Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
فهرست مطالب:
About the Author
About the Technical Reviewer
Acknowledgments
Introduction
Chapter 1: Security Trends
Chapter 2: Setting Up a Penetration Testing and Network Security Lab
Chapter 3: Elementary Linux Commands
Chapter 4: Know Your Network
Chapter 5: How to Build a Kali Web Server
Chapter 6: Kali Linux from the Inside Out
Chapter 7: Kali Linux and Python
Chapter 8: Information Gathering
Chapter 9: SQL Mapping
Chapter 10: Vulnerability Analysis
Chapter 11: Information Assurance Model
Chapter 12: Introducing Metasploit in Kali Linux
Chapter 13: Hashes and Passwords
Chapter 14: Classic and Modern Encryption
Chapter 15: Exploiting Targets
Index
Beginning Python: From Novice to Professional – Third Edition
فهرست مطالب:
About the Author
About the Technical Reviewer
Preface
Introduction
Chapter 1: Instant Hacking: The Basics
Chapter 2: Lists and Tuples
Chapter 3: Working with Strings
Chapter 4: Dictionaries: When Indices Won’t Do
Chapter 5: Conditionals, Loops, and Some Other Statements
Chapter 6: Abstraction
Chapter 7: More Abstraction
Chapter 8: Exceptions
Chapter 9: Magic Methods, Properties, and Iterators
Chapter 10: Batteries Included
Chapter 11: Files and Stuff
Chapter 12: Graphical User Interfaces
Chapter 13: Database Support
Chapter 14: Network Programming
Chapter 15: Python and the Web
Chapter 16: Testing, 1-2-3
Chapter 17: Extending Python
Chapter 18: Packaging Your Programs
Chapter 19: Playful Programming
Chapter 20: Project 1: Instant Markup
Chapter 21: Project 2: Painting a Pretty Picture
Chapter 22: Project 3: XML for All Occasions
Chapter 23: Project 4: In the News
Chapter 24: Project 5: A Virtual Tea Party
Chapter 25: Project 6: Remote Editing with CGI
Chapter 26: Project 7: Your Own Bulletin Board
Chapter 27: Project 8: File Sharing with XML-RPC
Chapter 28: Project 9: File Sharing II—Now with GUI!
Chapter 29: Project 10: Do-It-Yourself Arcade Game
Appendix A: The Short Version
Appendix B: Python Reference
Index
Black Hat Bash: Bash Scripting for Hackers and Pentesters
فهرست مطالب:
Chapter 1: Bash Basics
Chapter 2: Advanced Bash Concepts
Chapter 3: Setting Up a Hacking Lab
Chapter 4: Reconnaissance
Chapter 5: Vulnerability Scanning and Fuzzing
Chapter 6: Gaining a Web Shell
Chapter 7: Reverse Shells
Chapter 8: Local Information Gathering
Chapter 9: Privilege Escalation
Chapter 10: Persistence
Chapter 11: Network Probing and Lateral Movement
Chapter 12: Defense Evasion
Chapter 13: Exfiltration and Counter-Forensics
Bug Bounty Hunting Essentials
فهرست مطالب:
Preface
Chapter 1: Basics of Bug Bounty Hunting
Chapter 2: How to Write a Bug Bounty Report
Chapter 3: SQL Injection Vulnerabilities
Chapter 4: Cross-Site Request Forgery
Chapter 5: Application Logic Vulnerabilities
Chapter 6: Cross-Site Scripting Attacks
Chapter 7: SQL Injection
Chapter 8: Open Redirect Vulnerabilities
Chapter 9: Sub-Domain Takeovers
Chapter 10: XML External Entity Vulnerability
Chapter 11: Template Injection
Chapter 12: Top Bug Bounty Hunting Tools
Chapter 13: Top Learning Resources
Other Books You May Enjoy
Index
Building Data Centers with VXLAN BGP EVPN
فهرست مطالب:
Introduction
Chapter 1 Introduction to Programmable Fabric
Chapter 2 VXLAN BGP EVPN Basics
Chapter 3 VXLAN/EVPN Forwarding Characteristics
Chapter 4 The Underlay
Chapter 5 Multitenancy
Chapter 6 Unicast Forwarding
Chapter 7 Multicast Forwarding
Chapter 8 External Connectivity
Chapter 9 Multi-pod, Multifabric, and Data Center Interconnect (DCI)
Chapter 10 Layer 4–7 Services Integration
Chapter 11 Introduction to Fabric Management
Appendix A VXLAN BGP EVPN Implementation Options
Index
Building Microservices: Designing Fine-Grained Systems
فهرست مطالب کتاب Building Microservices:
Preface
1. Microservices
2. The Evolutionary Architect
3. How to Model Services
4. Integration
5. Splitting the Monolith
6. Deployment
7. Testing
8. Monitoring
9. Security
10. Conway’s Law and System Design
11. Microservices at Scale
12. Bringing It All Together
Index
Burp Suite Cookbook: Web Application Security Made Easy with Burp Suite – Second Edition
فهرست مطالب:
Preface
Getting Started with Burp Suite
Getting to Know the Burp Suite of Tools
Configuring, Crawling, Auditing, and Reporting with Burp
Assessing Authentication Schemes
Assessing Authorization Checks
Assessing Session Management Mechanisms
Assessing Business Logic
