Practical Hardware Pentesting Learn attack and defense techniques for embedded sys

فهرست مطالب کتاب Practical Hardware Pentesting:

Practical Hardware Pentesting Second Edition Learn attack and defense

techniques for embedded systems in IoT and other devices

Feedback

Prerequisites the basics you will need

Approach to buying test equipment

The component pantry

Sample labs

Summary

Questions

Feedback

Technical requirements

Introduction to the boards

Why C and not Arduino

The toolchain

Introduction to C

Summary

Questions

Further reading

Feedback

Technical requirements

Understanding I2C

Understanding SPI

Understanding UART

Understanding D1W

Summary

Questions

Feedback

Technical requirements

Finding the data

Extracting the data

Understanding unknown storage structures

Mounting filesystems

Repacking

Summary

Questions

Further reading

Practical Social Engineering A Primer for the Ethical Hacker

فهرست مطالب کتاب Practical Social Engineering:

Acknowledgments

Introduction

PART I: THE BASICS

Chapter 1: What Is Social Engineering?

Chapter 2: Ethical Considerations in Social Engineering

PART II: OFFENSIVE SOCIAL ENGINEERING

Chapter 3: Preparing for an Attack

Chapter 4: Gathering Business OSINT

Chapter 5: Social Media and Public Documents

Chapter 6: Gathering OSINT About People

Chapter 7: Phishing

Chapter 8: Cloning a Landing Page

Chapter 9: Detection, Measurement, and Reporting

PART III: DEFENDING AGAINST SOCIAL ENGINEERING

Chapter 10: Proactive Defense Techniques

Chapter 11: Technical Email Controls

Chapter 12: Producing Threat Intelligence

Appendix A: Scoping Worksheet

Appendix B: Reporting Template

Appendix C: Information-Gathering Worksheet

Appendix D: Pretexting Sample

Appendix E: Exercises to Improve Your Social Engineering

Index

Principles: Life and Work

فهرست مطالب کتاب Principles: Life and Work:

PART I WHERE I’M COMING FROM

1 My Call to Adventure: 1949-1967

2 Crossing the Threshold: 1967-1979

3 My Abyss: 1979-1982

4 My Road of Trials: 1983-1994

5 The Ultimate Boon: 1995-2010

6 Returning the Boon: 2011-2015

7 My Last Year and My Greatest Challenge: 2016-2017

8 Looking Backfrom a Higher Level

PART II LIFE PRINCIPLES

1 Embrace Reality and Deal with It

2 Use the 5-Step Process to Get What You Want Out of Life

3 Be Radically Open-Minded

4 Understand That People Are Wired Very Differently

5 Learn How to Make Decisions Effectively

PART III WORK PRINCIPLES

1 Trust in Radical Truth and Radical Transparency

2 Cultivate Meaningful Workand Meaningful Relationships

3 Create a Culture in Which It Is Okay to Make Mistakes and Unacceptable Not to Learn from Them

4 Get and Stay in Sync

5 Believability Weight Your Decision Maling

6 Recognize How to Get Beyond Disagreements

7 Remember That the WHO Is More Important than the WHAT

8 Hire Right, Because the Penalties for Hiring Wrong Are Huge

9 Constantly Train, Test, Evaluate, and Sort People

10 Manage as Someone Operating a Machine to Achieve a Goal

11 Perceive and Don’t Tolerate Problems

12 Diagnose Problems to Get at Their Root Causes

13 Design Improvements to Your Machine to Get Around Your Problems

14 Do What You Set Out to Do

15 Use Tools and Protocols to Shape How Work Is Done

16 And for Heaven’s Sake, Don’t Overlook Governance!

Pro Git (Second Edition)

فهرست مطالب کتاب Pro Git:

CHAPTER 1: Getting Started

CHAPTER 2: Git Basics

CHAPTER 3: Git Branching

CHAPTER 4: Git on the Server

CHAPTER 5: Distributed Git

CHAPTER 6: GitHub

CHAPTER 7: Git Tools

CHAPTER 8: Customizing Git

CHAPTER 9: Git and Other Systems

CHAPTER 10: Git Internals

Pro SQL Server 2019 Administration

فهرست مطالب کتاب Pro SQL Server 2019 Administration:

