-
HTTP/FTP - Programming Ebooks
keywords: A+ - Software Development Methodologies - XML - GUI development - ExtremeProgramming - ASP/ASP.NET/VB.NET
/29_Complete_Oreilly_Books.rar
/A+ Bible.pdf
/Absolute Beginners Guide To Building Robots - Que.chm
/Addison Wesley - Professional Software Development.chm
/Addison Wesley - Software Development For Small Teams. A Rup-centric Approach.chm
/C++ for Dummies - 5th Edition - eBook.pdf
/Crc Press - Behavioral And Cognitive Modeling Of The Human Brain.pdf
/Crc Press - Cryptography, Theory And Practice.chm
/Developing ASP Components, 2nd Edition.pdf
/Ebook - Kevin Mitnick - The Art Of Deception - Pulled from Freenet.ace
/ExtremeProgrammingPerspectives.chm
/for more VIDEO & ONLINE tutorials on programming -
[ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
/for.dummies.xml.for.dummies.the.fourth.edition.may .2005.ebook-ddu.pdf
/Programming E-Books/Google Hacks.chm
/GUI Bloopers -Don'ts and Do's for Software Developers and Web Designers.pdf
/Guide to ASP.pdf
/---- a vending machine.doc
/JavaScriptCourse.pdf
/John Wiley & Sons - Development Through Task Oriented Discourse.pdf
/John Wiley & Sons - Statistics For Dummies.chm
/John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real. Stories.Behind.the.Exploits.of.Hackers.pdf
/K.Beck, M.Fowler -- Planning Extreme Programming.pdf
/Learn ASP.pdf
/McGraw-Hill_-_Fortran_90_Handbook.pdf
/O'Reilly - ASP in a Nutshell. A Desktop Quick Reference.pdf
/O'reilly - Building Internet Firewalls. 2nd Ed.pdf
/O'reilly - Programming Visual Basic .net. 2nd Ed.chm
/oreilly_learningjava_2002.chm
/Premier -- ASP Programming for the Absolute Beginner.pdf
/Prentice Hall Ptr - Software Architect Bootcamp. 2nd Ed.chm
/QUE.MCAD_MCSD.NET.Training.Guide.(Exam 70-316).Developing.and.Implementing.Windows-Based.Applications.with.Mcft.Visual.CSharp.NET.and .Mcft.Visual.Studio.NET.chm
/VBScript.pdf
کد:
ftp://f26567:c3b6bcef@ftp.unser-ftp-cj-nos.goracer.de/webspace/httpdocs/Uploaded by Void/Programming E-Books/
-
200 Ways To Recover/Revive Your Hard-Drive
کد:
http://www.hddrecovery.com.au/downloads/200ways.pdf
Real World Linux® Security: Intrusion Prevention, Detection, and Recovery, Second Edition
[ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
Real World Linux® Security: Intrusion Prevention, Detection, and Recovery, Second Edition
By Bob Toxen
Publisher : Prentice Hall PTR
Pub Date : November 13, 2002
ISBN : 0-13-046456-2
Pages : 848
Slots : 1
A hands-on guide to protecting Linux data from security risks. Introduces readers to the seven deadly sins of Linux security, showing how to set up firewalls, break in case studies, block spam, develop internal security policies, and recover from an intrusion quickly. Softcover. DLC: Linux.
Table of Contents
List of Figures.
List of Tables.
Foreword.
Acknowledgments.
About the Author.
1. Introduction.
Introduction to the Second Edition. Who Should Read This Book? How This Book Is Organized. What Are You Protecting? Who Are Your Enemies? What They Hope to Accomplish. Costs: Protection versus Break-Ins. Protecting Hardware. Protecting Network and Modem Access. Protecting System Access. Protecting Files. Preparing for and Detecting an Intrusion. Recovering from an Intrusion.
