C Notes For Professionals

فهرست مطالب C Programming Notes for Professionals:

Getting started with C Language

Comments

Data Types

Operators

Boolean

Strings

Literals for numbers, characters and strings

Compound Literals

Bit-fields

Arrays

Linked lists

Enumerations

Structs

Standard Math

Iteration Statements/Loops: for, while, do-while

Selection Statements

Initialization

Declaration vs Definition

Command-line arguments

Files and I/O streams

Formatted Input/Output

Pointers

Sequence points

Function Pointers

Function Parameters

Pass 2D-arrays to functions

Error handling

Undefined behavior

Random Number Generation

Preprocessor and Macros

Signal handling

Variable arguments

Assertion

Generic selection

X-macros

Aliasing and effective type

Compilation

Inline assembly

Identifier Scope

Implicit and Explicit Conversions

Type Qualifiers

Typedef

Storage Classes

Declarations

Structure Padding and Packing

Memory management

Implementation-defined behaviour

Atomics

Jump Statements

Create and include header files

<ctype.h> — character classification & conversion

Side Effects

Multi-Character Character Sequence

Constraints

Inlining

Unions

Threads (native)

Multithreading

Interprocess Communication (IPC)

Testing frameworks

Valgrind

Common C programming idioms and developer practices

Common pitfalls

C Traps and Pitfalls

فهرست مطالب کتاب C Traps and Pitfalls:

Lexical pitfalls

Syntactic pitfalls

Semantic pitfalls

Linkage

Library functions

The preprocessor

Portability pitfalls

Advice and answers

C# Notes for Professionals

فهرست مطالب کتاب C# Notes for Professionals:

Getting started with C# Language

Literals

Operators

Conditional Statements

Equality Operator

Equals and GetHashCode

Null-Coalescing Operator

Null-conditional Operators

nameof Operator

Verbatim Strings

Common String Operations

Format

String Concatenate

String Manipulation

String Interpolation

String Escape Sequences

StringBuilder

Regex Parsing

DateTime Methods

Arrays

O(n) Algorithm for circular rotation of an array

Enum

Tuples

Guid

BigInteger

Collection Initializers

An overview of C# collections

Looping

Iterators

IEnumerable

Value type vs Reference type

Built-in Types

Aliases of built-in types

Anonymous types

Dynamic type

Type Conversion

Casting

Nullable types

Constructors and Finalizers

Access Modifiers

Interfaces

Static Classes

Singleton Implementation

Dependency Injection

Partial class and methods

Object initializers

Methods

Extension Methods

Named Arguments

Named and Optional Arguments

Data Annotation

Keywords

Object Oriented Programming In C#

Recursion

Naming Conventions

XML Documentation Comments

Comments and regions

Inheritance

Generics

Using Statement

Using Directive

IDisposable interface

Reflection

IQueryable interface

Linq to Objects

LINQ Queries

LINQ to XML

Parallel LINQ (PLINQ)

XmlDocument and the System.Xml namespace

XDocument and the System.Xml.Linq namespace

C# 7.0 Features

C# 6.0 Features

C# 5.0 Features

C# 4.0 Features

C# 3.0 Features

Exception Handling

NullReferenceException

Handling FormatException when converting string to other types

Read & Understand Stacktraces

Diagnostics

Overflow

Getting Started: Json with C#

Using json.net

Lambda expressions

Generic Lambda Query Builder

Properties

Initializing Properties

INotifyPropertyChanged interface

Events

Expression Trees

Overload Resolution

BindingList<T>

Preprocessor directives

Structs

Attributes

Delegates

File and Stream I/O

Networking

Performing HTTP requests

Reading and writing .zip files

FileSystemWatcher

Access network shared folder with username and password

Asynchronous Socket

Action Filters

Polymorphism

Immutability

Indexer

Checked and Unchecked

Stream

Timers

Stopwatches

Threading

Async/await, Backgroundworker, Task and Thread Examples

Async-Await

Synchronization Context in Async-Await

BackgroundWorker

Task Parallel Library

Making a variable thread safe

Lock Statement

Yield Keyword

Task Parallel Library (TPL) Dataflow Constructs

Functional Programming

Func delegates

Function with multiple return values

Binary Serialization

ICloneable

IComparable

Accessing Databases

Using SQLite in C#

Caching

Code Contracts

Code Contracts and Assertions

Structural Design Patterns

Creational Design Patterns

Implementing Decorator Design Pattern

Implementing Flyweight Design Pattern

Management.Automation

DirectoryServices.Protocols.LdapConnection

C# Authentication handler

Pointers

Pointers & Unsafe Code

How to use C# Structs to create a Union type (Similar to C Unions)

