C Notes For Professionals
فهرست مطالب C Programming Notes for Professionals:
Getting started with C Language
Comments
Data Types
Operators
Boolean
Strings
Literals for numbers, characters and strings
Compound Literals
Bit-fields
Arrays
Linked lists
Enumerations
Structs
Standard Math
Iteration Statements/Loops: for, while, do-while
Selection Statements
Initialization
Declaration vs Definition
Command-line arguments
Files and I/O streams
Formatted Input/Output
Pointers
Sequence points
Function Pointers
Function Parameters
Pass 2D-arrays to functions
Error handling
Undefined behavior
Random Number Generation
Preprocessor and Macros
Signal handling
Variable arguments
Assertion
Generic selection
X-macros
Aliasing and effective type
Compilation
Inline assembly
Identifier Scope
Implicit and Explicit Conversions
Type Qualifiers
Typedef
Storage Classes
Declarations
Structure Padding and Packing
Memory management
Implementation-defined behaviour
Atomics
Jump Statements
Create and include header files
<ctype.h> — character classification & conversion
Side Effects
Multi-Character Character Sequence
Constraints
Inlining
Unions
Threads (native)
Multithreading
Interprocess Communication (IPC)
Testing frameworks
Valgrind
Common C programming idioms and developer practices
Common pitfalls
C Traps and Pitfalls
فهرست مطالب کتاب C Traps and Pitfalls:
Lexical pitfalls
Syntactic pitfalls
Semantic pitfalls
Linkage
Library functions
The preprocessor
Portability pitfalls
Advice and answers
C# Notes for Professionals
فهرست مطالب کتاب C# Notes for Professionals:
Getting started with C# Language
Literals
Operators
Conditional Statements
Equality Operator
Equals and GetHashCode
Null-Coalescing Operator
Null-conditional Operators
nameof Operator
Verbatim Strings
Common String Operations
Format
String Concatenate
String Manipulation
String Interpolation
String Escape Sequences
StringBuilder
Regex Parsing
DateTime Methods
Arrays
O(n) Algorithm for circular rotation of an array
Enum
Tuples
Guid
BigInteger
Collection Initializers
An overview of C# collections
Looping
Iterators
IEnumerable
Value type vs Reference type
Built-in Types
Aliases of built-in types
Anonymous types
Dynamic type
Type Conversion
Casting
Nullable types
Constructors and Finalizers
Access Modifiers
Interfaces
Static Classes
Singleton Implementation
Dependency Injection
Partial class and methods
Object initializers
Methods
Extension Methods
Named Arguments
Named and Optional Arguments
Data Annotation
Keywords
Object Oriented Programming In C#
Recursion
Naming Conventions
XML Documentation Comments
Comments and regions
Inheritance
Generics
Using Statement
Using Directive
IDisposable interface
Reflection
IQueryable interface
Linq to Objects
LINQ Queries
LINQ to XML
Parallel LINQ (PLINQ)
XmlDocument and the System.Xml namespace
XDocument and the System.Xml.Linq namespace
C# 7.0 Features
C# 6.0 Features
C# 5.0 Features
C# 4.0 Features
C# 3.0 Features
Exception Handling
NullReferenceException
Handling FormatException when converting string to other types
Read & Understand Stacktraces
Diagnostics
Overflow
Getting Started: Json with C#
Using json.net
Lambda expressions
Generic Lambda Query Builder
Properties
Initializing Properties
INotifyPropertyChanged interface
Events
Expression Trees
Overload Resolution
BindingList<T>
Preprocessor directives
Structs
Attributes
Delegates
File and Stream I/O
Networking
Performing HTTP requests
Reading and writing .zip files
FileSystemWatcher
Access network shared folder with username and password
Asynchronous Socket
Action Filters
Polymorphism
Immutability
Indexer
Checked and Unchecked
Stream
Timers
Stopwatches
Threading
Async/await, Backgroundworker, Task and Thread Examples
