تبلیغات :
خرید لپ تاپ استوک
ماهان سرور
آکوستیک ، فوم شانه تخم مرغی ، پنل صداگیر ، یونولیت
دستگاه جوجه کشی حرفه ای
فروش آنلاین لباس کودک
خرید فالوور ایرانی
خرید فالوور اینستاگرام
خرید ممبر تلگرام

[ + افزودن آگهی متنی جدید ]




صفحه 20 از 41 اولاول ... 1016171819202122232430 ... آخرآخر
نمايش نتايج 191 به 200 از 407

نام تاپيک: معرفی کتاب هایی با زبان انگلیسی

  1. #191
    حـــــرفـه ای MaFia's Avatar
    تاريخ عضويت
    Jul 2004
    محل سكونت
    Stockholm
    پست ها
    11,052

    پيش فرض

    HTTP/FTP - Programming Ebooks


    keywords: A+ - Software Development Methodologies - XML - GUI development - ExtremeProgramming - ASP/ASP.NET/VB.NET

    /29_Complete_Oreilly_Books.rar
    /A+ Bible.pdf
    /Absolute Beginners Guide To Building Robots - Que.chm
    /Addison Wesley - Professional Software Development.chm
    /Addison Wesley - Software Development For Small Teams. A Rup-centric Approach.chm
    /C++ for Dummies - 5th Edition - eBook.pdf
    /Crc Press - Behavioral And Cognitive Modeling Of The Human Brain.pdf
    /Crc Press - Cryptography, Theory And Practice.chm
    /Developing ASP Components, 2nd Edition.pdf
    /Ebook - Kevin Mitnick - The Art Of Deception - Pulled from Freenet.ace
    /ExtremeProgrammingPerspectives.chm
    /for more VIDEO & ONLINE tutorials on programming - [ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
    /for.dummies.xml.for.dummies.the.fourth.edition.may .2005.ebook-ddu.pdf
    /Programming E-Books/Google Hacks.chm
    /GUI Bloopers -Don'ts and Do's for Software Developers and Web Designers.pdf
    /Guide to ASP.pdf
    /---- a vending machine.doc
    /JavaScriptCourse.pdf
    /John Wiley & Sons - Development Through Task Oriented Discourse.pdf
    /John Wiley & Sons - Statistics For Dummies.chm
    /John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real. Stories.Behind.the.Exploits.of.Hackers.pdf
    /K.Beck, M.Fowler -- Planning Extreme Programming.pdf
    /Learn ASP.pdf
    /McGraw-Hill_-_Fortran_90_Handbook.pdf
    /O'Reilly - ASP in a Nutshell. A Desktop Quick Reference.pdf
    /O'reilly - Building Internet Firewalls. 2nd Ed.pdf
    /O'reilly - Programming Visual Basic .net. 2nd Ed.chm
    /oreilly_learningjava_2002.chm
    /Premier -- ASP Programming for the Absolute Beginner.pdf
    /Prentice Hall Ptr - Software Architect Bootcamp. 2nd Ed.chm
    /QUE.MCAD_MCSD.NET.Training.Guide.(Exam 70-316).Developing.and.Implementing.Windows-Based.Applications.with.Mcft.Visual.CSharp.NET.and .Mcft.Visual.Studio.NET.chm
    /VBScript.pdf

    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  2. #192
    حـــــرفـه ای MaFia's Avatar
    تاريخ عضويت
    Jul 2004
    محل سكونت
    Stockholm
    پست ها
    11,052

    پيش فرض

    200 Ways To Recover/Revive Your Hard-Drive


    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
    Real World Linux® Security: Intrusion Prevention, Detection, and Recovery, Second Edition





    Real World Linux® Security: Intrusion Prevention, Detection, and Recovery, Second Edition
    By Bob Toxen

    Publisher : Prentice Hall PTR
    Pub Date : November 13, 2002
    ISBN : 0-13-046456-2
    Pages : 848
    Slots : 1

    A hands-on guide to protecting Linux data from security risks. Introduces readers to the seven deadly sins of Linux security, showing how to set up firewalls, break in case studies, block spam, develop internal security policies, and recover from an intrusion quickly. Softcover. DLC: Linux.

    Table of Contents

    List of Figures.
    List of Tables.
    Foreword.
    Acknowledgments.
    About the Author.
    1. Introduction.
    Introduction to the Second Edition. Who Should Read This Book? How This Book Is Organized. What Are You Protecting? Who Are Your Enemies? What They Hope to Accomplish. Costs: Protection versus Break-Ins. Protecting Hardware. Protecting Network and Modem Access. Protecting System Access. Protecting Files. Preparing for and Detecting an Intrusion. Recovering from an Intrusion.

