599.1 – Purple Team Tactics & Kill Chain Defenses

فهرست مطالب 599.1 – Purple Team Tactics & Kill Chain Defenses:

Day 1: Introduction & Reconnaissance

Day 2: Payload Delivery & Execution

Day 3: Exploitation, Persistence and Command & Control

Day 4: Lateral Movement

Day 5: Action on Objectives, Threat Hunting & Incident Response

Day 6: APT Defender Capstone

599.2 – Payload Delivery and Execution

فهرست مطالب 599.2 – Payload Delivery and Execution:

Day 1: Introduction & Reconnaissance SANS

Day 2: Payload Delivery & Execution

Day 3: Exploitation, Persistence and Command & Control

Day 4: Lateral Movement

Day 5: Action on Objectives, Threat Hunting & Incident Response

Day 6: APT Defender Capstone

599.3 – Exploitation, Persistence, and Command & Control

فهرست مطالب 599.3 – Exploitation, Persistence, and Command & Control:

Day 1: Introduction & Reconnaissance

Day 2: Payload Delivery & Execution

Day 3: Exploitation, Persistence and Command & Control

Day 4: Lateral Movement

Day 5: Action on Objectives, Threat Hunting & Incident Response

Day 6: APT Defender Capstone

599.4 – Lateral Movement

فهرست مطالب 599.4 – Lateral Movement:

Day 1: Introduction & Reconnaissance

Day 2: Payload Delivery & Execution

Day 3: Exploitation, Persistence and

Day 4: Lateral Movement

Day 5: Action on Objectives, Threat Hunting & Incident Response

Day 6: APT Defender Capstone

599.5 – Action on Objectives, Threat Hunting, & Incident Response

فهرست مطالب کتاب 599.5 – Action on Objectives, Threat Hunting, & Incident Response:

Day 1: Introduction & Reconnaissance

Day 2: Payload Delivery & Execution

Day 3: Exploitation, Persistence and Command & Control SANS

Day 4: Lateral Movement

Day 5: Action on Objectives, Threat Hunting & Incident Response

Day 6: APT Defender Capstone

A Bug Hunters Diary: A Guided Tour Through the Wilds of Software Security

فهرست مطالب کتاب A Bug Hunters Diary:

Acknowledgments

Introduction

Chapter 1: Bug Hunting

Chapter 2: Back to the ’90s

Chapter 3: Escape from the WWW Zone

Chapter 4: NULL Pointer FTW

Chapter 5: Browse and You’re Owned

Chapter 6: One Kernel to Rule Them All

Chapter 7: A Bug Older Than 4.4BSD

Chapter 8: The Ringtone Massacre

Appendix A: Hints for Hunting

Appendix B: Debugging

Appendix C: Mitigation

Index

A Complete Guide to DevOps with AWS

فهرست مطالب:

About the Author

About the Technical Reviewer

Acknowledgments

Introduction

CHAPTER 1 Overview of Amazon Web Services

CHAPTER 2 Understanding DevOps Concepts

CHAPTER 3 AWS Services for Continuous Integration

CHAPTER 4 AWS Services for Continuous Deployment

CHAPTER 5 AWS Deployment Strategies

CHAPTER 6 Infrastructure as Code

CHAPTER 7 AWS Monitoring and Observability Tools

CHAPTER 8 DevOps Security (DevSecOps)

CHAPTER 9 Microservices vs. Monolithic

CHAPTER 10 Kubernetes

CHAPTER 11 DevOps Projects

A Complete Guide to Programming in C++

فهرست مطالب کتاب A Complete Guide to Programming in C++:

Chapter 1 Fundamentals

Chapter 2 Fundamental Types, Constants, and Variables

Chapter 3 Using Functions and Classes

Chapter 4 Input and Output with Streams

Chapter 5 Operators for Fundamental Types

Chapter 6 Control Flow

Chapter 7 Symbolic Constants and Macros

Chapter 8 Converting Arithmetic Types

Chapter 9 The Standard Class string

Chapter 10 Functions

Chapter 11 Storage Classes and Namespaces

Chapter 12 References and Pointers

Chapter 13 Defining Classes

Chapter 14 Methods

Chapter 15 Member Objects and Static Members

Chapter 16 Arrays

Chapter 17 Arrays and Pointers

Chapter 18 Fundamentals of File Input and Output

Chapter 19 Overloading Operators

Chapter 20 Type Conversion for Classes

Chapter 21 Dynamic Memory Allocation

Chapter 22 Dynamic Members

Chapter 23 Inheritance

Chapter 24 Type Conversion in Class Hierarchies

Chapter 25 Polymorphism

Chapter 26 Abstract Classes

Chapter 27 Multiple Inheritance

Chapter 28 Exception Handling

Chapter 29 More About Files

Chapter 30 More About Pointers

Chapter 31 Manipulating Bits

Chapter 32 Templates

Chapter 33 Containers

Active Defense: A Comprehensive Guide to Network Security

فهرست مطالب کتاب Active Defense: A Comprehensive Guide to Network Security:

Introduction

Chapter 1 – Why Secure Your Network?

Chapter 2 – How Much Security Do You Need?

Chapter 3 – Understanding How Network Systems Communicate

Chapter 4 – Topology Security

Chapter 5 – Firewalls

Chapter 6 – Configuring Cisco Router Security Features

Chapter 7 – Check Point’s FireWall-1

Chapter 8 – Intrusion Detection Systems

Chapter 9 – Authentication and Encryption

Chapter 10 – Virtual Private Networking

Chapter 11 – Viruses, Trojans, and Worms: Oh My!

Chapter 12 – Disaster Prevention and Recovery

Chapter 13 – NetWare

Chapter 14 – NT and Windows 2000

Chapter 15 – UNIX

Chapter 16 – The Anatomy of an Attack

Chapter 17 – Staying Ahead of Attacks

Appendix A – About the CD-ROM

Appendix B – Sample Network Usage Policy

Active Directory Administration Cookbook

فهرست مطالب:

Preface

Chapter 2: Managing Domain Controllers

Chapter 3: Managing Active Directory Roles and Features

Chapter 4: Managing Containers and Organizational Units

Chapter 5: Managing Active Directory Sites and Troubleshooting Replication

Chapter 6: Managing Active Directory Users

Chapter 8: Managing Active Directory Computers

Chapter 9: Getting the Most Out of Group Policy

Chapter 10: Securing Active Directory

Chapter 11: Managing Federation

Chapter 12: Handling Authentication in a Hybrid World (AD FS, PHS, PTA, and 3SO)

Chapter 13: Handling Synchronization in a Hybrid World (Azure AD Connect)

Chapter 14: Hardening Azure AD

Other Books You May Enjoy

Index