I. SECURING YOUR SYSTEM.
2. Quick Fixes for Common Problems.
Understanding Linux Security. The Seven Most Deadly Sins. Passwords: A Key Point for Good Security. Advanced Password Techniques. Protecting the System from User Mistakes. Forgiveness Is Better than Permission. Dangers and Countermeasures During Initial System Setup. Limiting Unreasonable Access. Firewalls and the Corporate Moat. Turn Off Unneeded Services. High Security Requires Minimum Services. Replace These Weak Doors with Brick. New Lamps for Old. United We Fall, Divided We Stand.
3. Quick and Easy Hacking and How to Avoid It.
X Marks the Hole. Law of the Jungle—Physical Security. Physical Actions. Selected Short Subjects. Terminal Device Attacks. Disk Sniffing.
4. Common Hacking by Subsystem.
NFS, mountd, and portmap. Sendmail. Telnet. FTP. The rsh, rcp, rexec, and rlogin Services. DNS (named, a.k.a. BIND). POP and IMAP Servers. Doing the Samba. Stop Squid from Inking Out Their Trail. The syslogd Service. The print Service (lpd). The ident Service. INND and News. Protecting Your DNS Registration.
5. Common Hacker Attacks.
Rootkit Attacks (Script Kiddies). Packet Spoofing Explained. SYN Flood Attack Explained. Defeating SYN Flood Attacks. Defeating TCP Sequence Spoofing. Packet Storms, Smurf Attacks, and Fraggles. Buffer Overflows or Stamping on Memory with gets(). Spoofing Techniques. Man-in-the-Middle Attack.
6. Advanced Security Issues.
Configuring Netscape for Higher Security. Stopping Access to I/O Devices. Scouting Out Apache (httpd) Problems. Special Techniques for Web Servers. One-Way Credit Card Data Path for Top Security. Hardening for Very High Security. Restricting Login Location and Times. Obscure but Deadly Problems. Defeating Login Simulators. Stopping Buffer Overflows with Libsafe.
7. Establishing Security Policies.
General Policy. Personal Use Policy. Accounts Policy. E-Mail Policy. Instant Messenger (IM) Policy. Web Server Policy. File Server and Database Policy. Firewall Policy. Desktop Policy. Laptop Policy. Disposal Policy. Network Topology Policy. Problem Reporting Policy. Ownership Policy. Policy Policy.
8. Trusting Other Computers.
Secure Systems and Insecure Systems. Trust No One—The Highest Security. Linux and UNIX Systems Within Your Control. Mainframes Within Your Control. A Window Is Worth a Thousand Cannons. Firewall Vulnerabilities. Virtual Private Networks. Viruses and Linux.
9. Gutsy Break-Ins.
Mission Impossible Techniques. Spies. Fanatics and Suicide Attacks.
10. Case Studies.
Confessions of a Berkeley System Mole. Knights of the Realm (Forensics). Ken Thompson *****s the Navy. The Virtual Machine Trojan. AOL's DNS Change Fiasco. I'm Innocent, I Tell Ya! *****ing with a Laptop and a Pay Phone. Take a Few Cents off the Top. Nonprofit Organization Runs Out of Luck. Persistence with Recalcitrant SysAdmins Pays Off. Net Shipped with Nimda.
11. Recent Break-Ins.
Fragmentation Attacks. IP Masquerading Fails for ICMP. The Ping of Death Sinks Dutch Shipping Company. Captain, We're Being Scanned! (Stealth Scans). Cable Modems: A *****er's Dream. Using Sendmail to Block E-Mail Attacks. Sendmail Account Guessing. The Mysterious Ingreslock. You're Being Tracked. Distributed Denial of Service (Coordinated) Attacks. Stealth Trojan Horses. Linuxconf via TCP Port 98. Evil HTML Tags and Script. Format Problems with syslog().
II. PREPARING FOR AN INTRUSION.
12. Hardening Your System.
Protecting User Sessions with SSH. Virtual Private Networks (VPNs). Pretty Good Privacy (PGP). Using GPG to Encrypt Files the Easy Way. Firewalls with IP Tables and DMZ. Firewalls with IP Chains and DMZ.
