Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)
فهرست مطالب:
Part One: Background
Part Two: Symmetric Ciphers
Part Three: Asymmetric Ciphers
Part Four: Cryptographic Data Integrity Algorithms
Part Five: Mutual Trust
Part Six: Network and Internet Security
CWNA Certified Wireless Network Administrator Study Guide
فهرست مطالب:
Introduction
Assessment Test
Chapter 1 Overview of Wireless Standards and Organizations
Chapter 2 Radio Frequency Fundamentals
Chapter 3 Radio Frequency Components, Measurements, and Mathematics
Chapter 4 Radio Frequency Signal and Antenna Concepts
Chapter 5 IEEE 802.11 Standards
Chapter 6 Wireless Networks and Spread Spectrum Technologies
Chapter 7 Wireless LAN Topologies
Chapter 8 802.11 Medium Access
Chapter 9 802.11 MAC Architecture
Chapter 10 Wireless Devices
Chapter 11 Network Design, Implementation, and Management
Chapter 12 WLAN Troubleshooting
Chapter 13 802.11 Network Security Architecture
Chapter 14 Wireless Attacks, Intrusion Monitoring, and Policy
Chapter 15 Radio Frequency Site Survey Fundamentals
Chapter 16 Site Survey Systems and Devices
Glossary
Index
Data Center Virtualization Fundamentals
فهرست مطالب:
Introduction
Part I: What Is Virtualization?
Part II: Virtualization in Network Technologies
Part III: Virtualization in Storage Technologies
Part IV: Virtualization in Server Technologies
Part V: End-to-End Virtualization
Part VI: Appendixes
Data Structures and Algorithm Analysis in C
فهرست مطالب کتاب Data Structures and Algorithm Analysis in C:
PREFACE
CHAPTER 1: INTRODUCTION
CHAPTER 2: ALGORITHM ANALYSIS
CHAPTER 3: LISTS, STACKS, AND QUEUES
CHAPTER 4: TREES
CHAPTER 5: HASHING
CHAPTER 6: PRIORITY QUEUES (HEAPS)
CHAPTER 7: SORTING
CHAPTER 8: THE DISJOINT SET ADT
CHAPTER 9: GRAPH ALGORITHMS
CHAPTER 10: ALGORITHM DESIGN TECHNIQUES
CHAPTER 11: AMORTIZED ANALYSIS
Deploying Juniper Data Centers with EVPN VXLAN
فهرست مطالب:
Contents
1 Introducing the Juniper Ecosystem
2 Overview of Data Center Architecture
3 BGP for the Data Center
4 VXLAN as a Network Virtualization Overlay
5 Bridged Overlay in an EVPN VXLAN Fabric
6 MAC-VRFs
7 Centrally Routed Bridging
8 Edge-Routed Bridging
9 Routed Overlay and Host-Routed Bridging
10 DHCP in EVPN VXLAN Fabrics
11 Data Center Interconnect
12 Building Data Centers with Juniper Apstra, Part I—Apstra Foundation
13 Building Data Centers with Juniper Apstra, Part II—Advanced Apstra Deployments
14 Building Virtual Fabrics with vJunos, Containerlab, and Juniper Apstra
15 Large-Scale Fabrics, Inter-VRF Routing, and Security Policies in Apstra
Acronym Legend
Designing Real-World Multi-domain Networks
فهرست مطالب:
Part 1 – Introduction
1 Multi-Domain Networks
Part 2 – Multi-Domain Design
2 SD-Access and Campus Fabric
3 SD-WAN and DMVPN
4 Application Centric Infrastructure (ACI) – Integration and MultiDomain Capabilities
5 Enterprise MPLS
6 Carrier Neutral Facilities (CNF)
7 Cloud Connectivity
8 Security
9 Automation
Part 3 – Real World Use Cases
10 Global Manufacturing Use Case with SDA, SDWAN and CNFs
11 Financial Industry with ACI, MPLS and Security
12 Retail Use Case with Cloud, SDWAN and SDA
13 Public Sector Use Case
14 Transportation Use Case
Detecting, Troubleshooting, and Preventing Congestion in Storage Networks
فهرست مطالب:
1 Introduction to Congestion in Storage Networks
2 Understanding Congestion in Fibre Channel Fabrics
3 Detecting Congestion in Fibre Channel Fabrics
4 Troubleshooting Congestion in Fibre Channel Fabrics
5 Solving Congestion by Storage I/O Performance Monitoring
6 Preventing Congestion in Fibre Channel Fabrics
7 Congestion Management in Ethernet Storage Networks
8 Congestion Management in TCP Storage Networks
9 Congestion Management in Cisco UCS Servers
DevOps with Windows Server 2016: Obtain Enterprise Agility and Continuous Delivery by Implementing DevOps with Windows Server 2016
