首页
社区
课程
招聘
eBOOKS (POST ALL HERE) 电子图书
发表于: 2005-12-4 22:19 101221

eBOOKS (POST ALL HERE) 电子图书

2005-12-4 22:19
101221
收藏
免费 1
支持
分享
最新回复 (344)
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
226
Advances in Enterprise Information Technology Security

Product Description
Advances in Enterprise Information Technology Security provides a broad working knowledge of all the major security issues affecting todays enterprise IT activities. The chapters in this Premier Reference Source are written by some of the worlds leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.

About the Author
Djamel Khadraoui received his PhD from Blaise Pascal University of Clermont-Ferrand (France). He is a Senior researcher in the domains of Enterprise IT Security, Intelligent Systems and software architectures. Dr. Djamel Khadraoui is also active in the domain of web-centric and interactive multimedia applications. His recent interests are related to Multi-Agents Systems dealing with negotiation and arbitration applied to the domains of trusted e-contracting. Djamel Khadraoui is managing EUREKA projects in the area of Telecom and Security (BUGYO, RED, E-Confidential, CARLINK, AUTOTRUST). He is the representative of Security and Trust Management ERCIM working group as well as of Trust and Security working group of NESSI. He was a general chairman of AISTA 04. He is member of ISO JTC1/SC27/WG2 related to IT Security Techniques/Security techniques and mechanisms. He gives lectures at the university of Metz (France) and the Luxembourg University in the area of Security. Francine Herrmann received a Ph.D. in computer science from PARIS-VI University. She worked at CNET Research Center from 1985 to 1988. In 1989, she joined the Computer Science Department of Metz University and the LITA computer science laboratory. She is now the director of the computer science department and manages the master of computer security of Metz. Her main research areas are parallel and distributed algorithms, parallel constraints and security in parallel computations.

# 368 pages
# Publisher: IGI Global (May 31, 2007)
# Language: English
# ISBN-10: 1599040905
# ISBN-13: 978-1599040905  
http://rapidshare.com/files/86955552/IG7.pdf
2008-1-27 17:34
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
227
The Best Damn Exchange, SQL and IIS Book Period (Best Damn), (Book Period) (Paperback) Nov.2007.eBook-BBL

TITLE : The Best Damn Exchange, SQL and IIS Book Period (Best Damn) (Book Period) (Paperback)
AUTHOR : by Henrik Walther (Author), Mark Horninger (Author), Chris Adams (Author)
PUBLISHER : Syngress publisher
ISBN : 1597492191
EDITION : 1st
PUB DATE : November 05, 2007
LANGUAGE : English
RLS DATE : 01/27/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 11 x 5.00 MB

[ R e l e a s e N o t e s ]

Exchange, SQL and IIS are at the core of most Microsoft enterprise
servers. The 2007 releases of these products, along with the release of
Windows Vista and Windows 2008 Server, represents the biggest overhaul
of Windows enterprise products since Windows 2000. The dramatic changes
to security tools and the addition of features that support "anywhere
access" present IT professionals with a steep learning curve. Making
certain that these products are configured to meet regulatory compliance
requirements adds addtionaly complexity to day-to-day management network
management. The Best Damn Exchange, SQL and IIS Book Period delivers an
all-in-one reference for Windows System Administrators deploying the
2007 releases of these core Microsoft servers. The coverage is
comprehensive, and provides users with just about everything they need
to manage a Windows enterprise server. Special Bonus coverage includes
how to gather and analyze the many log files generated by these servers.
Key Features:

* All-in-one coverage includes Exchange, SQL, and IIS Servers
* Integrated coverage on all key security features
* Bonus coverage includes analyzing server logs and integrating
Communicator 2007

URL: http://www.amazon.com/exec/obidos/tg/detail/-/1597492191/

Download:

http://depositfiles.com/files/3267977

Mirror Download:

http://rapidshare.com/files/87165590/1597492191.zip
2008-1-28 10:16
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
228
OReilly.Knoppix.Hacks.2nd.Edition, Nov.2007.eBook-BBL

TITLE : Knoppix Hacks: Tips and Tools for Using the Linux Live CD to Hack, Repair, and Enjoy Your PC
TYPE : Computer/OS
AUTHOR : Kyle Rankin (Author)
PUBLISHER : Make Books
ISBN : 059651493X
PAGES : 420
EDITION : 1st
LANGUAGE : ENGLISH
RELEASE DATE : 28th Jan 2008

MAKER : BBL
PACKAGER : BBL
SUPPLIER : BBL
FORMAT : PDF
SIZE : 3.07 MB

RELEASE NOTES :
If you think Knoppix is just a Linux demo disk, think again. Klaus Knopper created an entire Linux distribution on a bootable CD (and now a DVD) so he could use his favorite open source tools on any computer. This book includes a collection of tips and techniques for using the enormous amount of software Knoppix offers-not just to work and play, but also to troubleshoot, repair, upgrade, and disinfect your system without having to install a thing.