13. Preparing Your Hardware.
Timing Is Everything. Advanced Preparation. Switch to Auxiliary Control (Hot Backups).
14. Preparing Your Configuration.
TCP Wrappers. Adaptive Firewalls: Raising the Drawbridge with the *****er Trap. Ending *****er Servers with a Kernel Mod. Fire Drills. Break into Your Own System with Tiger Teams.
15. Scanning Your Own System.
The Nessus Security Scanner. The SARA and SAINT Security Auditors. The nmap Network Mapper. The Snort Attack Detector. Scanning and Analyzing with SHADOW. John the Ripper. Store the RPM Database Checksums.
III. DETECTING AN INTRUSION.
16. Monitoring Activity.
Log Files. Log Files: Measures and Countermeasures. Using Logcheck to Check Log Files You Never Check. Using PortSentry to Lock Out Hackers. HostSentry. Paging the SysAdmin: *****ing in Progress! An Example for Automatic Paging. Building on Your Example for Automatic Paging. Paging telnet and rsh Usage. Using Arpwatch to Catch ARP and MAC Attacks. Monitoring Port Usage. Monitoring Attacks with Ethereal. Using tcpdump to Monitor Your LAN. Monitoring the Scanners with Deception Tool Kit (DTK). Monitoring Processes. Cron: Watching the *****ers. Caller ID.
17. Scanning Your System for Anomalies.
Finding Suspicious Files. Tripwire. Detecting Deleted Executables. Detecting Promiscuous Network Interface Cards. Finding Promiscuous Processes. Detecting Defaced Web Pages Automatically.
IV. RECOVERING FROM AN INTRUSION.
18. Regaining Control of Your System.
Finding the *****er's Running Processes. Handling Running *****er Processes. Drop the Modems, Network, Printers, and System.
19. Finding and Repairing the Damage.
Check Your /var/log Logs. The syslogd and klogd Daemons. Remote Logging. Interpreting Log File Entries. Check Other Logs. Check TCP Wrapper Responses. How the File System Can Be Damaged. Planting False Data. Altered Monitoring Programs. Stuck in the House of Mirrors. Getting Back in Control. Finding *****er-Altered Files. Sealing the *****. Finding set-UID Programs. Finding the mstream Trojan.
20. Finding the Attacker's System.
Tracing a Numeric IP Address with nslookup. Tracing a Numeric IP Address with dig. Who's a Commie: Finding .com Owners. Finding Entities Directly from the IP Address. Finding a G-Man: Looking Up .gov Systems. Using ping. Using traceroute. Neighboring Systems' Results. A Recent International Tracking of a *****er. Be Sure You Found the Attacker. Other SysAdmins: Do They Care?
21. Having the *****er ***** Rocks.
Police: Dragnet or Keystone Kops? Prosecution. Liability of ISPs Allowing Illegal Activity. Counteroffenses.
Appendix A. Internet Resources for the Latest Intrusions and Defenses.
Mailing Lists: The Mandatory Ones. Mailing Lists: The Optional Ones. News Groups. URLs for Security Sites. URLs for Security Tools. URLs for Documentation. URLs for General Tools. URLs for Specifications and Definitions. Vendor Software and Updates. Other Software Updates.
Appendix B. Books, CD-ROMs, and Videos.
Linux System Security. Building Linux and OpenBSD Firewalls. Samba: Integrating UNIX and Windows. Linux Sendmail Administration. Secrets and Lies: Digital Security in a Networked World. The Cuckoo's Egg. Hackers. UNIX Complete. The Computer Contradictionary. U.S. Department of Defense DISA Resource. Internetworking with TCP/IP Vols. I, II, and III Linux Application Development. Consultants: The Good, the Bad, and the Slick.
Appendix C. Network Services and Ports.
Appendix D. Danger Levels.
Appendix E. About the CD-ROM.
Appendix F. Abbreviations.
Index.