    I. SECURING YOUR SYSTEM.


    2. Quick Fixes for Common Problems.
    Understanding Linux Security. The Seven Most Deadly Sins. Passwords: A Key Point for Good Security. Advanced Password Techniques. Protecting the System from User Mistakes. Forgiveness Is Better than Permission. Dangers and Countermeasures During Initial System Setup. Limiting Unreasonable Access. Firewalls and the Corporate Moat. Turn Off Unneeded Services. High Security Requires Minimum Services. Replace These Weak Doors with Brick. New Lamps for Old. United We Fall, Divided We Stand.

    3. Quick and Easy Hacking and How to Avoid It.
    X Marks the Hole. Law of the Jungle—Physical Security. Physical Actions. Selected Short Subjects. Terminal Device Attacks. Disk Sniffing.

    4. Common Hacking by Subsystem.
    NFS, mountd, and portmap. Sendmail. Telnet. FTP. The rsh, rcp, rexec, and rlogin Services. DNS (named, a.k.a. BIND). POP and IMAP Servers. Doing the Samba. Stop Squid from Inking Out Their Trail. The syslogd Service. The print Service (lpd). The ident Service. INND and News. Protecting Your DNS Registration.

    5. Common Hacker Attacks.
    Rootkit Attacks (Script Kiddies). Packet Spoofing Explained. SYN Flood Attack Explained. Defeating SYN Flood Attacks. Defeating TCP Sequence Spoofing. Packet Storms, Smurf Attacks, and Fraggles. Buffer Overflows or Stamping on Memory with gets(). Spoofing Techniques. Man-in-the-Middle Attack.

    6. Advanced Security Issues.
    Configuring Netscape for Higher Security. Stopping Access to I/O Devices. Scouting Out Apache (httpd) Problems. Special Techniques for Web Servers. One-Way Credit Card Data Path for Top Security. Hardening for Very High Security. Restricting Login Location and Times. Obscure but Deadly Problems. Defeating Login Simulators. Stopping Buffer Overflows with Libsafe.

    7. Establishing Security Policies.
    General Policy. Personal Use Policy. Accounts Policy. E-Mail Policy. Instant Messenger (IM) Policy. Web Server Policy. File Server and Database Policy. Firewall Policy. Desktop Policy. Laptop Policy. Disposal Policy. Network Topology Policy. Problem Reporting Policy. Ownership Policy. Policy Policy.

    8. Trusting Other Computers.
    Secure Systems and Insecure Systems. Trust No One—The Highest Security. Linux and UNIX Systems Within Your Control. Mainframes Within Your Control. A Window Is Worth a Thousand Cannons. Firewall Vulnerabilities. Virtual Private Networks. Viruses and Linux.

    9. Gutsy Break-Ins.
    Mission Impossible Techniques. Spies. Fanatics and Suicide Attacks.

    10. Case Studies.
    Confessions of a Berkeley System Mole. Knights of the Realm (Forensics). Ken Thompson *****s the Navy. The Virtual Machine Trojan. AOL's DNS Change Fiasco. I'm Innocent, I Tell Ya! *****ing with a Laptop and a Pay Phone. Take a Few Cents off the Top. Nonprofit Organization Runs Out of Luck. Persistence with Recalcitrant SysAdmins Pays Off. Net Shipped with Nimda.

    11. Recent Break-Ins.
    Fragmentation Attacks. IP Masquerading Fails for ICMP. The Ping of Death Sinks Dutch Shipping Company. Captain, We're Being Scanned! (Stealth Scans). Cable Modems: A *****er's Dream. Using Sendmail to Block E-Mail Attacks. Sendmail Account Guessing. The Mysterious Ingreslock. You're Being Tracked. Distributed Denial of Service (Coordinated) Attacks. Stealth Trojan Horses. Linuxconf via TCP Port 98. Evil HTML Tags and Script. Format Problems with syslog().

    II. PREPARING FOR AN INTRUSION.


    12. Hardening Your System.
    Protecting User Sessions with SSH. Virtual Private Networks (VPNs). Pretty Good Privacy (PGP). Using GPG to Encrypt Files the Easy Way. Firewalls with IP Tables and DMZ. Firewalls with IP Chains and DMZ.

