0% ont trouvé ce document utile (0 vote)
125 vues11 pages

Guide Arab Reseaux

Le document contient des informations sur différents niveaux d'études en informatique et en mathématiques, avec des sources recommandées pour chaque niveau. Les niveaux incluent débutant, intermédiaire et avancé, et couvrent des sujets tels que la programmation, les architectures, les systèmes d'exploitation et la sécurité de l'information.

Transféré par

Issam Bammou
Copyright
© © All Rights Reserved
Nous prenons très au sérieux les droits relatifs au contenu. Si vous pensez qu’il s’agit de votre contenu, signalez une atteinte au droit d’auteur ici.
Formats disponibles
Téléchargez aux formats PDF, TXT ou lisez en ligne sur Scribd
0% ont trouvé ce document utile (0 vote)
125 vues11 pages

Guide Arab Reseaux

Le document contient des informations sur différents niveaux d'études en informatique et en mathématiques, avec des sources recommandées pour chaque niveau. Les niveaux incluent débutant, intermédiaire et avancé, et couvrent des sujets tels que la programmation, les architectures, les systèmes d'exploitation et la sécurité de l'information.

Transféré par

Issam Bammou
Copyright
© © All Rights Reserved
Nous prenons très au sérieux les droits relatifs au contenu. Si vous pensez qu’il s’agit de votre contenu, signalez une atteinte au droit d’auteur ici.
Formats disponibles
Téléchargez aux formats PDF, TXT ou lisez en ligne sur Scribd

R: R R R RRequired R R RNew REnglish RFile R R ROxford RUniversity RPress R

:
* ) Beginner (
R R R R R R R
Intermediate (
* )

R R R R R R

* ) Advanced (
R R R R

( Beginner
)
Mathematics :
:*

- Arithmetic
- Pre-Algebra
- Algebra I
- Geometry
- Algebra II
- Trigonometry
- Probability & Statistics
* :
-

MyOpenMath
Coursera
CK-12 Foundation
Art of Problem Solving (AoPS)
Computer Science :
:Programming )(
Python 3 /1/
:*

- Learn to Program: The Fundamentals


- Learn to Program: Crafting Quality Code
- Practical Programming: An Introduction to Computer Science Using Python 3
- The Python Standard Library by Example
- Learning Python, Mark Lutz
* :
- Programming Python, Mark Lutz
- Core Python Applications Programming
- Python 3 Object Oriented Programming

- C Programming Language ANSI


- C Programming: A Modern Approach
- The Standard C Library
- Practical C Programming
- C Primer Plus
- Understanding and Using C Pointers
- Mastering Algorithms with C
- Expert C Programming: Deep C Secrets
- Linux System Programming: Talking Directly to the Kernel and C Library
- The Linux Programming Interface: A Linux and UNIX System Programming
Handbook

C ANSI /2/
:*

:*

- Fundamentals of Logic Design

- The Hardware/Software Interface


- Computer Systems: A Programmers Perspective

Digital Logic Design )(

Computer Organization )(

Networks )(
- Computer Networks
- Computer Networks, Tanenbaum

:*

- The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference


- Computer Networking from LANs to WANs: Hardware, Software and Security
- Network Warrior

:*


)
( Intermediate
Mathematics :

:*

Pre-Calculus
Differential Calculus
Integral Calculus
Multivariable Calculus
Differential Equations
Linear Algebra

Introduction to Logic
Intermediate Algebra
Pre-Calculus
Calculus: Single Variable
Calculus One
Calculus Two: Sequences and Series

MyOpenMath
Coursera
CK-12 Foundation
Art of Problem Solving (AoPS)

:*

:*

Computer Science :
Computer Architecture )(
- Computer Architecture
- Computer Architecture: A Quantitative Approach
* :

:*

Microprocessor Design /*
-

Fundamentals of Digital Logic with VHDL Design


Digital Logic and Microprocessor Design with VHDL
Microprocessor Design: A Practical Guide from Design Planning to Manufacturing
Modern Processor Design: Fundamentals of Superscalar Processors
Operating Systems: Internals :)(

- Operating System Concepts


- Operating Systems: Internals and Design Principles
*/ Win32
- Windows Internals, Part 1
- Windows Internals, Part 2