Async-Await
Synchronization Context in Async-Await
BackgroundWorker
Task Parallel Library
Making a variable thread safe
Lock Statement
Yield Keyword
Task Parallel Library (TPL) Dataflow Constructs
Functional Programming
Func delegates
Function with multiple return values
Binary Serialization
ICloneable
IComparable
Accessing Databases
Using SQLite in C#
Caching
Code Contracts
Code Contracts and Assertions
Structural Design Patterns
Creational Design Patterns
Implementing Decorator Design Pattern
Implementing Flyweight Design Pattern
Management.Automation
DirectoryServices.Protocols.LdapConnection
C# Authentication handler
Pointers
Pointers & Unsafe Code
How to use C# Structs to create a Union type (Similar to C Unions)
Reactive Extensions (Rx)
cs Examples
Creating a Console Application using a Plain-Text Editor and the C# Compiler (csc.exe)
CLSCompliantAttribute
ObservableCollection<T>
Hash Functions
Generating Random Numbers in C#
Cryptography (System.Security.Cryptography)
NET Identity
Unsafe Code in .NET
C# Script
Runtime Compile
Interoperability
.NET Compiler Platform (Roslyn)
ILGenerator
T4 Code Generation
Creating Own MessageBox in Windows Form Application
Including Font Resources
Import Google Contacts
Garbage Collector in .Net
Exchange.WebServices
Windows Communication Foundation
C++ Notes for Professionals
فهرست مطالب کتاب C++ Notes for Professionals:
Getting started with C++
Literals
operator precedence
Floating Point Arithmetic
Bit Operators
Bit Manipulation
Bit fields
Arrays
Iterators
Basic input/output in c++
Loops
File I/O
C++ Streams
Stream manipulators
Flow Control
Metaprogramming
const keyword
mutable keyword
Friend keyword
Type Keywords
Basic Type Keywords
Variable Declaration Keywords
Keywords
Returning several values from a function
Polymorphism
References
Value and Reference Semantics
C++ function “call by value” vs. “call by reference”
Copying vs Assignment
Pointers
Pointers to members
The This Pointer
Smart Pointers
Classes/Structures
Function Overloading
Operator Overloading
Function Template Overloading
Virtual Member Functions
Inline functions
Special Member Functions
Non-Static Member Functions
Constant class member functions
C++ Containers
Namespaces
Header Files
Using declaration
std::string
std::array
std::vector
std::map
std::optional
std::function: To wrap any element that is callable
std::forward_list
std::pair
std::atomics
std::variant
std::iomanip
std::any
std::set and std::multiset
std::integer_sequence
Using std::unordered_map
Standard Library Algorithms
The ISO C++ Standard
Inline variables
Random number generation
Date and time using <chrono> header
Sorting
Enumeration
Iteration
Regular expressions
Implementation-defined behavior
Exceptions
Lambdas
Value Categories
Preprocessor
Data Structures in C++
Templates
Expression templates
Curiously Recurring Template Pattern (CRTP)
Threading
Thread synchronization structures
The Rule of Three, Five, And Zero
RAII: Resource Acquisition Is Initialization
RTTI: Run-Time Type Information
Mutexes
Recursive Mutex
Semaphore
Futures and Promises
Atomic Types
Type Erasure
Explicit type conversions
Unnamed types
Type Traits
Return Type Covariance
Layout of object types
Type Inference
Typedef and type aliases
type deduction
Trailing return type
Alignment
Perfect Forwarding
decltype
SFINAE (Substitution Failure Is Not An Error)
Undefined Behavior
Overload resolution
Move Semantics
Pimpl Idiom
auto
Copy Elision
Fold Expressions
Unions
Design pattern implementation in C++
Singleton Design Pattern
User-Defined Literals
Memory management
C++11 Memory Model
Scopes
static_assert
constexpr
One Definition Rule (ODR)
Unspecified behavior
Argument Dependent Name Lookup
Attributes