    13. Preparing Your Hardware.
    Timing Is Everything. Advanced Preparation. Switch to Auxiliary Control (Hot Backups).

    14. Preparing Your Configuration.
    TCP Wrappers. Adaptive Firewalls: Raising the Drawbridge with the *****er Trap. Ending *****er Servers with a Kernel Mod. Fire Drills. Break into Your Own System with Tiger Teams.

    15. Scanning Your Own System.
    The Nessus Security Scanner. The SARA and SAINT Security Auditors. The nmap Network Mapper. The Snort Attack Detector. Scanning and Analyzing with SHADOW. John the Ripper. Store the RPM Database Checksums.

    III. DETECTING AN INTRUSION.


    16. Monitoring Activity.
    Log Files. Log Files: Measures and Countermeasures. Using Logcheck to Check Log Files You Never Check. Using PortSentry to Lock Out Hackers. HostSentry. Paging the SysAdmin: *****ing in Progress! An Example for Automatic Paging. Building on Your Example for Automatic Paging. Paging telnet and rsh Usage. Using Arpwatch to Catch ARP and MAC Attacks. Monitoring Port Usage. Monitoring Attacks with Ethereal. Using tcpdump to Monitor Your LAN. Monitoring the Scanners with Deception Tool Kit (DTK). Monitoring Processes. Cron: Watching the *****ers. Caller ID.

    17. Scanning Your System for Anomalies.
    Finding Suspicious Files. Tripwire. Detecting Deleted Executables. Detecting Promiscuous Network Interface Cards. Finding Promiscuous Processes. Detecting Defaced Web Pages Automatically.

    IV. RECOVERING FROM AN INTRUSION.


    18. Regaining Control of Your System.
    Finding the *****er's Running Processes. Handling Running *****er Processes. Drop the Modems, Network, Printers, and System.

    19. Finding and Repairing the Damage.
    Check Your /var/log Logs. The syslogd and klogd Daemons. Remote Logging. Interpreting Log File Entries. Check Other Logs. Check TCP Wrapper Responses. How the File System Can Be Damaged. Planting False Data. Altered Monitoring Programs. Stuck in the House of Mirrors. Getting Back in Control. Finding *****er-Altered Files. Sealing the *****. Finding set-UID Programs. Finding the mstream Trojan.

    20. Finding the Attacker's System.
    Tracing a Numeric IP Address with nslookup. Tracing a Numeric IP Address with dig. Who's a Commie: Finding .com Owners. Finding Entities Directly from the IP Address. Finding a G-Man: Looking Up .gov Systems. Using ping. Using traceroute. Neighboring Systems' Results. A Recent International Tracking of a *****er. Be Sure You Found the Attacker. Other SysAdmins: Do They Care?

    21. Having the *****er ***** Rocks.
    Police: Dragnet or Keystone Kops? Prosecution. Liability of ISPs Allowing Illegal Activity. Counteroffenses.

    Appendix A. Internet Resources for the Latest Intrusions and Defenses.
    Mailing Lists: The Mandatory Ones. Mailing Lists: The Optional Ones. News Groups. URLs for Security Sites. URLs for Security Tools. URLs for Documentation. URLs for General Tools. URLs for Specifications and Definitions. Vendor Software and Updates. Other Software Updates.

    Appendix B. Books, CD-ROMs, and Videos.
    Linux System Security. Building Linux and OpenBSD Firewalls. Samba: Integrating UNIX and Windows. Linux Sendmail Administration. Secrets and Lies: Digital Security in a Networked World. The Cuckoo's Egg. Hackers. UNIX Complete. The Computer Contradictionary. U.S. Department of Defense DISA Resource. Internetworking with TCP/IP Vols. I, II, and III Linux Application Development. Consultants: The Good, the Bad, and the Slick.

    Appendix C. Network Services and Ports.
    Appendix D. Danger Levels.
    Appendix E. About the CD-ROM.
    Appendix F. Abbreviations.
    Index.


