Network Design Cookbook – 2nd Edition
فهرست مطالب کتاب Network Design Cookbook – 2nd Edition:
Start Here
Introduction
Design Process
Design PODs
Example
Frameworks
Solutions
Services
Attributes
Network Security Auditing
فهرست مطالب کتاب Network Security Auditing:
Introduction
Chapter 1 The Principles of Auditing
Chapter 2 Information Security and the Law
Chapter 3 Information Security Governance, Frameworks, and Standards
Chapter 4 Auditing Tools and Techniques
Chapter 5 Auditing Cisco Security Solutions
Chapter 6 Policy, Compliance, and Management
Chapter 7 Infrastructure Security
Chapter 8 Perimeter Intrusion Prevention
Chapter 9 Access Control
Chapter 10 Secure Remote Access
Chapter 11 Endpoint Protection
Chapter 12 Unified Communications
Index
Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1
فهرست مطالب کتاب Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1:
Chapter 1 Communication in a Connected World
Chapter 2 Network Components, Types, and Connections
Chapter 3 Wireless and Mobile Networks
Chapter 4 Build a Home Network
Chapter 5 Communication Principles
Chapter 6 Network Media
Chapter 7 The Access Layer
Chapter 8 The Internet Protocol
Chapter 9 IPv4 and Network Segmentation
Chapter 10 IPv6 Addressing Formats and Rules
Chapter 11 Dynamic Addressing with DHCP
Chapter 12 Gateways to Other Networks
Chapter 13 The ARP Process
Chapter 14 Routing Between Networks
Chapter 15 TCP and UDP
Chapter 16 Application Layer Services
Chapter 17 Network Testing Utilities
Chapter 18 Network Design
Chapter 19 Cloud and Virtualization
Chapter 20 Number Systems
Chapter 21 Ethernet Switching
Chapter 22 Network Layer
Chapter 23 IPv4 Address Structure
Chapter 24 Address Resolution
Chapter 25 IP Addressing Services
Chapter 26 Transport Layer
Chapter 27 The Cisco IOS Command Line
Chapter 28 Build a Small Cisco Network
Chapter 29 ICMP
Chapter 30 Physical Layer
Chapter 31 Data Link Layer
Chapter 32 Routing at the Network Layer
Chapter 33 IPv6 Addressing
Chapter 34 IPv6 Neighbor Discovery
Chapter 35 Cisco Switches and Routers
Chapter 36 Troubleshoot Common Network Problems
Chapter 37 Network Support
Chapter 38 Cybersecurity Threats, Vulnerabilities, and Attacks
Chapter 39 Network Security
Appendix A Answers to “Check Your Understanding”
Questions
Glossary
Networking with MikroTik MTCNA Study Guide
فهرست مطالب کتاب Networking with MikroTik MTCNA Study Guide:
1 MikroTik
2 RouterOS Software
3 Defaults
4 Accessing the Router
5 Configuring RouterOS
6 Managing Users
7 Interfaces
8 Addresses
9 Routing
10 VPNs and Tunnels
11 Queues
12 Firewalls
13 NAT
14 Wireless Networks
15 Wireless Security
16 Troubleshooting Tools
17 RouterOS Monitoring
18 The Dude
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
فهرست مطالب کتاب Ninja Hacking:
Chapter 1: The Historical Ninja
Chapter 2: The Modern Ninja
Chapter 3: Strategies and Tactics
Chapter 4: Exploitation of Current Events
Chapter 5: Disguise
Chapter 6: Impersonation
Chapter 7: Infiltration
Chapter 8: Use of Timing to Enter an Area
Chapter 9: Discovering Weak Points in Area Defenses
Chapter 10: Psychological Weaknesses
Chapter 11: Distraction
Chapter 12: Concealment Devices
Chapter 13: Covert Listening Devices
Chapter 14: Intelligence
Chapter 15: Surveillance
Chapter 16: Sabotage
Chapter 17: Hiding and Silent Movement
NodeJS Notes For Professionals
فهرست مطالب کتاب NodeJS Notes For Professionals:
Getting started with Node.js
npm
Web Apps With Express
Filesystem I/O
Exporting and Consuming Modules
Exporting and Importing Module in node.js
How modules are loaded
Cluster Module
Readline
json
Event Emitters
Autoreload on changes
Environment
Callback to Promise
Executing files or commands with Child Processes
Exception handling
Keep a node application constantly running
Uninstalling Node.js
nvm – Node Version Manager
http
Using Streams
Deploying Node.js applications in production
Securing Node.js applications
Mongoose Library
js
File upload
io communication
Mongodb integration
Handling POST request in Node.js
Simple REST based CRUD API
Template frameworks
js Architecture & Inner Workings
Debugging Node.js application
Node server without framework
JS with ES6
Interacting with Console
Cassandra Integration
Creating API’s with Node.js
Graceful Shutdown
Using IISNode to host Node.js Web Apps in IIS
CLI
NodeJS Frameworks
grunt
Using WebSocket’s with Node.JS
metalsmith
Parsing command line arguments
Client-server communication
js Design Fundamental
Connect to Mongodb
Performance challenges
Send Web Notification
Remote Debugging in Node.JS
Database (MongoDB with Mongoose)
Good coding style
Restful API Design: Best Practices
Deliver HTML or any other sort of file
TCP Sockets
Hack
Bluebird Promises
Async/Await
Koa Framework v2
Unit testing frameworks
ECMAScript 2015 (ES6) with Node.js
Routing AJAX requests with Express.JS
Sending a file stream to client
NodeJS with Redis
Using Browserfiy to resolve ‘required’ error with browsers
JS and MongoDB.