کد:
http://rapidshare.de/files/3321356/Real_World_Linux__Security.rar.html
-
AHFS Drug Information 2004
[ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
AHFS Drug Information 2004
Author: Gerald K. McEvoy (Editor), Jane Miller (Editor), Kathy Litvak (Editor)
URL:
[ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
Product Details
pages: 3752 pages
Publisher: Amer Soc Health-System Pharmacists
ISBN: 1585280585
Average Customer Review: N/A
Format: PDB
Size: 26.5 MB
کد:
http://rapidshare.de/files/2985065/McEvoy_-_AHFS.Drug.Information.2004-Big.Images.rar.html
-
درحواست
کتاب php5 professional را میخواستم
اگه نبوذ php4
-
راستی اگه ممکته میشه چندتا کتاب Maya بگداری؟؟
مرسی
-
-
TOYOTA TRAINING MATERIAL FUEL INJECTION ENGINE
DESCRIPTION:
- Good training material to know overall about fuel injection engine, their electronic system such as EFI, ECU, ECM and etc.
- Best if you own yourself Toyota's car then probably you could ---- them...Joke
DOWNLOAD:
کد:
http://www.offroadpakistan.com/downloads/tech/Toyota%20Technical%20Articles.zip
Size : 20Mb
CONTENTS :
01 Electrical Fundamentals.pdf
02 Electrical Circuits.pdf
03 Electrical Components.pdf
04 Analog vs Digital Meters.pdf
05 Wire, Terminal and Connector Repair.pdf
06 Automotive Batteries.pdf
07 Toyota Starting Systems.pdf
08 Toyota Charging Systems.pdf
09 Understanding Toyota Wiring.pdf
10 Electrical Diagnostic Tools.pdf
11 Diagnosing Body Electrical Problems.pdf
12 Semiconductors.pdf
13 Transistors.pdf
14 Computers and Logic Circuits.pdf
15 Overview of Sensors & Actuators.pdf
16 Electronic Transmission #1 - Operation.pdf
17 Electronic Transmission #2 - Diagnosis.pdf
18 Shift Interlock System.pdf
20 EFI#1 EFI System Overview.pdf
21 EFI#2 Air Induction System.pdf
22 EFI#3 Fuel Delivery & Injection Controls.pdf
23 EFI#4 Ignition System.pdf
24 Engine Controls #1 - Input Sensors.pdf
25 Engine Controls #2 - ECU Process and Output.pdf
26 Engine Controls #3 - Idle Speed Control.pdf
27 Engine Controls #4 - Diagnosis.pdf
31 Sensors#1 - Mode Sensors and Switches.pdf
32 Sensors#2 - Thermistors.pdf
33 Sensors#3 - Position Sensors.pdf
34 Sensors#4 - Air Flow Sensors.pdf
35 Sensors#5 - Pressure Sensors.pdf
36 Sensors#6 - Speed Sensors.pdf
37 Sensors#6 - Oxygen Air Fuel Sensors.pdf
38 Sensors#8 - Knock Sensors.pdf
39 Ignition#1 - Ignition Overview.pdf
40 Ignition#2 - Electronic Spark Advance.pdf
41 Ignition#3 - Distributor and Distributorless types.pdf
42 Fuel System#1 - Overview.pdf
43 Fuel System#2 - Injection Duration Controls.pdf
44 Fuel System#3 - Closed Loop & Fuel Trim.pdf
46 OBDII#1 - Overview of On-Board Diagnostics.pdf
47 OBDII#2 - Serial Data.pdf
48 OBDII#3 - Data Interpretation.pdf
55 Emission#1 - Chemistry of Combustion.pdf
56 Emission#2 - Emission Analysis.pdf
57 Emission#3 - Engine Sub Systems.pdf
58 Emission#4 - Closed Loop Feedback Systems.pdf
59 Emission#5 - Electronic Spark Advance.pdf
60 Emission#6 - Idle Air Control Systems.pdf
61 Emission#7 - Exhause Gas Recirculation.pdf
62 Emission#8 - Evaporative Emission Control.pdf
63 Emission#9 - Positive Crankcase Ventilation.pdf
64 Emission#10 - Catalytic Converter.pdf
65 Emission#11 - Secondary Air Injection.pdf
-
[ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
CCSP Cisco Secure VPN
Exam Certification Guide
by John & Mark
-----------------------------
Contents at a Glance
Introduction xvii
Chapter 1
All About the Cisco Certified Security Professional 3
Chapter 2
Overview of VPN and IPSec Technologies 15
Chapter 3
Cisco VPN 3000 Concentrator Series Hardware Overview 79
Chapter 4
Configuring Cisco VPN 3000 for Remote Access Using Preshared Keys 125
Chapter 5
Configuring Cisco VPN 3000 for Remote Access Using Digital