    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  3. #193
    حـــــرفـه ای MaFia's Avatar
    تاريخ عضويت
    Jul 2004
    محل سكونت
    Stockholm
    پست ها
    11,052

    پيش فرض

    AHFS Drug Information 2004



    AHFS Drug Information 2004
    Author: Gerald K. McEvoy (Editor), Jane Miller (Editor), Kathy Litvak (Editor)
    URL: [ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
    Product Details
    pages: 3752 pages
    Publisher: Amer Soc Health-System Pharmacists
    ISBN: 1585280585
    Average Customer Review: N/A
    Format: PDB
    Size: 26.5 MB


    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  4. #194
    آخر فروم باز hamidreza_buddy's Avatar
    تاريخ عضويت
    Sep 2004
    محل سكونت
    شریف
    پست ها
    1,167

    پيش فرض درحواست

    کتاب php5 professional را میخواستم
    اگه نبوذ php4

  5. #195
    آخر فروم باز hamidreza_buddy's Avatar
    تاريخ عضويت
    Sep 2004
    محل سكونت
    شریف
    پست ها
    1,167

    پيش فرض

    راستی اگه ممکته میشه چندتا کتاب Maya بگداری؟؟
    مرسی

  6. #196

  7. #197
    حـــــرفـه ای MaFia's Avatar
    تاريخ عضويت
    Jul 2004
    محل سكونت
    Stockholm
    پست ها
    11,052

    پيش فرض

    TOYOTA TRAINING MATERIAL FUEL INJECTION ENGINE



    DESCRIPTION:

    - Good training material to know overall about fuel injection engine, their electronic system such as EFI, ECU, ECM and etc.
    - Best if you own yourself Toyota's car then probably you could ---- them...Joke


    DOWNLOAD:
    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
    Size : 20Mb

    CONTENTS :

    01 Electrical Fundamentals.pdf
    02 Electrical Circuits.pdf
    03 Electrical Components.pdf
    04 Analog vs Digital Meters.pdf
    05 Wire, Terminal and Connector Repair.pdf
    06 Automotive Batteries.pdf
    07 Toyota Starting Systems.pdf
    08 Toyota Charging Systems.pdf
    09 Understanding Toyota Wiring.pdf
    10 Electrical Diagnostic Tools.pdf
    11 Diagnosing Body Electrical Problems.pdf
    12 Semiconductors.pdf
    13 Transistors.pdf
    14 Computers and Logic Circuits.pdf
    15 Overview of Sensors & Actuators.pdf
    16 Electronic Transmission #1 - Operation.pdf
    17 Electronic Transmission #2 - Diagnosis.pdf
    18 Shift Interlock System.pdf
    20 EFI#1 EFI System Overview.pdf
    21 EFI#2 Air Induction System.pdf
    22 EFI#3 Fuel Delivery & Injection Controls.pdf
    23 EFI#4 Ignition System.pdf
    24 Engine Controls #1 - Input Sensors.pdf
    25 Engine Controls #2 - ECU Process and Output.pdf
    26 Engine Controls #3 - Idle Speed Control.pdf
    27 Engine Controls #4 - Diagnosis.pdf
    31 Sensors#1 - Mode Sensors and Switches.pdf
    32 Sensors#2 - Thermistors.pdf
    33 Sensors#3 - Position Sensors.pdf
    34 Sensors#4 - Air Flow Sensors.pdf
    35 Sensors#5 - Pressure Sensors.pdf
    36 Sensors#6 - Speed Sensors.pdf
    37 Sensors#6 - Oxygen Air Fuel Sensors.pdf
    38 Sensors#8 - Knock Sensors.pdf
    39 Ignition#1 - Ignition Overview.pdf
    40 Ignition#2 - Electronic Spark Advance.pdf
    41 Ignition#3 - Distributor and Distributorless types.pdf
    42 Fuel System#1 - Overview.pdf
    43 Fuel System#2 - Injection Duration Controls.pdf
    44 Fuel System#3 - Closed Loop & Fuel Trim.pdf
    46 OBDII#1 - Overview of On-Board Diagnostics.pdf
    47 OBDII#2 - Serial Data.pdf
    48 OBDII#3 - Data Interpretation.pdf
    55 Emission#1 - Chemistry of Combustion.pdf
    56 Emission#2 - Emission Analysis.pdf
    57 Emission#3 - Engine Sub Systems.pdf
    58 Emission#4 - Closed Loop Feedback Systems.pdf
    59 Emission#5 - Electronic Spark Advance.pdf
    60 Emission#6 - Idle Air Control Systems.pdf
    61 Emission#7 - Exhause Gas Recirculation.pdf
    62 Emission#8 - Evaporative Emission Control.pdf
    63 Emission#9 - Positive Crankcase Ventilation.pdf
    64 Emission#10 - Catalytic Converter.pdf
    65 Emission#11 - Secondary Air Injection.pdf

  8. #198
    حـــــرفـه ای MaFia's Avatar
    تاريخ عضويت
    Jul 2004
    محل سكونت
    Stockholm
    پست ها
    11,052