Passport integration
Dependency Injection
NodeJS Beginner Guide
Use Cases of Node.js
js
PostgreSQL integration
MySQL integration
MySQL Connection Pool
MSSQL Intergration
js with Oracle
Synchronous vs Asynchronous programming in nodejs
js Error Management
js v6 New Features and Improvement
Eventloop
Nodejs History
js
Asynchronous programming
js code for STDIN and STDOUT without using any library
MongoDB Integration for Node.js/Express.js
Lodash
csv parser in node js
Loopback – REST Based connector
Running node.js as a service
js with CORS
Getting started with Nodes profiling
js Performance
Yarn Package Manager
OAuth 2.0
Node JS Localization
Deploying Node.js application without downtime.
js (express.js) with angular.js Sample code
NodeJs Routing
Creating a Node.js Library that Supports Both Promises and Error-First Callbacks
Project Structure
Avoid callback hell
Arduino communication with nodeJs
N-API
Multithreading
Windows authentication under node.js
Require()
Route-Controller-Service structure for ExpressJS
Push notifications
Installing Node.js
NSX-T Data Center Administration Guide (VMware NSX-T Data Center 3.0)
فهرست مطالب کتاب NSX-T Data Center Administration Guide (VMware NSX-T Data Center 3.0):
1 NSX Manager
2 Tier-0 Gateways
3 Tier-1 Gateway
4 Segments
5 Host Switches
6 Virtual Private Network (VPN)
7 Network Address Translation (NAT)
8 Load Balancing
9 Distributed Load Balancer
10 Forwarding Policies
11 IP Address Management (IPAM)
12 Networking Settings
13 Security
14 Inventory
15 Multisite and Federation
16 System Monitoring
17 Network Monitoring
18 Authentication and Authorization
19 Certificates
20 Configuring NSX-T Data Center in Manager Mode
21 Backing Up and Restoring NSX Manager
22 Operations and Management 886
23 Using NSX Cloud 965
ntroducing Windows Server 2016 Technical Preview
فهرست مطالب کتاب Windows Server 2016 Technical Preview:
Introduction
Chapter 1: The software-defined datacenter
Chapter 2: Compute
Chapter 3: Storage
Chapter 4: Networking
Chapter 5: Security
Chapter 6: App Plat
Chapter 7: Systems management
Oracle Database Notes For Professionals
فهرست مطالب کتاب Oracle Database Notes For Professionals:
Getting started with Oracle Database
Getting started with PL/SQL
Anonymous PL/SQL Block
PL/SQL procedure
Data Dictionary
Dates
Working with Dates
DUAL table
JOINS
Handling NULL values
String Manipulation
IF-THEN-ELSE Statement
Limiting the rows returned by a query (Pagination)
Recursive Sub-Query Factoring using the WITH Clause (A.K.A. Common Table Expressions)
Different ways to update records
Update with Joins
Functions
Statistical functions
Window Functions
Creating a Context
Splitting Delimited Strings
Collections and Records
Object Types
Loop
Cursors
Sequences
Indexes
Hints
Packages
Exception Handling
Error logging
Database Links
Table partitioning
Oracle Advanced Queuing (AQ)
constraints
Autonomous Transactions
Oracle MAF
level query
Hierarchical Retrieval With Oracle Database 12C
Data Pump
Bulk collect
Real Application Security
Assignments model and language
Triggers
Dynamic SQL
Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits
فهرست مطالب:
Introduction
1 Introduction to Penetration Testing
2 Standards
3 Cryptography
4 Reconnaissance
5 Malware
6 Hacking Windows
7 Web Hacking
8 Vulnerability Scanning
9 Introduction to Linux
10 Linux Hacking
11 Introduction to Kali Linux
12 General Hacking Techniques
13 Introduction to Metasploit
14 More with Metasploit
15 Introduction to Scripting with Ruby
16 Write Your Own Metasploit Exploits with Ruby
17 General Hacking Knowledge
18 Additional Pen Testing Topics
19 A Sample Pen Test Project
Appendix A: Answers to Chapter Multiple Choice Questions
Index Index
Pentesting Active Directory and Windows-based Infrastructure
فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:
1 Getting the Lab Ready and Attacking Exchange Server
2 Defense Evasion 25
3 Domain Reconnaissance and Discovery 51
4 Credential Access in Domain 71
5 Lateral Movement in Domain and Across Forests 101
6 Domain Privilege Escalation 141
7 Persistence on Domain Level 179
8 Abusing Active Directory Certificate Services 221
9 Compromising Microsoft SQL Server 267
10 Taking Over WSUS and SCCM
Practical Deployment of Cisco Identity Services Engine
فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:
Chapter 1: Introduction
Chapter 2: ISE Clustering and Basic Setup
Chapter 3: Authentication Methods
Chapter 4: Policy Elements
Chapter 5: Authentication
Chapter 6: Authorization
Chapter 7: Network Access Device Configuration
Chapter 8: ISE Profiling
Chapter 9: ISE Portals and Guest Access
Chapter 10: Deployment Strategies
Chapter 11: ISE Policy Design Practices
Chapter 12: Corporate Authentication Designs
Chapter 13: BYOD Designs
Chapter 14: ISE Posture Assessment
Chapter 15: VPN Integrations
Chapter 16: ISE Reporting and Logging
Chapter 17: ISE CLI
Chapter 18: ISE Administration