The LISP Network Evolution to the Next-Generation of Data Networks
فهرست مطالب کتاب The LISP Network:
Chapter 1: LISP and the Future of Networking
Chapter 2: LISP Architecture
Chapter 3: Data Center Trends
Chapter 4: The WideArea Network: Bringing Traffic from Access to the Data Center
Chapter 5: MegaScale Access Networks: LISP, User Access, and the Internet of Things
Chapter 6: Security
Chapter 7: LISP and the NextGeneration Mobile Network
The Official CompTIA Network+ Student Guide (Exam N10-008)
فهرست مطالب کتابThe Official CompTIA Network+ Student Guide (Exam N10-008):
Lesson 1: Comparing OSI Model Network
Lesson 3: Deploying Ethernet Switching
Lesson 4: Troubleshooting Ethernet Networks
Lesson 5: Explaining IPv4 Addressing
Lesson 6: Supporting IPv4 and IPv6 Networks
Lesson 7: Configuring and Troubleshooting Routers
Lesson 8: Explaining Network Topologies and Types
Lesson 9: Explaining Transport Layer Protocols
Lesson 10: Explaining Network Services
Lesson 11: Explaining Network
Lesson 12: Ensuring Network Availability
Lesson 13: Explaining Common Security Concepts
Lesson 14: Supporting and Troubleshooting Secure Networks
Lesson 15: Deploying and Troubleshooting Wireless Networks
Lesson 16: Comparing WAN Links and Remote Access Methods
Lesson 17: Explaining Organizational and Physical Security Concepts
Lesson 18: Explaining Disaster Recovery and High Availability Concepts
Lesson 19: Applying Network Hardening Techniques
Lesson 20: Summarizing Cloud and Datacenter Architecture
Appendix A
Solutions
Glossary
Index
The Official CompTIA PenTest+ Student Guide (Exam PT0-002)
فهرست مطالب کتاب The Official CompTIA PenTest+ Student Guide:
Lesson 1: Scoping Organizational/Customer Requirements
Lesson 2: Defining the Rules of Engagement
Lesson 3: Footprinting and Gathering Intelligence
Lesson 4: Evaluating Human and Physical Vulnerabilities
Lesson 5: Preparing the Vulnerability Scan
Lesson 6: Scanning Logical Vulnerabilities
Lesson 7: Analyzing Scanning Results
Lesson 8: Avoiding Detection and Covering Tracks
Lesson 9: Exploiting the LAN and Cloud
Lesson 10: Testing Wireless Networks
Lesson 11: Targeting Mobile Devices
Lesson 12: Attacking Specialized Systems
Lesson 13: Web Application-Based Attacks
Lesson 14: Performing System Hacking
Lesson 15: Scripting and Software Development
Lesson 16: Leveraging the Attack: Pivot and Penetrate
Lesson 17: Communicating During the PenTesting Process
Lesson 18: Summarizing Report Components
Lesson 19: Recommending Remediation
Lesson 20: Performing Post-Report Delivery Activities
The Official CompTIA Security+ Study Guide (Exam SY0-601)
فهرست مطالب کتاب The Official CompTIA Security+ Study Guide (Exam SY0‑601):
Lesson 1: Comparing Security Roles and Security Controls
Lesson 2: Explaining Threat Actors and Threat Intelligence
Lesson 3: Performing Security Assessments
Lesson 4: Identifying Social Engineering and Malware
Lesson 5: Summarizing Basic Cryptographic Concepts
Lesson 6: Implementing Public Key Infrastructure
Lesson 7: Implementing Authentication Controls
Lesson 8: Implementing Identity and Account Management Controls
Lesson 9: Implementing Secure Network Designs
Lesson 10: Implementing Network Security Appliances
Lesson 11: Implementing Secure Network Protocols
Lesson 12: Implementing Host Security Solutions
Lesson 13: Implementing Secure Mobile Solutions
Lesson 14: Summarizing Secure Application Concepts
Lesson 15: Implementing Secure Cloud Solutions
