Mastering Active Directory (Third Edition): Design, deploy, and protect Active Directory Domain Services for Windows Server 2022

فهرست مطالب کتاب Mastering Active Directory (Third Edition):

Chapter 1: Active Directory Fundamentals

Chapter 2: Active Directory Domain Services 2022

Chapter 3: Designing an Active Directory Infrastructure

Chapter 4: Active Directory Domain Name System

Chapter 5: Placing Operations Master Roles

Chapter 6: Migrating to Active Directory 2022

Chapter 7: Managing Active Directory Objects

Chapter 8: Managing Users, Groups, and Devices

Chapter 9: Designing the OU Structure

Chapter 10: Managing Group Policies

Chapter 11: Active Directory Services – Part 01

Chapter 12: Active Directory Services – Part 02

Chapter 13: Active Directory Certificate Services

Chapter 14: Active Directory Federation Services

Chapter 15: Active Directory Rights Management Services

Chapter 16: Active Directory Security Best Practices

Chapter 17: Advanced AD Management with PowerShell

Chapter 18: Hybrid Identity

Chapter 19: Active Directory Audit and Monitoring

Mastering Active Directory Automate tasks by leveraging PowerShell

فهرست مطالب کتاب Mastering Active Directory:

Active Directory Fundamentals Benefits

Active Directory Domain Services 2016

Designing Active Directory Infrastructure

Active Directory Domain Name System

Placing Operations Master Roles

Migrating to Active Directory 2016

Managing Active Directory Objects Tools

Managing Users, Groups, and Devices

Designing the OU Structure

Managing Group Policies

Active Directory Services

Active Directory Certificate Services

Active Directory Federation Services

Active Directory Rights Management Services

Active Directory Security Best Practices

Advanced AD Management with PowerShell

Summary

Active Directory Audit and Monitoring

Active Directory Troubleshooting

Mastering Active Directory, Third Edition: Design, deploy, and protect Active Directory Domain Services for Windows Server 2022

فهرست مطالب کتاب Mastering Active Directory:

Preface

Chapter 1: Active Directory Fundamentals

Chapter 2: Active Directory Domain Services 2022

Chapter 3: Designing an Active Directory Infrastructure

Chapter 4: Active Directory Domain Name System

Chapter 5: Placing Operations Master Roles

Chapter 6: Migrating to Active Directory 2022

Chapter 7: Managing Active Directory Objects

Chapter 8: Managing Users, Groups, and Devices

Chapter 9: Designing the OU Structure

Chapter 10: Managing Group Policies

Chapter 11: Active Directory Services – Part 01

Chapter 12: Active Directory Services – Part 02

Chapter 13: Active Directory Certificate Services

Chapter 14: Active Directory Federation Services

Chapter 15: Active Directory Rights Management Services

Chapter 16: Active Directory Security Best Practices

Chapter 17: Advanced AD Management with PowerShell

Chapter 18: Hybrid Identity

Chapter 19: Active Directory Audit and Monitoring

Index

Mastering Active Directory: Automate tasks by leveraging PowerShell for Active Directory Domain Services 2016

فهرست مطالب کتاب Mastering Active Directory: Automate tasks by leveraging PowerShell for Active Directory Domain Services 2016:

Active Directory Fundamentals Benefits

Active Directory Domain Services 2016

Designing Active Directory Infrastructure

Active Directory Domain Name System

Placing Operations Master Roles

Migrating to Active Directory 2016

Managing Active Directory Objects Tools

Managing Users, Groups, and Devices

Designing the OU Structure

Managing Group Policies

Active Directory Services

Active Directory Certificate Services

Active Directory Federation Services

Active Directory Rights Management Services

Active Directory Security Best Practices

Advanced AD Management with PowerShell

Summary  Azure

Active Directory Audit and Monitoring

Active Directory Troubleshooting

Mastering Cyber Intelligence Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

فهرست مطالب کتاب Mastering Cyber Intelligence: 

Preface

1 Cyber Threat Intelligence Life Cycle

2 Requirements and Intelligence Team Implementation

3 Cyber Threat Intelligence Frameworks

4 Cyber Threat Intelligence Tradecraft and Standards

5 Goal Setting, Procedures for CTI Strategy, and Practical Use

6 Cyber Threat Modeling and Adversary Analysis

7 Threat Intelligence Data Sources

8 Effective Defense Tactics and Data Protection

9 AI Applications in Cyber Threat Analytics

10 Threat Modeling and Analysis – Practical Use Cases

11 Usable Security: Threat Intelligence as Part of the Process

12 SIEM Solutions and Intelligence-Driven SOCs

13 Threat Intelligence Metrics, Indicators of Compromise, and

14 Threat Intelligence Reporting and Dissemination

15 Threat Intelligence Sharing and Cyber Activity Attribution – Practical Use Cases

Index

Mastering Kali Linux for Advanced Penetration Testing

فهرست مطالب:

Title Page

Copyright and Credits

Dedication

About Packt

Contributors

Preface

Goal-Based Penetration Testing

Open Source Intelligence and Passive Reconnaissance

Active Reconnaissance of External and Internal Networks

Vulnerability Assessment

Advanced Social Engineering and Physical Security

Wireless Attacks

Exploiting Web-Based Applications

Client-Side Exploitation

Bypassing Security Controls

Exploitation

Action on the Objective and Lateral Movement

Privilege Escalation

Command and Control

Embedded Devices and RFID Hacking

Other Books You May Enjoy

Mastering Linux Security and Hardening, Second Edition

فهرست مطالب کتابMastering Linux Security and Hardening:

Section 1: Setting up a Secure Linux System

Chapter 1: Running Linux in a Virtual Environment

Chapter 2: Securing User Accounts

Chapter 3: Securing Your Server with a Firewall – Part 1

Chapter 4: Securing Your Server with a Firewall – Part 2

Chapter 5: Encryption Technologies

Chapter 6: SSH Hardening

Section 2: Mastering File and Directory Access Control (DAC)

Chapter 7: Mastering Discretionary Access Control

Chapter 8: Access Control Lists and Shared Directory Management

Section 3: Advanced System Hardening Techniques

Chapter 9: Implementing Mandatory Access Control with SELinux and AppArmor

Chapter 10: Kernel Hardening and Process Isolation

Chapter 11: Scanning, Auditing, and Hardening

Chapter 12: Logging and Log Security

Chapter 13: Vulnerability Scanning and Intrusion Detection

Chapter 14: Security Tips and Tricks for the Busy Bee

Mastering Modern Web Penetration Testing

فهرست مطالب کتاب Mastering Modern Web Penetration Testing:

Chapter 1: Common Security Protocols

Chapter 2: Information Gathering

Chapter 3: Cross-Site Scripting

Chapter 4: Cross-Site Request Forgery

Chapter 5: Exploiting SQL Injection

Chapter 6: File Upload Vulnerabilities

Chapter 7: Metasploit and Web

Chapter 8: XML Attacks

Chapter 9: Emerging Attack Vectors

Chapter 10: OAuth 2.0 Security

Chapter 11: API Testing Methodology

Mastering Python Networking, Third Edition Your one-stop solution to using Python for network automation, programmability, and DevOps

فهرست مطالب کتاب Mastering Python Networking:

Preface

Chapter 1: Review of TCP/IP Protocol Suite and Python

Chapter 2: Low-Level Network Device Interactions

Chapter 3: APIs and Intent-Driven Networking

Chapter 4: The Python Automation Framework – Ansible Basics

Chapter 5: The Python Automation Framework – Beyond Basics

Chapter 6: Network Security with Python

Chapter 7: Network Monitoring with Python – Part 1

Chapter 8: Network Monitoring with Python – Part 2

Chapter 9: Building Network Web Services with Python

Chapter 10: AWS Cloud Networking

Chapter 11: Azure Cloud Networking

Chapter 12: Network Data Analysis with Elastic Stack

Chapter 13: Working with Git

Chapter 14: Continuous Integration with Jenkins

Chapter 15: Test-Driven Development for Networks

Index

Mastering Ubuntu Server – Second Edition

فهرست مطالب:

Preface

Chapter 1 – Deploying Ubuntu Server

Chapter 2 – Managing Users

Chapter 3 – Managing Storage Volumes

Chapter 4 – Connecting to Networks

Chapter 5 – Managing Software Packages

Chapter 6 – Controlling and Monitoring Processes

Chapter 7 – Setting Up Network Services

Chapter 8 – Accessing and sharing files

Chapter 9 – Sharing and Transferring Files

Chapter 10 – Serving Web Content

Chapter 11 – Learning Advanced Shell Techniques

Chapter 12 – Virtualization

Chapter 13 – Running Containers

Chapter 14 – Automating Server Configuration with Ansible

Chapter 15 – Securing Your Server

Chapter 16 – Troubleshooting Ubuntu Servers

Chapter 17 – Preventing and Recovering from Disasters

Appendix A: Using the Alternate Installer

Appendix B: Assessments

Other Books You May Enjoy

Index

Mastering Ubuntu Server (Second Edition)

فهرست مطالب کتاب Mastering Ubuntu Server (Second Edition):

Deploying Ubuntu Server

Managing Users

Managing Storage Volumes

Connecting to Networks

Managing Software Packages

Controlling and Monitoring Processes

Setting Up Network Services

Sharing and Transferring Files

Managing Databases

Serving Web Content

Learning Advanced Shell Techniques

Virtualization

Running Containers

Automating Server Configuration with Ansible

Securing Your Server

Troubleshooting Ubuntu Servers

Preventing and Recovering from Disasters

Mastering Veeam Backup & Replication (Third Edition)

فهرست مطالب کتاب Mastering Veeam Backup & Replication:

Part 1: Installation – Best Practices, Core Architecture, and Other Enhancements

Chapter 1: Installation – Best Practices and Optimizations

Chapter 2: Core Architecture Enhancements

Chapter 3: Scale-Out Backup Repository – What’s New

Chapter 4: Tape Servers and Other Enhancements

Part 2: Security, Object Storage Direct, CDP, and Cloud Connect

Chapter 5: Veeam’s New Enhanced Security Features

Chapter 6: Object Storage – What’s New and Enhancements

Chapter 7: What’s New in NAS Backup

Chapter 8: CDP and Veeam Cloud Connect

Index