530.6 – Hands-On Secure the Flag Challenge
فهرست مطالب کتاب 530.6 – Hands-On Secure the Flag Challenge:
ندارد
599.1 – Purple Team Tactics & Kill Chain Defenses
فهرست مطالب 599.1 – Purple Team Tactics & Kill Chain Defenses:
Day 1: Introduction & Reconnaissance
Day 2: Payload Delivery & Execution
Day 3: Exploitation, Persistence and Command & Control
Day 4: Lateral Movement
Day 5: Action on Objectives, Threat Hunting & Incident Response
Day 6: APT Defender Capstone
599.2 – Payload Delivery and Execution
فهرست مطالب 599.2 – Payload Delivery and Execution:
Day 1: Introduction & Reconnaissance SANS
Day 2: Payload Delivery & Execution
Day 3: Exploitation, Persistence and Command & Control
Day 4: Lateral Movement
Day 5: Action on Objectives, Threat Hunting & Incident Response
Day 6: APT Defender Capstone
599.3 – Exploitation, Persistence, and Command & Control
فهرست مطالب 599.3 – Exploitation, Persistence, and Command & Control:
Day 1: Introduction & Reconnaissance
Day 2: Payload Delivery & Execution
Day 3: Exploitation, Persistence and Command & Control
Day 4: Lateral Movement
Day 5: Action on Objectives, Threat Hunting & Incident Response
Day 6: APT Defender Capstone
599.4 – Lateral Movement
فهرست مطالب 599.4 – Lateral Movement:
Day 1: Introduction & Reconnaissance
Day 2: Payload Delivery & Execution
Day 3: Exploitation, Persistence and
Day 4: Lateral Movement
Day 5: Action on Objectives, Threat Hunting & Incident Response
Day 6: APT Defender Capstone
599.5 – Action on Objectives, Threat Hunting, & Incident Response
فهرست مطالب کتاب 599.5 – Action on Objectives, Threat Hunting, & Incident Response:
Day 1: Introduction & Reconnaissance
Day 2: Payload Delivery & Execution
Day 3: Exploitation, Persistence and Command & Control SANS
Day 4: Lateral Movement
Day 5: Action on Objectives, Threat Hunting & Incident Response
Day 6: APT Defender Capstone
A Bug Hunters Diary: A Guided Tour Through the Wilds of Software Security
فهرست مطالب کتاب A Bug Hunters Diary:
Acknowledgments
Introduction
Chapter 1: Bug Hunting
Chapter 2: Back to the ’90s
Chapter 3: Escape from the WWW Zone
Chapter 4: NULL Pointer FTW
Chapter 5: Browse and You’re Owned
Chapter 6: One Kernel to Rule Them All
Chapter 7: A Bug Older Than 4.4BSD
Chapter 8: The Ringtone Massacre
Appendix A: Hints for Hunting
Appendix B: Debugging
Appendix C: Mitigation
Index
A Complete Guide to DevOps with AWS
فهرست مطالب:
About the Author
About the Technical Reviewer
Acknowledgments
Introduction
CHAPTER 1 Overview of Amazon Web Services
CHAPTER 2 Understanding DevOps Concepts
CHAPTER 3 AWS Services for Continuous Integration
CHAPTER 4 AWS Services for Continuous Deployment
CHAPTER 5 AWS Deployment Strategies
CHAPTER 6 Infrastructure as Code
CHAPTER 7 AWS Monitoring and Observability Tools
CHAPTER 8 DevOps Security (DevSecOps)
CHAPTER 9 Microservices vs. Monolithic
CHAPTER 10 Kubernetes
CHAPTER 11 DevOps Projects
A Complete Guide to Programming in C++
فهرست مطالب کتاب A Complete Guide to Programming in C++:
Chapter 1 Fundamentals
Chapter 2 Fundamental Types, Constants, and Variables
Chapter 3 Using Functions and Classes
Chapter 4 Input and Output with Streams
Chapter 5 Operators for Fundamental Types
Chapter 6 Control Flow
Chapter 7 Symbolic Constants and Macros
Chapter 8 Converting Arithmetic Types
Chapter 9 The Standard Class string
Chapter 10 Functions
Chapter 11 Storage Classes and Namespaces
Chapter 12 References and Pointers
Chapter 13 Defining Classes
Chapter 14 Methods
Chapter 15 Member Objects and Static Members
Chapter 16 Arrays
Chapter 17 Arrays and Pointers
Chapter 18 Fundamentals of File Input and Output
Chapter 19 Overloading Operators
Chapter 20 Type Conversion for Classes
Chapter 21 Dynamic Memory Allocation
Chapter 22 Dynamic Members
Chapter 23 Inheritance
Chapter 24 Type Conversion in Class Hierarchies
Chapter 25 Polymorphism
Chapter 26 Abstract Classes
Chapter 27 Multiple Inheritance
Chapter 28 Exception Handling
Chapter 29 More About Files
Chapter 30 More About Pointers
Chapter 31 Manipulating Bits
Chapter 32 Templates
Chapter 33 Containers
Active Defense: A Comprehensive Guide to Network Security
فهرست مطالب کتاب Active Defense: A Comprehensive Guide to Network Security:
Introduction
Chapter 1 – Why Secure Your Network?
Chapter 2 – How Much Security Do You Need?
Chapter 3 – Understanding How Network Systems Communicate
Chapter 4 – Topology Security
Chapter 5 – Firewalls
Chapter 6 – Configuring Cisco Router Security Features
Chapter 7 – Check Point’s FireWall-1
Chapter 8 – Intrusion Detection Systems
Chapter 9 – Authentication and Encryption
Chapter 10 – Virtual Private Networking
Chapter 11 – Viruses, Trojans, and Worms: Oh My!
Chapter 12 – Disaster Prevention and Recovery
Chapter 13 – NetWare
Chapter 14 – NT and Windows 2000
Chapter 15 – UNIX
Chapter 16 – The Anatomy of an Attack
Chapter 17 – Staying Ahead of Attacks
Appendix A – About the CD-ROM
Appendix B – Sample Network Usage Policy
Active Directory Administration Cookbook
فهرست مطالب:
Preface
Chapter 2: Managing Domain Controllers
Chapter 3: Managing Active Directory Roles and Features
Chapter 4: Managing Containers and Organizational Units
Chapter 5: Managing Active Directory Sites and Troubleshooting Replication
Chapter 6: Managing Active Directory Users
Chapter 8: Managing Active Directory Computers
Chapter 9: Getting the Most Out of Group Policy
Chapter 10: Securing Active Directory
Chapter 11: Managing Federation
Chapter 12: Handling Authentication in a Hybrid World (AD FS, PHS, PTA, and 3SO)
Chapter 13: Handling Synchronization in a Hybrid World (Azure AD Connect)
Chapter 14: Hardening Azure AD
Other Books You May Enjoy
Index