Knoppix Hacks is just like the distribution it covers: a veritable Swiss Army knife packed full of tools. Scores of industrial-strength hacks-many of them new to this second edition-cover both the standard Knoppix CD and the feature-rich DVD "Maxi" distribution, which is included with this book. Discover how to use Knoppix to its full potential as your desktop, rescue CD, or as a launching point for your own live CD.

With Knoppix Hacks, you can:

* Investigate features of the KDE desktop and its Internet applications
* Save your settings and data between reboots with persistent storage
* Employ Knoppix as a system administration multitool to replace failed servers and more
* Use the CD/DVD as a rescue disc to repair filesystems or a system that won't boot
* Rescue Windows systems with Knoppix to back up files and settings, hack the registry, and more
* Explore other live CDs based on Knoppix that could augment your system
* Easily install the popular Debian GNU/Linux distribution with all of your hardware detected and configured
* Remaster Knoppix to include your favorite software and custom branding

Whether you're a new Linux user, power user, or system administer, this book helps you take advantage of Knoppix and customize it to your needs. You may just find ways to use Knoppix that you never considered.

URL :

http://www.amazon.com/exec/obidos/tg/detail/-/059651493X/

DOWNLOAD :

http://rapidshare.com/files/87426183/059651493X.rar
2008-1-29 09:48
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
229
Oracle PL/SQL Language Pocket Reference, Fourth Edition (Paperback), Oct.2007.eBook-BBL

TITLE : Oracle PL/SQL Language Pocket Reference, Fourth Edition (Paperback)AUTHOR : by Steven Feuerstein (Author), Bill Pribyl (Author), Chip Dawes (Author)PUBLISHER : O'Reilly Media publisherISBN : 0596514042EDITION : 4thPUB DATE : October 23, 2007LANGUAGE : English RLS DATE : 01/28/2008MAKER : BBL SUPPLIER : BBL PACKAGER : BBLFORMAT : PDFSIZE : 01 x 1.44 MB[ R e l e a s e N o t e s ]The fourth edition of this popular pocket guide provides quick-reference information that will help you use Oracle's PL/SQL language, including the newest Oracle Database 11g features. It's a companion to Steven Feuerstein and Bill Pribyl's bestselling Oracle PL/SQL Programming. This concise guide boils down the most vital PL/SQL information into an accessible summary of: - Fundamental language elements (e.g., block structure, datatypes, declarations) - Statements for program control, cursor management, and exception handling - Records, procedures, functions, triggers, and packages - Calling PL/SQL functions in SQL - Compilation options, object-oriented features, collections, and Java integration The new edition describes such Oracle Database 11g elements as PL/SQL's function result cache, compound triggers, the CONTINUE statement, the SIMPLE_INTEGER datatype, and improvements to native compilation, regular expressions, and compiler optimization (including intra-unit inlining). In addition, this book now includes substantial new sections on Oracle's built-in functions and packages. When you need answers quickly, the Oracle PL/SQL Language Pocket Reference will save you hours of frustration.URL: http://www.amazon.com/exec/obidos/tg/detail/-/0596514042/Download:http://depositfiles.com/files/3284968Mirror Download:http://rapidshare.com/files/87468198/0596514042.zip
2008-1-29 17:21
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
230
The Web Application Hacker's Handbook

Book Description
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.

The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.

http://www.megaupload.com/?d=X9TG0UZA

Password: www.BayW.org
2008-1-30 20:25
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
231
Writing Secure Code, Second Edition

Book Description
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process - from designing secure applications to writing robust code

From the Publisher
No more malicious attacks! Learn the best practices for writing secure code, with samples in Microsoft Visual Basic®.NET, Visual C++®, Perl, and Visual C#®

very professional developer should read this book, period!

This book provides a great overview of what techniques are important when writing secure applications, and what pitfalls to avoid. The book does a good job at making a point through examples and by explaining possible exploits.

This book tries to cover a lot of ground. Most of the things discussed are for C++ developers. However, most of the things discussed are of general interest no matter what language one develops with.

I found myself wishing that the book covered a bit more about my development environment of choice: Visual Studio .NET. As mentioned above, I found all the content very interesting and applicable,
but I think it would be good to have more than one chapter covering .NET specifically. I do realize however, that this book was first written before .NET. Perhaps someone will dedicate a book completely to .NET ("Writing Secure .NET Code" anyone?).

This book provides a solid foundation and teaches developers what to look for. However, the book is written for developers and managers alike and does not cover tons of implementation details. I would recommend this book to everyone as a first book to read about secure application development. It is not the last book people should read however. There are a number of good books available for a variety of environments (including .NET) that discuss specific implementations of various security and privacy techniques. Get several of those books as well!

Bottom line: This is a great book. Developers must read it. No "ifs" and "buts". Once you are done with this one though, get other security books and keep on reading...
# 650 pages
# Publisher: Microsoft Press; 2 Sub edition (December 4, 2002)
# Language: English
# ISBN-10: 0735617228
# ISBN-13: 978-0735617223
http://rapidshare.com/files/88054683/_Mode.pdf
2008-1-31 23:07
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
232
Computer Security and Cryptography

Review
"...essential reading for professionals in e-commerce and information technology...it is also ideal for students." (IEEE Computer Magazine, March 2007)

Book Description
Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.

