The LISP Network Evolution to the Next-Generation of Data Networks

فهرست مطالب کتاب The LISP Network:

Chapter 1: LISP and the Future of Networking

Chapter 2: LISP Architecture

Chapter 3: Data Center Trends

Chapter 4: The Wide­Area Network: Bringing Traffic from Access to the Data Center

Chapter 5: Mega­Scale Access Networks: LISP, User Access, and the Internet of Things

Chapter 6: Security

Chapter 7: LISP and the Next­Generation Mobile Network

The Official CompTIA Network+ Student Guide (Exam N10-008)

فهرست مطالب کتابThe Official CompTIA Network+ Student Guide (Exam N10-008):

Lesson 1: Comparing OSI Model Network

Lesson 3: Deploying Ethernet Switching

Lesson 4: Troubleshooting Ethernet Networks

Lesson 5: Explaining IPv4 Addressing

Lesson 6: Supporting IPv4 and IPv6 Networks

Lesson 7: Configuring and Troubleshooting Routers

Lesson 8: Explaining Network Topologies and Types

Lesson 9: Explaining Transport Layer Protocols

Lesson 10: Explaining Network Services

Lesson 11: Explaining Network

Lesson 12: Ensuring Network Availability

Lesson 13: Explaining Common Security Concepts

Lesson 14: Supporting and Troubleshooting Secure Networks

Lesson 15: Deploying and Troubleshooting Wireless Networks

Lesson 16: Comparing WAN Links and Remote Access Methods

Lesson 17: Explaining Organizational and Physical Security Concepts

Lesson 18: Explaining Disaster Recovery and High Availability Concepts

Lesson 19: Applying Network Hardening Techniques

Lesson 20: Summarizing Cloud and Datacenter Architecture

Appendix A

Solutions

Glossary

Index

The Official CompTIA PenTest+ Student Guide (Exam PT0-002)

فهرست مطالب کتاب The Official CompTIA PenTest+ Student Guide:

Lesson 1: Scoping Organizational/Customer Requirements

Lesson 2: Defining the Rules of Engagement

Lesson 3: Footprinting and Gathering Intelligence

Lesson 4: Evaluating Human and Physical Vulnerabilities

Lesson 5: Preparing the Vulnerability Scan

Lesson 6: Scanning Logical Vulnerabilities

Lesson 7: Analyzing Scanning Results

Lesson 8: Avoiding Detection and Covering Tracks

Lesson 9: Exploiting the LAN and Cloud

Lesson 10: Testing Wireless Networks

Lesson 11: Targeting Mobile Devices

Lesson 12: Attacking Specialized Systems

Lesson 13: Web Application-Based Attacks

Lesson 14: Performing System Hacking

Lesson 15: Scripting and Software Development

Lesson 16: Leveraging the Attack: Pivot and Penetrate

Lesson 17: Communicating During the PenTesting Process

Lesson 18: Summarizing Report Components

Lesson 19: Recommending Remediation

Lesson 20: Performing Post-Report Delivery Activities

The Official CompTIA Security+ Study Guide (Exam SY0-601)

فهرست مطالب کتاب The Official CompTIA Security+ Study Guide (Exam SY0601):

Lesson 1: Comparing Security Roles and Security Controls

Lesson 2: Explaining Threat Actors and Threat Intelligence

Lesson 3: Performing Security Assessments

Lesson 4: Identifying Social Engineering and Malware

Lesson 5: Summarizing Basic Cryptographic Concepts

Lesson 6: Implementing Public Key Infrastructure

Lesson 7: Implementing Authentication Controls

Lesson 8: Implementing Identity and Account Management Controls

Lesson 9: Implementing Secure Network Designs

Lesson 10: Implementing Network Security Appliances

Lesson 11: Implementing Secure Network Protocols

Lesson 12: Implementing Host Security Solutions

Lesson 13: Implementing Secure Mobile Solutions

Lesson 14: Summarizing Secure Application Concepts

Lesson 15: Implementing Secure Cloud Solutions

Lesson 16: Explaining Data Privacy and Protection Concepts

Lesson 17: Performing Incident Response

Lesson 18: Explaining Digital Forensics

Lesson 19: Summarizing Risk Management Concepts

Lesson 20: Implementing Cybersecurity Resilience

Lesson 21: Explaining Physical Security

The Practice of Management

فهرست مطالب کتاب The Practice of Management:

INTRODUCTION: THE NATURE OF MANAGEMENT

PART I: MANAGING A BUSINESS

PART II: MANAGING MANAGERS

PART III: THE STRUCTURE OF MANAGEMENT

PART IV: THE MANAGEMENT OF WORKER AND WORK

PART V: WHAT IT MEANS TO BE A MANAGER

CONCLUSION: THE RESPONSIBILITIES OF MANAGEMENT

The Pragmatic Programmer: From Journeyman to Master

فهرست مطالب کتاب The Pragmatic Programmer:

1. A Pragmatic Philosophy

2. A Pragmatic Approach

3. The Basic Tools

4. Pragmatic Paranoia

5. Bend or Break

6. While You Are Coding

7. Before the Project

8. Pragmatic Projects

Resources

Answers to Exercises

The Shellcoders Handbook: Discovering and Exploiting Security Holes (Second Edition)

فهرست مطالب کتاب The Shellcoders Handbook: Discovering and Exploiting Security Holes:

Part I: Introduction to Exploitation: Linux on x86

Chapter 1: Before You Begin

Chapter 2: Stack Overflows

Chapter 3: Shellcode

Chapter 4: Introduction to Format String Bugs

Chapter 5: Introduction to Heap Overflows

Part II: Other Platforms — Windows, Solaris, OS X, and Cisco

Chapter 6: The Wild World of Windows

Chapter 7: Windows Shellcode

Chapter 8: Windows Overflows

Chapter 9: Overcoming Filters

Chapter 10: Introduction to Solaris Exploitation

Chapter 11: Advanced Solaris Exploitation

Chapter 12: OS X Shellcode

Chapter 13: Cisco IOS Exploitation

Chapter 14: Protection Mechanisms

Part III: Vulnerability Discovery

Chapter 15: Establishing a Working Environment

Chapter 16: Fault Injection

Chapter 17: The Art of Fuzzing

Chapter 18: Source Code Auditing: Finding Vulnerabilities in C-Based Languages

Chapter 19: Instrumented Investigation: A Manual Approach

Chapter 20: Tracing for Vulnerabilities

Chapter 21: Binary Auditing: Hacking Closed Source Software

Part IV: Advanced Materials

Chapter 22: Alternative Payload Strategies

Chapter 23: Writing Exploits that Work in the Wild

Chapter 24: Attacking Database Software

Chapter 25: Unix Kernel Overflows

Chapter 26: Exploiting Unix Kernel Vulnerabilities

Chapter 27: Hacking the Windows Kernel

The Startup Owners Manual: The Step‑by‑Step Guide for Building a Great Company

فهرست مطالب کتاب The Startup Owners Manual:

Step 1: The Startup Owner’s Manual Strategy Guide

Preface

Who Is This Book For?

Introduction

A Repeatable Path

Why a Second Decade?

The Four Steps: A New Path

Chapter 1: The Path to Disaster — A Startup Is Not a Small Version of a Big Company

Chapter 2: The Path to the Epiphany — The Customer Development Model

Chapter 3: The Customer Development Manifesto

Chapter 4: An Introduction to Customer Discovery

Chapter 5: Introduction to Customer Validation

Chapter 6: Customer Validation — The Toughest Question of All: Pivot or Proceed

Step 2: The Startup Owner’s Manual for Web/Mobile Channel Startups

How to Read This Book

Getting Started

Chapter 1: The Customer Development Manifesto

Step One: Customer Discovery

Chapter 2: An Introduction to Customer Discovery

Chapter 3: Customer Discovery, Phase One — State Your Business Model Hypotheses

Chapter 4: Customer Discovery, Phase Two — “Get Out of the Building” to Test the Problem: “Do People Care?”