:*

:*

*/ Mac OS X
- Mac OS X and iOS Internals: To the Apples Core
*/ Linux
- Understanding the Linux Kernel
- Linux Kernel Development
:Programming )(
C++ ISO /3/
:*

- C++ Without Fear: A Beginners Guide That Makes You Feel Smart
- The C++ Programming Language
- The C++ Standard Library: A Tutorial and Reference
-

:*

C++ Primer
C++ Primer Plus
Programming: Principles and Practice Using C++
C++ Concurrency in Action: Practical Multithreading

Assembly /4/
Intel x86 & _64 :*
-

Assembly Language Step-by-Step: Programming with Linux


The Art of Assembly Language
Professional Assembly Language
Introduction to 64 Bit Intel Assembly Language Programming for Linux
ARM :*

- ARM Assembly Language: Fundamentals and Techniques


- ARM System Developers Guide: Designing and Optimizing System Software
Algorithms /5/
- Algorithms, Part I
- Algorithms, Part II
- Algorithms: Design and Analysis, Part I
- Algorithms: Design and Analysis, Part II

:*
:*

)
( Advanced

Information Security
R R R R R R R R R R R R R R R:

R R R R R R R R R R R R R R R R R

Reverse Engineering
- Reversing: Secrets of Reverse Engineering
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and
Obfuscation

Web Applications Security


Solid Rbackground Rin RWeb RDevelopment :
:

Web Application Security, A Beginners Guide


The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Web Application Hackers Handbook: Finding and Exploiting Security Flaws
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Web Application Defenders Cookbook: Battling Hackers and Protecting Users
The Tangled Web: A Guide to Securing Modern Web Applications
Web Application Obfuscation
Hacking Exposed Web Applications

Software Security
Reverse REngineering R:

The Shellcoders Handbook: Discovering and Exploiting Security Holes


The Browser Hackers Handbook
Exploiting Software: How to Break Code
Hacking: The Art of Exploitation

Software Security :

Database Security
Solid Rbackground Rin RDatabases R:

The Database Hackers Handbook: Defending Database Servers


SQL Injection Attacks and Defense
The Oracle Hackers Handbook: Hacking and Defending Oracle
Securing SQL Server: Protecting Your Database from Attackers

Malware: Analysis
Network Security, Software Security :

Malicious Software and its Underground Economy: Two Sides to Every Story :

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


Malware Analysts Cookbook: Tools and Techniques for Fighting Malicious Code
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Rootkits: Subverting the Windows Kernel
Hacking Exposed: Malware & Rootkits Secrets & Solutions
Managed Code Rootkits: Hooking into Runtime Environments

Network Security
Network Packet , Flow , Monitoring , Protocols , Wireless , Cloud :
- Practical Packet Analysis
- Network Flow Analysis
- The Practice of Network Security Monitoring: Understanding Incident Detection and
Response
- Applied Network Security Monitoring: Collection, Detection, and Analysis
- Hacking VoIP: Protocols, Attacks, and Countermeasures
- Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
- Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions
- Wireless Network Security A Beginners Guide
- Hacking Exposed: Wireless Security Secrets & Colutions
- Hacking Exposed: Network Security Secrets & Solutions
- Network and System Security
- Network Security Essentials Applications and Standards
- Securing the Cloud: Cloud Computer Security Techniques and Tactics

Cryptology
Solid background in Mathematics, Software Security, Network Security :
Cryptography, Cryptanalysis :
:
Number Rtheory R R
Information Rtheory R R
Complexity Rtheory R R
Group Rtheory R R

Probability Rtheory R R
Abstract Ralgebra R R
Combinatorics R R
-

Understanding Cryptology: Core Concepts


Understanding Cryptology: Cryptanalysis
Cryptography I
Cryptography II
Applied Cryptography: Science of Secrets
An Introduction to Mathematical Cryptography
Understanding Cryptography: A Textbook for Students and Practitioners
Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Open-Source Software
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Cryptography Engineering
Handbook of Applied Cryptography, Discrete Mathematics and Its Applications
Foundations of Cryptography: Volume 1, Basic Tools
Foundations of Cryptography: Volume 2, Basic Applications
Modern Cryptography: Theory and Practice
Handbook of Elliptic and Hyperelliptic Curve Cryptography
Cryptography and Network Security: Principles and Practice
Introduction to Modern Cryptography: Principles and Protocols
Everyday Cryptography: Fundamental Principles and Applications
Public Key Cryptography: Applications and Attacks
Cryptography: Theory and Practice
Implementing SSL / TLS Using Cryptography and PKI
Elementary Cryptanalysis
Modern Cryptanalysis: Techniques for Advanced Code Breaking
Applied Cryptanalysis: Breaking Ciphers in the Real World
Malicious Cryptography: Exposing Cryptovirology