The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.

Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.

Three basic types of chapters are featured to facilitate learning:

* Chapters that develop technical skills
* Chapters that describe a cryptosystem and present a method of analysis
* Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions

With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.

# 544 pages
# Publisher: Wiley-Interscience (January 29, 2007)
# Language: English
# ISBN-10: 0471947830
# ISBN-13: 978-0471947837  
http://rapidshare.com/files/88228432/comphy.pdf
2008-2-1 15:53
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
233
RSA Security's Official Guide to Cryptography

Book Description
Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed with detailed case studies, this practical guide is written in conjunction with RSA Security--the most trusted name in e-security(tm). Part of the RSA Press Series.

Download Description
Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed with detailed case studies, this practical guide is written in conjunction with RSA Security--the most trusted name in e-security.

Quote:
A fantastic book for the IS professional interested in learning more about cryptography. This book is one of the better-written books I have read in a long time. The authors keep the content flowing without bogging you down in a lot of high-level mathematical theory or techno garbage. From history to the concepts behind different algorithms, the book presents the pros and cons of many different technologies. My one fear was that it would be nothing more than an advertisement for RSA's products. I couldn't have been more incorrect. I started this book on a two-hour flight, and five chapters into it I actually didn't want to put it down. A great read with lots of information.

# 419 pages
# Publisher: McGraw-Hill Osborne Media; 1 edition (March 29, 2001)
# Language: English
# ISBN-10: 007213139X
# ISBN-13: 978-0072131390 :
http://rapidshare.com/files/88228897/Mcphy_-_fly.rar
2008-2-1 15:54
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
234
Decrypted Secrets: Methods and Maxims of Cryptology

Review

"The best single book on cryptology today." --Cryptologia (from a review of a previous edition)

From the reviews of the fourth edition:

"This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007)

Cryptologia
"It is an outstanding book that assumes only elementary mathematical knowledge and is interspersed with many exciting, amusing, and sometimes personal stories from the history of cryptology."

Quote:
This is an amazing book, and relatively inexpensive; Springer-Verlag has done it again.

Rather than being a dry recitation of encryption and cryptanalysis schemes, Bauer provides a great deal of information about what actually goes wrong when one tries to construct a cipher that must be used under pressure by non-cryptologists, with plenty of historical examples to illustrate his points. And he discusses at some length the ways in which cryptanalysts can hope to unravel ciphers and codes too strong to be broken by standard methods. Much of what he has to say I had never seen in print before; some of it was brand new to me. Perhaps it helps that Bauer is German, and doesn't have to write with the uneasy feeling that NSA or MI-6 is looking over his shoulder at every line he writes. For example, his explanation of how Robert Murphy compromised an American cipher in WW II so badly that the Germans could read it easily is one that I think some American officials would probably still prefer not to have in print.

Despite comments by other reviewers and by Cryptologia, I think it requires a certain mathematical sophistication to absorb much of the material in this book. The math is not hard, but Bauer implicitly assumes a mathematical mindset and a familiarity with the terminology of pure mathematics that most college undergraduates don't have. So I wouldn't choose it as the primary text for a first course in cryptology, but I would certainly use it as a supplementary text. I know of no other book that contains so much material on the practical realities of cryptology.

# 525 pages
# Publisher: Springer; 4th ed. edition (November 14, 2006)
# Language: English
# ISBN-10: 3540245022
# ISBN-13: 978-3540245025  
http://rapidshare.com/files/88229798/deims-o7381.pdf
2008-2-1 15:55
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
235
Rootkits: Subverting the Windows Kernel

From the Back Cover

"It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits."
--Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine

"This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."
--Tony Bautts, Security Consultant; CEO, Xtivix, Inc.

"This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."
--Jennifer Kolde, Security Consultant, Author, and Instructor

"What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight.

"Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine.

"Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."
--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley

"Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."
--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005)

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection.

Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. Using extensive downloadable examples, they teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers.

After reading this book, readers will be able to

* Understand the role of rootkits in remote command/control and software eavesdropping
* Build kernel rootkits that can make processes, files, and directories invisible
* Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects
* Work with layered drivers to implement keyboard sniffers and file filters
* Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Visit rootkit.com for code and programs from this book. The site also contains enhancements to the book's text, such as up-to-the-minute information on rootkits available nowhere else.

About the Author

Greg Hoglund has been a pioneer in the area of software security. He is CEO of HBGary, Inc., a leading provider of software security verification services. After writing one of the first network vulnerability scanners (installed in over half of all Fortune 500 companies), he created and documented the first Windows NT-based rootkit, founding rootkit.com in the process. Greg is a frequent speaker at Black Hat, RSA, and other security conferences.

