Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services
فهرست مطالب کتاب Service Design Patterns:
Chapter 1: From Objects to Web Services
Chapter 2: Web Service API Styles
Chapter 3: Client-Service Interactions
Chapter 4: Request and Response Management
Chapter 5: Web Service Implementation Styles
Chapter 6: Web Service Infrastructures
Chapter 7: Web Service Evolution
SQL Injection Attacks and Defense, Second Edition
فهرست مطالب کتاب SQL Injection Attacks and Defense:
Chapter 1. What Is SQL Injection?
Chapter 2. Testing for SQL Injection
Chapter 3. Reviewing Code for SQL Injection
Chapter 4. Exploiting SQL injection
Chapter 5. Blind SQL Injection Exploitation
Chapter 6. Exploiting the operating system
Chapter 7. Advanced topics
Chapter 8. Code-level defenses
Chapter 9. Platform level defenses
Chapter 10. Confirming and Recovering from SQL Injection Attacks
Chapter 11. References
SQL Notes For Professionals
فهرست مطالب کتاب SQL Notes For Professionals:
Getting started with SQL
Identifier
Data Types
NULL
Example Databases and Tables
SELECT
GROUP BY
ORDER BY
AND & OR Operators
CASE
LIKE operator
IN clause
Filter results using WHERE and HAVING
SKIP TAKE (Pagination)
EXCEPT
EXPLAIN and DESCRIBE
EXISTS CLAUSE
JOIN
UPDATE
CREATE Database
CREATE TABLE
CREATE FUNCTION
TRY/CATCH
UNION / UNION ALL
ALTER TABLE
INSERT
MERGE
cross apply, outer apply
DELETE
TRUNCATE
DROP Table
DROP or DELETE Database
Cascading Delete
GRANT and REVOKE
XML
Primary Keys
Indexes
Row number
SQL Group By vs Distinct
Finding Duplicates on a Column Subset with Detail
String Functions
Functions (Aggregate)
Functions (Scalar/Single Row)
Functions (Analytic)
Window Functions
Common Table Expressions
Views
Materialized Views
Comments
Foreign Keys
Sequence
Subqueries
Execution blocks
Stored Procedures
Triggers
Transactions
Table Design
Synonyms
Information Schema
Order of Execution
Clean Code in SQL
SQL Injection
Start With Why: How Great Leaders Inspire Everyone to Take Action
فهرست مطالب کتاب Start With Why: How Great Leaders Inspire Everyone to Take Action:
PART 1: A WORLD THAT DOESN’T START WITH WHY
PART 2: AN ALTERNATIVE PERSPECTIVE PART
PART 3: LEADERS NEED A FOLLOWING PART
PART 4: HOW TO RALLY THOSE WHO BELIEVE
PART 5: THE BIGGEST CHALLENGE IS SUCCESS
PART 6: DISCOVER WHY
Steve Jobs by Walter Isaacson
فهرست مطالب کتاب Steve Jobs:
Chapter 1: Childhood — Abandoned and Chosen
Chapter 2: Odd Couple — The Two Steves
Chapter 3: The Dropout — Turn On, Tune In …
Chapter 4: Atari and India — Zen and the Art of Game Design
Chapter 5: The Apple I — Turn On, Boot Up, Jack In …
Chapter 6: The Apple II — Dawn of a New Age
Chapter 7: Chrisann and Lisa — He Who Is Abandoned …
Chapter 8: Xerox and Lisa — Graphical User Interfaces
Chapter 9: Going Public — A Man of Wealth and Fame
Chapter 10: The Mac Is Born — You Say You Want a Revolution
Chapter 11: The Reality Disortion Field — Playing by His Own Set of Rules
Chapter 12: The Design — Real Artists Simplify
Chapter 13: Building the Mac — The Journey Is the Reward
Chapter 14: Enter Sculley — The Pepsi Challenge
Chapter 15: The Launch — A Dent in the Universe
Chapter 16: Gates and Jobs — When Orbits Intersect
Chapter 17: Icarus — What Goes Up …
Chapter 18: NeXT — Prometheus Unbound
Chapter 19: Pixar — Technology Meets Art
Chapter 20: A Regular Guy — Love Is Just a Four-Letter Word
Chapter 21: Family Man — At Home with the Jobs Clan
Chapter 22: Toy Story — Buzz and Woody to the Rescue
Chapter 23: The Second Coming — What Rough Beast, Its Hour Come Round at Last …
Chapter 24: The Restoration — The Loser Now Will Be Later to Win
Chapter 25: Think Different — Jobs as iCEO
Chapter 26: Design Principles — The Studio of Jobs and Ive
Chapter 27: The iMac — Hello (Again)
Chapter 28: CEO — Still Crazy after All These Years
Chapter 29: Apple Stores — Genius Bars and Siena Sandstone
Chapter 30: The Digital Hub — From iTunes to the iPod
Chapter 31: The iTunes Store — I’m the Pied Piper
Chapter 32: Music Man — The Sound Track of His Life
Chapter 33: Pixar’s Friends — … and Foes
Chapter 34: Twenty-First-Century Macs — Setting Apple Apart
Chapter 35: Round One — Memento Mori
Chapter 36: The iPhone — Three Revolutionary Products in One
Chapter 37: Round Two — The Cancer Recurs
Chapter 38: The iPad — Into the Post-PC Era
Chapter 39: New Battles — And Echoes of Old Ones
Chapter 40: To Infinity — The Cloud, the Spaceship, and Beyond