Reactive Extensions (Rx)

cs Examples

Creating a Console Application using a Plain-Text Editor and the C# Compiler (csc.exe)

CLSCompliantAttribute

ObservableCollection<T>

Hash Functions

Generating Random Numbers in C#

Cryptography (System.Security.Cryptography)

NET Identity

Unsafe Code in .NET

C# Script

Runtime Compile

Interoperability

.NET Compiler Platform (Roslyn)

ILGenerator

T4 Code Generation

Creating Own MessageBox in Windows Form Application

Including Font Resources

Import Google Contacts

Garbage Collector in .Net

Exchange.WebServices

Windows Communication Foundation

C++ Notes for Professionals

فهرست مطالب کتاب C++ Notes for Professionals:

Getting started with C++

Literals

operator precedence

Floating Point Arithmetic

Bit Operators

Bit Manipulation

Bit fields

Arrays

Iterators

Basic input/output in c++

Loops

File I/O

C++ Streams

Stream manipulators

Flow Control

Metaprogramming

const keyword

mutable keyword

Friend keyword

Type Keywords

Basic Type Keywords

Variable Declaration Keywords

Keywords

Returning several values from a function

Polymorphism

References

Value and Reference Semantics

C++ function “call by value” vs. “call by reference”

Copying vs Assignment

Pointers

Pointers to members

The This Pointer

Smart Pointers

Classes/Structures

Function Overloading

Operator Overloading

Function Template Overloading

Virtual Member Functions

Inline functions

Special Member Functions

Non-Static Member Functions

Constant class member functions

C++ Containers

Namespaces

Header Files

Using declaration

std::string

std::array

std::vector

std::map

std::optional

std::function: To wrap any element that is callable

std::forward_list

std::pair

std::atomics

std::variant

std::iomanip

std::any

std::set and std::multiset

std::integer_sequence

Using std::unordered_map

Standard Library Algorithms

The ISO C++ Standard

Inline variables

Random number generation

Date and time using <chrono> header

Sorting

Enumeration

Iteration

Regular expressions

Implementation-defined behavior

Exceptions

Lambdas

Value Categories

Preprocessor

Data Structures in C++

Templates

Expression templates

Curiously Recurring Template Pattern (CRTP)

Threading

Thread synchronization structures

The Rule of Three, Five, And Zero

RAII: Resource Acquisition Is Initialization

RTTI: Run-Time Type Information

Mutexes

Recursive Mutex

Semaphore

Futures and Promises

Atomic Types

Type Erasure

Explicit type conversions

Unnamed types

Type Traits

Return Type Covariance

Layout of object types

Type Inference

Typedef and type aliases

type deduction

Trailing return type

Alignment

Perfect Forwarding

decltype

SFINAE (Substitution Failure Is Not An Error)

Undefined Behavior

Overload resolution

Move Semantics

Pimpl Idiom

auto

Copy Elision

Fold Expressions

Unions

Design pattern implementation in C++

Singleton Design Pattern

User-Defined Literals

Memory management

C++11 Memory Model

Scopes

static_assert

constexpr

One Definition Rule (ODR)

Unspecified behavior

Argument Dependent Name Lookup

Attributes

Recursion in C++

Arithmitic Metaprogramming

Callable Objects

Client server examples

Const Correctness

Parameter packs

Build Systems

Concurrency With OpenMP

Resource Management

Storage class specifiers

Linkage specifications

Digit separators

C incompatibilities

Side by Side Comparisons of classic C++ examples solved via C++ vs C++11 vs C++14 vs C++17

Compiling and Building

Common compile/linker errors (GCC)

More undefined behaviors in C++

Unit Testing in C++

C++ Debugging and Debug-prevention Tools & Techniques

Optimization in C++

Optimization

Profiling

Refactoring Techniques

CC Certified in Cybersecurity Cert Guide

فهرست مطالب:

Introduction

1 Cybersecurity Principles

2 Risk Management

3 Threats to Security

4 Physical Access Controls

5 Logical Access Controls

6 Computer Networking Fundamentals

7 Network Security Infrastructure

8 Data and the System

9 Security in the Life

10 Security in Emergencies

11 Tying It All Together

12 After the Certification

13 Final Preparation

Glossary of Key Terms

Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&A

Appendix B CC Certified in Cybersecurity Cert Guide Exam Updates

Appendix C Study Planner

CC Certified in Cybersecurity Cert Guide

فهرست مطالب کتاب CC Certified in Cybersecurity Cert Guide:

Introduction

1 Cybersecurity Principles

2 Risk Management

3 Threats to Security

4 Physical Access Controls

5 Logical Access Controls

6 Computer Networking Fundamentals

7 Network Security Infrastructure

8 Data and the System

9 Security in the Life

10 Security in Emergencies

11 Tying It All Together

12 After the Certification

13 Final Preparation

Glossary of Key Terms

Appendix A Answers to the “Do I Know This Already?” Quizzes and

Q&A

Appendix B CC Certified in Cybersecurity Cert Guide Exam Updates

Appendix C Study Planner

CC Certified in Cybersecurity Study Guide

فهرست مطالب:

Introduction

PART I DOMAIN 1: SECURITY PRINCIPLES

CHAPTER 1 Confidentiality, Integrity, Availability, and Non-repudiation

CHAPTER 2 Authentication and Authorization

CHAPTER 3 Privacy

CHAPTER 4 Risk Management

CHAPTER 5 Security Controls

CHAPTER 6 Ethics

CHAPTER 7 Security Governance Processes

PART II DOMAIN 2: BUSINESS CONTINUITY (BC), DISASTER RECOVERY (DR) & INCIDENT RESPONSE (IR) CONCEPTS

CHAPTER 8 Business Continuity

CHAPTER 9 Disaster Recovery

CHAPTER 10 Incident Response

PART III DOMAIN 3: ACCESS CONTROLS CONCEPTS

CHAPTER 11 Physical Access Controls

CHAPTER 12 Logical Access Controls

PART IV DOMAIN 4: NETWORK SECURITY

CHAPTER 13 Computer Networking

CHAPTER 14 Network Threats and Attacks

CHAPTER 15 Threat Identification and Prevention

CHAPTER 16 Network Security Infrastructure

CHAPTER 17 Cloud Computing

PART V DOMAIN 5: SECURITY OPERATIONS

CHAPTER 18 Encryption

CHAPTER 19 Data Handling

CHAPTER 20 Logging and Monitoring

CHAPTER 21 Configuration Management

CHAPTER 22 Best Practice Security Policies

CHAPTER 23 Security Awareness Training

Index

CCENT ICND1 Study Guide Exam 100-105 (Third Edition)

فهرست مطالب:

Introduction

Assessment Test

Answers to Assessment Test

Chapter 1 Internetworking

Chapter 2 Ethernet Networking and Data Encapsulation

Chapter 3 Introduction to TCP/IP

Chapter 4 Easy Subnetting

Chapter 5 VLSMs, Summarization, and Troubleshooting TCP/IP

Chapter 6 Cisco’s Internetworking Operating System (IOS)

Chapter 7 Managing a Cisco Internetwork

Chapter 8 Managing Cisco Devices

Chapter 9 IP Routing

Chapter 10 Layer 2 Switching

Chapter 11 VLANs and Inter-VLAN Routing

Chapter 12 Security

Chapter 13 Network Address Translation (NAT)

Chapter 14 Internet Protocol Version 6 (IPv6)

Appendix A Answers to Written Labs

Appendix B Answers to Review Questions

Appendix C Disabling and Configuring Network Services

CCENT/CCNA ICND1 640-822 Official Cert Guide – Third Edition

فهرست مطالب:

Introduction

Part I: Networking Fundamentals

Part II: LAN Switching

Part III: IPv4 Addressing and Subnetting

Part IV: IPv4 Routing

Part V: Wide-Area Networks

Part VI: Final Preparation

Part VII: Appendixes

Part VIII: DVD-Only

CCIE Enterprise Infrastructure Foundation

فهرست مطالب:

Chapter 1. Switching

Chapter 2. DMVPN

Chapter 3. IP Prefix Lists

Chapter 4. RIPv2

Chapter 5. EIGRP

Chapter 6. OSPF

Chapter 7. BGP

Chapter 8. MPLS and L3VPNs

Chapter 9. IPv6

Chapter 10. SD-WAN

Chapter 11. SD-ACCESS

CCNA 200-301 Hands-on Mastery with Packet Tracer

فهرست مطالب کتاب CCNA 200-301 Hands-on Mastery with Packet Tracer:

Introduction xxii

Part I Packet Tracer Fundamentals 1

Chapter 1 Introducing Packet Tracer 3

Chapter 2 Building Your First Simulation 15

Chapter 3 Customizing Packet Tracer 23

Part II Network Fundamentals 31

Chapter 4 Cisco IOS Basics 33

Chapter 5 Physical Interfaces and Cabling Types 47

Chapter 6 Configure and Verify IPv4 Addressing and Subnetting 61

Chapter 7 Configure IPv6 83

Chapter 8 Describe Wireless Principles

Chapter 9 Configure Switching Basics

Part III Network Access

Chapter 10 Configure and Verify VLANs and Interswitch Connectivity

Chapter 11 Configure and Verify Layer 2 Discovery Protocols

Chapter 12 Configure Rapid PVST+ Spanning Tree Protocol

Chapter 13 Compare Cisco Wireless Architectures and AP Modes

Part IV IP Connectivity

Chapter 14 Interpret the Components of a Routing Table

Chapter 15 Configure and Verify IPv4 and IPv6 Static Routing

Chapter 16 Configure and Verify Single Area OSPFv2

Part V IP Services

Chapter 17 Configure and Verify Inside Source NAT

Chapter 18 Configure and Verify NTP

Chapter 19 Configure DNS and DHCP

Chapter 20 Configure Other Networking Services

Part VI Security Fundamentals

Chapter 21 Configure Device Access Control

Chapter 22 Configure and Verify Access Control Lists

Chapter 23 Configure Layer 2 Security Features

Chapter 24 Configure Wireless Security Protocols

Part VII Appendices

Appendix A Other CCNA Topics

Appendix B Practice Exams

Glossary

Index

CCNA 200-301 Official Cert Guide Volume 2, Second Edition

فهرست مطالب کتاب CCNA 200-301 Official Cert Guide  Volume 2:

Introduction

Part I Wireless LANs

Chapter 1 Fundamentals of Wireless Networks

Chapter 2 Analyzing Cisco Wireless Architectures

Chapter 3 Securing Wireless Networks

Chapter 4 Building a Wireless LAN

Part I Review

Part II IP Access Control Lists

Chapter 5 Introduction to TCP/IP Transport and Applications

Chapter 6 Basic IPv4 Access Control Lists

Chapter 7 Named and Extended IP ACLs

Chapter 8 Applied IP ACLs

Part II Review

Part III Security Services

Chapter 9 Security Architectures

Chapter 10 Securing Network Devices

Chapter 11 Implementing Switch Port Security

Chapter 12 DHCP Snooping and ARP Inspection

Part III Review

Part IV IP Services

Chapter 13 Device Management Protocols

Chapter 14 Network Address Translation

Chapter 15 Quality of Service (QoS)

Chapter 16 First Hop Redundancy Protocols

Chapter 17 SNMP, FTP, and TFTP

Part IV Review

Part V Network Architecture

Chapter 18 LAN Architecture

Chapter 19 WAN Architecture

Chapter 20 Cloud Architecture

Part V Review

Part VI Network Automation

Chapter 21 Introduction to Controller-Based Networking

Chapter 22 Cisco Software-Defined Access (Cisco SD-Access)

Chapter 23 Understanding REST and JSON

Chapter 24 Understanding Ansible and Terraform

Part VI Review

Part VII Exam Updates and Final Review

Chapter 25 CCNA 200-301 Official Cert Guide, Volume 2, Second

Edition, Exam Updates

Chapter 26 Final Review

Part VIII Print Appendixes

Appendix A Numeric Reference Tables

Appendix B Exam Topics Cross-Reference

Appendix C Answers to the “Do I Know This Already?” Quizzes