James Butler, Director of Engineering at HBGary, has a world-class talent for kernel programming and rootkit development and extensive experience in host-based intrusion-detection systems. He is the developer of VICE, a rootkit detection and forensics system. Jamie's previous positions include Senior Security Software Engineer at Enterasys and Computer Scientist at the National Security Agency. He is a frequent trainer and speaker at Black Hat security conferences. He holds a masters of computer science from the University of Maryland, Baltimore County. He has published articles in the IEEE Information Assurance Workshop, Phrack, USENIX ;login:, and Information Management and Computer Security.

# 352 pages
# Publisher: Addison-Wesley Professional (August 1, 2005)
# Language: English
# ISBN-10: 0321294319
# ISBN-13: 978-0321294319
PDF HERE:
http://rapidshare.com/files/88219069/roots.pdf

CHM HERE:
http://rapidshare.com/files/88219175/Addiernel.chm
2008-2-1 16:00
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
236
Compilers:Principles,Techniques,Tools,The PurpleDragon

2nd Edition

Following in the tradition of its two predecessors, the second edition features a dragon and a knight on its cover, designed by Strange Tonic Productions; for this reason, the series of books is commonly known as the Dragon Books. Different editions in the series are further distinguished by the color of the dragon. This edition is informally known as the purple dragon. Monica S. Lam of Stanford University became the fourth co-author with this edition.

The second edition includes several additional topics that are not covered in the first edition. New topics include

* directed translation
* new data flow analyses
* parallel machines
* JIT compiling
* garbage collection
* new case studies.

Compilers: Principles, Techniques, and Tools [1] is a famous computer science textbook by Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman about compiler construction. Although decades have passed since the publication of the first edition, it is widely regarded as the classic definitive compiler technology text.

It is known as the Dragon Book because its covers depict a knight and a dragon in battle. The first edition is informally called the “red dragon book” to distinguish it from the second edition and from Aho & Ullman’s Principles of Compiler Design (1977, sometimes known as the “green dragon book” because the dragon on its cover is green).

A new edition of the book was published in August 2006.

Topics covered in the first edition include:

* Compiler structure
* Lexical analysis (including regular expressions and finite automata)
* Syntax analysis (including context-free grammars, LL parsers, bottom-up parsers, and LR parsers)
* Syntax directed translation
* Type checking (including type conversions and polymorphism)
* Run-time environment (including parameter passing, symbol tables, and storage allocation)
* Code generation (including intermediate code generation)
* Code optimization

# 1009 pages
# Publisher: Addison Wesley; 2 edition (October 15, 2007)
# Language: English
# ISBN-10: 0321547985
# ISBN-13: 978-032154798  
http://rapidshare.com/files/88224257/Addis.T.pdf
2008-2-1 16:25
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
237
Advanced Windows Debugging

Author: Mario Hewardt and Daniel Pravat
Paperback: 840 pages
Publisher: Addison-Wesley Professional (November 8, 2007)
Language: English
ISBN-10: 0321374460
ISBN-13: 978-0321374462
Format: Pdf
Details:
For Windows developers, few tasks are more challenging than debugging—-or more crucial. Reliable and realistic information about Windows debugging has always been scarce. Now, with over 15 years of experience two of Microsoft’s system-level developers present a thorough and practical guide to Windows debugging ever written.

Mario Hewardt and Daniel Pravat cover debugging throughout the entire application lifecycle and show how to make the most of the tools currently available—-including Microsoft’s powerful native debuggers and third-party solutions.

To help you find real solutions fast, this book is organized around real-world debugging scenarios. Hewardt and Pravat use detailed code examples to illuminate the complex debugging challenges professional developers actually face. From core Windows operating system concepts to security, Windows® Vista™ and 64-bit debugging, they address emerging topics head-on—and nothing is ever oversimplified or glossed over!

This book enables you to

Master today’s most powerful Windows debugging tools, including NTSD, CDB, WinDbg, KD, and ADPlus
Debug code that wasn’t designed or written for easy debugging
Understand debuggers “under the hood,” and manage symbols and sources efficiently
Debug complex memory corruptions related to stacks and heaps
Resolve complex security problems
Debug across processes: identity tracking, RPC debugger extensions, and tracking IPCs with Ethereal
Find and fix resource leaks, such as memory and handle leaks.
Debug common thread synchronization problems
Learn when and how to write custom debugger extensions
Perform “postmortem debugging” using crash dumps and Windows Error Reporting
Automate debugging with DebugDiag and the Analyze Debugger command
Whether you’re a system-level or application developer, Advanced Windows Debugging delivers the deep understanding of debugging that could save you weeks on your very next project.

http://rapidshare.com/files/88332051/Advanced.Windows.Debugging_-_virTuAlZin.rar
2008-2-1 23:14
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
238
Over 5GB of ebooks on FTP

ftp://194.44.214.3/pub/e-books/
2008-2-1 23:38
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
239
稀里糊涂的干啥呢
2008-2-2 22:20
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
240
发帖请参看版规.
2008-2-2 23:23
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
241
The Linux kernel API.pdf 1,64 MB 2004-01-24
http://ihtik.2x4.ru/complit_22janv2007/complit_22janv2007_3700.rar
2008-2-3 11:34
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
242
The Best Damn IT Security Management Book Period (Paperback), Oct.2007.eBook-BBL