Chapter 5: Customer Discovery, Phase Three — “Get Out of the Building” and Test the Product Solution

Chapter 6: Customer Discovery, Phase Four — Verify the Business Model and Pivot or Proceed

Step Two: Customer Validation

Chapter 7: Introduction to Customer Validation

Chapter 8: Customer Validation, Phase One — “Get Ready to Sell”

Chapter 9: Customer Validation, Phase Two — “Get Out of the Building and Sell!”

Chapter 10: Customer Validation, Phase Three — Develop Product and Company Positioning

Chapter 11: Customer Validation, Phase Four — The Toughest Question of All: Pivot or Proceed

How to Build a Web Startup — A Simple Overview

Step 3: The Startup Owner’s Manual for Physical Channel Startups

How to Read This Book

Getting Started

Chapter 1: The Customer Development Manifesto

Step One: Customer Discovery

Chapter 2: An Introduction to Customer Discovery

Chapter 3: Customer Discovery, Phase One — State Your Business Model Hypotheses

Chapter 4: Customer Discovery, Phase Two — “Get Out of the Building” to Test the Problem: “Do People Care?”

Chapter 5: Customer Discovery, Phase Three — “Get Out of the Building” and Test the Product Solution

Chapter 6: Customer Discovery, Phase Four — Verify the Business Model and Pivot or Proceed

Step Two: Customer Validation

Chapter 7: Introduction to Customer Validation

Chapter 8: Customer Validation, Phase One — “Get Ready to Sell”

Chapter 9: Customer Validation, Phase Two — “Get Out of the Building and Sell!”

Chapter 10: Customer Validation, Phase Three — Develop Product and Company Positioning

Chapter 11: Customer Validation, Phase Four — The Toughest Question of All: Pivot or Proceed

The Ultimate Kali Linux Book (Third Edition)

فهرست مطالب کتاب The Ultimate Kali Linux Book (Third Edition): 

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Building a Penetration Testing Lab

Chapter 3: Setting up for Advanced Penetration Testing Techniques

Chapter 4: Passive Reconnaissace

Chapter 5: Exploring Open Source Intelligence

Chapter 6: Active Reconnaissance

Chapter 7: Performing Vulnerability Assessments

Chapter 8: Understanding Network Penetration Testing

Chapter 9: Post Exploitation techniques

Chapter 10: Working with Active Directory attacks

Chapter 11: Advanced Active Directory attacks

Chapter 12: Delving into Command and Control tactics

Chapter 13: Advanced wireless penetration testing

Chapter 14: Exploring Social Engineering attacks

Chapter 15: Understanding Website Application security

Chapter 16: Advanced Website Penetration Testing Techniques

17. Chapter 17: Best Practices for the real world

The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition

فهرست مطالب کتاب The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition:

Introduction to Ethical Hacking

Building a Penetration Testing Lab

Setting up for Advanced Penetration Testing Techniques

Passive Reconnaissace

Exploring Open Source Intelligence

Active Reconnaissance

Performing Vulnerability Assessments

Understanding Network Penetration Testing

The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws

فهرست مطالب کتاب The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws:

Chapter 1 Web Application (In)security

Chapter 2 Core Defense Mechanisms

Chapter 3 Web Application Technologies

Chapter 4 Mapping the Application

Chapter 5 Bypassing Client-Side Controls

Chapter 6 Attacking Authentication

Chapter 7 Attacking Session Management

Chapter 8 Attacking Access Controls

Chapter 9 Injecting Code

Chapter 10 Exploiting Path Traversal

Chapter 11 Attacking Application Logic

Chapter 12 Attacking Other Users

Chapter 13 Automating Bespoke Attacks

Chapter 14 Exploiting Information Disclosure

Chapter 15 Attacking Compiled Applications

Chapter 16 Attacking Application Architecture

Chapter 17 Attacking the Web Server

Chapter 18 Finding Vulnerabilities in Source Code

Chapter 19 A Web Application Hacker’s Toolkit

Chapter 20 A Web Application Hacker’s Methodology