首页
社区
课程
招聘
eBOOKS (POST ALL HERE) 电子图书
发表于: 2005-12-4 22:19 101221

eBOOKS (POST ALL HERE) 电子图书

2005-12-4 22:19
101221
收藏
免费 1
支持
分享
最新回复 (344)
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
151
Beautiful Code: Leading Programmers Explain How They Think

* Publisher:O'Reilly Media, Inc.
* Number Of Pages:
* Publication Date:June 26, 2007
* Sales Rank: #498
* ISBN / ASIN: 0596510047
* EAN: 978-0596510046


Book Description
How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that reveal how they found unusual, carefully designed solutions to high-profile projects. You will be able to look over the shoulder of major coding and design experts to see problems through their eyes.

This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. Beautiful Code is an opportunity for master coders to tell their story.


http://rapidshare.com/files/47254306/OReilly_.Beautiful.Code._2007_.rar

Password: mimio1234
2007-12-12 17:31
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
152
Reversing: Secrets of Reverse Engineering

Book Description
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language

http://rapidshare.com/files/72824443/Reversing_Secrets_of_Reverse_Engineering.rar
2007-12-19 13:38
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
153
Exceptional C

http://rapidshare.com/files/73142037/Exceptional_C__.chm
2007-12-21 11:18
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
154
C FAQ

http://rapidshare.com/files/72380465/c___c__.rar
2007-12-21 11:19
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
155
18 Oracle 9i & 10g Books

eBook.McGraw.Hill.Osborne.Oracle.Database.10g.SQL.chm 11-Jul-2007 14:19 849K
Sybex.Oracle9i.DBA.JumpStart.eBook-LiB.chm 11-Jul-2007 14:19 7.9M
Sams.Oracle.Database.10g.Insider.Solutions.chm 11-Jul-2007 14:19 12M
Que.Oracle.9i.Fundamentals.I.Exam.Cram.2.Nov.2004.eBook-LiB.chm 11-Jul-2007 14:19 3.4M
Prentice.Programming.Oracle.Triggers.And.Stored.Procedures.3rd.Edition.eBook-LiB.chm 11-Jul-2007 14:19 1.2M
Prentice.Oracle.PL.SQL.By.Example.3rd.Edition-LiB.chm 11-Jul-2007 14:19 1.1M
Prentice.Oracle.DBA.SQL.Quick.Reference.eBook-LiB.chm 11-Jul-2007 14:19 4.5M
Prentice.Oracle.DBA.Guide.To.Data.Warehousing.And.Star.Schemas.eBook-LiB.chm 11-Jul-2007 14:19 1.5M
Prentice.Hall.PTR.Oracle.DBA.Scripting.Quick.Reference.Apr.2004.eBook-DDU.chm 11-Jul-2007 14:19 187K
Oreilly.Oracle.Essentials.Oracle.Database.10g.3rd.Edition.eBook-LiB.chm 11-Jul-2007 14:19 1.8M
OReilly.Oracle.PL.SQL.for.DBAs.Oct.2005.chm 11-Jul-2007 14:19 929K
McGrawHill-Oracle_Database_10g_New_Features.chm 11-Jul-2007 14:19 1.6M
McGraw Hill - Oracle Database 10g, A Beginner's Guide.chm 11-Jul-2007 14:19 2.4M
McGraw.Hill.-.Oracle.Database.10g..High.Availablity.with.RAC.Flashback.&.Data.Guard.chm 11-Jul-2007 14:19 9.3M
Digital Press - Oracle High Performance Tuning for 9i and 10g.chm 11-Jul-2007 14:19 10M
Digital.Press.Oracle.High.Performance.Tuning.for.9i.and.10g.eBook-DDU.chm 11-Jul-2007 14:19 10M
Apress.Expert.Oracle9i.Database.Administration.eBook-LiB.chm 11-Jul-2007 14:19 9.8M
Addison.Wesley.Guerrilla.Oracle.eBook-LiB.chm 11-Jul-2007 14:19 9.5M

http://rapidshare.com/files/73890252/Oracle_Books.rar.html
2007-12-21 11:21
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
156
Beginning C# 2008: From Novice to Professional

Get comfortable with the most powerful version of the .NET Framework devised yet, by embracing new techniques and innovations to create your applications faster, using a wide range of tools.