Evaluating Input Validation Checks
Attacking the Client
Working with Burp Suite Macros and Extensions
Implementing Advanced Topic Attacks
Index
C Interfaces and Implementations: Techniques for Creating Reusable Software
فهرست مطالب کتاب C Interfaces and Implementations:
Chapter 1. Introduction
Chapter 2. Interfaces and Implementations
Chapter 3. Atoms
Chapter 4. Exceptions and Assertions
Chapter 5. Memory Management
Chapter 6. More Memory Management
Chapter 7. Lists
Chapter 8. Tables
Chapter 9. Sets
Chapter 10. Dynamic Arrays
Chapter 11. Sequences
Chapter 12. Rings
Chapter 13. Bit Vectors
Chapter 14. Formatting
Chapter 15. Low-Level Strings
Chapter 16. High-Level Strings
Chapter 17. Extended-Precision Arithmetic
Chapter 18. Arbitrary-Precision Arithmetic
Chapter 19. Multiple-Precision Arithmetic
Chapter 20. Threads
C Notes For Professionals
فهرست مطالب C Programming Notes for Professionals:
Getting started with C Language
Comments
Data Types
Operators
Boolean
Strings
Literals for numbers, characters and strings
Compound Literals
Bit-fields
Arrays
Linked lists
Enumerations
Structs
Standard Math
Iteration Statements/Loops: for, while, do-while
Selection Statements
Initialization
Declaration vs Definition
Command-line arguments
Files and I/O streams
Formatted Input/Output
Pointers
Sequence points
Function Pointers
Function Parameters
Pass 2D-arrays to functions
Error handling
Undefined behavior
Random Number Generation
Preprocessor and Macros
Signal handling
Variable arguments
Assertion
Generic selection
X-macros
Aliasing and effective type
Compilation
Inline assembly
Identifier Scope
Implicit and Explicit Conversions
Type Qualifiers
Typedef
Storage Classes
Declarations
Structure Padding and Packing
Memory management
Implementation-defined behaviour
Atomics
Jump Statements
Create and include header files
<ctype.h> — character classification & conversion
Side Effects
Multi-Character Character Sequence
Constraints
Inlining
Unions
Threads (native)
Multithreading
Interprocess Communication (IPC)
Testing frameworks
Valgrind
Common C programming idioms and developer practices
Common pitfalls
C Traps and Pitfalls
فهرست مطالب کتاب C Traps and Pitfalls:
Lexical pitfalls
Syntactic pitfalls
Semantic pitfalls
Linkage
Library functions
The preprocessor
Portability pitfalls
Advice and answers
C# Notes for Professionals
فهرست مطالب کتاب C# Notes for Professionals:
Getting started with C# Language
Literals
Operators
Conditional Statements
Equality Operator
Equals and GetHashCode
Null-Coalescing Operator
Null-conditional Operators
nameof Operator
Verbatim Strings
Common String Operations
Format
String Concatenate
String Manipulation
String Interpolation
String Escape Sequences
StringBuilder
Regex Parsing
DateTime Methods
Arrays
O(n) Algorithm for circular rotation of an array
Enum
Tuples
Guid
BigInteger
Collection Initializers
An overview of C# collections
Looping
Iterators
IEnumerable
Value type vs Reference type
Built-in Types
Aliases of built-in types
Anonymous types
Dynamic type
Type Conversion
Casting
Nullable types
Constructors and Finalizers
Access Modifiers
Interfaces
Static Classes
Singleton Implementation
Dependency Injection
Partial class and methods
Object initializers
Methods
Extension Methods
Named Arguments
Named and Optional Arguments
Data Annotation
Keywords
Object Oriented Programming In C#
Recursion
Naming Conventions
XML Documentation Comments
Comments and regions
Inheritance
Generics
Using Statement
Using Directive
IDisposable interface
Reflection
IQueryable interface
Linq to Objects
LINQ Queries
LINQ to XML
Parallel LINQ (PLINQ)
XmlDocument and the System.Xml namespace
XDocument and the System.Xml.Linq namespace
C# 7.0 Features
C# 6.0 Features
C# 5.0 Features
C# 4.0 Features
C# 3.0 Features
Exception Handling
NullReferenceException
Handling FormatException when converting string to other types
Read & Understand Stacktraces
Diagnostics
Overflow
Getting Started: Json with C#
Using json.net
Lambda expressions
Generic Lambda Query Builder
Properties
Initializing Properties
INotifyPropertyChanged interface
Events
Expression Trees
Overload Resolution
BindingList<T>
Preprocessor directives
Structs
Attributes
Delegates
File and Stream I/O
Networking
Performing HTTP requests
Reading and writing .zip files
FileSystemWatcher
Access network shared folder with username and password
Asynchronous Socket
Action Filters
Polymorphism
Immutability
Indexer
