HTTP The Definitive Guide
فهرست مطالب کتاب HTTP The Definitive Guide :
Part I. HTTP: The Web’s Foundation
Part II. HTTP Architecture
Part III. Identification, Authorization, and Security
Part IV. Entities, Encodings, and Internationalization
Part V. Content Publishing and Distribution
Part VI. Appendixes
IAPP CIPM Certified Information Privacy Manager Study Guide
فهرست مطالب کتاب IAPP CIPM Certified Information Privacy Manager Study Guide:
Introduction
Chapter 1: Developing a Privacy Program
Chapter 2: Privacy Program Framework
Chapter 3: Privacy Operational Life Cycle: Assess
Chapter 4: Privacy Operational Life Cycle: Protect
Chapter 5: Privacy Operational Life Cycle: Sustain
Chapter 6: Privacy Operational Life Cycle: Respond
Index
ICS-410-1 ICS Ovenriew
فهرست مطالب:
GICSP Overview
ICS Concepts
EXERCISE l.l: Learningfrom Peers
Purdue Levels 0 and I
ExERcısE l.2: Programming a PLC
Purdue Levels 2 and 3
scADA
ExERcısE l.3: Programmingan HMl
lT and ICS Differences
Physical and Cybersecurity
Secure ICS Network Architectures
EXERCISE 1.4: Architecting a Secure DCS
ICS-410-2: Field Devices and Controllers
فهرست مطالب:
ICS Attack Surhce
Purdue Level 0 and I Attacks
Control Things Platform
ExERcısE 2. l: Finding Passwords in EEPRoM Dumps
Level 0 and I Technologies
ExERcısE 2.2: Exploring Fieldbus Protocols
Purdue Level 0 and I Defenses
Ethernet and TCP/lP
ExERcısE 2.3: Network Capture Analysis
ICS Protocols overTCP/IP
Attack on Networks
ExERcısE 2’4: Enumerating ModbusTCP
ICS-410-3: Supervisory Systems
فهرست مطالب:
Enforcement Zone Devices
Understanding Basic Cryptography
WirelessTechnologies
Wireless Attacks and Defenses
ExERcısE 3.I: Network Forensics of an Attack
Purdue Level 2 and 3 Attacks
Historians and Databases
ExERcIsE 3.2ı BypassingAuthentication with SQL lnjection
HMI and UlAtocks
Password Defenses
ExERcısE 3.3: Password Fuzzing
ICS-410-4: Workstations and Servers
فهرست مطالب:
Patching ICS Systems
Defending Microsoft Windows
EXERCISE 4.1 : Baselining with PowerShell
Defending Unix and Linux
Endpoint Security Software
EXERC I SE 4.2: Configuring Host-Based Firewalls
Event Logging and Analysis
ExERcısE 4.3: Windows Event Logs
Honeypots
Attacks on the Perimeter
ExERcısE 4.4: Finding Remote Access
ICS-410-5 ICS Secutiy Governance
فهرست مطالب:
Building an ICS Cybersecurity Program
Creating ICS Cybersecurit Polic
Disaster Recovery
Measuring Cybersecurity Risk
lncident Response
EXERCISE 5. I : lncident ResponseTabletop Exercise
Final Thoughts and Next Steps
ICS515.1 Threat Intelligence
فهرست مطالب:
Day 1: Threat Intelligence
Day 2: Asset ID’ing and NSM
Day 3: Incident Response
Day 4: Threat and Environment Manipulation
Day 5: Under Attack!
ICS515.2 Asset Identification and Network Security Monitoring
فهرست مطالب:
Case Study: Havex
ICS Asset and Network Visibility
ICS Network Security Monitoring – Collection
ICS Network Security Monitoring – Detection
ICS Network Security Monitoring – Analysis
ICS515.3 Incident Response
فهرست مطالب:
Case Study: German Steelworks Attack
Incident Response and Digital Forensics Overview
Evidence Acquisition
Sources of Forensic Data in ICS Networks
Memory Forensics and Identifying Capabilities
Integrated Timely Analysis
ICS515.4 Threat and Environment Manipulation
فهرست مطالب:
Case Study: BlackEnergy2
ICS Threat and Environment Manipulation Goals and Considerations
Analyzing Acquired Evidence
Case Study: Ukraine Power Grid Attack 2015
Malware Analysis Methodologies
Case Study: CRASHOVERRIDE
Documenting Knowledge
Case Study: TRISIS