Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services

فهرست مطالب کتاب Service Design Patterns:

Chapter 1: From Objects to Web Services

Chapter 2: Web Service API Styles

Chapter 3: Client-Service Interactions

Chapter 4: Request and Response Management

Chapter 5: Web Service Implementation Styles

Chapter 6: Web Service Infrastructures

Chapter 7: Web Service Evolution

SQL Injection Attacks and Defense, Second Edition

فهرست مطالب کتاب SQL Injection Attacks and Defense:

Chapter 1. What Is SQL Injection?

Chapter 2. Testing for SQL Injection

Chapter 3. Reviewing Code for SQL Injection

Chapter 4. Exploiting SQL injection

Chapter 5. Blind SQL Injection Exploitation

Chapter 6. Exploiting the operating system

Chapter 7. Advanced topics

Chapter 8. Code-level defenses

Chapter 9. Platform level defenses

Chapter 10. Confirming and Recovering from SQL Injection Attacks

Chapter 11. References

SQL Notes For Professionals

فهرست مطالب کتاب SQL Notes For Professionals:

Getting started with SQL

Identifier

Data Types

NULL

Example Databases and Tables

SELECT

GROUP BY

ORDER BY

AND & OR Operators

CASE

LIKE operator

IN clause

Filter results using WHERE and HAVING

SKIP TAKE (Pagination)

EXCEPT

EXPLAIN and DESCRIBE

EXISTS CLAUSE

JOIN

UPDATE

CREATE Database

CREATE TABLE

CREATE FUNCTION

TRY/CATCH

UNION / UNION ALL

ALTER TABLE

INSERT

MERGE

cross apply, outer apply

DELETE

TRUNCATE

DROP Table

DROP or DELETE Database

Cascading Delete

GRANT and REVOKE

XML

Primary Keys

Indexes

Row number

SQL Group By vs Distinct

Finding Duplicates on a Column Subset with Detail

String Functions

Functions (Aggregate)

Functions (Scalar/Single Row)

Functions (Analytic)

Window Functions

Common Table Expressions

Views

Materialized Views

Comments

Foreign Keys

Sequence

Subqueries

Execution blocks

Stored Procedures

Triggers

Transactions

Table Design

Synonyms

Information Schema

Order of Execution

Clean Code in SQL

SQL Injection

Start With Why: How Great Leaders Inspire Everyone to Take Action

فهرست مطالب کتاب Start With Why: How Great Leaders Inspire Everyone to Take Action:

PART 1: A WORLD THAT DOESN’T START WITH WHY

PART 2: AN ALTERNATIVE PERSPECTIVE PART

PART 3: LEADERS NEED A FOLLOWING PART

PART 4: HOW TO RALLY THOSE WHO BELIEVE

PART 5: THE BIGGEST CHALLENGE IS SUCCESS

PART 6: DISCOVER WHY

Steve Jobs by Walter Isaacson

فهرست مطالب کتاب Steve Jobs:

Chapter 1: Childhood — Abandoned and Chosen

Chapter 2: Odd Couple — The Two Steves

Chapter 3: The Dropout — Turn On, Tune In …

Chapter 4: Atari and India — Zen and the Art of Game Design

Chapter 5: The Apple I — Turn On, Boot Up, Jack In …

Chapter 6: The Apple II — Dawn of a New Age

Chapter 7: Chrisann and Lisa — He Who Is Abandoned …

Chapter 8: Xerox and Lisa — Graphical User Interfaces

Chapter 9: Going Public — A Man of Wealth and Fame

Chapter 10: The Mac Is Born — You Say You Want a Revolution

Chapter 11: The Reality Disortion Field — Playing by His Own Set of Rules

Chapter 12: The Design — Real Artists Simplify

Chapter 13: Building the Mac — The Journey Is the Reward

Chapter 14: Enter Sculley — The Pepsi Challenge

Chapter 15: The Launch — A Dent in the Universe

Chapter 16: Gates and Jobs — When Orbits Intersect

Chapter 17: Icarus — What Goes Up …

Chapter 18: NeXT — Prometheus Unbound

Chapter 19: Pixar — Technology Meets Art

Chapter 20: A Regular Guy — Love Is Just a Four-Letter Word

Chapter 21: Family Man — At Home with the Jobs Clan

Chapter 22: Toy Story — Buzz and Woody to the Rescue

Chapter 23: The Second Coming — What Rough Beast, Its Hour Come Round at Last …

Chapter 24: The Restoration — The Loser Now Will Be Later to Win

Chapter 25: Think Different — Jobs as iCEO

Chapter 26: Design Principles — The Studio of Jobs and Ive

Chapter 27: The iMac — Hello (Again)

Chapter 28: CEO — Still Crazy after All These Years

Chapter 29: Apple Stores — Genius Bars and Siena Sandstone

Chapter 30: The Digital Hub — From iTunes to the iPod

Chapter 31: The iTunes Store — I’m the Pied Piper

Chapter 32: Music Man — The Sound Track of His Life

Chapter 33: Pixar’s Friends — … and Foes

Chapter 34: Twenty-First-Century Macs — Setting Apple Apart

Chapter 35: Round One — Memento Mori

Chapter 36: The iPhone — Three Revolutionary Products in One

Chapter 37: Round Two — The Cancer Recurs

Chapter 38: The iPad — Into the Post-PC Era

Chapter 39: New Battles — And Echoes of Old Ones

Chapter 40: To Infinity — The Cloud, the Spaceship, and Beyond

Chapter 41: Round Three — The Twilight Struggle

Chapter 42: Legacy — The Brightest Heaven of Invention

Summary of Start With Why

فهرست مطالب کتاب Summary of Start With Why:

PART 1: A WORLD THAT DOESN’T START WITH WHY

PART 2: AN ALTERNATIVE PERSPECTIVE

PART 3: LEADERS NEED A FOLLOWING

PART 4: HOW TO RALLY THOSE WHO BELIEVE

PART 5: THE BIGGEST CHALLENGE IS SUCCESS

PART 6: DISCOVER WHY

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

فهرست مطالب کتاب The AI Revolution in Networking, Cybersecurity, and Emerging Technologies:

Preface

Introducing the Age of AI: Emergence, Growth, and Impact on Technology

Connected Intelligence: AI in Computer Networking

Securing the Digital Frontier: AI’s Role in Cybersecurity

AI and Collaboration: Building Bridges, Not Walls

AI in the Internet of Things (AIoT)

Revolutionizing Cloud Computing with AI

Impact of AI in Other Emerging Technologies

Index

The Algorithm Design Manual (Second Edition)

فهرست مطالب کتاب The Algorithm Design Manual:

1 Introduction to Algorithm Design

2 Algorithm Analysis

3 Data Structures

4 Sorting and Searching

5 Graph Traversal

6 Weighted Graph Algorithms

7 Combinatorial Search and Heuristic Methods

8 Dynamic Programming

9 Intractable Problems and Approximation Algorithms

10 How to Design Algorithms

11 A Catalog of Algorithmic Problems

12 Data Structures

13 Numerical Problems

14 Combinatorial Problems

15 Graph Problems: Polynomial-Time

16 Graph Problems: Hard Problems

17 Computational Geometry

18 Set and String Problem

19 Algorithmic Resources

The Art of Agile Development

فهرست مطالب کتاب The Art of Agile Development:

Preface

Part I: Getting Started

Chapter 1: Why Agile?

Chapter 2: How to Be Agile

Chapter 3: Understanding X

Chapter 4: Adopting XP

Part II: Practicing XP

Chapter 5: Thinking

Chapter 6: Collaborating

Chapter 7: Releasing

Chapter 8: Planning

Chapter 9: Developing

Part III: Mastering Agility

Chapter 10: Values and Principles

Chapter 11: Improve the Process

Chapter 12: Rely on People

Chapter 13: Eliminate Waste

Chapter 14: Deliver Value

Chapter 15: Seek Technical Excellence

References

Index

The Art of Deception: Controlling the Human Element of Security

فهرست مطالب کتاب The Art of Deception:

Introduction

Part 1 Behind the Scenes

Chapter 1 Security’s Weakest Link

Part 2 The Art of the Attacker

Chapter 2 When Innocuous Information Isn’t

Chapter 3 The Direct Attack: Just Asking for it

Chapter 4 Building Trust

Chapter 5 “Let Me Help You”

Chapter 6 “Can You Help Me?”

Chapter 7 Phony Sites and Dangerous Attachments

Chapter 8 Using Sympathy, Guilt and Intimidation

Chapter 9 The Reverse Sting

Part 3 Intruder Alert

Chapter 10 Entering the Premises

Chapter 11 Combining Technology and Social Engineering

Chapter 12 Attacks on the Entry-Level Employee

Chapter 13 Clever Cons

Chapter 14 Industrial Espionage

Part 4 Raising the Bar

Chapter 15 Information Security Awareness and Training

Chapter 16 Recommended Corporate Information Security Policies

The Art of War

فهرست مطالب کتاب The Art of War:

THE ART OF WAR

Translator’s Preface

Translator’s Introduction

Strategic Assessments

Doing Battle

Planning a Siege

Formation

Force

Emptiness and Fullness

Armed Struggle

Adaptations

Maneuvering Armies

Terrain

Nine Grounds

Fire Attack

On the Use of Spies

MASTERING THE ART OF WAR

Note on Pronunciation

Translator’s Introduction

The Art of War and the I Ching: Strategy and Change

Notes on Sources

Part One: The Way of the General – Essays on Leadership and Crisis Management

Part Two: Lessons of War – Studies in Strategy

THE LOST ART OF WAR

Introduction

Sun Bin’s Art of War

Leadership, Organization, and Strategy: How Sun Tzu and Sun Tzu II Complement Each Other

THE SILVER SPARROW ART OF WAR

Translator’s Introduction

Strategic Measurements

Combat

Planning Attack

Formations

Disposition and Momentum

Vulnerability and Substantiality

Armed Struggle

Adapting to All Changes

Maneuvering Forces

The Lay of the Land

Nine Grounds

Fire Assault

Employing Secret Agents

Sources

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

فهرست مطالب کتاب The Basics of Hacking and Penetration Testing:

Acknowledgments

About the Author

About the Technical Editor

Introduction

Chapter 1: What Is Penetration Testing?

Chapter 2: Reconnaissance

Chapter 3: Scanning

Chapter 4: Exploitation

Chapter 5: Web-based Exploitation

Chapter 6: Maintaining Access with Backdoors and Rootkits

Chapter 7: Wrapping Up the Penetration Test

Index