The C# 2008 language is your gateway to the powerful .NET platform. C# combined with Visual Studio gives you the freedom to create your applications faster and with a greater range of tools than any other coding environment.

The new .NET "Orcas" Framework is the most powerful yet, devised with new innovations such as Language Integrated Query, making it easy for you to query your databases directly from your C# code; and ASP.NET AJAX, giving you drag-and-drop access to AJAX techniques for your web pages.

With Beginning C# 2008, expert author Christian Gross, will have you creating real applications in the first few pages, continuing with valuable support by building in good design and testing habits into every chapter. You'll learn much more than just the C# language; you'll gradually understand the mindset of a true developer as you progress through the book.
What you'll learn
*C# 2008!
*Learn everything you need to begin building your own applications in a solid, well-considered way: this book will teach you .NET coding from the ground up.
*Use the Visual Studio IDE to create, debug, and deploy your applications.
*Understand the mysteries of database access and the many ways that it can be accomplished from C#.
*Delve deep into the huge range of supporting technologies that the .NET Framework offers--LINQ, ASP.NET AJAX, ADO.NET 3.0, WPF, WCF, and Windows Workflow are all introduced and explained in a straightforward, easy-to-follow way.

http://rapidshare.com/files/76379062/Apress.Beginning.C.Sharp.2008.From.Novice.to.Professional.Nov.2007.pdf
2007-12-21 11:25
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
157
Beginning Linux Programming, Fourth Edition

Provided you have some previous basic exposure to C and Unix, Beginning Linux Programming delivers an excellent overview of the world of Linux development with an appealing range of essential tools and APIs.

The standout feature of Beginning Linux Programming is its wide-ranging coverage of important topics in basic Unix programming. In a series of short chapters, the authors discuss the basics of writing Unix programs in C, with material on basic system calls, file I/O, interprocess communication (for getting programs to work together), and advanced topics such as socket programming and how to create Unix device drivers.

Parallel to this, the book introduces the toolkits and libraries for working with user interfaces, from simpler terminal mode applications to X and GTK+ for graphical user interfaces. While you won’t be an authority on X or GTK+ after reading this book, you will certainly be able to explore real Linux development on your own after the capable introductory guide provided here. (The book’s main example, a CD-ROM database, gets enhanced in subsequent chapters using new APIs and features as the book moves forward.) This text also serves as a valuable primer on languages and tools such as Tcl, Perl, and CGI. (There’s even a section that explains the basics of the Internet and HTML.)

More than ever, there is no shortage of specific information on Linux programming, but few titles provide such a wide-ranging tour of what you need to know to get serious with Linux development. In all, Beginning Linux Programming gives the reader an intelligent sampling of essential topics in today’s Linux. It’s a wise choice for aspiring Unix C developers or folks seeking to extend the range of their Linux knowledge. –Richard Dragan

Topics covered: Linux overview, compiling C programs, shell programming, pipes, script keywords and functions, Unix file I/O in C, Unix system functions, terminal interfaces (termios, keyboard input, the curses library), memory management, file locking, dbm databases, make and source control basics, man pages, debugging with gdb, processes and signals, POSIX threads and synchronization, IPC and pipes, semaphores, queues and shared memory, sockets, Tcl basics, X Windows and GTK+ for GNOME, Perl basics, HTML and CGI, writing Unix device drivers.

http://rapidshare.com/files/76275463/0470147628.rar
2007-12-22 09:26
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
158
SQL Tutorials AiO

Includes:

- Inside Microsoft SQL Server 2000

- MCSE - SQL Server 2000 Design Study Guide

- Microsoft SQL Server 2000 - Database Design

- Microsoft SQL Server 2000 Programming by Example

- Microsoft SQL Server 2000 Weekend Crash Course

- Microsoft SQL Server Black Book

- Microsoft Training & Certification - SQL Server 2000 Admin

- MySQL and PHP Database Applications

- Mysql Server Manual

- MySQL.and.mSQL.eBook-EEn

http://rapidshare.com/files/78037617/SQL_TUTORIALS.rar

Password:Shumway
2007-12-22 09:28
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
159
McGraw Hill Oracle Automatic Storage Management Nov 2007 eBook-BBL

Oracle Automatic Storage Management: Under-the-Hood & Practical
Deployment Guide (c) by McGraw-Hill Osborne Media

The type of the release is: eBook
In the PDF format with ISBN: 0071496076 and Pub Date: November 05, 2007
The size of the release is: 02 disks x 2.88mb
And released on: 12/19/2007

Build and manage a scalable storage infrastructure with Oracle Automatic
Storage Management

Streamline data management and provisioning using Oracle Automatic
Storage Management (Oracle ASM) and the detailed information contained
in this exclusive Oracle Press resource. Written by a team of database
experts, Oracle Automatic Storage Management: Under-the-Hood & Practical
Deployment Guide explains how to build and maintain a dynamic, highly
available Oracle database storage environment. Inside, you'll learn how
to configure storage for Oracle ASM, build disk groups, use data
striping and mirroring, and optimize performance. You'll also learn how
to ensure consistency across server and storage platforms, maximize data
redundancy, and administer Oracle ASM from the command line.
- Manage Oracle ASM Instances and configure Oracle RDBMS instances to
leverage Oracle ASM
- Define, discover, and manage disk storage under Oracle ASM
- Create external, normal-redundancy, and high-redundancy disk groups
- Add and remove Oracle ASM storage without affecting RDMS instance
availability
- Learn how Oracle ASM provides even I/O distribution
- Work with Oracle ASM directories, files, templates, and aliases
- Improve storage performance and integrity using the ASMLIB API
- Simplify system administration with the Oracle ASM command line
interface
- Understand key internal Oracle ASM structures and algorithms

http://www.amazon.com/exec/obidos/tg/detail/-/0071496076/

http://www.ebookshare.net/download.php?id=4412
2007-12-22 22:42
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
160
200 Hacking Tutorials

http://rapidshare.com/files/79847102/200_Hacking_Tutorials.rar
2007-12-30 12:29
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
161
Google codes

Great e-book,about Google Secret codes.

http://rapidshare.com/files/71898733/Google_codes_by_TeRa-www.Balkan-Media.org.rar
2007-12-30 19:11
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
162
39 PC E-Books

Hackers Black Book
http://rapidshare.com/files/58644348/Hacker_s_Black_Book_by_MehiriyeT.rar

A_Buffer_Overflow_Study_-_Attacks_and_Defenses
Computer_Vulnerability
Crackproof_Your_Software_No_Starch
Credit_Card_Visa_Hack_Cambridge_Lab
Google_Hacking_for_Penetration_Tester__Syngress
http://rapidshare.com/files/58657160/PC_E_Book9_ENG-Ingilizce__by_MehiriyeT.rar

Hack_IT__Security_Through_Penetration_Testing__Addison_Wesley
Hack_Proofing_Your_Identity_in_the_Information_Age__Syngress
Hack_Proofing_Your_Network_-_Internet_Tradecraft__Syngress
Hacker_Disassembling_Uncovered__A_List
Hacker_s_Desk_Reference
Hackers Delight - Addison Wesley
http://rapidshare.com/files/58683808/PC_E_Book10_ENG-Ingilizce__by_MehiriyeT.rar