TITLE : The Best Damn IT Security Management Book Period (Paperback)
AUTHOR : by Susan Snedaker (Author), Robert McCrie (Author), Karim Vellani (Author)
PUBLISHER : Syngress publisher
ISBN : 1597492272
EDITION : 1st
PUB DATE : October 19, 2007
LANGUAGE : English
RLS DATE : 02/02/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 06 x 2.88 MB

[ R e l e a s e N o t e s ]

The Best Damn Security Manager's Handbook Periodhas comprehensive
coverage of all management isuses facing IT and security professionals.
Compiled from the best of the Syngress and Butterworth Heinemann
libraries and authored by business continuity expert Susan Snedakers,
this volume is an indispensable addition to a serious security
professional's toolkit. Coverage includes Business Continuity, Risk
Assessment, Protection Assets, Project Management, Security Operations,
and Security Management, and Security Design & Integration.

* An all encompassing book, covering general security management issues
and providing specific guidelines and checklists.
* Anyone studying for a security specific certification or ASIS
certification, will find this a valuable resource.
* The only book to cover all major IT and security management issues in
one place: disaster recover, project management, operations management,
risk assessment.

URL: http://www.amazon.com/exec/obidos/tg/detail/-/1597492272/

Download:

http://depositfiles.com/files/3356688

Mirror Download:

http://rapidshare.com/files/88696842/1597492272.zip
2008-2-4 14:04
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
243
DB2 9 for Linux, UNIX, and Windows: DBA Guide, Reference, and, Exam Prep (6th Edition) (Hardcover) Nov.2007.eBook-BBL

TITLE : DB2 9 for Linux, UNIX, and Windows: DBA Guide, Reference, and Exam Prep (6th Edition) (Hardcover)
AUTHOR : by George Baklarz (Author), Paul C. Zikopoulos (Author)
PUBLISHER : IBM Press publisher
ISBN : 013185514X
EDITION : 6th
PUB DATE : November 29, 2007
LANGUAGE : English
RLS DATE : 02/03/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 08 x 1.44 MB

[ R e l e a s e N o t e s ]

DB2 9 builds on the world's number one enterprise database to simplify
the delivery of information as a service, accelerate development, and
dramatically improve operational efficiency, security, and resiliency.
Now, this new edition offers complete, start-to-finish coverage of DB2 9
administration and development for Linux, UNIX, and Windows platforms,
as well as authoritative preparation for the latest IBM DB2
certification exam. Written for both DBAs and developers, this
definitive reference and self-study guide covers all aspects of
deploying and managing DB2 9, including DB2 database design and
development; day-to-day administration and backup; deployment of
networked, Internet-centered, and SOA-based applications; migration; and
much more. You'll also find an unparalleled collection of expert tips
for optimizing performance, availability, and value. Coverage includes:

- Important security and resiliency enhancements, including advanced
access control; fine-grained, label-based security; and the new security
administrator role
- Breakthrough pureXML features that make it easier to succeed with
service-oriented architecture
- Operational improvements that enhance DBA efficiency--including
self-tuning memory allocation, automated storage management, and storage
optimization
- Table-partitioning features that improve scalability and
manageability
- Powerful improvements for more agile and rapid development,
including the new Eclipse-based Developer Workbench and simple SQL or
XQuery access to all data Whatever your role in working with DB2 or
preparing for certification, DB2 9 for Linux, UNIX, and Windows, Sixth
Edition is the one book you can't afford to be without.
Download Complete DB2 V9 Trial Version
Visit ibm.com/db2/9/download.html to download a complete trial version
of DB2, which enables you to try out dozens of the most powerful
features of DB2 for yourself: everything from pureXML support to
automated administration and optimization.
- Straight from IBM, the ultimate guide to running DB2 9 and preparing
for the latest IBM DB2 certification exam!
- Covers powerful DB2 9 enhancements ranging from automated management
to improved compression
- Covers the full spectrum of DBA responsibilities, including server
management, data placement, XML concepts, activity analysis, high
availability, and security
- Presents expert tips and best practices from the DB2 customer
support organization

URL: http://www.amazon.com/exec/obidos/tg/detail/-/013185514X/

Download:

http://depositfiles.com/files/3369067

Mirror Download:

http://rapidshare.com/files/88894730/013185514X.zip
2008-2-4 14:04
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
244
Patterns in Network Architecture: A Return to Fundamentals (Hardcover), Jan.2008.eBook-BBL

TITLE : Patterns in Network Architecture: A Return to Fundamentals (Hardcover)
AUTHOR : by John Day (Author)
PUBLISHER : Prentice Hall PTR publisher
ISBN : 0132252422
EDITION : 1st
PUB DATE : January 06, 2008
LANGUAGE : English
RLS DATE : 02/03/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 02 x 1.44 MB

[ R e l e a s e N o t e s ]

Groundbreaking Patterns for Building Simpler, More Powerful Networks

In Patterns in Network Architecture, pioneer John Day takes a unique
approach to solving the problem of network architecture. Piercing the
fog of history, he bridges the gap between our experience from the
original ARPANET and today's Internet to a new perspective on
networking. Along the way, he shows how socioeconomic forces derailed
progress and led to the current crisis.

