Good to Great: Why Some Companies Make the Leap … and Others Don’t
فهرست مطالب کتاب Good to Great: Why Some Companies Make the Leap … and Others Don’t:
Chapter 1 – Good is the Enemy of Great
Chapter 2 – Level 5 Leadership
Chapter 3 – First Who … Then What
Chapter 4 – Confront The Brutal Facts (Yet Never Lose Faith)
Chapter 5 – The Hedgehog Concept – (Simplicity within the Three Circles)
Chapter 6 – A Culture of Discipline
Chapter 7 – Technology Accelerators
Chapter 8 – The Flywheel and The Doom Loop
Chapter 9 – From Good To Great To Built To Last
Epilogue – Frequently Asked Questions
Appendix 1.A – Selection Process for Good-To-Great Companies
Appendix 1.B – Direct Comparison Selections
Appendix 1.C – Unsustained Comparisons
Appendix 1.D – Overview of Research Steps
Appendix 2.A – Inside Versus Outside CEO Analysis
Appendix 5.A – Industry Analysis Rankings
Appendix 8.A – Doom Loop Behavior in the Comparison Companies
Appendix 8.B – Summary of Acquisition Analysis
Gray Hat Hacking The Ethical Hackers Handbook (Second Edition)
فهرست مطالب کتاب Gray Hat Hacking The Ethical Hackers Handbook:
Part I – Introduction to Ethical Disclosure
Chapter 1: Ethics of Ethical Hacking
Chapter 2: Ethical Hacking and the Legal System
Chapter 3: Proper and Ethical Disclosure
Part II – Penetration Testing and Tools
Chapter 4: Using Metasploit
Chapter 5: Using the BackTrack LiveCD Linux Distribution
Part III – Exploits 101
Chapter 6: Programming Survival Skills
Chapter 7: Basic Linux Exploits
Chapter 8: Advanced Linux Exploits
Chapter 9: Shellcode Strategies
Chapter 10: Writing Linux Shellcode
Chapter 11: Basic Windows Exploits
Part IV – Vulnerability Analysis
Chapter 12: Passive Analysis
Chapter 13: Advanced Static Analysis with IDA Pro
Chapter 14: Advanced Reverse Engineering
Chapter 15: Client-Side Browser Exploits
Chapter 16: Exploiting Windows Access Control Model for Local Elevation of Privilege
Chapter 17: Intelligent Fuzzing with Sulley
Chapter 18: From Vulnerability to Exploit
Chapter 19: Closing the Holes: Mitigation
Part V – Malware Analysis
Chapter 20: Collecting Malware and Initial Analysis
Chapter 21: Hacking Malware
Group Policy Fundamentals, Security, and the Managed Desktop
فهرست مطالب کتاب Group Policy Fundamentals, Security, and the Managed Desktop:
1 Starting Up a Cisco Router
2 Domestic Router Functions Configuration
3 Routing Protocols Configuration
4 Advanced Routing Protocols Configuration
5 WAN Technologies
6 Security Configuration
7 Cisco Router Management
8 Remote Connectivity to Cisco Router
9 Hints and Tips
Guide to Cisco Routers Configuration Becoming a Router Geek
فهرست مطالب کتاب Guide to Cisco Routers Configuration Becoming a Router Geek:
1 Starting Up a Cisco Router
2 Domestic Router Functions Configuration
3 Routing Protocols Configuration
4 Advanced Routing Protocols Configuration
5 WAN Technologies
6 Security Configuration
7 Cisco Router Management
8 Remote Connectivity to Cisco Router
9 Hints and Tips
Further Guidance
Hackers & Painters: Big Ideas from the Computer Age
فهرست مطالب کتاب Hackers & Painters: Big Ideas from the Computer Age:
1. Why Nerds Are Unpopular
2. Hackers and Painters
3. What You Can’t Say
4. Good Bad Attitude
5. The Other Road Ahead
6. How to Make Wealth
7. Mind the Gap
8. A Plan for Spam
9. Taste for Makers
10. Programming Languages Explained
11. The Hundred-Year Language
12. Beating the Averages
13. Revenge of the Nerds
14. The Dream Language
15. Design and Research
Hackers Delight (Second Edition)
فهرست مطالب کتاب Hacker’s Delight (Second Edition):
Chapter 1. Introduction
Chapter 2. Basics
Chapter 3. Power-Of-2 Boundaries
Chapter 4. Arithmetic Bounds
Chapter 5. Counting Bits
Chapter 6. Searching Words
Chapter 7. Rearranging Bits And Bytes
Chapter 8. Multiplication
Chapter 9. Integer Division
Chapter 10. Integer Division By Constants
Chapter 11. Some Elementary Functions
Chapter 12. Unusual Bases For Number Systems
Chapter 13. Gray Code
Chapter 14. Cyclic Redundancy Check
Chapter 15. Error-Correcting Codes
Chapter 16. Hilbert’s Curve
Chapter 17. Floating-Point
Chapter 18. Formulas For Primes
Hacking with Python The Ultimate Beginners Guide
فهرست مطالب Hacking with Python The Ultimate Beginners Guide:
Chapter 1: Preparation For Hacking
Chapter 2: Python Basics
Chapter 3: Writing Python Programs
Chapter 5: Operators and Expressions
Chapter 6: Functions and Modules
Chapter 7: Setting Up for Hacking
Chapter 8: Network Hacking
Chapter 9: Hacks for the Web
Chapter 10: Understanding Attacks Using Python
Chapter 11: Other Nifty Hacks to Try
Conclusion
Bonus: Preview Of ‘Introduction to Python 3
How Google Tests Software
فهرست مطالب کتاب How Google Tests Software:
Foreword & Preface
Foreword by Alberto Savoia
Foreword by Patrick Copeland
Preface
Chapter 1: Introduction to Google Software Testing
Quality ≠ Test
Roles
Organizational Structure
Crawl, Walk, Run
Types of Tests
Chapter 2: The Software Engineer in Test
The Life of an SET
Development and Test Workflow
Who Are These SETs Anyway?