Hackers_Beware__NewRiders
Hackers_Delight__Addison_Wesley
Hacking Guide v3.1
Hacking_-_The_Art_of_Exploitation
Hacking_Exposed-_Network_Security_Secrets_and_Solutions__MCGraw-Hill
Hacking_Exposed-_Web_Applications__MCGraw-Hill
Hacking_Exposed-_Windows_2003_Chapter_5
http://rapidshare.com/files/58695776/PC_E_Book11_ENG-Ingilizce__by_MehiriyeT.rar

Hacking_for_Dummies__John_Wiley-2004
Hacking_Guide_v3.1
How_Thieves_Targeted_eBay_Users_but_Got_Stopped_Instead_Interhack
Malware_-_Fighting_Malicious_Code__Prentice_Hall
Maximum_Security__3rd_Edition_Sams
Maximum_Security_-A_Hackers_Guide_to__Protect_Your_Internet
Network Security
http://rapidshare.com/files/58728685/PC_E_Book12_ENG-Ingilizce__by_MehiriyeT.rar

O Reilly-PayPal Hacks
O Reilly-PC Hacks-2004
O'Reilly-Learning PHP
O'Reilly-Learning the UNIX Operating System
O'Reilly-MySQL Pocket Reference
O'Reilly-The Network Administration Guide
Practical_Study_Remote_Access__Cisco
http://rapidshare.com/files/58730563/PC_E_Book13_ENG-Ingilizce__by_MehiriyeT.rar

Secrets_To_Winning_Cash_Via_Online_Poker
Stealing_the_Network_How_to_Own_the_Box
The XP Files - Windows Hidden Tools for Secure Sharing Communication and Collaboration
The_Art_of_Deception_by_Kevin_Mitnick
The_Art_of_Intrusion
The_Complete_History_of_Hacking
http://rapidshare.com/files/58667232/PC_E_Book14_ENG-Ingilizce__by_MehiriyeT.rar
2007-12-31 20:50
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
163
Hacker Highschool

Description:

Hacker HighSchool - 13 E-book

01 Being a Hacker
02 Windows and Linux
03 Ports and Protocols
04 Services and Connections
05 System Identification
06 Malware
07 Attack Analysis
08 Forensics
09 Email Security
10 Web Security and Privacy
11 Passwords
12 Legalities and Ethics
13 TOC Glossary

http://w13.easy-share.com/13667171.html
2007-12-31 22:46
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
164
不错。。支持。。
2008-1-1 20:53
0
雪    币: 202
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
165
这些作为keywords在电驴中搜索还不错``支持
2008-1-5 15:14
0
雪    币: 493
活跃值: (23)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
166
支持一下,有用
2008-1-5 17:04
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
167
非常支持喔推
2008-1-8 19:13
0
雪    币: 1505
能力值: (RANK:210 )
在线值:
发帖
回帖
粉丝
168
一些电子书下载站点

http://www.ebookee.com ---强烈强烈的推荐
http://www.pdfchm.com ——pdf电子书(书很全,但一定要先登陆才能下载)
http://www.bookfitc.com/ ——强烈推荐!!
http://www.literature-free.com/ ——强烈推荐!!
http://www.spotbit.com/main/ ——推荐!
http://asiaing.com/index.php ——强烈推荐!!
http://www.freeclassicaudiobooks.com/
http://ebook.vopen.net/ ——国内站点!全部英文原版书籍!强烈推荐!!
http://www.ebooksheaven.org/
http://www.screenbooks.net/screenbook_library.html
http://freecomputerbooks.com/
http://www.bookrevyoo.com/
http://www.edu-tec.org/directorio/pages/E-Books/index.html
http://www.foresight.org/UTF/Unbound_LBW/
http://trh990.blogspot.com/index.html
http://www.giuciao.com/
http://www.ateus.net/ebooks/index.php
http://onlinebooks.library.upenn.edu/
http://www.gutenberg.org/wiki/Main_Page
http://www.memoware.com/
http://www.cafeconleche.org/ (编程的)
http://www.librodot.com/index.php
http://www.medicinainformacion.com/
http://www.bookwarez.org/ebooks.html
http://www.biblopia.com/
http://www.oebook.org/
http://www.33367.com
http://www.chipollo.info/modules.php?name=xNews&new_topic=27
http://www.xpressionsz.com/archives/category/magazine/
http://www.ebookshare.net/category/magazine/
http://avaxhome.ru/ebooks
http://digital.library.okstate.edu/OAS/ ——推荐!!
http://textual.net/access.gutenberg#H --TXT电子书
http://etext.lib.virginia.edu/ --TXT电子书
2008-1-8 22:02
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
169
bithaha:谢谢你的支持!

