Lean Enterprise: How High Performance Organizations Innovate at Scale

فهرست مطالب کتاب Lean Enterprise:

PART I: ORIENT

Chapter 1 – Introduction

Chapter 2 – Manage the Dynamics of the Enterprise Portfolio

PART II: EXPLORE

Chapter 3 – Model and Measure Investment Risk

Chapter 4 – Explore Uncertainty to Detect Opportunities

Chapter 5 – Evaluate the Product/Market Fit

PART III: EXPLOIT

Chapter 6 – Deploy Continuous Improvement

Chapter 7 – Identify Value and Increase Flow

Chapter 8 – Adopt Lean Engineering Practices

Chapter 9 – Take an Experimental Approach to Product Development

Chapter 10 – Implement Mission Command

PART IV: TRANSFORM

Chapter 11 – Grow an Innovation Culture

Chapter 12 – Embrace Lean Thinking for Governance, Risk, and Compliance

Chapter 13 – Evolve Financial Management to Drive Product Innovation

Chapter 14 – Turn IT into a Competitive Advantage

Chapter 15 – Start Where You Are

Lean UX: Applying Lean Principles to Improve User Experience

فهرست مطالب کتاب Lean UX:

Section I: Introduction and Principles

Chapter 1: Why Lean UX?

Chapter 2: Principles

Section II: Process

Chapter 3: Vision, Framing, and Outcomes

Chapter 4: Collaborative Design

Chapter 5: MVPs and Experiments

Chapter 6: Feedback and Research

Section III: Making It Work

Chapter 7: Integrating Lean UX and Agile

Chapter 8: Making Organizational Shifts

Learn Kali Linux 2019 Perform powerful penetration testing using Kali Linux

فهرست مطالب کتاب Learn Kali Linux 2019:

Section 1: Kali Linux Basics

Chapter 1: Introduction to Hacking

Chapter 2: Setting Up Kali – Part 1

Chapter 3: Setting Up Kali – Part 2

Chapter 4: Getting Comfortable with Kali Linux 2019

Section 2: Reconnaissance

Chapter 5: Passive Information Gathering

Chapter 6: Active Information Gathering

Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019

Chapter 7: Working with Vulnerability Scanners

Chapter 8: Understanding Network Penetration Testing

Chapter 9: Network Penetration Testing – Pre-Connection Attacks

Chapter 10: Network Penetration Testing – Gaining Access

Chapter 11: Network Penetration Testing – Post-Connection Attacks

Chapter 12: Network Penetration Testing – Detection and Security

Chapter 13: Client-Side Attacks – Social Engineering

Chapter 14: Performing Website Penetration Testing

Chapter 15: Website Penetration Testing – Gaining Access

Chapter 16: Best Practices

Learn Wireshark

فهرست مطالب:

Preface 1

Chapter 1: Appreciating Traffic Analysis 7

Chapter 2: Using Wireshark NG

Chapter 3: Installing Wireshark on a PC or macOS

Chapter 4: Exploring the Wireshark Interface

Chapter 5: Tapping into the Data Stream

Chapter 6: Personalizing the Interface

Chapter 7: Using Display and Capture Filters

Chapter 8: Outlining the OSI Model

Chapter 9: Decoding TCP and UDP

Chapter 10: Managing TCP Connections

Chapter 11: Analyzing IPv4 and IPv6

Chapter 12: Discovering ICMP

Chapter 13: Understanding ARP

Chapter 14: Troubleshooting Latency Issues

Chapter 15: Subsetting, Saving, and Exporting Captures

Chapter 16: Using CloudShark for Packet Analysis

Assessment

Other Books You May Enjoy

Index

Learning Data Mining with Python

فهرست مطالب کتاب Learning Data Mining with Python:

Chapter 1: Getting Started with Data Mining

Chapter 2: Classifying with scikit-learn Estimators

Chapter 3: Predicting Sports Winners with Decision Trees

Chapter 4: Recommending Movies Using Affinity Analysis

Chapter 5: Extracting Features with Transformers

Chapter 6: Social Media Insight Using Naive Bayes

Chapter 7: Discovering Accounts to Follow Using Graph Mining

Chapter 8: Beating CAPTCHAs with Neural Networks

Chapter 9: Authorship Attribution

Chapter 10: Clustering News Articles

Chapter 11: Classifying Objects in Images Using Deep Learning

Chapter 12: Working with Big Data

Appendix: Next Steps

Learning Materials LPIC-1 (101)

