banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Messages posted by: sleeper  XML
Profile for sleeper Messages posted by sleeper [ number of posts not being displayed on this page: 2 ]
 

Đông Chí wrote:
Chào các bác, không biết em đặt yêu cầu này ở đây có thích hợp không, nếu không thích hợp thì nhờ các Mod move giùm vậy. Em đang cần cuốn "Trigonometry for dummies", cuốn này có rất nhiều ở các thư viện của nước ngoài, LC Call No của nó là: "QA531 .S783 2005", ISBN: 9780764569036. Bác nào học ở nước ngoài có cuốn này thì cho em xin với. Em xin chân thành cảm ơn. Nếu không thì sell cho em cũng được, nếu giá cả hợp lý thì em sẽ mua. Thân mến. 


Mary Jane Sterling, «Trigonometry Workbook For Dummies»
For Dummies | ISBN 0764587811 | 2005-07-08 | PDF | 2,5 Mb | 320 pages


http://rapidshare.com/files/114534/Trigonometry.Workbook.for.Dummies-0764587811.rar

MD5: e4784e0bacec7f9a17905f29f1cb8359

Book Description:

From angles to functions to identities — solve trig equations with ease

Got a grasp on the terms and concepts you need to know, but get lost halfway through a problem or worse yet, not know where to begin? No fear — this hands-on-guide focuses on helping you solve the many types of trigonometry equations you encounter in a focused, step-by-step manner. With just enough refresher explanations before each set of problems, you'll sharpen your skills and improve your performance. You'll see how to work with angles, circles, triangles, graphs, functions, the laws of sines and cosines, and more!

100s of Problems!

* Step-by-step answer sets clearly identify where you went wrong (or right) with a problem
* Get the inside scoop on graphing trig functions
* Know where to begin and how to solve the most common equations
* Use trig in practical applications with confidence

About the Author:

Mary Jane Sterling is also the author of Algebra For Dummies, Trigonometry For Dummies, Algebra Workbook For Dummies, Algebra I CliffStudySolver, and Algebra II CliffStudySolver (all published by Wiley). She has taught at Bradley University in Peoria, Illinois, for over 25 years.

Download from mirror on Depositfiles http://depositfiles.com/files/328737

chuot_jery wrote:
Hix, em đang muốn install con linux vào vmware để run nhưng con dell của em nó lại hỏng mất DVD, chưa có thời gian đi sửa mà install con linux thì lại đang cần, các bác giới thiệu cho em cách cài linux từ ổ cứng với (ổ ảo hoặc remote qua CD hoặc gì gì đó cũng được).

Em cài linux cũng chỉ muốn dùng ở commandline thui, lên bác nào biết link download con fedora (7, 8 ..) nhỏ nhỏ chỉ dùm em với nhé, vì hiện giờ em có mấy bộ cài linux rùi (mỗi bộ tầm 6 disk) nhưng cứ vài hôm là nó lại bị xước lên toàn hỏng thôi lên muốn kiếm con fedora nhỏ nhỏ vất vào máy thỉnh thoảng reinstall cho dễ.
 

Vào đây để download Fedora Core (version mấy tùy bạn quyết định): http://fedoraproject.org
Còn việc tiếp theo là cài đặt, bạn DÙNG GOOGLE ĐỂ SEARCH với từ khóa "CÀI ĐẶT LINUX TỪ Ổ CỨNG"
Eclipse Web Tools Platform: Developing Java(TM) Web Applications by Naci Dai
Publisher: Addison-Wesley Professional; 1 edition (May 31, 2007) | 752 Pages | ISBN: 0321396855 | PDF | 5.2 MB

Discover WTP, the New End-to-End Toolset for Java-Based Web Development

The Eclipse Web Tools Platform (WTP) seamlessly integrates all the tools today’s Java Web developer needs. WTP is both an unprecedented Open Source resource for working developers and a powerful foundation for state-of-the-art commercial products.

Eclipse Web Tools Platform offers in-depth descriptions of every tool included in WTP, introducing powerful capabilities never before available in Eclipse. The authors cover the entire Web development process–from defining Web application architectures and development processes through testing and beyond. And if you’re seeking to extend WTP, this book provides an introduction to the platform’s rich APIs. The book also

* Presents step-by-step coverage of developing persistence, business logic, and presentation tiers with WTP and Java
* Introduces best practices for multiple styles of Web and Java EE development
* Demonstrates JDBC database access and configuration
* Shows how to configure application servers for use with WTP
* Walks through creating Web service application interfaces
* Covers automated testing with JUnit and Cactus, and automated builds utilizing Ant, Maven, and CruiseControl
* Introduces testing and profiling Web applications with the Eclipse Test and Performance Tools Platform (TPTP) project
* Describes how to extend WTP with new servers, file types, and WSDL extensions

Foreword
Preface
Acknowledgments
About the Authors
Part I: Getting Started
Chapter 1: Introduction
Chapter 2: About the Eclipse Web Tools Platform Project
Chapter 3: Quick Tour
Chapter 4: Setting Up Your Workspace
Part II: Java Web Application Development
Chapter 5: Web Application Architecture and Design
Chapter 6: Organizing Your Development Project
Chapter 7: The Presentation Tier
Chapter 8: The Business Logic Tier
Chapter 9: The Persistence Tier
Chapter 10: Web Services
Chapter 11: Testing
Part III: Extending WTP
Chapter 12: Adding New Servers
Chapter 13: Supporting New File Types
Chapter 14: Creating WSDL Extensions
Chapter 15: Customizing Resource Resolution
Part IV: Products and Plans
Chapter 16: Other Web Tools Based on Eclipse
Chapter 17: The Road Ahead
Glossary
References
Index

This book is an invaluable resource for every Eclipse and enterprise Java Web developer: both those who use Eclipse to build other Web applications, and those who build Eclipse technologies into their own products.

