Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)

فهرست مطالب:

Part One: Background

Part Two: Symmetric Ciphers

Part Three: Asymmetric Ciphers

Part Four: Cryptographic Data Integrity Algorithms

Part Five: Mutual Trust

Part Six: Network and Internet Security

CWNA Certified Wireless Network Administrator Study Guide

فهرست مطالب:

Introduction

Assessment Test

Chapter 1 Overview of Wireless Standards and Organizations

Chapter 2 Radio Frequency Fundamentals

Chapter 3 Radio Frequency Components, Measurements, and Mathematics

Chapter 4 Radio Frequency Signal and Antenna Concepts

Chapter 5 IEEE 802.11 Standards

Chapter 6 Wireless Networks and Spread Spectrum Technologies

Chapter 7 Wireless LAN Topologies

Chapter 8 802.11 Medium Access

Chapter 9 802.11 MAC Architecture

Chapter 10 Wireless Devices

Chapter 11 Network Design, Implementation, and Management

Chapter 12 WLAN Troubleshooting

Chapter 13 802.11 Network Security Architecture

Chapter 14 Wireless Attacks, Intrusion Monitoring, and Policy

Chapter 15 Radio Frequency Site Survey Fundamentals

Chapter 16 Site Survey Systems and Devices

Glossary

Index

Data Center Virtualization Fundamentals

فهرست مطالب:

Introduction

Part I: What Is Virtualization?

Part II: Virtualization in Network Technologies

Part III: Virtualization in Storage Technologies

Part IV: Virtualization in Server Technologies

Part V: End-to-End Virtualization

Part VI: Appendixes

Data Structures and Algorithm Analysis in C

فهرست مطالب کتاب Data Structures and Algorithm Analysis in C:

PREFACE

CHAPTER 1: INTRODUCTION

CHAPTER 2: ALGORITHM ANALYSIS

CHAPTER 3: LISTS, STACKS, AND QUEUES

CHAPTER 4: TREES

CHAPTER 5: HASHING

CHAPTER 6: PRIORITY QUEUES (HEAPS)

CHAPTER 7: SORTING

CHAPTER 8: THE DISJOINT SET ADT

CHAPTER 9: GRAPH ALGORITHMS

CHAPTER 10: ALGORITHM DESIGN TECHNIQUES

CHAPTER 11: AMORTIZED ANALYSIS

Deploying Juniper Data Centers with EVPN VXLAN

فهرست مطالب:

Contents

1 Introducing the Juniper Ecosystem

2 Overview of Data Center Architecture

3 BGP for the Data Center

4 VXLAN as a Network Virtualization Overlay

5 Bridged Overlay in an EVPN VXLAN Fabric

6 MAC-VRFs

7 Centrally Routed Bridging

8 Edge-Routed Bridging

9 Routed Overlay and Host-Routed Bridging

10 DHCP in EVPN VXLAN Fabrics

11 Data Center Interconnect

12 Building Data Centers with Juniper Apstra, Part I—Apstra Foundation

13 Building Data Centers with Juniper Apstra, Part II—Advanced Apstra Deployments

14 Building Virtual Fabrics with vJunos, Containerlab, and Juniper Apstra

15 Large-Scale Fabrics, Inter-VRF Routing, and Security Policies in Apstra

Acronym Legend

Designing Real-World Multi-domain Networks

فهرست مطالب:

Part 1 – Introduction

1 Multi-Domain Networks

Part 2 – Multi-Domain Design

2 SD-Access and Campus Fabric

3 SD-WAN and DMVPN

4 Application Centric Infrastructure (ACI) – Integration and MultiDomain Capabilities

5 Enterprise MPLS

6 Carrier Neutral Facilities (CNF)

7 Cloud Connectivity

8 Security

9 Automation

Part 3 – Real World Use Cases

10 Global Manufacturing Use Case with SDA, SDWAN and CNFs

11 Financial Industry with ACI, MPLS and Security

12 Retail Use Case with Cloud, SDWAN and SDA

13 Public Sector Use Case

14 Transportation Use Case

Detecting, Troubleshooting, and Preventing Congestion in Storage Networks

فهرست مطالب:

1 Introduction to Congestion in Storage Networks

2 Understanding Congestion in Fibre Channel Fabrics

3 Detecting Congestion in Fibre Channel Fabrics

4 Troubleshooting Congestion in Fibre Channel Fabrics

5 Solving Congestion by Storage I/O Performance Monitoring

6 Preventing Congestion in Fibre Channel Fabrics

7 Congestion Management in Ethernet Storage Networks

8 Congestion Management in TCP Storage Networks

9 Congestion Management in Cisco UCS Servers

DevOps with Windows Server 2016: Obtain Enterprise Agility and Continuous Delivery by Implementing DevOps with Windows Server 2016

فهرست مطالب:

Preface

Chapter 1: Introducing DevOps 9

Chapter 2: DevOps Tools and Technologies

Chapter 3: DevOps Automation Primer

Chapter 4: Nano, Containers, and Docker Primer

Chapter 5: Building a Sample Application

Chapter 6: Source Code Control

Chapter 7: Configuration Management

Chapter 8: Configuration Management and Operational Validation

Chapter 9: Continuous Integration

Chapter 10: Continuous Delivery and Deployment

Chapter 11: Monitoring and Measuring

Index

Digital Forensics Essentials Professional Series

فهرست مطالب کتاب Digital Forensics Essentials Professional Series:

Module 01: Computer Forensics Fundamentals

Fundamentals of Computer Forensics

Digital Evidence

Forensic Readiness

Roles and Responsibilities of a Forensic Investigator

Legal Compliance in Computer Forensics

Module 02: Computer Forensics Investigation Process

Forensic Investigation Process and its Importance

Forensic Investigation Process – Pre-investigation Phase

Forensic Investigation Process – Investigation Phase

Forensic Investigation Process – Post-investigation Phase

Module 03: Understanding Hard Disks and File Systems

Different Types of Disk Drives and their Characteristics

Logical Structure of a Disk

Booting Process of Windows, Linux, and Mac Operating Systems

File Systems of Windows, Linux, and Mac Operating Systems

File System Examination

Module 04: Data Acquisition and Duplication

Data Acquisition Fundamentals

Types of Data Acquisition

Data Acquisition Format

Data Acquisition Methodology

Module 05: Defeating Anti-forensics Techniques

Anti-forensics and its Techniques

Anti-forensics Countermeasures

Module 06: Windows Forensics

Volatile and Non-Volatile Information

Windows Memory and Registry Analysis

Cache, Cookie, and History Recorded in Web Browsers

Windows Files and Metadata

Module 07: Linux and Mac Forensics

Volatile and Non-Volatile Data in Linux

Analyze Filesystem Images Using The Sleuth Kit

Memory Forensics

Mac Forensics

Module 08: Network Forensics

Network Forensics Fundamentals

Event Correlation Concepts and Types

Identify Indicators of Compromise (IoCs) from Network Logs

Investigate Network Traffic

Module 09: Investigating Web Attacks

Web Application Forensics

IIS and Apache Web Server Logs

Investigating Web Attacks on Windows-based Servers

Detect and Investigate Attacks on Web Applications

Module 10: Dark Web Forensics

Dark Web

Dark Web Forensics

Tor Browser Forensics

Module 11: Investigating Email Crimes

Email Basics

Email Crime Investigation and its Steps

Module 12: Malware Forensics

Malware, its Components and Distribution Methods

Malware Forensics Fundamentals and Recognize Types of Malware Analysis

Static Malware Analysis

Analyze Suspicious Word Documents

Dynamic Malware Analysis

System Behavior Analysis

Network Behavior Analysis

Glossary

References

Domain-Driven Design Distilled

فهرست مطالب کتاب Domain-Driven Design Distilled:

Chapter 1: DDD for Me

Chapter 2: Strategic Design with Bounded Contexts and the Ubiquitous Language

Chapter 3: Strategic Design with Subdomains

Chapter 4: Strategic Design with Context Mapping

Chapter 5: Tactical Design with Aggregates

Chapter 6: Tactical Design with Domain Events

Chapter 7: Acceleration and Management Tools

EC-Council Certified Incident Handler v3 – CEI Material

فهرست مطالب کتاب Certified Incident Handler: Building a Culture of Security:

What Is ECIH

ECIH TRAINING SCHEDULE AND EXAM Information

How to Access Course rel ated material

CLASS MINIMUM REQUIREMENTS, Basic Lab Setup

Requirements, and Lab Setup Environment

What Is EC-COUNCIL CYBERQ

What shoul d you ensure before going to Cl ass

How to Teach ECIH

Where to get help