Recursion in C++
Arithmitic Metaprogramming
Callable Objects
Client server examples
Const Correctness
Parameter packs
Build Systems
Concurrency With OpenMP
Resource Management
Storage class specifiers
Linkage specifications
Digit separators
C incompatibilities
Side by Side Comparisons of classic C++ examples solved via C++ vs C++11 vs C++14 vs C++17
Compiling and Building
Common compile/linker errors (GCC)
More undefined behaviors in C++
Unit Testing in C++
C++ Debugging and Debug-prevention Tools & Techniques
Optimization in C++
Optimization
Profiling
Refactoring Techniques
CC Certified in Cybersecurity Cert Guide
فهرست مطالب:
Introduction
1 Cybersecurity Principles
2 Risk Management
3 Threats to Security
4 Physical Access Controls
5 Logical Access Controls
6 Computer Networking Fundamentals
7 Network Security Infrastructure
8 Data and the System
9 Security in the Life
10 Security in Emergencies
11 Tying It All Together
12 After the Certification
13 Final Preparation
Glossary of Key Terms
Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&A
Appendix B CC Certified in Cybersecurity Cert Guide Exam Updates
Appendix C Study Planner
CC Certified in Cybersecurity Cert Guide
فهرست مطالب کتاب CC Certified in Cybersecurity Cert Guide:
Introduction
1 Cybersecurity Principles
2 Risk Management
3 Threats to Security
4 Physical Access Controls
5 Logical Access Controls
6 Computer Networking Fundamentals
7 Network Security Infrastructure
8 Data and the System
9 Security in the Life
10 Security in Emergencies
11 Tying It All Together
12 After the Certification
13 Final Preparation
Glossary of Key Terms
Appendix A Answers to the “Do I Know This Already?” Quizzes and
Q&A
Appendix B CC Certified in Cybersecurity Cert Guide Exam Updates
Appendix C Study Planner
CC Certified in Cybersecurity Study Guide
فهرست مطالب:
Introduction
PART I DOMAIN 1: SECURITY PRINCIPLES
CHAPTER 1 Confidentiality, Integrity, Availability, and Non-repudiation
CHAPTER 2 Authentication and Authorization
CHAPTER 3 Privacy
CHAPTER 4 Risk Management
CHAPTER 5 Security Controls
CHAPTER 6 Ethics
CHAPTER 7 Security Governance Processes
PART II DOMAIN 2: BUSINESS CONTINUITY (BC), DISASTER RECOVERY (DR) & INCIDENT RESPONSE (IR) CONCEPTS
CHAPTER 8 Business Continuity
CHAPTER 9 Disaster Recovery
CHAPTER 10 Incident Response
PART III DOMAIN 3: ACCESS CONTROLS CONCEPTS
CHAPTER 11 Physical Access Controls
CHAPTER 12 Logical Access Controls
PART IV DOMAIN 4: NETWORK SECURITY
CHAPTER 13 Computer Networking
CHAPTER 14 Network Threats and Attacks
CHAPTER 15 Threat Identification and Prevention
CHAPTER 16 Network Security Infrastructure
CHAPTER 17 Cloud Computing
PART V DOMAIN 5: SECURITY OPERATIONS
CHAPTER 18 Encryption
CHAPTER 19 Data Handling
CHAPTER 20 Logging and Monitoring
CHAPTER 21 Configuration Management
CHAPTER 22 Best Practice Security Policies
CHAPTER 23 Security Awareness Training
Index
CCENT ICND1 Study Guide Exam 100-105 (Third Edition)
فهرست مطالب:
Introduction
Assessment Test
Answers to Assessment Test
Chapter 1 Internetworking
Chapter 2 Ethernet Networking and Data Encapsulation
Chapter 3 Introduction to TCP/IP
Chapter 4 Easy Subnetting
Chapter 5 VLSMs, Summarization, and Troubleshooting TCP/IP
Chapter 6 Cisco’s Internetworking Operating System (IOS)
Chapter 7 Managing a Cisco Internetwork
Chapter 8 Managing Cisco Devices
Chapter 9 IP Routing
Chapter 10 Layer 2 Switching
Chapter 11 VLANs and Inter-VLAN Routing
Chapter 12 Security
Chapter 13 Network Address Translation (NAT)
Chapter 14 Internet Protocol Version 6 (IPv6)
Appendix A Answers to Written Labs
Appendix B Answers to Review Questions
Appendix C Disabling and Configuring Network Services
CCENT/CCNA ICND1 640-822 Official Cert Guide – Third Edition
