Mastering Active Directory (Third Edition): Design, deploy, and protect Active Directory Domain Services for Windows Server 2022
فهرست مطالب کتاب Mastering Active Directory (Third Edition):
Chapter 1: Active Directory Fundamentals
Chapter 2: Active Directory Domain Services 2022
Chapter 3: Designing an Active Directory Infrastructure
Chapter 4: Active Directory Domain Name System
Chapter 5: Placing Operations Master Roles
Chapter 6: Migrating to Active Directory 2022
Chapter 7: Managing Active Directory Objects
Chapter 8: Managing Users, Groups, and Devices
Chapter 9: Designing the OU Structure
Chapter 10: Managing Group Policies
Chapter 11: Active Directory Services – Part 01
Chapter 12: Active Directory Services – Part 02
Chapter 13: Active Directory Certificate Services
Chapter 14: Active Directory Federation Services
Chapter 15: Active Directory Rights Management Services
Chapter 16: Active Directory Security Best Practices
Chapter 17: Advanced AD Management with PowerShell
Chapter 18: Hybrid Identity
Chapter 19: Active Directory Audit and Monitoring
Mastering Active Directory Automate tasks by leveraging PowerShell
فهرست مطالب کتاب Mastering Active Directory:
Active Directory Fundamentals Benefits
Active Directory Domain Services 2016
Designing Active Directory Infrastructure
Active Directory Domain Name System
Placing Operations Master Roles
Migrating to Active Directory 2016
Managing Active Directory Objects Tools
Managing Users, Groups, and Devices
Designing the OU Structure
Managing Group Policies
Active Directory Services
Active Directory Certificate Services
Active Directory Federation Services
Active Directory Rights Management Services
Active Directory Security Best Practices
Advanced AD Management with PowerShell
Summary
Active Directory Audit and Monitoring
Active Directory Troubleshooting
Mastering Active Directory, Third Edition: Design, deploy, and protect Active Directory Domain Services for Windows Server 2022
فهرست مطالب کتاب Mastering Active Directory:
Preface
Chapter 1: Active Directory Fundamentals
Chapter 2: Active Directory Domain Services 2022
Chapter 3: Designing an Active Directory Infrastructure
Chapter 4: Active Directory Domain Name System
Chapter 5: Placing Operations Master Roles
Chapter 6: Migrating to Active Directory 2022
Chapter 7: Managing Active Directory Objects
Chapter 8: Managing Users, Groups, and Devices
Chapter 9: Designing the OU Structure
Chapter 10: Managing Group Policies
Chapter 11: Active Directory Services – Part 01
Chapter 12: Active Directory Services – Part 02
Chapter 13: Active Directory Certificate Services
Chapter 14: Active Directory Federation Services
Chapter 15: Active Directory Rights Management Services
Chapter 16: Active Directory Security Best Practices
Chapter 17: Advanced AD Management with PowerShell
Chapter 18: Hybrid Identity
Chapter 19: Active Directory Audit and Monitoring
Index
Mastering Active Directory: Automate tasks by leveraging PowerShell for Active Directory Domain Services 2016
فهرست مطالب کتاب Mastering Active Directory: Automate tasks by leveraging PowerShell for Active Directory Domain Services 2016:
Active Directory Fundamentals Benefits
Active Directory Domain Services 2016
Designing Active Directory Infrastructure
Active Directory Domain Name System
Placing Operations Master Roles
Migrating to Active Directory 2016
Managing Active Directory Objects Tools
Managing Users, Groups, and Devices
Designing the OU Structure
Managing Group Policies
Active Directory Services
Active Directory Certificate Services
Active Directory Federation Services
Active Directory Rights Management Services
Active Directory Security Best Practices
Advanced AD Management with PowerShell
Summary Azure
Active Directory Audit and Monitoring
Active Directory Troubleshooting
Mastering Cyber Intelligence Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
فهرست مطالب کتاب Mastering Cyber Intelligence:
Preface
1 Cyber Threat Intelligence Life Cycle
2 Requirements and Intelligence Team Implementation
3 Cyber Threat Intelligence Frameworks
4 Cyber Threat Intelligence Tradecraft and Standards
5 Goal Setting, Procedures for CTI Strategy, and Practical Use
6 Cyber Threat Modeling and Adversary Analysis
7 Threat Intelligence Data Sources
8 Effective Defense Tactics and Data Protection
9 AI Applications in Cyber Threat Analytics
10 Threat Modeling and Analysis – Practical Use Cases
11 Usable Security: Threat Intelligence as Part of the Process
12 SIEM Solutions and Intelligence-Driven SOCs
13 Threat Intelligence Metrics, Indicators of Compromise, and
14 Threat Intelligence Reporting and Dissemination
15 Threat Intelligence Sharing and Cyber Activity Attribution – Practical Use Cases
Index
Mastering Kali Linux for Advanced Penetration Testing
فهرست مطالب:
Title Page
Copyright and Credits
Dedication
About Packt
