Lean Enterprise: How High Performance Organizations Innovate at Scale
فهرست مطالب کتاب Lean Enterprise:
PART I: ORIENT
Chapter 1 – Introduction
Chapter 2 – Manage the Dynamics of the Enterprise Portfolio
PART II: EXPLORE
Chapter 3 – Model and Measure Investment Risk
Chapter 4 – Explore Uncertainty to Detect Opportunities
Chapter 5 – Evaluate the Product/Market Fit
PART III: EXPLOIT
Chapter 6 – Deploy Continuous Improvement
Chapter 7 – Identify Value and Increase Flow
Chapter 8 – Adopt Lean Engineering Practices
Chapter 9 – Take an Experimental Approach to Product Development
Chapter 10 – Implement Mission Command
PART IV: TRANSFORM
Chapter 11 – Grow an Innovation Culture
Chapter 12 – Embrace Lean Thinking for Governance, Risk, and Compliance
Chapter 13 – Evolve Financial Management to Drive Product Innovation
Chapter 14 – Turn IT into a Competitive Advantage
Chapter 15 – Start Where You Are
Lean UX: Applying Lean Principles to Improve User Experience
فهرست مطالب کتاب Lean UX:
Section I: Introduction and Principles
Chapter 1: Why Lean UX?
Chapter 2: Principles
Section II: Process
Chapter 3: Vision, Framing, and Outcomes
Chapter 4: Collaborative Design
Chapter 5: MVPs and Experiments
Chapter 6: Feedback and Research
Section III: Making It Work
Chapter 7: Integrating Lean UX and Agile
Chapter 8: Making Organizational Shifts
Learn Kali Linux 2019 Perform powerful penetration testing using Kali Linux
فهرست مطالب کتاب Learn Kali Linux 2019:
Section 1: Kali Linux Basics
Chapter 1: Introduction to Hacking
Chapter 2: Setting Up Kali – Part 1
Chapter 3: Setting Up Kali – Part 2
Chapter 4: Getting Comfortable with Kali Linux 2019
Section 2: Reconnaissance
Chapter 5: Passive Information Gathering
Chapter 6: Active Information Gathering
Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019
Chapter 7: Working with Vulnerability Scanners
Chapter 8: Understanding Network Penetration Testing
Chapter 9: Network Penetration Testing – Pre-Connection Attacks
Chapter 10: Network Penetration Testing – Gaining Access
Chapter 11: Network Penetration Testing – Post-Connection Attacks
Chapter 12: Network Penetration Testing – Detection and Security
Chapter 13: Client-Side Attacks – Social Engineering
Chapter 14: Performing Website Penetration Testing
Chapter 15: Website Penetration Testing – Gaining Access
Chapter 16: Best Practices
Learn Packet Tracer by Examples
فهرست مطالب کتاب Learn Packet Tracer by Examples:
ندارد
Learn Wireshark
فهرست مطالب:
Preface 1
Chapter 1: Appreciating Traffic Analysis 7
Chapter 2: Using Wireshark NG
Chapter 3: Installing Wireshark on a PC or macOS
Chapter 4: Exploring the Wireshark Interface
Chapter 5: Tapping into the Data Stream
Chapter 6: Personalizing the Interface
Chapter 7: Using Display and Capture Filters
Chapter 8: Outlining the OSI Model
Chapter 9: Decoding TCP and UDP
Chapter 10: Managing TCP Connections
Chapter 11: Analyzing IPv4 and IPv6
Chapter 12: Discovering ICMP
Chapter 13: Understanding ARP
Chapter 14: Troubleshooting Latency Issues
Chapter 15: Subsetting, Saving, and Exporting Captures
Chapter 16: Using CloudShark for Packet Analysis
Assessment
Other Books You May Enjoy
Index
Learning Data Mining with Python
فهرست مطالب کتاب Learning Data Mining with Python:
Chapter 1: Getting Started with Data Mining
Chapter 2: Classifying with scikit-learn Estimators
Chapter 3: Predicting Sports Winners with Decision Trees
Chapter 4: Recommending Movies Using Affinity Analysis
Chapter 5: Extracting Features with Transformers
Chapter 6: Social Media Insight Using Naive Bayes
Chapter 7: Discovering Accounts to Follow Using Graph Mining
Chapter 8: Beating CAPTCHAs with Neural Networks
Chapter 9: Authorship Attribution
Chapter 10: Clustering News Articles
Chapter 11: Classifying Objects in Images Using Deep Learning
Chapter 12: Working with Big Data
Appendix: Next Steps
Learning Materials LPIC-1 (101)
