Network Design Cookbook – 2nd Edition

فهرست مطالب کتاب Network Design Cookbook – 2nd Edition:

Start Here

Introduction

Design Process

Design PODs

Example

Frameworks

Solutions

Services

Attributes

Network Security Auditing

فهرست مطالب کتاب Network Security Auditing:

Introduction

Chapter 1 The Principles of Auditing

Chapter 2 Information Security and the Law

Chapter 3 Information Security Governance, Frameworks, and Standards

Chapter 4 Auditing Tools and Techniques

Chapter 5 Auditing Cisco Security Solutions

Chapter 6 Policy, Compliance, and Management

Chapter 7 Infrastructure Security

Chapter 8 Perimeter Intrusion Prevention

Chapter 9 Access Control

Chapter 10 Secure Remote Access

Chapter 11 Endpoint Protection

Chapter 12 Unified Communications

Index

Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1

فهرست مطالب کتاب Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1:

Chapter 1 Communication in a Connected World

Chapter 2 Network Components, Types, and Connections

Chapter 3 Wireless and Mobile Networks

Chapter 4 Build a Home Network

Chapter 5 Communication Principles

Chapter 6 Network Media

Chapter 7 The Access Layer

Chapter 8 The Internet Protocol

Chapter 9 IPv4 and Network Segmentation

Chapter 10 IPv6 Addressing Formats and Rules

Chapter 11 Dynamic Addressing with DHCP

Chapter 12 Gateways to Other Networks

Chapter 13 The ARP Process

Chapter 14 Routing Between Networks

Chapter 15 TCP and UDP

Chapter 16 Application Layer Services

Chapter 17 Network Testing Utilities

Chapter 18 Network Design

Chapter 19 Cloud and Virtualization

Chapter 20 Number Systems

Chapter 21 Ethernet Switching

Chapter 22 Network Layer

Chapter 23 IPv4 Address Structure

Chapter 24 Address Resolution

Chapter 25 IP Addressing Services

Chapter 26 Transport Layer

Chapter 27 The Cisco IOS Command Line

Chapter 28 Build a Small Cisco Network

Chapter 29 ICMP

Chapter 30 Physical Layer

Chapter 31 Data Link Layer

Chapter 32 Routing at the Network Layer

Chapter 33 IPv6 Addressing

Chapter 34 IPv6 Neighbor Discovery

Chapter 35 Cisco Switches and Routers

Chapter 36 Troubleshoot Common Network Problems

Chapter 37 Network Support

Chapter 38 Cybersecurity Threats, Vulnerabilities, and Attacks

Chapter 39 Network Security

Appendix A Answers to “Check Your Understanding”

Questions

Glossary

Networking with MikroTik MTCNA Study Guide

فهرست مطالب کتاب Networking with MikroTik MTCNA Study Guide:

1 MikroTik

2 RouterOS Software

3 Defaults

4 Accessing the Router

5 Configuring RouterOS

6 Managing Users

7 Interfaces

8 Addresses

9 Routing

10 VPNs and Tunnels

11 Queues

12 Firewalls

13 NAT

14 Wireless Networks

15 Wireless Security

16 Troubleshooting Tools

17 RouterOS Monitoring

18 The Dude

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

فهرست مطالب کتاب Ninja Hacking:

Chapter 1: The Historical Ninja

Chapter 2: The Modern Ninja

Chapter 3: Strategies and Tactics

Chapter 4: Exploitation of Current Events

Chapter 5: Disguise

Chapter 6: Impersonation

Chapter 7: Infiltration

Chapter 8: Use of Timing to Enter an Area

Chapter 9: Discovering Weak Points in Area Defenses

Chapter 10: Psychological Weaknesses

Chapter 11: Distraction

Chapter 12: Concealment Devices

Chapter 13: Covert Listening Devices

Chapter 14: Intelligence

Chapter 15: Surveillance

Chapter 16: Sabotage

Chapter 17: Hiding and Silent Movement

NodeJS Notes For Professionals

فهرست مطالب کتاب NodeJS Notes For Professionals:

Getting started with Node.js

npm

Web Apps With Express

Filesystem I/O

Exporting and Consuming Modules

Exporting and Importing Module in node.js

How modules are loaded

Cluster Module

Readline

json

Event Emitters

Autoreload on changes

Environment

Callback to Promise

Executing files or commands with Child Processes

Exception handling

Keep a node application constantly running

Uninstalling Node.js

nvm – Node Version Manager

http

Using Streams

Deploying Node.js applications in production

Securing Node.js applications

Mongoose Library

js

File upload

io communication

Mongodb integration

Handling POST request in Node.js

Simple REST based CRUD API

Template frameworks

js Architecture & Inner Workings

Debugging Node.js application

Node server without framework

JS with ES6

Interacting with Console

Cassandra Integration

Creating API’s with Node.js

Graceful Shutdown

Using IISNode to host Node.js Web Apps in IIS

CLI

NodeJS Frameworks

grunt

Using WebSocket’s with Node.JS

metalsmith

Parsing command line arguments

Client-server communication

js Design Fundamental

Connect to Mongodb

Performance challenges

Send Web Notification

Remote Debugging in Node.JS

Database (MongoDB with Mongoose)

Good coding style

Restful API Design: Best Practices

Deliver HTML or any other sort of file

TCP Sockets

Hack

Bluebird Promises

Async/Await

Koa Framework v2

Unit testing frameworks

ECMAScript 2015 (ES6) with Node.js

Routing AJAX requests with Express.JS

Sending a file stream to client

NodeJS with Redis

Using Browserfiy to resolve ‘required’ error with browsers

JS and MongoDB.