工具大礼包辛苦.
2008-1-8 22:52
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
170
Hacking books

(Ebook - Computer) Hacking The Windows Registry.pdf
(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf
(eBook pdf) Hacking into computer systems - a beginners guide.pdf
(ebook_-_pdf)_Hacking_IIS_Servers.pdf
A Beginners Guide To Hacking Computer Systems.pdf
amazon-hacks.chm
Attacking the DNS Protocol.pdf
Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf
bsd-hacks.pdf
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
Computer - Hackers Secrets - e-book.pdf
cracking-sql-passwords.pdf
Crc Press - The Hacker'S Handbook.pdf
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf
DangerousGoogle-SearchingForSecrets.pdf
database hacker handbook.chm
Dummies - Hack How To Create Keygens (1).pdf
ebay-hacks-100-industrial-strength-tips-and-tools.pdf
eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm
ethical hacking, student guide.pdf
excel-hacks.chm
google-hacks.pdf
Guide-to-Hacking-with-sub7 (1).doc
Hack IT Security Through Penetration Testing.pdf
Hack Proofing - Your Network - Internet Tradecraft.pdf
Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf
Hack Proofing Sun Solaris 8.pdf
Hack Proofing Your E-Commerce Site.pdf
Hack Proofing Your Identity In The Information Age.pdf
Hack Proofing Your Network Second Edition.pdf
Hack Proofing Your Network_First Edition.pdf
Hack Proofing Your Web Applications.pdf
Hacker Disassembling Uncovered.chm
hacker ethic.pdf
Hacker Linux Uncovered.chm
Hacker Web Exploitation Uncovered.chm
Hacker'S.Delight.chm
Hackers Beware.pdf
Hackers Secrets Revealed.pdf
Hackers Secrets.pdf
Hackers, Heroes Of The Computer Revolution.pdf
Hackers_Secrets.pdf
Hacker_s_Guide.pdf
Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf
Hacking - The Art of Exploitation.chm
Hacking Cisco Routers.pdf
Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition.pdf
Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1.pdf
Hacking For Dummies 1.pdf
Hacking For Dummies 2.pdf
Hacking For Dummies.pdf
Hacking GMail.pdf
Hacking IIS Servers.pdf
Hacking into computer systems - a beginners guide.pdf
hacking the windows registry .pdf
Hacking Windows XP.pdf
Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf
Hacking-Hacker's Guide.pdf
Hacking-Hackers Secrets Revealed.pdf
Hacking-Hugo Cornwall-The Hacker's Handbook .pdf
Hacking-The Hacker Crackdown.pdf
Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf
Hacking.Guide.V3.1.pdf
Hacking.nfo
Hacking.sfv
Hackproofing Oracle Application Server.pdf
Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm
Hack_IT_Security_Through_Penetration_Testing.chm
haking.txt
Halting.The.Hacker.A.Practical.Guide.To.Computer.Security.chm
How to Crack CD Protections.pdf
John Wiley & Sons - Hacking For Dummies.pdf
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook-DDU.pdf
linux-server-hacks.pdf
little_black_book_oc_computer_viruses.pdf
mac-os-hacks.chm
McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2.pdf
McGraw.Hacking.Exposed.Cisco.Networks.chm
McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eB.pdf
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-.pdf
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf
Mind Hacks - Tips & Tricks for Using Your Brain.chm
network-security-hacks.chm
No.Starch.Press.Hacking.The.Art.Of.Exploitation.chm
O'Reilly - Online Investing Hacks.chm
O'Reilly.-.Network.Security.Hacks.chm
O'Reilly.Windows.Server.Hack.chm
O'Reilly.Windows.Server.Hack.rar
online-investing-hacks.chm
OReilly Google Hacks, 1st Edition2003.pdf
OReilly - Google Hacks.pdf
Oreilly, Paypal Hacks (2004) Ddu.chm
OReilly,.IRC.Hacks.(2004).DDU.chm
OReilly.SQL.Hacks.Nov.2006.chm
OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm
O_Reilly_-_Windows_XP_Hacks.chm
PC Games - How to Crack CD Protection.pdf
Security and Hacking - Anti-Hacker Tool Kit Second Edition.chm
SoTayHacker1.0.chm
spidering-hacks.chm
SQL Hacks.chm
SQLInjectionWhitePaper.pdf
Syngress - Hacking a Terror Network. The Silent Threat of Covert Channels.pdf
Syngress -- Hack Proofing Your Wireless Network.pdf
Syngress Hack Proofing Your Identity in the Information Age.pdf
Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf
Syngress.Hack.the.Stack.Oct.2006.pdf
The Little Black Book Of Computer Virus.pdf
The_20Little_20Black_20Book_20of_20Computer_20Viruses.pdf
tivo-hacks.100-industrial-strength-tips-and-tools.pdf
u23_Wiley - Hacking GPS - 2005 - (By Laxxuss).pdf
Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm
Win XP Hacks oreilly 2003.chm
Windows Server Hacks.chm
WinXP SP1 Hack.pdf
Xbox-hack - AIM-2002-008.pdf
Yahoo.Hacks.Oct.2005.chm