    پيش فرض





    CCSP Cisco Secure VPN
    Exam Certification Guide

    by John & Mark
    -----------------------------


    Contents at a Glance
    Introduction xvii
    Chapter 1
    All About the Cisco Certified Security Professional 3
    Chapter 2
    Overview of VPN and IPSec Technologies 15
    Chapter 3
    Cisco VPN 3000 Concentrator Series Hardware Overview 79
    Chapter 4
    Configuring Cisco VPN 3000 for Remote Access Using Preshared Keys 125
    Chapter 5
    Configuring Cisco VPN 3000 for Remote Access Using Digital
    Certificates 215
    Chapter 6
    Configuring the Cisco VPN Client Firewall Feature 259
    Chapter 7
    Monitoring and Administering the VPN 3000 Series Concentrator 303
    Chapter 8
    Configuring Cisco 3002 Hardware Client for Remote Access 359
    Chapter 9
    Configuring Scalability Features of the VPN 3002 Hardware Client 399
    Chapter 10
    Cisco VPN 3000 LAN-to-LAN with Preshared Keys 443
    Chapter 11
    Scenarios 473
    Appendix A
    Answers to the “Do I Know This Already?” Quizzes and Q&A Sections 489




    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  9. #199
    حـــــرفـه ای MaFia's Avatar
    تاريخ عضويت
    Jul 2004
    محل سكونت
    Stockholm
    پست ها
    11,052

    پيش فرض

    Thank FlamingStar for this book



    عكس رو نمي دونم درست هست يا نه :roll:

    With International Data Corp. projecting e-learning to be an $11.5 billion industry by 2003, the demand for interactive multimedia learning applications is on the rise. And Macromedia's Studio MX design tools--including Flash MX, Dreamweaver MX, and ColdFusion MX--provide the ideal solution. But figuring out how to combine these products to create the perfect active-learning applications for your purposes can be tricky--which is why you need Macromedia MX eLearning: Advanced Training from the Source.

    Using project-based lessons, e-learning specialist and veteran author Jeffrey Bardzell takes you through the paces of these solutions, demonstrating how you can use them to create e-learning applications for both academic and corporate environments. Moving at your own pace, you'll learn by doing through the tutorials and hands-on instructions that have become the hallmark of this popular series. By the time you reach the end of this volume, you will have built four e-learning projects: one in Dreamweaver, two in Flash, and one that uses ColdFusion, Dreamweaver, and Flash to create a front-end for a complete ColdFusion-driven Web application. In the process, you'll learn how to create drag-and-drop interactivity, fill-in-the-blank dynamic text, hotspots, and a host of other useful e-learning features, including how to track scores and provide on-the-fly user feedback by connecting to a database through ColdFusion. Whether you're a corporate or government trainer or an educator grappling with the challenges of distance learning, you'll find what you need to provide the training your people require in Macromedia MX eLearning:Advanced Training from the Source


    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  10. #200
    حـــــرفـه ای MaFia's Avatar
    تاريخ عضويت
    Jul 2004
    محل سكونت
    Stockholm
    پست ها
    11,052

    پيش فرض

    Programming ColdFusion MX, 2nd Edition




    ColdFusion has enjoyed widespread use among developers as a powerful, easy-to-learn platform for creating and deploying dynamic web applications. ColdFusion's simple, tag-based language makes it easy to handle basic tasks, like processing form data and querying databases, but the language is also powerful enough to deliver highly scalable, robust applications. And now that Macromedia has integrated ColdFusion into its MX family of technologies, ColdFusion is capable of interacting with Flash MX applications, which opens up even more possibilities. The first edition of this book has been praised as "the best reference book available on the subject." This new edition, Programming ColdFusion MX, 2nd Edition, goes even further, documenting new techniques for using ColdFusion MX 6.1 to develop and serve dynamic web page content. This exhaustive guide covers everything from the basics to advanced topics, with numerous examples that you can use for your own applications

    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Thread Information

Users Browsing this Thread

هم اکنون 1 کاربر در حال مشاهده این تاپیک میباشد. (0 کاربر عضو شده و 1 مهمان)

User Tag List

قوانين ايجاد تاپيک در انجمن

  • شما نمی توانید تاپیک ایحاد کنید
  • شما نمی توانید پاسخی ارسال کنید
  • شما نمی توانید فایل پیوست کنید
  • شما نمی توانید پاسخ خود را ویرایش کنید
  •