Contributors
Preface
Goal-Based Penetration Testing
Open Source Intelligence and Passive Reconnaissance
Active Reconnaissance of External and Internal Networks
Vulnerability Assessment
Advanced Social Engineering and Physical Security
Wireless Attacks
Exploiting Web-Based Applications
Client-Side Exploitation
Bypassing Security Controls
Exploitation
Action on the Objective and Lateral Movement
Privilege Escalation
Command and Control
Embedded Devices and RFID Hacking
Other Books You May Enjoy
Mastering Linux Security and Hardening, Second Edition
فهرست مطالب کتابMastering Linux Security and Hardening:
Section 1: Setting up a Secure Linux System
Chapter 1: Running Linux in a Virtual Environment
Chapter 2: Securing User Accounts
Chapter 3: Securing Your Server with a Firewall – Part 1
Chapter 4: Securing Your Server with a Firewall – Part 2
Chapter 5: Encryption Technologies
Chapter 6: SSH Hardening
Section 2: Mastering File and Directory Access Control (DAC)
Chapter 7: Mastering Discretionary Access Control
Chapter 8: Access Control Lists and Shared Directory Management
Section 3: Advanced System Hardening Techniques
Chapter 9: Implementing Mandatory Access Control with SELinux and AppArmor
Chapter 10: Kernel Hardening and Process Isolation
Chapter 11: Scanning, Auditing, and Hardening
Chapter 12: Logging and Log Security
Chapter 13: Vulnerability Scanning and Intrusion Detection
Chapter 14: Security Tips and Tricks for the Busy Bee
Mastering Modern Web Penetration Testing
فهرست مطالب کتاب Mastering Modern Web Penetration Testing:
Chapter 1: Common Security Protocols
Chapter 2: Information Gathering
Chapter 3: Cross-Site Scripting
Chapter 4: Cross-Site Request Forgery
Chapter 5: Exploiting SQL Injection
Chapter 6: File Upload Vulnerabilities
Chapter 7: Metasploit and Web
Chapter 8: XML Attacks
Chapter 9: Emerging Attack Vectors
Chapter 10: OAuth 2.0 Security
Chapter 11: API Testing Methodology
Mastering Python Networking, Third Edition Your one-stop solution to using Python for network automation, programmability, and DevOps
فهرست مطالب کتاب Mastering Python Networking:
Preface
Chapter 1: Review of TCP/IP Protocol Suite and Python
Chapter 2: Low-Level Network Device Interactions
Chapter 3: APIs and Intent-Driven Networking
Chapter 4: The Python Automation Framework – Ansible Basics
Chapter 5: The Python Automation Framework – Beyond Basics
Chapter 6: Network Security with Python
Chapter 7: Network Monitoring with Python – Part 1
Chapter 8: Network Monitoring with Python – Part 2
Chapter 9: Building Network Web Services with Python
Chapter 10: AWS Cloud Networking
Chapter 11: Azure Cloud Networking
Chapter 12: Network Data Analysis with Elastic Stack
Chapter 13: Working with Git
Chapter 14: Continuous Integration with Jenkins
Chapter 15: Test-Driven Development for Networks
Index
Mastering Ubuntu Server – Second Edition
فهرست مطالب:
Preface
Chapter 1 – Deploying Ubuntu Server
Chapter 2 – Managing Users
Chapter 3 – Managing Storage Volumes
Chapter 4 – Connecting to Networks
Chapter 5 – Managing Software Packages
Chapter 6 – Controlling and Monitoring Processes
Chapter 7 – Setting Up Network Services
Chapter 8 – Accessing and sharing files
Chapter 9 – Sharing and Transferring Files
Chapter 10 – Serving Web Content
Chapter 11 – Learning Advanced Shell Techniques
Chapter 12 – Virtualization
Chapter 13 – Running Containers
Chapter 14 – Automating Server Configuration with Ansible
Chapter 15 – Securing Your Server
Chapter 16 – Troubleshooting Ubuntu Servers
Chapter 17 – Preventing and Recovering from Disasters
Appendix A: Using the Alternate Installer
Appendix B: Assessments
Other Books You May Enjoy
Index
Mastering Ubuntu Server (Second Edition)
فهرست مطالب کتاب Mastering Ubuntu Server (Second Edition):
Deploying Ubuntu Server
Managing Users
Managing Storage Volumes
Connecting to Networks
Managing Software Packages
Controlling and Monitoring Processes
Setting Up Network Services
Sharing and Transferring Files
Managing Databases
Serving Web Content
Learning Advanced Shell Techniques
Virtualization
Running Containers
Automating Server Configuration with Ansible
Securing Your Server
Troubleshooting Ubuntu Servers
Preventing and Recovering from Disasters
Mastering Veeam Backup & Replication (Third Edition)
فهرست مطالب کتاب Mastering Veeam Backup & Replication:
Part 1: Installation – Best Practices, Core Architecture, and Other Enhancements
Chapter 1: Installation – Best Practices and Optimizations
Chapter 2: Core Architecture Enhancements
Chapter 3: Scale-Out Backup Repository – What’s New
Chapter 4: Tape Servers and Other Enhancements
Part 2: Security, Object Storage Direct, CDP, and Cloud Connect
Chapter 5: Veeam’s New Enhanced Security Features
Chapter 6: Object Storage – What’s New and Enhancements
Chapter 7: What’s New in NAS Backup
Chapter 8: CDP and Veeam Cloud Connect
Index