Checked and Unchecked
Stream
Timers
Stopwatches
Threading
Async/await, Backgroundworker, Task and Thread Examples
Async-Await
Synchronization Context in Async-Await
BackgroundWorker
Task Parallel Library
Making a variable thread safe
Lock Statement
Yield Keyword
Task Parallel Library (TPL) Dataflow Constructs
Functional Programming
Func delegates
Function with multiple return values
Binary Serialization
ICloneable
IComparable
Accessing Databases
Using SQLite in C#
Caching
Code Contracts
Code Contracts and Assertions
Structural Design Patterns
Creational Design Patterns
Implementing Decorator Design Pattern
Implementing Flyweight Design Pattern
Management.Automation
DirectoryServices.Protocols.LdapConnection
C# Authentication handler
Pointers
Pointers & Unsafe Code
How to use C# Structs to create a Union type (Similar to C Unions)
Reactive Extensions (Rx)
cs Examples
Creating a Console Application using a Plain-Text Editor and the C# Compiler (csc.exe)
CLSCompliantAttribute
ObservableCollection<T>
Hash Functions
Generating Random Numbers in C#
Cryptography (System.Security.Cryptography)
NET Identity
Unsafe Code in .NET
C# Script
Runtime Compile
Interoperability
.NET Compiler Platform (Roslyn)
ILGenerator
T4 Code Generation
Creating Own MessageBox in Windows Form Application
Including Font Resources
Import Google Contacts
Garbage Collector in .Net
Exchange.WebServices
Windows Communication Foundation
C++ Notes for Professionals
فهرست مطالب کتاب C++ Notes for Professionals:
Getting started with C++
Literals
operator precedence
Floating Point Arithmetic
Bit Operators
Bit Manipulation
Bit fields
Arrays
Iterators
Basic input/output in c++
Loops
File I/O
C++ Streams
Stream manipulators
Flow Control
Metaprogramming
const keyword
mutable keyword
Friend keyword
Type Keywords
Basic Type Keywords
Variable Declaration Keywords
Keywords
Returning several values from a function
Polymorphism
References
Value and Reference Semantics
C++ function “call by value” vs. “call by reference”
Copying vs Assignment
Pointers
Pointers to members
The This Pointer
Smart Pointers
Classes/Structures
Function Overloading
Operator Overloading
Function Template Overloading
Virtual Member Functions
Inline functions
Special Member Functions
Non-Static Member Functions
Constant class member functions
C++ Containers
Namespaces
Header Files
Using declaration
std::string
std::array
std::vector
std::map
std::optional
std::function: To wrap any element that is callable
std::forward_list
std::pair
std::atomics
std::variant
std::iomanip
std::any
std::set and std::multiset
std::integer_sequence
Using std::unordered_map
Standard Library Algorithms
The ISO C++ Standard
Inline variables
Random number generation
Date and time using <chrono> header
Sorting
Enumeration
Iteration
Regular expressions
Implementation-defined behavior
Exceptions
Lambdas
Value Categories
Preprocessor
Data Structures in C++
Templates
Expression templates
Curiously Recurring Template Pattern (CRTP)
Threading
Thread synchronization structures
The Rule of Three, Five, And Zero
RAII: Resource Acquisition Is Initialization
RTTI: Run-Time Type Information
Mutexes
Recursive Mutex
Semaphore
Futures and Promises
Atomic Types
Type Erasure
Explicit type conversions
Unnamed types
Type Traits
Return Type Covariance
Layout of object types
Type Inference
Typedef and type aliases
type deduction
Trailing return type
Alignment
Perfect Forwarding
decltype
SFINAE (Substitution Failure Is Not An Error)
Undefined Behavior
Overload resolution
Move Semantics
Pimpl Idiom
auto
Copy Elision
Fold Expressions
Unions
Design pattern implementation in C++
Singleton Design Pattern
User-Defined Literals
Memory management
C++11 Memory Model
Scopes
static_assert
constexpr
One Definition Rule (ODR)
Unspecified behavior
Argument Dependent Name Lookup
Attributes
Recursion in C++
Arithmitic Metaprogramming
Callable Objects
Client server examples
Const Correctness
Parameter packs
Build Systems
Concurrency With OpenMP
Resource Management
Storage class specifiers
Linkage specifications
Digit separators
C incompatibilities
Side by Side Comparisons of classic C++ examples solved via C++ vs C++11 vs C++14 vs C++17
Compiling and Building
Common compile/linker errors (GCC)
More undefined behaviors in C++
Unit Testing in C++
C++ Debugging and Debug-prevention Tools & Techniques
Optimization in C++
Optimization
Profiling
Refactoring Techniques