Beginning with the seven fundamental, and still unanswered, questions
identified during the ARPANET's development, Patterns in Network
Architecture returns to bedrock and traces our experience both good and
bad. Along the way, he uncovers overlooked patterns in protocols that
simplify design and implementation and resolves the classic conflict
between connection and connectionless while retaining the best of both.
He finds deep new insights into the core challenges of naming and
addressing, along with results from upper-layer architecture. All of
this in Day's deft hands comes together in a tour de force of elegance
and simplicity with the annoying turn of events that the answer has been
staring us in the face: Operating systems tell us even more about
networking than we thought. The result is, in essence, the first
“unified theory of networking,” and leads to a simpler, more
powerful-and above all-more scalable network infrastructure. The book
then lays the groundwork for how to exploit the result in the design,
development, and management as we move beyond the limitations of the
Internet.

Using this new model, Day shows how many complex mechanisms in the
Internet today (multihoming, mobility, and multicast) are, with this
collapse in complexity, now simply a consequence of the structure. The
problems of router table growth of such concern today disappear. The
inescapable conclusion is that the Internet is an unfinished demo, more
in the tradition of DOS than Unix, that has been living on Moore's Law
and 30 years of band-aids. It is long past time to get networking back
on track.

- Patterns in network protocols that synthesize
“contradictory” approaches and simplify design and implementation
- “Deriving” that networking is interprocess communication
(IPC) yielding
- A distributed IPC model that repeats with different scope
and range of operation
- Making network addresses topological makes routing purely a
local matter
- That in fact, private addresses are the norm-not the
exception-with the consequence that the global public addresses required
today are unnecessary
- That mobility is dynamic multihoming and unicast is a subset
of multicast, but multicast devolves into unicast and facilitates
mobility
- That the Internet today is more like DOS, but what we need
should be more like Unix
- For networking researchers, architects, designers, engineers

Provocative, elegant, and profound, Patterns in Network Architecture
transforms the way you envision, architect, and implement networks.

URL: http://www.amazon.com/exec/obidos/tg/detail/-/0132252422/

Download:

http://depositfiles.com/files/3369288

Mirror Download:

http://rapidshare.com/files/88897704/0132252422.zip
2008-2-4 14:05
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
245
Rapid GUI Programming with Python and Qt (Prentice Hall Open Source, Software Development) (Hardcover) Oct.2007.eBook-BBL

TITLE : Rapid GUI Programming with Python and Qt (Prentice Hall Open Source Software Development) (Hardcover)
AUTHOR : by Mark Summerfield (Author)
PUBLISHER : Prentice Hall PTR publisher
ISBN : 0132354187
EDITION : 1st
PUB DATE : October 28, 2007
LANGUAGE : English
RLS DATE : 02/03/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 04 x 1.44 MB

[ R e l e a s e N o t e s ]

The Insider's Best-Practice Guide to Rapid PyQt 4 GUI Development
Whether you're building GUI prototypes or full-fledged cross-platform
GUI applications with native look-and-feel, PyQt 4 is your fastest,
easiest, most powerful solution. Qt expert Mark Summerfield has written
the definitive best-practice guide to PyQt 4 development. With Rapid GUI
Programming with Python and Qt you'll learn how to build efficient GUI
applications that run on all major operating systems, including Windows,
Mac OS X, Linux, and many versions of Unix, using the same source code
for all of them. Summerfield systematically introduces every core GUI
development technique: from dialogs and windows to data handling; from
events to printing; and more. Through the book's realistic examples
you'll discover a completely new PyQt 4-based programming approach, as
well as coverage of many new topics, from PyQt 4's rich text engine to
advanced model/view and graphics/view programming. Every key concept is
illuminated with realistic, downloadable examples—all tested on Windows,
Mac OS X, and Linux with Python 2.5, Qt 4.2, and PyQt 4.2, and on
Windows and Linux with Qt 4.3 and PyQt 4.3. Coverge includes:

- Python basics for every PyQt developer: data types, data structures,
control structures, classes, modules, and more
- Core PyQt GUI programming techniques: dialogs, main windows, and
custom file formats
- Using Qt Designer to design user interfaces, and to implement and
test dialogs, events, the Clipboard, and drag-and-drop
- Building custom widgets: Widget Style Sheets, composite widgets,
subclassing, and more
- Making the most of Qt 4.2's new graphics/view architecture
- Connecting to databases, executing SQL queries, and using form and
table views
- Advanced model/view programming: custom views, generic delegates,
and more
- Implementing online help, internationalizing applications, and using
PyQt's networking and multithreading facilities