Chapter 41: Round Three — The Twilight Struggle
Chapter 42: Legacy — The Brightest Heaven of Invention
Summary of Start With Why
فهرست مطالب کتاب Summary of Start With Why:
PART 1: A WORLD THAT DOESN’T START WITH WHY
PART 2: AN ALTERNATIVE PERSPECTIVE
PART 3: LEADERS NEED A FOLLOWING
PART 4: HOW TO RALLY THOSE WHO BELIEVE
PART 5: THE BIGGEST CHALLENGE IS SUCCESS
PART 6: DISCOVER WHY
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
فهرست مطالب کتاب The AI Revolution in Networking, Cybersecurity, and Emerging Technologies:
Preface
Introducing the Age of AI: Emergence, Growth, and Impact on Technology
Connected Intelligence: AI in Computer Networking
Securing the Digital Frontier: AI’s Role in Cybersecurity
AI and Collaboration: Building Bridges, Not Walls
AI in the Internet of Things (AIoT)
Revolutionizing Cloud Computing with AI
Impact of AI in Other Emerging Technologies
Index
The Algorithm Design Manual (Second Edition)
فهرست مطالب کتاب The Algorithm Design Manual:
1 Introduction to Algorithm Design
2 Algorithm Analysis
3 Data Structures
4 Sorting and Searching
5 Graph Traversal
6 Weighted Graph Algorithms
7 Combinatorial Search and Heuristic Methods
8 Dynamic Programming
9 Intractable Problems and Approximation Algorithms
10 How to Design Algorithms
11 A Catalog of Algorithmic Problems
12 Data Structures
13 Numerical Problems
14 Combinatorial Problems
15 Graph Problems: Polynomial-Time
16 Graph Problems: Hard Problems
17 Computational Geometry
18 Set and String Problem
19 Algorithmic Resources
The Art of Agile Development
فهرست مطالب کتاب The Art of Agile Development:
Preface
Part I: Getting Started
Chapter 1: Why Agile?
Chapter 2: How to Be Agile
Chapter 3: Understanding X
Chapter 4: Adopting XP
Part II: Practicing XP
Chapter 5: Thinking
Chapter 6: Collaborating
Chapter 7: Releasing
Chapter 8: Planning
Chapter 9: Developing
Part III: Mastering Agility
Chapter 10: Values and Principles
Chapter 11: Improve the Process
Chapter 12: Rely on People
Chapter 13: Eliminate Waste
Chapter 14: Deliver Value
Chapter 15: Seek Technical Excellence
References
Index
The Art of Deception: Controlling the Human Element of Security
فهرست مطالب کتاب The Art of Deception:
Introduction
Part 1 Behind the Scenes
Chapter 1 Security’s Weakest Link
Part 2 The Art of the Attacker
Chapter 2 When Innocuous Information Isn’t
Chapter 3 The Direct Attack: Just Asking for it
Chapter 4 Building Trust
Chapter 5 “Let Me Help You”
Chapter 6 “Can You Help Me?”
Chapter 7 Phony Sites and Dangerous Attachments
Chapter 8 Using Sympathy, Guilt and Intimidation
Chapter 9 The Reverse Sting
Part 3 Intruder Alert
Chapter 10 Entering the Premises
Chapter 11 Combining Technology and Social Engineering
Chapter 12 Attacks on the Entry-Level Employee
Chapter 13 Clever Cons
Chapter 14 Industrial Espionage
Part 4 Raising the Bar
Chapter 15 Information Security Awareness and Training
Chapter 16 Recommended Corporate Information Security Policies
The Art of War
فهرست مطالب کتاب The Art of War:
THE ART OF WAR
Translator’s Preface
Translator’s Introduction
Strategic Assessments
Doing Battle
Planning a Siege
Formation
Force
Emptiness and Fullness
Armed Struggle
Adaptations
Maneuvering Armies
Terrain
Nine Grounds
Fire Attack
On the Use of Spies
MASTERING THE ART OF WAR
Note on Pronunciation
Translator’s Introduction
The Art of War and the I Ching: Strategy and Change
Notes on Sources
Part One: The Way of the General – Essays on Leadership and Crisis Management
Part Two: Lessons of War – Studies in Strategy
THE LOST ART OF WAR
Introduction
Sun Bin’s Art of War
Leadership, Organization, and Strategy: How Sun Tzu and Sun Tzu II Complement Each Other
THE SILVER SPARROW ART OF WAR
Translator’s Introduction
Strategic Measurements
Combat
Planning Attack
Formations
Disposition and Momentum
Vulnerability and Substantiality
Armed Struggle
Adapting to All Changes
Maneuvering Forces
The Lay of the Land
Nine Grounds
Fire Assault
Employing Secret Agents
Sources
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
فهرست مطالب کتاب The Basics of Hacking and Penetration Testing:
Acknowledgments
About the Author
About the Technical Editor
Introduction
Chapter 1: What Is Penetration Testing?
Chapter 2: Reconnaissance
Chapter 3: Scanning
Chapter 4: Exploitation
Chapter 5: Web-based Exploitation
Chapter 6: Maintaining Access with Backdoors and Rootkits
Chapter 7: Wrapping Up the Penetration Test
Index