Lesson 16: Explaining Data Privacy and Protection Concepts
Lesson 17: Performing Incident Response
Lesson 18: Explaining Digital Forensics
Lesson 19: Summarizing Risk Management Concepts
Lesson 20: Implementing Cybersecurity Resilience
Lesson 21: Explaining Physical Security
The Practice of Management
فهرست مطالب کتاب The Practice of Management:
INTRODUCTION: THE NATURE OF MANAGEMENT
PART I: MANAGING A BUSINESS
PART II: MANAGING MANAGERS
PART III: THE STRUCTURE OF MANAGEMENT
PART IV: THE MANAGEMENT OF WORKER AND WORK
PART V: WHAT IT MEANS TO BE A MANAGER
CONCLUSION: THE RESPONSIBILITIES OF MANAGEMENT
The Pragmatic Programmer: From Journeyman to Master
فهرست مطالب کتاب The Pragmatic Programmer:
1. A Pragmatic Philosophy
2. A Pragmatic Approach
3. The Basic Tools
4. Pragmatic Paranoia
5. Bend or Break
6. While You Are Coding
7. Before the Project
8. Pragmatic Projects
Resources
Answers to Exercises
The Shellcoders Handbook: Discovering and Exploiting Security Holes (Second Edition)
فهرست مطالب کتاب The Shellcoders Handbook: Discovering and Exploiting Security Holes:
Part I: Introduction to Exploitation: Linux on x86
Chapter 1: Before You Begin
Chapter 2: Stack Overflows
Chapter 3: Shellcode
Chapter 4: Introduction to Format String Bugs
Chapter 5: Introduction to Heap Overflows
Part II: Other Platforms — Windows, Solaris, OS X, and Cisco
Chapter 6: The Wild World of Windows
Chapter 7: Windows Shellcode
Chapter 8: Windows Overflows
Chapter 9: Overcoming Filters
Chapter 10: Introduction to Solaris Exploitation
Chapter 11: Advanced Solaris Exploitation
Chapter 12: OS X Shellcode
Chapter 13: Cisco IOS Exploitation
Chapter 14: Protection Mechanisms
Part III: Vulnerability Discovery
Chapter 15: Establishing a Working Environment
Chapter 16: Fault Injection
Chapter 17: The Art of Fuzzing
Chapter 18: Source Code Auditing: Finding Vulnerabilities in C-Based Languages
Chapter 19: Instrumented Investigation: A Manual Approach
Chapter 20: Tracing for Vulnerabilities
Chapter 21: Binary Auditing: Hacking Closed Source Software
Part IV: Advanced Materials
Chapter 22: Alternative Payload Strategies
Chapter 23: Writing Exploits that Work in the Wild
Chapter 24: Attacking Database Software
Chapter 25: Unix Kernel Overflows
Chapter 26: Exploiting Unix Kernel Vulnerabilities
Chapter 27: Hacking the Windows Kernel
The Startup Owners Manual: The Step‑by‑Step Guide for Building a Great Company
فهرست مطالب کتاب The Startup Owners Manual:
Step 1: The Startup Owner’s Manual Strategy Guide
Preface
Who Is This Book For?
Introduction
A Repeatable Path
Why a Second Decade?
The Four Steps: A New Path
Chapter 1: The Path to Disaster — A Startup Is Not a Small Version of a Big Company
Chapter 2: The Path to the Epiphany — The Customer Development Model
Chapter 3: The Customer Development Manifesto
Chapter 4: An Introduction to Customer Discovery
Chapter 5: Introduction to Customer Validation
Chapter 6: Customer Validation — The Toughest Question of All: Pivot or Proceed
Step 2: The Startup Owner’s Manual for Web/Mobile Channel Startups
How to Read This Book
Getting Started
Chapter 1: The Customer Development Manifesto
Step One: Customer Discovery
Chapter 2: An Introduction to Customer Discovery
Chapter 3: Customer Discovery, Phase One — State Your Business Model Hypotheses
Chapter 4: Customer Discovery, Phase Two — “Get Out of the Building” to Test the Problem: “Do People Care?”