The Early Phase of a Project
Team Structure
Design Docs
Interfaces and Protocols
Automation Planning
Testability
SET Workflow: An Example
Test Execution
Test Size Definitions
Use of Test Sizes in Shared Infrastructure
Benefits of Test Sizes
Test Runtime Requirements
Case Study: Change in Common Library
Test Certified
Interviews:
Founders of the Test Certified Program
SETs
Tool Developer Ted Mao
WebDriver Creator Simon Stewart
Chapter 3: The Test Engineer
A User-Facing Test Role
The Life of a TE
Test Planning
Risk
Life of a Test Case
Life of a Bug
Recruiting TEs
Test Leadership at Google
Maintenance Mode Testing
Quality Bots Experiment
BITE Experiment
Google Test Analytics
Free Testing Workflow
External Vendors
Interviews:
Google Docs TE – Lindsay Webster
YouTube TE – Apple Chow
Chapter 4: The Test Engineering Manager
The Life of a TEM
Getting Projects and People
Impact
Interviews:
Gmail TEM – Ankit Mehta
Android TEM – Hung Dang
Chrome TEM – Joel Hynoski
The Test Engineering Director
Interviews:
Search & Geo Test Director – Shelton Mar
Engineering Tools Director – Ashish Kumar
Google India Test Director – Sujay Sahni
Engineering Manager – Brad Green
James Whittaker
Chapter 5: Improving How Google Tests Software
Fatal Flaws in Google’s Process
The Future of the SET
The Future of the TE
The Future of the Test Director and Manager
The Future of Test Infrastructure
In Conclusion
Appendix A: Chrome OS Test Plan
Overview of Themes
Risk Analysis
Per-Build Baseline Testing
Per-LKG Day Testing
Per-Release Testing
Manual Versus Automation
Dev Versus Test Quality Focus
Release Channels
User Input
Test Case Repositories
Test Dashboarding
Virtualization
Performance
Stress, Long-Running, and Stability
Test Execution Framework (Autotest)
OEMs
Hardware Lab
E2E Farm Automation
Testing the Browser AppManager
Browser Testability
Hardware
Timeline
Primary Test Drivers
Relevant Documents
Appendix B: Test Tours for Chrome
The Shopping Tour
The Student Tour
The International Calling Tour
The Landmark Tour
The All Nighter Tour
The Artisan’s Tour
Tools in Chrome
The Bad Neighborhood Tour
The Personalization Tour
Appendix C: Blog Posts on Tools and Code
Take a BITE out of Bugs and Redundant Labor
Unleash the QualityBots
RPF: Google’s Record Playback Framework
Google Test Analytics — Now in Open Source
Comprehensive
Quick
Actionable
Sustained Value
Index
How Marketers Master Business Growth on LinkedIn: The Marketer’s Guide
فهرست مطالب کتاب How Marketers Master Business Growth on LinkedIn:
ندارد
How to Use Instagram for Business: Guide 2023
فهرست مطالب:
Introduction
Identifying goals & creating a strategy
Engagement and followers
Square pix to video: Insta today
Instagram: The Platform In-depth
Conclusion
Additional resources
HPE Synergy Administration Student Guide
فهرست مطالب کتاب HPE Synergy Administration Student Guide:
Module 0: Course Overview
Module 1: HPE Synergy Solution
Module 2: HPE Synergy Cabling
Module 3: HPE Synergy Networking
Module 4: HPE Synergy Storage
Module 5: HPE Synergy Composability
Module 6: HPE Synergy Firmware
Module 7: HPE Synergy Analytics
Module 8: HPE Synergy Maintenance and Growth
HPE Synergy For Dummies, 2nd Edition
فهرست مطالب:
Introduction
Chapter 1 The Idea Economy and Composable Infrastructure
Chapter 2 HPE Synergy Overview
Chapter 3 HPE Synergy Frame
Chapter 4 HPE Synergy Composer
Chapter 5 HPE Synergy Image Streamer
Chapter 6 HPE Synergy Composable Compute
Chapter 7 HPE Synergy Composable Storage
Chapter 8 HPE Synergy Composable Fabric
Chapter 9 Ten Key Tips about Synergy
Appendix HPE Services for Synergy