فهرست مطالب کتاب Learning Materials LPIC-1 (101):
Topic 101: System Architecture
Topic 102: Linux Installation and Package Management
Topic 103: GNU and Unix Commands
Topic 104: Devices, Linux Filesystems, Filesystem Hierarchy Standard
Imprint
Learning Python Network Programming Utilize Python 3 to get network applications up and running quickly and easily
فهرست مطالب کتاب Learning Python Network Programming:
Chapter 1: Network Programming and Python
Chapter 2: HTTP and Working with the Web
Chapter 3: APIs in Action
Chapter 4: Engaging with E-mails
Chapter 5: Interacting with Remote Systems
Chapter 6: IP and DNS
Chapter 7: Programming with Sockets
Chapter 8: Client and Server Applications
Chapter 9: Applications for the Web
Learning VMware NSX (Second Edition)
فهرست مطالب:
Preface
Introduction to Network Virtualization
NSX Core Components
NSX Installation and Configuration
NSX Functional Services
Edge Services Gateway
Service Composer
Monitoring
Managing NSX
Conclusion
Linux Bible (Ninth Edition)
فهرست مطالب کتاب Linux Bible (Ninth Edition):
Acknowledgments
Introduction
Part I: Getting Started
Chapter 1: Starting with Linux
Chapter 2: Creating the Perfect Linux Desktop
Part II: Becoming a Linux Power User
Chapter 3: Using the Shell
Chapter 4: Moving around the Filesystem
Chapter 5: Working with Text Files
Chapter 6: Managing Running Processes
Chapter 7: Writing Simple Shell Scripts
Part III: Becoming a Linux System Administrator
Chapter 8: Learning System Administration
Chapter 9: Installing Linux
Chapter 10: Getting and Managing Software
Chapter 11: Managing User Accounts
Chapter 12: Managing Disks and Filesystems
Part IV: Becoming a Linux Server Administrator
Chapter 13: Understanding Server Administration
Chapter 14: Administering Networking
Chapter 15: Starting and Stopping Services
Chapter 16: Configuring a Print Server
Chapter 17: Configuring a Web Server
Chapter 18: Configuring an FTP Server
Chapter 19: Configuring a Windows File Sharing (Samba) Server
Chapter 20: Configuring an NFS File Server
Chapter 21: Troubleshooting Linux
Part V: Learning Linux Security Techniques
Chapter 22: Understanding Basic Linux Security
Chapter 23: Understanding Advanced Linux Security
Chapter 24: Enhancing Linux Security with SELinux
Chapter 25: Securing Linux on a Network
Part VI: Extending Linux into the Cloud
Chapter 26: Using Linux for Cloud Computing
Chapter 27: Deploying Linux to the Cloud
Part VII: Appendixes
Appendix A: Media
Appendix B: Exercise Answers
Index
Linux Essentials for Cybersecurity
فهرست مطالب:
Introduction
Part I: Introducing Linux
Part II: User and Group Accounts
Part III: File and Data Storage
Part IV: Automation
Part V: Networking
Part VI: Process and Log Administration
Part VII: Software Management
Part VIII: Security Tasks
Appendix A: Answers to Review Questions
Appendix B: Resource Guide
Glossary
Index
Linux Essentials Version 1.6 English (010)
فهرست مطالب کتاب Linux Essentials Version 1.6 English (010):
TOPIC 1: THE LINUX COMMUNITY AND A CAREER IN OPEN SOURCE
1 Linux Evolution and Popular Operating Systems
2 Major Open Source Applications
3 Open Source Software and Licensing
4 ICT Skills and Working in Linux
TOPIC 2: FINDING YOUR WAY ON A LINUX SYSTEM
1 Command Line Basics
2 Using the Command Line to Get Help
3 Using Directories and Listing Files
4 Creating, Moving and Deleting Files
TOPIC 3: THE POWER OF THE COMMAND LINE
1 Archiving Files on the Command Line
2 Searching and Extracting Data from Files
3 Turning Commands into a Script
TOPIC 4: THE LINUX OPERATING SYSTEM
1 Choosing an Operating System
2 Understanding Computer Hardware
3 Where Data is Stored
4 Your Computer on the Network
TOPIC 5: SECURITY AND FILE PERMISSIONS
1 Basic Security and Identifying User Types
2 Creating Users and Groups
3 Managing File Permissions and Ownership
4 Special Directories and Links