فهرست مطالب:
Introduction
Part I: Networking Fundamentals
Part II: LAN Switching
Part III: IPv4 Addressing and Subnetting
Part IV: IPv4 Routing
Part V: Wide-Area Networks
Part VI: Final Preparation
Part VII: Appendixes
Part VIII: DVD-Only
CCIE Enterprise Infrastructure Foundation
فهرست مطالب:
Chapter 1. Switching
Chapter 2. DMVPN
Chapter 3. IP Prefix Lists
Chapter 4. RIPv2
Chapter 5. EIGRP
Chapter 6. OSPF
Chapter 7. BGP
Chapter 8. MPLS and L3VPNs
Chapter 9. IPv6
Chapter 10. SD-WAN
Chapter 11. SD-ACCESS
CCNA 200-301 Hands-on Mastery with Packet Tracer
فهرست مطالب کتاب CCNA 200-301 Hands-on Mastery with Packet Tracer:
Introduction xxii
Part I Packet Tracer Fundamentals 1
Chapter 1 Introducing Packet Tracer 3
Chapter 2 Building Your First Simulation 15
Chapter 3 Customizing Packet Tracer 23
Part II Network Fundamentals 31
Chapter 4 Cisco IOS Basics 33
Chapter 5 Physical Interfaces and Cabling Types 47
Chapter 6 Configure and Verify IPv4 Addressing and Subnetting 61
Chapter 7 Configure IPv6 83
Chapter 8 Describe Wireless Principles
Chapter 9 Configure Switching Basics
Part III Network Access
Chapter 10 Configure and Verify VLANs and Interswitch Connectivity
Chapter 11 Configure and Verify Layer 2 Discovery Protocols
Chapter 12 Configure Rapid PVST+ Spanning Tree Protocol
Chapter 13 Compare Cisco Wireless Architectures and AP Modes
Part IV IP Connectivity
Chapter 14 Interpret the Components of a Routing Table
Chapter 15 Configure and Verify IPv4 and IPv6 Static Routing
Chapter 16 Configure and Verify Single Area OSPFv2
Part V IP Services
Chapter 17 Configure and Verify Inside Source NAT
Chapter 18 Configure and Verify NTP
Chapter 19 Configure DNS and DHCP
Chapter 20 Configure Other Networking Services
Part VI Security Fundamentals
Chapter 21 Configure Device Access Control
Chapter 22 Configure and Verify Access Control Lists
Chapter 23 Configure Layer 2 Security Features
Chapter 24 Configure Wireless Security Protocols
Part VII Appendices
Appendix A Other CCNA Topics
Appendix B Practice Exams
Glossary
Index
CCNA 200-301 Official Cert Guide Volume 2, Second Edition
فهرست مطالب کتاب CCNA 200-301 Official Cert Guide Volume 2:
Introduction
Part I Wireless LANs
Chapter 1 Fundamentals of Wireless Networks
Chapter 2 Analyzing Cisco Wireless Architectures
Chapter 3 Securing Wireless Networks
Chapter 4 Building a Wireless LAN
Part I Review
Part II IP Access Control Lists
Chapter 5 Introduction to TCP/IP Transport and Applications
Chapter 6 Basic IPv4 Access Control Lists
Chapter 7 Named and Extended IP ACLs
Chapter 8 Applied IP ACLs
Part II Review
Part III Security Services
Chapter 9 Security Architectures
Chapter 10 Securing Network Devices
Chapter 11 Implementing Switch Port Security
Chapter 12 DHCP Snooping and ARP Inspection
Part III Review
Part IV IP Services
Chapter 13 Device Management Protocols
Chapter 14 Network Address Translation
Chapter 15 Quality of Service (QoS)
Chapter 16 First Hop Redundancy Protocols
Chapter 17 SNMP, FTP, and TFTP
Part IV Review
Part V Network Architecture
Chapter 18 LAN Architecture
Chapter 19 WAN Architecture
Chapter 20 Cloud Architecture
Part V Review
Part VI Network Automation
Chapter 21 Introduction to Controller-Based Networking
Chapter 22 Cisco Software-Defined Access (Cisco SD-Access)
Chapter 23 Understanding REST and JSON
Chapter 24 Understanding Ansible and Terraform
Part VI Review
Part VII Exam Updates and Final Review
Chapter 25 CCNA 200-301 Official Cert Guide, Volume 2, Second
Edition, Exam Updates
Chapter 26 Final Review
Part VIII Print Appendixes
Appendix A Numeric Reference Tables
Appendix B Exam Topics Cross-Reference
Appendix C Answers to the “Do I Know This Already?” Quizzes