HTTP The Definitive Guide

فهرست مطالب کتاب HTTP The Definitive Guide :

Part I. HTTP: The Web’s Foundation

Part II. HTTP Architecture

Part III. Identification, Authorization, and Security

Part IV. Entities, Encodings, and Internationalization

Part V. Content Publishing and Distribution

Part VI. Appendixes

IAPP CIPM Certified Information Privacy Manager Study Guide

فهرست مطالب کتاب IAPP CIPM Certified Information Privacy Manager Study Guide:

Introduction

Chapter 1: Developing a Privacy Program

Chapter 2: Privacy Program Framework

Chapter 3: Privacy Operational Life Cycle: Assess

Chapter 4: Privacy Operational Life Cycle: Protect

Chapter 5: Privacy Operational Life Cycle: Sustain

Chapter 6: Privacy Operational Life Cycle: Respond

Index

ICS-410-1 ICS Ovenriew

فهرست مطالب:

GICSP Overview

ICS Concepts

EXERCISE l.l: Learningfrom Peers

Purdue Levels 0 and I

ExERcısE l.2: Programming a PLC

Purdue Levels 2 and 3

scADA

ExERcısE l.3: Programmingan HMl

lT and ICS Differences

Physical and Cybersecurity

Secure ICS Network Architectures

EXERCISE 1.4: Architecting a Secure DCS

ICS-410-2: Field Devices and Controllers

فهرست مطالب:

ICS Attack Surhce

Purdue Level 0 and I Attacks

Control Things Platform

ExERcısE 2. l: Finding Passwords in EEPRoM Dumps

Level 0 and I Technologies

ExERcısE 2.2: Exploring Fieldbus Protocols

Purdue Level 0 and I Defenses

Ethernet and TCP/lP

ExERcısE 2.3: Network Capture Analysis

ICS Protocols overTCP/IP

Attack on Networks

ExERcısE 2’4: Enumerating ModbusTCP

ICS-410-3: Supervisory Systems

فهرست مطالب:

Enforcement Zone Devices

Understanding Basic Cryptography

WirelessTechnologies

Wireless Attacks and Defenses

ExERcısE 3.I: Network Forensics of an Attack

Purdue Level 2 and 3 Attacks

Historians and Databases

ExERcIsE 3.2ı BypassingAuthentication with SQL lnjection

HMI and UlAtocks

Password Defenses

ExERcısE 3.3: Password Fuzzing

ICS-410-4: Workstations and Servers

فهرست مطالب:

Patching ICS Systems

Defending Microsoft Windows

EXERCISE 4.1 : Baselining with PowerShell

Defending Unix and Linux

Endpoint Security Software

EXERC I SE 4.2: Configuring Host-Based Firewalls

Event Logging and Analysis

ExERcısE 4.3: Windows Event Logs

Honeypots

Attacks on the Perimeter

ExERcısE 4.4: Finding Remote Access

ICS-410-5 ICS Secutiy Governance

فهرست مطالب:

Building an ICS Cybersecurity Program

Creating ICS Cybersecurit Polic

Disaster Recovery

Measuring Cybersecurity Risk

lncident Response

EXERCISE 5. I : lncident ResponseTabletop Exercise

Final Thoughts and Next Steps

ICS515.1 Threat Intelligence

فهرست مطالب:

Day 1: Threat Intelligence

Day 2: Asset ID’ing and NSM

Day 3: Incident Response

Day 4: Threat and Environment Manipulation

Day 5: Under Attack!

ICS515.2 Asset Identification and Network Security Monitoring

فهرست مطالب:

Case Study: Havex

ICS Asset and Network Visibility

ICS Network Security Monitoring – Collection

ICS Network Security Monitoring – Detection

ICS Network Security Monitoring – Analysis

ICS515.3 Incident Response

فهرست مطالب:

Case Study: German Steelworks Attack

Incident Response and Digital Forensics Overview

Evidence Acquisition

Sources of Forensic Data in ICS Networks

Memory Forensics and Identifying Capabilities

Integrated Timely Analysis

ICS515.4 Threat and Environment Manipulation

فهرست مطالب:

Case Study: BlackEnergy2

ICS Threat and Environment Manipulation Goals and Considerations

Analyzing Acquired Evidence

Case Study: Ukraine Power Grid Attack 2015

Malware Analysis Methodologies

Case Study: CRASHOVERRIDE

Documenting Knowledge

Case Study: TRISIS