Certificates 215
Chapter 6
Configuring the Cisco VPN Client Firewall Feature 259
Chapter 7
Monitoring and Administering the VPN 3000 Series Concentrator 303
Chapter 8
Configuring Cisco 3002 Hardware Client for Remote Access 359
Chapter 9
Configuring Scalability Features of the VPN 3002 Hardware Client 399
Chapter 10
Cisco VPN 3000 LAN-to-LAN with Preshared Keys 443
Chapter 11
Scenarios 473
Appendix A
Answers to the “Do I Know This Already?” Quizzes and Q&A Sections 489
کد:
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/CCSP/Cisco - CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study).pdf.zip
Size : 16.48MB
Pages : 584
PDF Format
-
Thank FlamingStar for this book
[ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
عكس رو نمي دونم درست هست يا نه :roll:
With International Data Corp. projecting e-learning to be an $11.5 billion industry by 2003, the demand for interactive multimedia learning applications is on the rise. And Macromedia's Studio MX design tools--including Flash MX, Dreamweaver MX, and ColdFusion MX--provide the ideal solution. But figuring out how to combine these products to create the perfect active-learning applications for your purposes can be tricky--which is why you need Macromedia MX eLearning: Advanced Training from the Source.
Using project-based lessons, e-learning specialist and veteran author Jeffrey Bardzell takes you through the paces of these solutions, demonstrating how you can use them to create e-learning applications for both academic and corporate environments. Moving at your own pace, you'll learn by doing through the tutorials and hands-on instructions that have become the hallmark of this popular series. By the time you reach the end of this volume, you will have built four e-learning projects: one in Dreamweaver, two in Flash, and one that uses ColdFusion, Dreamweaver, and Flash to create a front-end for a complete ColdFusion-driven Web application. In the process, you'll learn how to create drag-and-drop interactivity, fill-in-the-blank dynamic text, hotspots, and a host of other useful e-learning features, including how to track scores and provide on-the-fly user feedback by connecting to a database through ColdFusion. Whether you're a corporate or government trainer or an educator grappling with the challenges of distance learning, you'll find what you need to provide the training your people require in Macromedia MX eLearning:Advanced Training from the Source
کد:
http://babybluevn.co.nr/modules.php?name=News&file=article&sid=364
-
Programming ColdFusion MX, 2nd Edition
[ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
ColdFusion has enjoyed widespread use among developers as a powerful, easy-to-learn platform for creating and deploying dynamic web applications. ColdFusion's simple, tag-based language makes it easy to handle basic tasks, like processing form data and querying databases, but the language is also powerful enough to deliver highly scalable, robust applications. And now that Macromedia has integrated ColdFusion into its MX family of technologies, ColdFusion is capable of interacting with Flash MX applications, which opens up even more possibilities. The first edition of this book has been praised as "the best reference book available on the subject." This new edition, Programming ColdFusion MX, 2nd Edition, goes even further, documenting new techniques for using ColdFusion MX 6.1 to develop and serve dynamic web page content. This exhaustive guide covers everything from the basics to advanced topics, with numerous examples that you can use for your own applications
کد:
http://babybluevn.co.nr/modules.php?name=News&file=article&sid=421&mode=&order=0&thold=0