http://rapidshare.com/files/82425846/Hacking.part01.rar
http://rapidshare.com/files/82442869/Hacking.part02.rar
http://rapidshare.com/files/82427993/Hacking.part02.rar
http://rapidshare.com/files/82445546/Hacking.part03.rar
http://rapidshare.com/files/82430177/Hacking.part03.rar
http://rapidshare.com/files/82432614/Hacking.part04.rar
http://rapidshare.com/files/82448319/Hacking.part04.rar
http://rapidshare.com/files/82451101/Hacking.part05.rar
http://rapidshare.com/files/82454225/Hacking.part06.rar
http://rapidshare.com/files/82457503/Hacking.part07.rar
http://rapidshare.com/files/82460913/Hacking.part08.rar
http://rapidshare.com/files/82464586/Hacking.part09.rar
http://rapidshare.com/files/82468340/Hacking.part10.rar
http://rapidshare.com/files/82471881/Hacking.part11.rar
http://rapidshare.com/files/82473464/Hacking.part12.rar
2008-1-10 15:27
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
171
Pro SQL Server 2005 Integration Services, Apress - sUppLeX

TITLE : Pro SQL Server 2005 Integration Services
TYPE : Computers & Internet/Database
AUTHOR : Jim Wightman (Author)
PUBLISHER : Apress
ISBN : 1590598970
PAGES : 548
EDITION : 1st
LANGUAGE : ENGLISH
RELEASE DATE : 8th Jan 2008
This book was NOT published on the 8th January. It was published in October 2007. Kindly use the correct publication date, not the date when you post it on Vdown. The dates are always checked.
Italia

MAKER : sUppLeX
PACKAGER : sUppLeX
SUPPLIER : sUppLeX
FORMAT : PDF
SIZE : 10.6 MB

RELEASE NOTES :
Book Description

SQL Server Integration Services is groundbreaking. It exists for both the DBA and the developer, as well as that new role SSIS has created between the two--the data artisan.