فهرست مطالب کتاب Learning Materials LPIC-1 (101):

Topic 101: System Architecture

Topic 102: Linux Installation and Package Management

Topic 103: GNU and Unix Commands

Topic 104: Devices, Linux Filesystems, Filesystem Hierarchy Standard

Imprint

Learning Python Network Programming Utilize Python 3 to get network applications up and running quickly and easily

فهرست مطالب کتاب Learning Python Network Programming:

Chapter 1: Network Programming and Python

Chapter 2: HTTP and Working with the Web

Chapter 3: APIs in Action

Chapter 4: Engaging with E-mails

Chapter 5: Interacting with Remote Systems

Chapter 6: IP and DNS

Chapter 7: Programming with Sockets

Chapter 8: Client and Server Applications

Chapter 9: Applications for the Web

Learning VMware NSX (Second Edition)

فهرست مطالب:

Preface

Introduction to Network Virtualization

NSX Core Components

NSX Installation and Configuration

NSX Functional Services

Edge Services Gateway

Service Composer

Monitoring

Managing NSX

Conclusion

Linux Bible (Ninth Edition)

فهرست مطالب کتاب Linux Bible (Ninth Edition):

Acknowledgments

Introduction

Part I: Getting Started

Chapter 1: Starting with Linux

Chapter 2: Creating the Perfect Linux Desktop

Part II: Becoming a Linux Power User

Chapter 3: Using the Shell

Chapter 4: Moving around the Filesystem

Chapter 5: Working with Text Files

Chapter 6: Managing Running Processes

Chapter 7: Writing Simple Shell Scripts

Part III: Becoming a Linux System Administrator

Chapter 8: Learning System Administration

Chapter 9: Installing Linux

Chapter 10: Getting and Managing Software

Chapter 11: Managing User Accounts

Chapter 12: Managing Disks and Filesystems

Part IV: Becoming a Linux Server Administrator

Chapter 13: Understanding Server Administration

Chapter 14: Administering Networking

Chapter 15: Starting and Stopping Services

Chapter 16: Configuring a Print Server

Chapter 17: Configuring a Web Server

Chapter 18: Configuring an FTP Server

Chapter 19: Configuring a Windows File Sharing (Samba) Server

Chapter 20: Configuring an NFS File Server

Chapter 21: Troubleshooting Linux

Part V: Learning Linux Security Techniques

Chapter 22: Understanding Basic Linux Security

Chapter 23: Understanding Advanced Linux Security

Chapter 24: Enhancing Linux Security with SELinux

Chapter 25: Securing Linux on a Network

Part VI: Extending Linux into the Cloud

Chapter 26: Using Linux for Cloud Computing

Chapter 27: Deploying Linux to the Cloud

Part VII: Appendixes

Appendix A: Media

Appendix B: Exercise Answers

Index

Linux Essentials for Cybersecurity

فهرست مطالب:

Introduction

Part I: Introducing Linux

Part II: User and Group Accounts

Part III: File and Data Storage

Part IV: Automation

Part V: Networking

Part VI: Process and Log Administration

Part VII: Software Management

Part VIII: Security Tasks

Appendix A: Answers to Review Questions

Appendix B: Resource Guide

Glossary

Index

Linux Essentials Version 1.6 English (010)

فهرست مطالب کتاب Linux Essentials Version 1.6 English (010):

TOPIC 1: THE LINUX COMMUNITY AND A CAREER IN OPEN SOURCE

1 Linux Evolution and Popular Operating Systems

2 Major Open Source Applications

3 Open Source Software and Licensing

4 ICT Skills and Working in Linux

TOPIC 2: FINDING YOUR WAY ON A LINUX SYSTEM

1 Command Line Basics

2 Using the Command Line to Get Help

3 Using Directories and Listing Files

4 Creating, Moving and Deleting Files

TOPIC 3: THE POWER OF THE COMMAND LINE

1 Archiving Files on the Command Line

2 Searching and Extracting Data from Files

3 Turning Commands into a Script

TOPIC 4: THE LINUX OPERATING SYSTEM

1 Choosing an Operating System

2 Understanding Computer Hardware

3 Where Data is Stored

4 Your Computer on the Network

TOPIC 5: SECURITY AND FILE PERMISSIONS

1 Basic Security and Identifying User Types

2 Creating Users and Groups

3 Managing File Permissions and Ownership

4 Special Directories and Links