Passport integration

Dependency Injection

NodeJS Beginner Guide

Use Cases of Node.js

js

PostgreSQL integration

MySQL integration

MySQL Connection Pool

MSSQL Intergration

js with Oracle

Synchronous vs Asynchronous programming in nodejs

js Error Management

js v6 New Features and Improvement

Eventloop

Nodejs History

js

Asynchronous programming

js code for STDIN and STDOUT without using any library

MongoDB Integration for Node.js/Express.js

Lodash

csv parser in node js

Loopback – REST Based connector

Running node.js as a service

js with CORS

Getting started with Nodes profiling

js Performance

Yarn Package Manager

OAuth 2.0

Node JS Localization

Deploying Node.js application without downtime.

js (express.js) with angular.js Sample code

NodeJs Routing

Creating a Node.js Library that Supports Both Promises and Error-First Callbacks

Project Structure

Avoid callback hell

Arduino communication with nodeJs

N-API

Multithreading

Windows authentication under node.js

Require()

Route-Controller-Service structure for ExpressJS

Push notifications

Installing Node.js

NSX-T Data Center Administration Guide (VMware NSX-T Data Center 3.0)

فهرست مطالب کتاب NSX-T Data Center Administration Guide (VMware NSX-T Data Center 3.0):

1 NSX Manager

2 Tier-0 Gateways

3 Tier-1 Gateway

4 Segments

5 Host Switches

6 Virtual Private Network (VPN)

7 Network Address Translation (NAT)

8 Load Balancing

9 Distributed Load Balancer

10 Forwarding Policies

11 IP Address Management (IPAM)

12 Networking Settings

13 Security

14 Inventory

15 Multisite and Federation

16 System Monitoring

17 Network Monitoring

18 Authentication and Authorization

19 Certificates

20 Configuring NSX-T Data Center in Manager Mode

21 Backing Up and Restoring NSX Manager

22 Operations and Management 886

23 Using NSX Cloud 965

ntroducing Windows Server 2016 Technical Preview

فهرست مطالب کتاب Windows Server 2016 Technical Preview:

Introduction

Chapter 1: The software-defined datacenter

Chapter 2: Compute

Chapter 3: Storage

Chapter 4: Networking

Chapter 5: Security

Chapter 6: App Plat

Chapter 7: Systems management

Oracle Database Notes For Professionals

فهرست مطالب کتاب Oracle Database Notes For Professionals:

Getting started with Oracle Database

Getting started with PL/SQL

Anonymous PL/SQL Block

PL/SQL procedure

Data Dictionary

Dates

Working with Dates

DUAL table

JOINS

Handling NULL values

String Manipulation

IF-THEN-ELSE Statement

Limiting the rows returned by a query (Pagination)

Recursive Sub-Query Factoring using the WITH Clause (A.K.A. Common Table Expressions)

Different ways to update records

Update with Joins

Functions

Statistical functions

Window Functions

Creating a Context

Splitting Delimited Strings

Collections and Records

Object Types

Loop

Cursors

Sequences

Indexes

Hints

Packages

Exception Handling

Error logging

Database Links

Table partitioning

Oracle Advanced Queuing (AQ)

constraints

Autonomous Transactions

Oracle MAF

level query

Hierarchical Retrieval With Oracle Database 12C

Data Pump

Bulk collect

Real Application Security

Assignments model and language

Triggers

Dynamic SQL

Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits

فهرست مطالب:

Introduction

1 Introduction to Penetration Testing

2 Standards

3 Cryptography

4 Reconnaissance

5 Malware

6 Hacking Windows

7 Web Hacking

8 Vulnerability Scanning

9 Introduction to Linux

10 Linux Hacking

11 Introduction to Kali Linux

12 General Hacking Techniques

13 Introduction to Metasploit

14 More with Metasploit

15 Introduction to Scripting with Ruby

16 Write Your Own Metasploit Exploits with Ruby

17 General Hacking Knowledge

18 Additional Pen Testing Topics

19 A Sample Pen Test Project

Appendix A: Answers to Chapter Multiple Choice Questions

Index Index

Pentesting Active Directory and Windows-based Infrastructure

فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:

1 Getting the Lab Ready and Attacking Exchange Server

2 Defense Evasion 25

3 Domain Reconnaissance and Discovery 51

4 Credential Access in Domain 71

5 Lateral Movement in Domain and Across Forests 101

6 Domain Privilege Escalation 141

7 Persistence on Domain Level 179

8 Abusing Active Directory Certificate Services 221

9 Compromising Microsoft SQL Server 267

10 Taking Over WSUS and SCCM

Practical Deployment of Cisco Identity Services Engine

فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:

Chapter 1: Introduction

Chapter 2: ISE Clustering and Basic Setup

Chapter 3: Authentication Methods

Chapter 4: Policy Elements

Chapter 5: Authentication

Chapter 6: Authorization

Chapter 7: Network Access Device Configuration

Chapter 8: ISE Profiling

Chapter 9: ISE Portals and Guest Access

Chapter 10: Deployment Strategies

Chapter 11: ISE Policy Design Practices

Chapter 12: Corporate Authentication Designs

Chapter 13: BYOD Designs

Chapter 14: ISE Posture Assessment

Chapter 15: VPN Integrations

Chapter 16: ISE Reporting and Logging

Chapter 17: ISE CLI

Chapter 18: ISE Administration