Chapter 2: GUI Installation

Chapter 3: Server Core Installation

Chapter 4: Installation on Heterogeneous Operating Systems

Chapter 5: Configuring the Instance

Chapter 6: Database Configuration

Chapter 7: Table Optimizations

Chapter 8: Indexes and Statistics

Chapter 9: Database Consistency

Chapter 10: SQL Server Security Mode

Chapter 11: Encryption

Chapter 12: Backups and Restores

Chapter 13: High Availability and Disaster Recovery Concepts

Chapter 14: Implementing Always On Availability Groups

Chapter 15: Implementing Log Shipping

Chapter 16: Scaling Workloads

Chapter 17: SQL Server Metadata

Chapter 18: Locking and Blocking

Chapter 19: Extended Events

Chapter 20: Query Store

Chapter 21: Distributed Replay

Chapter 22: Automating Maintenance Routines

Chapter 23: Policy-Based Management

Chapter 24: Resource Governor

Python Basics: A Practical Introduction to Python 3

فهرست مطالب:

Contents

Foreword

Introduction

Setting Up Python

Your First Python Program

Strings and String Methods

Numbers and Math

Functions and Loops

Finding and Fixing Code Bugs

Conditional Logic and Control Flow

Tuples, Lists, and Dictionaries

Object-Oriented Programming (OOP)

Modules and Packages

File Input and Output

Installing Packages With pip

Creating and Modifying PDF Files

Working With Databases

Interacting With the Web

Scientiрc Computing and Graphing

Graphical User Interfaces

Final Thoughts and Next Steps

Python Notes For Professionals

فهرست مطالب کتاب Python Notes For Professionals:

Getting started with Python Language

Python Data Types

Indentation

Comments and Documentation

Date and Time

Date Formatting

Enum

Set

Simple Mathematical Operators

Bitwise Operators

Boolean Operators

Operator Precedence

Variable Scope and Binding

Conditionals

Comparisons

Loops

Arrays

Multidimensional arrays

Dictionary

List

List comprehensions

List slicing (selecting parts of lists)

groupby()

Linked lists

Linked List Node

Filter

Heapq

Tuple

Basic Input and Output

Files & Folders I/O

path

Iterables and Iterators

Functions

Defining functions with list arguments

Functional Programming in Python

Partial functions

Decorators

Classes

Metaclasses

String Formatting

String Methods

Using loops within functions

Importing modules

Difference between Module and Package

Math Module

Complex math

Collections module

Operator module

JSON Module

Sqlite3 Module

The os Module

The locale Module

Itertools Module

Asyncio Module

Random module

Functools Module

The dis module

The base64 Module

Queue Module

Deque Module

Webbrowser Module

tkinter

pyautogui module

Indexing and Slicing

Plotting with Matplotlib

graph-tool

Generators

Reduce

Map Function

Exponentiation

Searching

Sorting, Minimum and Maximum

Counting

The Print Function

Regular Expressions (Regex)

Copying data

Context Managers (“with” Statement)

The __name__ special variable

Checking Path Existence and Permissions

Creating Python packages

Usage of “pip” module: PyPI Package Manager

pip: PyPI Package Manager

Parsing Command Line arguments

Subprocess Library

py

Recursion

Type Hints

Exceptions

Raise Custom Errors / Exceptions

Commonwealth Exceptions

urllib

Web scraping with Python

HTML Parsing

Manipulating XML

Python Requests Post

Distribution

Property Objects

Overloading

Polymorphism

Method Overriding

User-Defined Methods

String representations of class instances: __str__ and __repr__ methods

Debugging

Reading and Writing CSV

Writing to CSV from String or List

Dynamic code execution with `exec` and `eval`

PyInstaller – Distributing Python Code

Data Visualization with Python

The Interpreter (Command Line Console)

*args and **kwargs

Garbage Collection

Pickle data serialisation

Binary Data

Idioms

Data Serialization

Multiprocessing

Multithreading

Processes and Threads

Python concurrency

Parallel computation

Sockets

Websockets

Sockets And Message Encryption/Decryption Between Client and Server

Python Networking

Python HTTP Server

Flask

Introduction to RabbitMQ using AMQPStorm

Descriptor

tempfile NamedTemporaryFile

Input, Subset and Output External Data Files using Pandas

Unzipping Files

Working with ZIP archives

Getting start with GZip

Stack

Working around the Global Interpreter Lock (GIL)