فهرست مطالب:
Preface
Chapter 1: Introducing DevOps 9
Chapter 2: DevOps Tools and Technologies
Chapter 3: DevOps Automation Primer
Chapter 4: Nano, Containers, and Docker Primer
Chapter 5: Building a Sample Application
Chapter 6: Source Code Control
Chapter 7: Configuration Management
Chapter 8: Configuration Management and Operational Validation
Chapter 9: Continuous Integration
Chapter 10: Continuous Delivery and Deployment
Chapter 11: Monitoring and Measuring
Index
Digital Forensics Essentials Professional Series
فهرست مطالب کتاب Digital Forensics Essentials Professional Series:
Module 01: Computer Forensics Fundamentals
Fundamentals of Computer Forensics
Digital Evidence
Forensic Readiness
Roles and Responsibilities of a Forensic Investigator
Legal Compliance in Computer Forensics
Module 02: Computer Forensics Investigation Process
Forensic Investigation Process and its Importance
Forensic Investigation Process – Pre-investigation Phase
Forensic Investigation Process – Investigation Phase
Forensic Investigation Process – Post-investigation Phase
Module 03: Understanding Hard Disks and File Systems
Different Types of Disk Drives and their Characteristics
Logical Structure of a Disk
Booting Process of Windows, Linux, and Mac Operating Systems
File Systems of Windows, Linux, and Mac Operating Systems
File System Examination
Module 04: Data Acquisition and Duplication
Data Acquisition Fundamentals
Types of Data Acquisition
Data Acquisition Format
Data Acquisition Methodology
Module 05: Defeating Anti-forensics Techniques
Anti-forensics and its Techniques
Anti-forensics Countermeasures
Module 06: Windows Forensics
Volatile and Non-Volatile Information
Windows Memory and Registry Analysis
Cache, Cookie, and History Recorded in Web Browsers
Windows Files and Metadata
Module 07: Linux and Mac Forensics
Volatile and Non-Volatile Data in Linux
Analyze Filesystem Images Using The Sleuth Kit
Memory Forensics
Mac Forensics
Module 08: Network Forensics
Network Forensics Fundamentals
Event Correlation Concepts and Types
Identify Indicators of Compromise (IoCs) from Network Logs
Investigate Network Traffic
Module 09: Investigating Web Attacks
Web Application Forensics
IIS and Apache Web Server Logs
Investigating Web Attacks on Windows-based Servers
Detect and Investigate Attacks on Web Applications
Module 10: Dark Web Forensics
Dark Web
Dark Web Forensics
Tor Browser Forensics
Module 11: Investigating Email Crimes
Email Basics
Email Crime Investigation and its Steps
Module 12: Malware Forensics
Malware, its Components and Distribution Methods
Malware Forensics Fundamentals and Recognize Types of Malware Analysis
Static Malware Analysis
Analyze Suspicious Word Documents
Dynamic Malware Analysis
System Behavior Analysis
Network Behavior Analysis
Glossary
References
Domain-Driven Design Distilled
فهرست مطالب کتاب Domain-Driven Design Distilled:
Chapter 1: DDD for Me
Chapter 2: Strategic Design with Bounded Contexts and the Ubiquitous Language
Chapter 3: Strategic Design with Subdomains
Chapter 4: Strategic Design with Context Mapping
Chapter 5: Tactical Design with Aggregates
Chapter 6: Tactical Design with Domain Events
Chapter 7: Acceleration and Management Tools
DotNET Frame work Notes For Professionals
فهرست مطالب کتاب DotNET Frame work Notes For Professionals:
EC-Council Certified Incident Handler v3 – CEI Material
فهرست مطالب کتاب Certified Incident Handler: Building a Culture of Security:
What Is ECIH
ECIH TRAINING SCHEDULE AND EXAM Information
How to Access Course rel ated material
CLASS MINIMUM REQUIREMENTS, Basic Lab Setup
Requirements, and Lab Setup Environment
What Is EC-COUNCIL CYBERQ
What shoul d you ensure before going to Cl ass
How to Teach ECIH
Where to get help