variables

Jobs at specific times

Handling the system prompt

The cut command

Bash on Windows 10

Cut Command

global and local variables

CGI Scripts

Select keyword

When to use eval

Networking With Bash

Parallel

Decoding URL

Design Patterns

Pitfalls

Keyboard shortcuts

Beautiful Code: Leading Programmers Explain How They Think

فهرست مطالب کتاب Beautiful Code:

A Regular Expression Matcher

Subversion’s Delta Editor: Interface as Ontology

The Most Beautiful Code I Never Wrote

Finding Things

Correct, Beautiful, Fast (In That Order): Lessons from Designing XML Verifiers

Framework for Integrated Test: Beauty Through Fragility

Beautiful Tests

On-the-Fly Code Generation for Image Processing

Top Down Operator Precedence

The Quest for an Accelerated Population Count

Secure Communication: The Technology of Freedom

Growing Beautiful Code in BioPerl

The Design of the Gene Sorter

How Elegant Code Evolves with Hardware: The Case of Gaussian Elimination

The Long-Term Benefits of Beautiful Design

The Linux Kernel Driver Model: The Benefits of Working Together

Another Level of Indirection

Python’s Dictionary Implementation: Being All Things to All People

Multidimensional Iterators in NumPy

A Highly Reliable Enterprise System for NASA’s Mars Rover Mission

ERP5: Designing for Maximum Adaptability

A Spoonful of Sewage

Distributed Programming with MapReduce

Beautiful Concurrency

Syntactic Abstraction: The Syntax-Case Expander

Labor-Saving Architecture: An Object-Oriented Framework for Networked Software

Integrating Business Partners the RESTful Way

Beautiful Debugging

Treating Code as an Essay

When a Button Is All That Connects You to the World

Emacspeak: The Complete Audio Desktop

Code in Motion

Writing Programs for “The Book”

Beginning DAX with Power BI: The SQL Pro’s Guide to Better Business Intelligence

فهرست مطالب:

About the Author

About the Technical Reviewer

Foreword

Acknowledgments

CHAPTER 1 Introduction to DAX

CHAPTER 2 Variables

CHAPTER 3 Context

CHAPTER 4 Summarizing and Aggregating

CHAPTER 5 Joins

CHAPTER 6 Filtering

CHAPTER 8 Debugging and Optimizing

CHAPTER 9 Practical DAX

Index

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

فهرست مطالب:

About the Author

About the Technical Reviewer

Acknowledgments

Introduction

Chapter 1: Security Trends

Chapter 2: Setting Up a Penetration Testing and Network Security Lab

Chapter 3: Elementary Linux Commands

Chapter 4: Know Your Network

Chapter 5: How to Build a Kali Web Server

Chapter 6: Kali Linux from the Inside Out

Chapter 7: Kali Linux and Python

Chapter 8: Information Gathering

Chapter 9: SQL Mapping

Chapter 10: Vulnerability Analysis

Chapter 11: Information Assurance Model

Chapter 12: Introducing Metasploit in Kali Linux

Chapter 13: Hashes and Passwords

Chapter 14: Classic and Modern Encryption

Chapter 15: Exploiting Targets

Index

Beginning Python: From Novice to Professional – Third Edition

فهرست مطالب:

About the Author

About the Technical Reviewer

Preface

Introduction

Chapter 1: Instant Hacking: The Basics

Chapter 2: Lists and Tuples

Chapter 3: Working with Strings

Chapter 4: Dictionaries: When Indices Won’t Do

Chapter 5: Conditionals, Loops, and Some Other Statements

Chapter 6: Abstraction

Chapter 7: More Abstraction

Chapter 8: Exceptions

Chapter 9: Magic Methods, Properties, and Iterators

Chapter 10: Batteries Included

Chapter 11: Files and Stuff

Chapter 12: Graphical User Interfaces

Chapter 13: Database Support

Chapter 14: Network Programming

Chapter 15: Python and the Web

Chapter 16: Testing, 1-2-3

Chapter 17: Extending Python

Chapter 18: Packaging Your Programs

Chapter 19: Playful Programming

Chapter 20: Project 1: Instant Markup

Chapter 21: Project 2: Painting a Pretty Picture

Chapter 22: Project 3: XML for All Occasions

Chapter 23: Project 4: In the News

Chapter 24: Project 5: A Virtual Tea Party

Chapter 25: Project 6: Remote Editing with CGI

Chapter 26: Project 7: Your Own Bulletin Board

Chapter 27: Project 8: File Sharing with XML-RPC

Chapter 28: Project 9: File Sharing II—Now with GUI!