Pro SQL Server 2005 Integration Services contains everything you could ever hope to know about this exciting new development from Microsoft: developer insight, Microsoft group manager--level access, personal experience of using the technology in the real-world, and fine-grained analysis. If you want to rapidly gain knowledge and context from your data, Microsoft's latest and greatest interpretation of Enterprise Application Integration, SQL Server Integration Services, is for you. As part of the extensive SQL Server suite, Integration Services is a more serious and expandable interpretation of the integration paradigm than previously available. At once both simple to use yet incredibly complex, it goes far beyond being a reimagining and reengineering of DTS, and it's all presented in a familiar Visual Studio context. It's Agile, it's service-oriented, it's everything to everyone.

Written for the developer, the DBA, and the data artisan, Pro SQL Server 2005 Integration Services will show you how to develop and deploy enterprise SSIS solutions in multibillion-item environments. It's everything SSIS, explained for everyone!
What you'll learn

* Understand how to develop and deploy SSIS solutions that will perform in multibillion-item environments from an author who has been there and done it.
* Build bespoke custom components tailored to your project's exact requirements.
* Create perfomant and scalable solutions with an eye to future requirements and upgrades.

Who is this book for?

This book is for anyone working with SQL Server who has an interest in the Integration Services technology. Deep experience of SQL Server 2005 is not expected, however, you should be comfortable with fundamental techniques.

http://rapidshare.com/files/82206674/Apress.Pro.SQL.Server.2005.Integration.Services.RETAiL.eBOOk-sUppLeX.rar
2008-1-10 16:07
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
172
The Definitive Guide to the Microsoft Enterprise Library (Hardcover), RETAiL.Nov.2007.eBOOk-sUppLeX

TITLE : The Definitive Guide to the Microsoft Enterprise Library (Hardcover)
AUTHOR : by Keenan Newton (Author)
PUBLISHER : Apress publisher
ISBN : 1590596552
EDITION : 1st
PUB DATE : November 26, 2007
LANGUAGE : English
RLS DATE : 01/07/2008

MAKER : sUppLeX
SUPPLIER : sUppLeX
PACKAGER : sUppLeX
FORMAT : PDF
SIZE : 01 x 8.15 MB

[ R e l e a s e N o t e s ]

The Definitive Guide to the Microsoft Enterprise Library introduces one of the most
exciting and popular .NET-oriented initiatives, the Enterprise Library. The EL
offers nine classes of reusable code, or blocks, that are used to solve a variety
of common problem spaces. These problems cover a number of topics, including
configuration, data access, exception management, caching, application updates, UI
separation, asynchronous invocation, logging, security, and XML-based information
aggregation. Author Keenan Newton, a senior consultant for noted Microsoft Partner
Magenic, begins the book with an introduction to common challenges, explaining the
conditions that brought about the creation of the EL. After an EL overview,
subsequent chapters offer detailed information about each of the nine blocks. The
book concludes by outlining the framework available for creating custom application
blocks.

You'll be able to build .NET applications faster and more efficiently by taking
advantage of readily available code developed and released by Microsoft's Patterns
and Practices group. All book examples are based on a theme project that develops
a point-of-sale application for a cosmetics company. You will be introduced to these
technologies in conjunction with real-world scenarios.

