首页
社区
课程
招聘
[转帖]Hacker's Delight (2nd Edition) By Henry S. Warren
发表于: 2012-10-25 06:27 4993

[转帖]Hacker's Delight (2nd Edition) By Henry S. Warren

2012-10-25 06:27
4993

Hacker's Delight (2nd Edition) By Henry S. Warren
2012 | 512 Pages | ISBN: 0321842685 | EPUB | 45 MB
In Hacker’s Delight, Second Edition, Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren’s hacks are eminently practical, but they’re also intrinsically interesting, and sometimes unexpected, much like the solution to a great puzzle. They are, in a word, a delight to any programmer who is excited by the opportunity to improve.
Extensive additions in this edition include
A new chapter on cyclic redundancy checking (CRC), including routines for the commonly used CRC-32 code
A new chapter on error correcting codes (ECC), including routines for the Hamming code
More coverage of integer division by constants, including methods using only shifts and adds
Computing remainders without computing a quotient
More coverage of population count and counting leading zeros
Array population count
New algorithms for compress and expand
An LRU algorithm
Floating-point to/from integer conversions
Approximate floating-point reciprocal square root routine
A gallery of graphs of discrete functions
Now with exercises and answers
http://filepost.com/files/eea544af/Hacker's_Delight.epub/


[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

上传的附件:
收藏
免费 1
支持
分享
最新回复 (7)
雪    币: 219
活跃值: (738)
能力值: (RANK:290 )
在线值:
发帖
回帖
粉丝
2
林版主这么早啊!! 早上好
2012-10-25 06:51
0
雪    币: 292
活跃值: (153)
能力值: ( LV3,RANK:30 )
在线值:
发帖
回帖
粉丝
3
0.0  都起的好早啊、、、、、
2012-10-25 09:37
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
4

Chris Sanders, "Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd edition"
2011 | ISBN-10: 1593272669 | PDF, EPUB | 280 pages | 16 + 12 MB
Wireshark is the world's most popular "packet sniffer," allowing its users to uncover valuable information about computer networks by analyzing the TCP packets that travel through them. This significantly revised and expanded second edition of Practical Packet Analysis shows you how to use Wireshark to capture raw network traffic, filter and analyze packets, and diagnose common network problems. Author Chris Sanders begins by discussing how networks work and gives you a solid understanding of how packets travel along the wire.
He then explains how Wireshark can be used to monitor and troubleshoot networks. Numerous case studies help you apply your newfound knowledge to your networks. This revision offers more detailed explanations of key networking protocols; expanded discussions of wireless protocol analysis and an examination of network security at the packet level; expanded discussion of the meaning of packets and how they can offer insight into network structure; and new scenarios and examples. Whether fighting a virus infestation or a confounding connectivity problem, Practical Packet Analysis, 2nd Edition will help you find the problem and fix it.
http://ul.to/qa1y1dho
https://rapidshare.com/files/297732159/1593272669_Analys.pdf

http://ul.to/qa1y1dho
https://rapidshare.com/files/2754502652/1593272669_Analys.epub

上传的附件:
2012-10-26 07:24
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
5

Rudi Bruchez, "Microsoft SQL Server 2012 Security Cookbook"
English | ISBN: 1849685886 | 2012 | 322 pages | PDF, EPUB | 7 + 8 MB
In 2011, a big corporation suffered a 23-day network outage after a breach of security that allowed the theft of millions of registered accounts on its gaming network. A month later, hackers claimed in a press release to have stolen personal information of 1 million users by a single SQL injection attack. In these days of high-profile hacking, SQL Server 2012 database security has become of prime importance.
“Microsoft SQL Server 2012 Security Cookbook” will show you how to secure your database using cutting-edge methods and protect it from hackers and other security threats. You will learn the latest techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, securing business intelligence, and more.
We will start with securing SQL Server right from the point where you install it. You will learn to secure your server and network with recipes such as managing service SIDs, configuring a firewall for SQL Server access, and encrypting the session by SSL. We will then address internal security : creating logins to connect to SQL Server, and users to gain access to a database. We will also see how to grant privileges to securable objects on the server or inside the database.
After having managed authentication through logins and users, we will assign privileges inside a database using permissions. We will then learn about symmetric keys, asymmetric keys and certificates, which can be used to encrypt data or sign data and modules with a choice of cipher algorithms, as well as creating hash representations of data.
Then we will cover methods to protect your database against brute force attacks, denial-of-service attacks, and SQL Injection. Finally we will learn about auditing and compliance and securing SQL Server Analysis Services (SSAS) and Reporting Services (SSRS).
What you will learn from this book
Start securing your database right from the first step when you install it
Protect your database against brute force attacks, denial-of-service attacks, and SQL Injection
Secure SQL Server Analysis Services (SSAS) and Reporting Services (SSRS)
Use a SQL or Web Application Firewall
Perform user authentication and authorization
Manage object ownership and protect data through views and stored procedures
Create and use certificates, and symmetric and asymmetric encryption keys
Authenticate stored procedures by signatures
Monitor SQL Server logs and use DML and DDL trigger for auditing
Configure SQL Server database audit and manage audit resilience after a crash
http://ul.to/1d7vv8f5
https://rapidshare.com/files/98239124/1849685886_Securit.pdf