Chapter 29: Project 10: Do-It-Yourself Arcade Game

Appendix A: The Short Version

Appendix B: Python Reference

Index

Black Hat Bash: Bash Scripting for Hackers and Pentesters

فهرست مطالب:

Chapter 1: Bash Basics

Chapter 2: Advanced Bash Concepts

Chapter 3: Setting Up a Hacking Lab

Chapter 4: Reconnaissance

Chapter 5: Vulnerability Scanning and Fuzzing

Chapter 6: Gaining a Web Shell

Chapter 7: Reverse Shells

Chapter 8: Local Information Gathering

Chapter 9: Privilege Escalation

Chapter 10: Persistence

Chapter 11: Network Probing and Lateral Movement

Chapter 12: Defense Evasion

Chapter 13: Exfiltration and Counter-Forensics

Bluetooth Security

فهرست مطالب کتاب Bluetooth Security:

Preface

Part I: Bluetooth Security Basics

1 Introduction

2 Overview of the Bluetooth Security Architecture

3 Bluetooth Pairing and Key Management

4 Algorithms

5 Broadcast Encryption

6 Security Policies and Access Control

7 Attacks, Strengths, and Weaknesses

Part II: Bluetooth Security Enhancements

8 Providing Anonymity

9 Key Management Extensions

10 Security for Bluetooth Applications

References

Glossary

List of Acronyms and Abbreviations

About the Authors

Index

Bug Bounty Hunting Essentials

فهرست مطالب:

Preface

Chapter 1: Basics of Bug Bounty Hunting

Chapter 2: How to Write a Bug Bounty Report

Chapter 3: SQL Injection Vulnerabilities

Chapter 4: Cross-Site Request Forgery

Chapter 5: Application Logic Vulnerabilities

Chapter 6: Cross-Site Scripting Attacks

Chapter 7: SQL Injection

Chapter 8: Open Redirect Vulnerabilities

Chapter 9: Sub-Domain Takeovers

Chapter 10: XML External Entity Vulnerability

Chapter 11: Template Injection

Chapter 12: Top Bug Bounty Hunting Tools

Chapter 13: Top Learning Resources

Other Books You May Enjoy

Index

Building Data Centers with VXLAN BGP EVPN

فهرست مطالب:

Introduction

Chapter 1 Introduction to Programmable Fabric

Chapter 2 VXLAN BGP EVPN Basics

Chapter 3 VXLAN/EVPN Forwarding Characteristics

Chapter 4 The Underlay

Chapter 5 Multitenancy

Chapter 6 Unicast Forwarding

Chapter 7 Multicast Forwarding

Chapter 8 External Connectivity

Chapter 9 Multi-pod, Multifabric, and Data Center Interconnect (DCI)

Chapter 10 Layer 4–7 Services Integration

Chapter 11 Introduction to Fabric Management

Appendix A VXLAN BGP EVPN Implementation Options

Index

Building Microservices: Designing Fine-Grained Systems

فهرست مطالب کتاب Building Microservices:

Preface

1. Microservices

2. The Evolutionary Architect

3. How to Model Services

4. Integration

5. Splitting the Monolith

6. Deployment

7. Testing

8. Monitoring

9. Security

10. Conway’s Law and System Design

11. Microservices at Scale

12. Bringing It All Together

Index

Burp Suite Cookbook: Web Application Security Made Easy with Burp Suite – Second Edition

فهرست مطالب:

Preface

Getting Started with Burp Suite

Getting to Know the Burp Suite of Tools

Configuring, Crawling, Auditing, and Reporting with Burp

Assessing Authentication Schemes

Assessing Authorization Checks

Assessing Session Management Mechanisms

Assessing Business Logic

Evaluating Input Validation Checks

Attacking the Client

Working with Burp Suite Macros and Extensions

Implementing Advanced Topic Attacks

Index

C Interfaces and Implementations: Techniques for Creating Reusable Software

فهرست مطالب کتاب C Interfaces and Implementations:

Chapter 1. Introduction

Chapter 2. Interfaces and Implementations

Chapter 3. Atoms

Chapter 4. Exceptions and Assertions

Chapter 5. Memory Management

Chapter 6. More Memory Management

Chapter 7. Lists

Chapter 8. Tables

Chapter 9. Sets

Chapter 10. Dynamic Arrays

Chapter 11. Sequences

Chapter 12. Rings

Chapter 13. Bit Vectors

Chapter 14. Formatting

Chapter 15. Low-Level Strings

Chapter 16. High-Level Strings

Chapter 17. Extended-Precision Arithmetic

Chapter 18. Arbitrary-Precision Arithmetic

Chapter 19. Multiple-Precision Arithmetic

Chapter 20. Threads