URL: http://www.amazon.com/exec/obidos/tg/detail/-/1590596552/

http://rapidshare.com/files/82115197/1590596552.zip
2008-1-10 16:08
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
173
支持!
2008-1-10 20:23
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
174
Assembly Language Step-By-Step

Editorial Reviews
The publisher, John Wiley & Sons
Begins with the most fundamental, plain-English concepts and everyday analogies progressing to very sophisticated assembly principles and practices. Examples are based on the 8086/8088 chips but all code is usable with the entire Intel 80X86 family of microprocessors. Covers both TASM and MASM. Gives readers the foundation necessary to create their own executable assembly language programs.
Product Details

* Paperback: 432 pages
* Publisher: John Wiley & Sons (September 1992)
* Language: English
* ISBN-10: 0471578142
* ISBN-13: 978-0471578147
* Product Dimensions: 9.2 x 7.5 x 1 inches
* Shipping Weight: 1.7 pounds
* Average Customer Review: ***** based on 35 reviews.

http://rapidshare.com/files/55610178/John.Wiley.And.Sons.Assembly.Language.pdf
2008-1-10 21:30
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
175
Hacking Exposed - 2nd Edition

Author(s): Joel Scambray, Stuart MCClure..| Type: Hacking, Networking & Network Security | Pdf | English | Size: 7 Mb

Excellent book for the beginners–> A lot of computer-security textbooks approach the subject from a defensive point of view. “Do this, and probably you’ll survive a particular kind of attack,” they say. In refreshing contrast, Hacking Exposed, Second Edition talks about security from an offensive angle… This book tell you about Security vulnerabilities of operating systems, applications, and network devices, Administrative procedures that will help defeat them, Techniques for hacking Windows 95, Windows 98, Windows Me, Windows NT 4.0, Windows 2000, Novell NetWare, and Unix, Strategies for breaking into (or bringing down) telephony devices, routers, and firewalls..

Book Description:
When a tree falls in the forest and no one is around to hear it, it certainly makes a sound. But if a computer network has a security vulnerability and no one knows about it, is it insecure? Only the most extreme Berkeleian idealist might argue against the former, but the latter is not nearly so obvious.

A network with a security vulnerability is insecure to those who know about the vulnerability.If noone knows about it—if it is literally a vulnerability that has not been discovered—then the network is secure. If one person knows about it, then the network is insecure to him but secure to everyone else. If the network equipment manufacturer knows about it…if security researchers know about it…if the hacking community knows about it the insecurity of the network increasesas news of the vulnerability gets out.

Or does it? The vulnerability exists, whether or not anyone knows about it.Publishing a vulnerability does not cause the network to be insecure. To claim that would be confusing knowledge about a thing with the thing itself. Publishing increases the likelihood that an attacker will use the vulnerability, but not the severity of the vulnerability. Publishing also increases the likelihood that people can defend against the vulnerability. Just as an attacker can’t exploit a vulnerability he does not know about, a defender can’t protect against a vulnerability he does not know about.

So if keeping vulnerabilities secret increases security, it does so in a fragile way. Keeping vulnerabilities secret only works as long as they remain secret—but everything about information works toward spreading information. Some people spread secrets accidentally; others spread them on purpose. Sometimes secrets are re-derived by someone else. And once a secret is out, it can never be put back.

TABLE OF CONTENT:
Chapter 01 - Footprinting
Chapter 02 - Scanning
Chapter 03 - Enumeration
Chapter 04 - Hacking Windows 95/98 and ME
Chapter 05 - Hacking Windows NT
Chapter 06 - Hacking Windows 2000
Chapter 07 - Novell NetWare Hacking
Chapter 08 - Hacking UNIX
Chapter 09 - Dial-Up, PBX, Voicemail, and VPN Hacking
Chapter 10 - Network Devices
Chapter 11 - Firewalls
Chapter 12 - Denial of Service (DoS) Attacks
Chapter 13 - Remote Control Insecurities
Chapter 14 - Advanced Techniques
Chapter 15 - Web Hacking
Chapter 16 - Hacking the Internet User
Appendix A - Ports
Appendix B - Top 14 Security Vulnerabilities
Appendix C - About the Companion Web Site

http://www.ziddu.com/download.php?uid=Z62gnJ2uZqyanOKnZqqhkZSmY6uZnZuu6

http://w15.easy-share.com/14535791.html
2008-1-11 08:43
0
游客
登录 | 注册 方可回帖
返回
//