URL: http://www.amazon.com/exec/obidos/tg/detail/-/0132354187/

Download:

http://depositfiles.com/files/3369358

Mirror Download:

http://rapidshare.com/files/88898707/0132354187.zip
2008-2-4 14:06
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
246
Microsoft(r) Office Project Server 2007: The Complete Reference, (Complete Reference Series) (Paperback) Feb.2008.eBook-BBL

TITLE : Microsoft(r) Office Project Server 2007: The Complete Reference (Complete Reference Series) (Paperback)
AUTHOR : by Dave Gochberg (Author), Rob Stewart (Author)
PUBLISHER : McGraw-Hill publisher
ISBN : 0071485996
EDITION : 1st
PUB DATE : February 13, 2008
LANGUAGE : English
RLS DATE : 02/05/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 08 x 2.88 MB

[ R e l e a s e N o t e s ]

This comprehensive guide takes you through the planning and
implementation lifecycle of a Project Server installation. You will
learn how to utilize this powerful software to set up and manage
projects, allocate human as well as financial resources, track progress,
and adjust activities quickly to accommodate project changes and
updates.

URL: http://www.amazon.com/exec/obidos/tg/detail/-/0071485996/

Download:

http://depositfiles.com/files/3403966

Mirror Download:

http://rapidshare.com/files/89484792/0071485996.zip
2008-2-6 07:22
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
247
Internet Multimedia Communications Using SIP: A Modern Approach, Including Java(r) Practice (Hardcover) Jan.2008.eBook-BBL

TITLE : Internet Multimedia Communications Using SIP: A Modern Approach Including Java(r) Practice (Hardcover)
AUTHOR : by Rogelio Martinez Perea (Author)
PUBLISHER : Morgan Kaufmann publisher
ISBN : 0123743001
EDITION : 1st
PUB DATE : January 15, 2008
LANGUAGE : English
RLS DATE : 02/02/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 03 x 1.44 MB

[ R e l e a s e N o t e s ]

Session Initiation Protocol (SIP) was conceived in 1996 as a signaling
protocol for inviting users to multimedia conferences. With this
development, the next big Internet revolution silently started. That was
the revolution which would end up converting the Internet into a total
communication system which would allow people to talk to each other, see
each other, work collaboratively or send messages in real time. Internet
telephony and, in general, Internet multimedia, is the new revolution
today and SIP is the key protocol which allows this revolution to grow.
The book explains, in tutorial fashion, the underlying technologies that
enable real-time IP multimedia communication services in the Internet
(voice, video, presence, instant messaging, online picture sharing,
white-boarding, etc). Focus is on session initiation protocol (SIP) but
also covers session description protocol (SDP), Real-time transport
protocol (RTP), and message session relay protocol (MSRP). In addition,
it will also touch on other application-related protocols and refer to
the latest research work in IETF and 3GPP about these topics. (3GPP
stands for "third-generation partnership project" which is a
collaboration agreement between ETSI (Europe), ARIB/TTC (Japan), CCSA
(China), ATIS (North America) and TTA (South Korea).) The book includes
discussion of leading edge theory (which is key to really understanding
the technology) accompanied by Java examples that illustrate the
theoretical concepts. Throughout the book, in addition to the code
snippets, the reader is guided to build a simple but functional IP
soft-phone therefore demonstrating the theory with practical examples.
This book covers IP multimedia from both a theoretical and practical
point of view focusing on letting the reader understand the concepts and
put them into practice using Java. It includes lots of drawings,
protocol diagrams, UML sequence diagrams and code snippets that allow
the reader to rapidly understand the concepts. KEY FEATURES

* Focus on HOW multimedia communications over the Internet works to
allow readers to really understand and implement the technology
* Explains how SIP works, including many programming examples so the
reader can understand abstract concepts like SIP dialogs, SIP
transactions, etc.
* It is not focused on just VoIP. It looks At a wide array of enhanced
communication services related to SIP enabling the reader put this
technology into practice.
* Includes nearly 100 references to the latest standards and working
group activities in the IETF, bringing the reader completely up to date.

* Provides a step-by-step tutorial on how to build a basic, though
functional, IP soft-phone allowing the reader to put concepts into
practice.
* For advanced readers, the book also explains how to build a SIP proxy
and a SIP registrar to enhance one's expertise and marketability in this
fast moving area.

URL: http://www.amazon.com/exec/obidos/tg/detail/-/0123743001/

Download:

http://depositfiles.com/files/3399120

Mirror Download:

http://rapidshare.com/files/89393096/0123743001.zip
2008-2-6 07:22
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
248
Open Source Fuzzing Tools (Paperback), Aug.2007.eBook-BBL

TITLE : Open Source Fuzzing Tools (Paperback)
AUTHOR : by Noam Rathaus (Author), Gadi Evron (Author)
PUBLISHER : Syngress publisher
ISBN : 1597491950
EDITION : 1st
PUB DATE : August 01, 2007
LANGUAGE : English
RLS DATE : 02/05/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 03 x 1.44 MB

[ R e l e a s e N o t e s ]

A "fuzzer" is a program that attempts to discover security
vulnerabilities by sending random data to an application. If that
application crashes, then it has deffects to correct. Security
professionals and web developers can use fuzzing for software
testing--checking their own programs for problems--before hackers do it!