Chapter 5: Customer Discovery, Phase Three — “Get Out of the Building” and Test the Product Solution
Chapter 6: Customer Discovery, Phase Four — Verify the Business Model and Pivot or Proceed
Step Two: Customer Validation
Chapter 7: Introduction to Customer Validation
Chapter 8: Customer Validation, Phase One — “Get Ready to Sell”
Chapter 9: Customer Validation, Phase Two — “Get Out of the Building and Sell!”
Chapter 10: Customer Validation, Phase Three — Develop Product and Company Positioning
Chapter 11: Customer Validation, Phase Four — The Toughest Question of All: Pivot or Proceed
How to Build a Web Startup — A Simple Overview
Step 3: The Startup Owner’s Manual for Physical Channel Startups
How to Read This Book
Getting Started
Chapter 1: The Customer Development Manifesto
Step One: Customer Discovery
Chapter 2: An Introduction to Customer Discovery
Chapter 3: Customer Discovery, Phase One — State Your Business Model Hypotheses
Chapter 4: Customer Discovery, Phase Two — “Get Out of the Building” to Test the Problem: “Do People Care?”
Chapter 5: Customer Discovery, Phase Three — “Get Out of the Building” and Test the Product Solution
Chapter 6: Customer Discovery, Phase Four — Verify the Business Model and Pivot or Proceed
Step Two: Customer Validation
Chapter 7: Introduction to Customer Validation
Chapter 8: Customer Validation, Phase One — “Get Ready to Sell”
Chapter 9: Customer Validation, Phase Two — “Get Out of the Building and Sell!”
Chapter 10: Customer Validation, Phase Three — Develop Product and Company Positioning
Chapter 11: Customer Validation, Phase Four — The Toughest Question of All: Pivot or Proceed
The Ultimate Kali Linux Book (Third Edition)
فهرست مطالب کتاب The Ultimate Kali Linux Book (Third Edition):
Chapter 1: Introduction to Ethical Hacking
Chapter 2: Building a Penetration Testing Lab
Chapter 3: Setting up for Advanced Penetration Testing Techniques
Chapter 4: Passive Reconnaissace
Chapter 5: Exploring Open Source Intelligence
Chapter 6: Active Reconnaissance
Chapter 7: Performing Vulnerability Assessments
Chapter 8: Understanding Network Penetration Testing
Chapter 9: Post Exploitation techniques
Chapter 10: Working with Active Directory attacks
Chapter 11: Advanced Active Directory attacks
Chapter 12: Delving into Command and Control tactics
Chapter 13: Advanced wireless penetration testing
Chapter 14: Exploring Social Engineering attacks
Chapter 15: Understanding Website Application security
Chapter 16: Advanced Website Penetration Testing Techniques
17. Chapter 17: Best Practices for the real world
The Ultimate Kali Linux Book, Second Edition
فهرست مطالب کتاب The Ultimate Kali Linux Book, Second Edition:
ندارد
The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition
فهرست مطالب کتاب The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition:
Introduction to Ethical Hacking
Building a Penetration Testing Lab
Setting up for Advanced Penetration Testing Techniques
Passive Reconnaissace
Exploring Open Source Intelligence
Active Reconnaissance
Performing Vulnerability Assessments
Understanding Network Penetration Testing
The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws
فهرست مطالب کتاب The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws:
Chapter 1 Web Application (In)security
Chapter 2 Core Defense Mechanisms
Chapter 3 Web Application Technologies
Chapter 4 Mapping the Application
Chapter 5 Bypassing Client-Side Controls
Chapter 6 Attacking Authentication
Chapter 7 Attacking Session Management
Chapter 8 Attacking Access Controls
Chapter 9 Injecting Code
Chapter 10 Exploiting Path Traversal
Chapter 11 Attacking Application Logic
Chapter 12 Attacking Other Users
Chapter 13 Automating Bespoke Attacks
Chapter 14 Exploiting Information Disclosure
Chapter 15 Attacking Compiled Applications
Chapter 16 Attacking Application Architecture
Chapter 17 Attacking the Web Server
Chapter 18 Finding Vulnerabilities in Source Code
Chapter 19 A Web Application Hacker’s Toolkit
Chapter 20 A Web Application Hacker’s Methodology