Social Engineering

- Social Engineering: The Art of Human Hacking


- The Art of Deception: Controlling the Human Element of Security
- Spy the Lie: Former CIA Officers Teach You How to Detect Deception
- Unmasking the Social Engineer: The Human Element of Security
- The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and
Deceivers
- No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
- What Every BODY is Saying: An Ex-FBI Agent's Guide to Speed-Reading People
- Covert Persuasion: Psychological Tactics and Tricks to Win the Game
- The Official CIA Manual of Trickery and Deception
- Surveillance Countermeasures: A Serious Guide To Detecting, Evading, And Eluding
Threats To Personal Privacy
- The Art of Intelligence: Lessons from a Life in the CIA's Clandestine Service

Penetration Testing
:

- Penetration Testing: A Hands-On Introduction to Hacking


- The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing
Made Easy
- Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and
Security Engineers
- Gray Hat Hacking The Ethical Hackers Handbook
- Penetration Testers Open Source Toolkit
- Professional Penetration Testing: Creating and Learning in a Hacking Lab
- Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security
Guide (Open Source: Community Experience Distilled)
- Unauthorised Access: Physical Penetration Testing For IT Security Teams
- Basic Security Testing with Kali Linux
- Practical Lock Picking: A Physical Penetration Testers Training Guide
- Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based
Attacks Against Physical Locks
- Coding for Penetration Testers: Building Better Tools
- Gray Hat Python: Python Programming for Hackers and Reverse Engineers
- Wireless Reconnaissance in Penetration Testing
- Build Your Own Security Lab: A Field Guide for Network Testing
- Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
- Learning Pentesting for Android Devices
- The Hackers Handbook: The Strategy Behind Breaking Into and Defending Networks

Digital Forensics
:

- The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
- Digital Forensics with Open Source Tools
- Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO
17025, ISO 27001 and Best Practice Requirements
- Computer Forensics InfoSec Pro Guide
- An Excerpt from Malware Forensic Field Guide for Linux Systems Larger Cover Linux
Malware Incident Response: A Practitioners Guide to Forensic Collection and Examination
of Volatile Data
- Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
- Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
- Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8
- Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7
- Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
- Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative
Techniques to Identify Cybercrime Suspects
- Digital Forensics for Legal Professionals: Understanding Digital Evidence From The
Warrant To The Courtroom
- Real Digital Forensics: Computer Security and Incident Response
- Network Forensics: Tracking Hackers through Cyberspace
- File System Forensic Analysis
- Cloud Storage Forensics
- Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual
Environments
- iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone,
iPad and iOS Devices
- iOS Forensic Analysis: for iPhone, iPad, and iPod touch
- XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
- Android Forensics: Investigation, Analysis and Mobile Security for Google Android
- X-Ways Forensics Practitioners Guide

- Hacking Exposed Computer Forensics: Secrets & Solutions


- Mastering Windows Network Forensics and Investigation
- Malware Forensics: Investigating and Analyzing Malicious Code
- Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide
for Moving Targets and Data
- The Art of Memory Forensics

Mobile Security
Mobile OS: Android or IPhone, Programming: Java or Objective-C, Software :

Security
:

- iOS Hackers Handbook


- Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to
Prevent It
- Android Security Cookbook
- Android Hackers Handbook
- Android Security: Attacks and Defenses
- Hacking Exposed Mobile: Security Secrets & Solutions

Hardware Security
- Hardware Security
- Introduction to Hardware Security and Trust
- Computer Architecture and Security: Fundamentals of Designing Secure Computer
Systems

:
:

OS Security
- The Mac Hackers Handbook
- The Hackers Guide to OS X: Exploiting OS X from the Root Up
- A Guide to Kernel Exploitation: Attacking the Core

Vous aimerez peut-être aussi