Deployment

Logging

Web Server Gateway Interface (WSGI)

Python Server Sent Events

Alternatives to switch statement from other languages

List destructuring (aka packing and unpacking)

Accessing Python source code and bytecode

Mixins

Attribute Access

ArcPy

Abstract Base Classes (abc)

Plugin and Extension Classes

Immutable datatypes(int, float, str, tuple and frozensets)

Incompatibilities moving from Python 2 to Python 3

2to3 tool

Non-official Python implementations

Abstract syntax tree

Unicode and bytes

Python Serial Communication (pyserial)

Neo4j and Cypher using Py2Neo

Basic Curses with Python

Templates in python

Pillow

The pass statement

CLI subcommands with precise help output

Database Access

Connecting Python to SQL Server

PostgreSQL

Python and Excel

Turtle Graphics

Python Persistence

Design Patterns

hashlib

Creating a Windows service using Python

Mutable vs Immutable (and Hashable) in Python

configparser

Optical Character Recognition

Virtual environments

Python Virtual Environment – virtualenv

Virtual environment with virtualenvwrapper

Create virtual environment with virtualenvwrapper in windows

sys

ChemPy – python package

pygame

Pyglet

Audio

pyaudio

shelve

IoT Programming with Python and Raspberry PI

kivy – Cross-platform Python Framework for NUI Development

Pandas Transform: Preform operations on groups and concatenate the results

Similarities in syntax, Differences in meaning: Python vs. JavaScript

Call Python from C#

ctypes

Writing extensions

Python Lex-Yacc

Unit Testing

test

Profiling

Python speed of program

Performance optimization

Security and Cryptography

Secure Shell Connection in Python

Python Anti-Patterns

Common Pitfalls

Hidden Features

Python Web Penetration Testing Cookbook

فهرست مطالب کتاب Python Web Penetration Testing Cookbook:

Chapter 1: Gathering Open Source Intelligence

Chapter 2: Enumeration

Chapter 3: Vulnerability Identification

Chapter 4: SQL Injection

Chapter 5: Web Header Manipulation

Chapter 6: Image Analysis and Manipulation

Chapter 7: Encryption and Encoding

Chapter 8: Payloads and Shells

Chapter 9: Reporting

Index

React JS Notes for Professionals

فهرست مطالب کتاب React JS Notes for Professionals:

Getting started with React

Components

Using ReactJS with TypeScript

State in React

Props in React

React Component Lifecycle

Forms and User Input

React Boilerplate [React + Babel + Webpack]

Using ReactJS with jQuery

React Routing

Communicate Between Components

How to setup a basic webpack, react and babel environment

createClass vs extends React.Component

React AJAX call

Communication Between Components

Stateless Functional Components

Performance

Introduction to Server-Side Rendering

Setting Up React Environment

Using React with Flow

JSX

React Forms

User interface solutions

Using ReactJS in Flux way

React, Webpack & TypeScript installation

How and why to use keys in React

Keys in react

Higher Order Components

React with Redux

Installation

React Tools

Refactoring: Improving the Design of Existing Code

فهرست مطالب کتاب Refactoring: Improving the Design of Existing Code:

Chapter 1. Refactoring, a First Example

Chapter 2. Principles in Refactoring

Chapter 3. Bad Smells in Code

Chapter 4. Building Tests

Chapter 5. Toward a Catalog of Refactorings

Chapter 6. Composing Methods

Chapter 7. Moving Features Between Objects

Chapter 8. Organizing Data

Chapter 9. Simplifying Conditional Expressions

Chapter 10. Making Method Calls Simpler

Chapter 11. Dealing with Generalization

Chapter 12. Big Refactorings

Chapter 13. Refactoring, Reuse, and Reality

Chapter 14. Refactoring Tools

Chapter 15. Putting It All Together

Rework

فهرست مطالب کتاب Rework:

CHAPTER INTRODUCTION

CHAPTER FIRST

CHAPTER TAKEDOWNS

CHAPTER GO

CHAPTER PROGRESS

CHAPTER PRODUCTIVITY

CHAPTER COMPETITORS

CHAPTER EVOLUTION

CHAPTER PROMOTION

CHAPTER HIRING

CHAPTER DAMAGE CONTROL

CHAPTER CULTURE

CHAPTER CONCLUSION

CHAPTER RESOURCES