http://ul.to/sj8a99yx
https://rapidshare.com/files/3538944781/1849685886_Securit.epub

上传的附件:
2012-10-26 07:26
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
6

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy By Patrick Engebretson
English | 2011 | 180 Pages | ISBN: 1597496553 | PDF | 4 MB
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more.
A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.
• Each chapter contains hands-on examples teach you how to interpret the results and utilize those results in later phases
• Written by an author who has practical experience as a Penetration Tester and who has taught "Introduction to Penetration Testing" for 5 years
• Utilizes Backtrack Linux distribution and the "core" tools required to complete a penetration test
http://uploaded.net/file/tyvysai9/1597496553.pdf
https://rapidshare.com/files/3798731376/1597496553.pdf

上传的附件:
2012-10-26 07:29
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
7
Latest OReilly e-book Collection
OReilly.Building.a.Windows.IT.Infrastructure.in.the.Cloud.2012.RETAIL.eBook-ELOHiM
OReilly.C.Plus.Plus.AMP.2012.RETAIL.eBook-ELOHiM
OReilly.Civic.Apps.Competition.Handbook.2012.RETAIL.eBook-ELOHiM
OReilly.Cloud.Architecture.Patterns.2012.RETAIL.eBook-ELOHiM
OReilly.Developing.with.Google.Plus.2012.RETAIL.eBook-ELOHiM
OReilly.Enterprise.Games.2012.RETAIL.eBook-ELOHiM
OReilly.Ethics.of.Big.Data.2012.RETAIL.eBook-ELOHiM
OReilly.Juniper.MX.Series.2012.RETAIL.eBook-ELOHiM
OReilly.Learning.Unix.for.OS.X.Mountain.Lion.2012.RETAIL.eBook-ELOHiM
OReilly.Photoshop.Elements.11.The.Missing.Manual.2012.RETAIL.eBook-ELOHiM
OReilly.Programming.Android.2nd.Edition.2012.RETAIL.eBook-ELOHiM
OReilly.Programming.ASP.NET.MVC.4.2012.RETAIL.eBook-ELOHiM
OReilly.Switching.to.the.Mac.The.Missing.Manual.Mountain.Lion.Edition.2012.RETAIL.eBook-ELOHiM
OReilly.Troubleshoot.and.Optimize.Windows.8.Inside.Out.2012.RETAIL.eBook-ELOHiM
OReilly.Windows.8.for.Tablets.Plain.and.Simple.2012.RETAIL.eBook-ELOHiM
OReilly.Windows.8.Plain.and.Simple.2012.RETAIL.eBook-ELOHiM
OReilly.Windows.8.Step.by.Step.2012.RETAIL.eBook-ELOHiM

https://www.rapidshare.com/files/82808822/1010.part1.rar
https://www.rapidshare.com/files/3971900594/1010.part2.rar
https://www.rapidshare.com/files/81665212/1010.part3.rar
part1.rar
http://www65.zippyshare.com/v/90668443/file.html
part2.rar
http://www65.zippyshare.com/v/63891460/file.html
part3.rar
http://www65.zippyshare.com/v/10840669/file.html

上传的附件:
2012-10-26 08:01
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
8

Corporate Computer Security, 3rd Edition
Ebook Description:
A strong business focus through a solid technical presentation of security tools.
Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools. This text gives readers the IT security skills they need for the workplace.
This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies.
E-book Details:
Hardcover: 688 pages
Author: Randy J Boyle
Publisher: Prentice Hall, 3 Edition, 2012-01-21
Language: English
ISBN-10: 0132145359
ISBN-13: 9780132145350
Format: PDF
File Size: 10.5MB
http://www.mirrorcreator.com/files/KX3MBR2T/

上传的附件:
2012-10-26 10:14
0
游客
登录 | 注册 方可回帖
返回
//