Open Source Fuzzing Tools is the first book to market that covers the
subject of black box testing using fuzzing techniques. Fuzzing has been
around fow a while, but is making a transition from hacker home-grown
tool to commercial-grade quality assurance product. Using fuzzing,
developers can find and eliminate buffer overflows and other software
vulnerabilities during the development process and before release.

* Fuzzing is a fast-growing field with increasing commercial interest (7
vendors unveiled fuzzing products last year).
* Vendors today are looking for solutions to the ever increasing threat
of vulnerabilities. Fuzzing looks for these vulnerabilities
automatically, before they are known, and eliminates them before
release.
* Software developers face an incresing demand to produce secure
applications---and they are looking for any information to help them do
that.

URL: http://www.amazon.com/exec/obidos/tg/detail/-/1597491950/

Download:

http://depositfiles.com/files/3404334

Mirror Download:

http://rapidshare.com/files/89492492/1597491950.zip
2008-2-10 01:16
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
249
Sarbanes-Oxley IT Compliance Using Open Source Tools, Second Edition, (Paperback) Nov.2007.eBook-BBL

TITLE : Sarbanes-Oxley IT Compliance Using Open Source Tools, Second Edition (Paperback)
AUTHOR : by Christian B Lahti (Author), Roderick Peterson (Author)
PUBLISHER : Syngress publisher
ISBN : 1597492167
EDITION : 2nd
PUB DATE : November 16, 2007
LANGUAGE : English
RLS DATE : 02/05/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 03 x 2.88 MB

[ R e l e a s e N o t e s ]

The Sarbanes-Oxley Act (officially titled the Public Company Accounting
Reform and Investor Protection Act of 2002), signed into law on 30 July
2002 by President Bush, is considered the most significant change to
federal securities laws in the United States since the New Deal. It came
in the wake of a series of corporate financial scandals, including those
affecting Enron, Arthur Andersen, and WorldCom. The law is named after
Senator Paul Sarbanes and Representative Michael G. Oxley. It was
approved by the House by a vote of 423-3 and by the Senate 99-0. This
book illustrates the many Open Source cost-saving opportunities that
public companies can explore in their IT enterprise to meet mandatory
compliance requirements of the Sarbanes-Oxley act. This book will also
demonstrate by example and technical reference both the infrastructure
components for Open Source that can be made compliant, and the Open
Source tools that can aid in the journey of compliance. Although many
books and reference material have been authored on the financial and
business side of Sox compliance, very little material is available that
directly address the information technology considerations, even less so
on how Open Source fits into that discussion. The format of the book
will begin each chapter with the IT business and executive
considerations of Open Source and SOX compliance. The remaining chapter
verbiage will include specific examinations of Open Source applications
and tools which relate to the given subject matter, and last a bootable
?live?

* Only book that shows companies how to use Open Source tools to achieve
SOX compliance, which dramatically lowers the cost of using proprietary,
commercial applications.
* Only SOX book with a bootable-Linux CD containing countless
applications, forms, and checklists to assist companies in achieving SOX
compliance.
* Only SOX compliance book specifically detailing steps to achieve SOX
compliance for IT Professionals.

URL: http://www.amazon.com/exec/obidos/tg/detail/-/1597492167/

Download:

http://depositfiles.com/files/3404984

Mirror Download:

http://rapidshare.com/files/89507444/1597492167.zip
2008-2-10 01:17
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
250
Computing for Numerical Methods Using Visual C++ (Hardcover), Dec.2007.eBook-BBL

TITLE : Computing for Numerical Methods Using Visual C++ (Hardcover)
AUTHOR : by Shaharuddin Salleh (Author), Albert Y. Zomaya (Author), Sakhinah A. Bakar (Author)
PUBLISHER : Wiley publisher
ISBN : 0470127953
EDITION : 1st
PUB DATE : December 14, 2007
LANGUAGE : English
RLS DATE : 02/05/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 02 x 1.44 MB

[ R e l e a s e N o t e s ]

Providing a bridge between a problem and its solution through
visualization, this book covers the most talked about problems currently
available. Presenting a new approach that allows the reader to work by
designing C++ programs directly using Windows interface in one book, the
text provides ready to run codes. An equation parser in the form of an
object file can be linked directly to the codes to provide accuracy and
utility to the presentation. These are provided through an FTP location.

URL: http://www.amazon.com/exec/obidos/tg/detail/-/0470127953/

Download:

http://depositfiles.com/files/3404999

Mirror Download:

http://rapidshare.com/files/89507789/0470127953.zip
2008-2-10 01:18
0
游客
登录 | 注册 方可回帖
返回
//