Complete source code examples are available at www.eclipsewtp.org.


About the Author


Naci Dai, chief scientist and founder of eteration, a.s., is a member of the WTP project management committee, leads its JST subproject, and leads the Open Source Lomboz project, which was a part of the initial code contributed to WTP to seed the project.

Lawrence Mandel, a software architect and developer at at the IBM Toronto Laboratory, is a WTP committer and served as the project’s ecosystem and documentation lead up until the 1.5.2 release.

Arthur Ryman, software architect and development manager at the IBM Toronto Laboratory, has a decade’s experience building Java Web development tools. He led the creation of the WTP project, and led the WST subproject up until the release of WTP 1.5.

http://uploading.com/files/O1MVEPHF/eclipse-web-tools-platform.rar.html
http://www.file-rack.com/files/epXkfEXT9Z8B/eclipse-web-tools-platform.rar.html
http://d1.xlget.com/download/2369?language=english
http://www.megaupload.com/?d=62W1Z3RU
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition) by Massimo Tistarelli, Stan Z. Li, Rama Chellappa
Publisher: Springer | Number Of Pages: 423 | Publication Date: 2009-06 | ISBN-10: 1848823843 | PDF | 12 Mb

This comprehensive and innovative handbook covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. Features: Starts with a thorough introductory chapter; Provides topics from a range of different perspectives offered by an international collection of leading researchers in the field; Contains selected expanded contributions from the 5th IAPR International Summer School for Advanced Studies on Biometrics for Secure Authentication; Investigates issues of iris recognition, gait recognition, and touchless fingerprint recognition, as well as various aspects of face recognition; Discusses multibiometric systems, and machine learning techniques; Examines biometrics ethics and policy; Presents international standards in biometrics, including those under preparation. This state-of-the-art volume is designed to help form and inform professionals, young researchers, and graduate students in advanced biometric technologies.

http://depositfiles.com/files/cl6tsaylj
http://hotfile.com/dl/5104971/aebe6c4/Handbook_of_Remote_Biometrics.rar.html
http://www.uploading.com/files/6YO1KP22/Handbook_of_Remote_Biometrics.rar.html
http://www.filefactory.com/file/ag40bda/n/Handbook_of_Remote_Biometrics_rar

kieuviethuy wrote:
hi mọi người, xin các bác chỉ giúp e là nên dùng phần mềm anti-virus nào cho 1 con máy thường cài đặt winserver2003 nhỉ. Mình thấy có mấy cái nhưng cũng chẳng biết có ăn thua ko, một số cái miễn phí thì không dùng được cho server, một số thì fai crack. Mọi người, ai đã dùng cái nào thấy ok thì chỉ giáo cho mình với nhé.
tks! 

Đối với máy sử dụng windows server 2003 mình đề cử Symantec AntiVirus. Thiết lập các ứng dụng security chặt chẽ cũng hạn chế đáng kể việc nhiễm và lây lan virus malware các loại.
@tiuquy: mình có một quyển sách tặng bạn smilie

How to be a Programmer

Publisher: Samizdat Press | ISBN: N\A | edition 2003 | PDF | 58 pages | 1,4 mb

The text is primarily concerned with social situations and team relationships that occur in typical software development. The author tried to cover what he considers the essential, often non-techncial, skills of the beginning, intermediate and advanced programmer. To the beginner, it may be a peek into the culture of the software engineer; to the advanced programmer, it is an opinionated review.

http://uploading.com/files/4J8UXRAK/1096.rar.html
http://saveqube.com/getfile/012ad662965e13b27a057e39189275cb3abfcd3921c0c11f0e/1096.rar.html
http://www.filefactory.com/file/ag378g2/n/1096_rar%20
 
James F. Ransome PhD CISM CISSP, John Rittinghouse PhD CISM, "Voice over Internet Protocol (VoIP) Security "
Publisher: Digital Press | 2004 | 432 Pages | ISBN: 1555583326 | PDF | 2 MB

Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.
* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures
. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation.
* In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability.

http://uploading.com/files/9CCI5BYB/1555583326.zip.html
http://www.megaupload.com/?d=WW38OIA5
@ham_choi: mình khuyên bạn nên bớt lời đi một tí, cái gì đáng reply hãy reply không thì thôi.
WinHex 15.3 SR-1
6 mb | HF.COM / RS.COM

There was a new version of program WinHex is a universal editor in the sexadecimal system, especially useful in the field of computer examination, restoration of the data.


Data processing of low level and safety of an information technology. The advanced tool for everyday and emergency use which studies and edits all kinds of files, restores the destroyed files or the lost data from hard disks with the damaged file systems or from digital flash cards. The program gives the chance physical and logic editing of disks in formats FAT12, FAT16, FAT32, NTFS, and CDFS. Under Windows NT you even can edit contents of virtual memory of processes. Besides, the program allows to delete and rub clean from disks files without possibility of their restoration, to cancel and reserve any made changes, to cipher the data, to "clone" sectors, to generate random numbers.

http://hotfile.com/dl/4293382/a7b23d6/X_Ways_WinHex_15.3_SR_1.rar.html
http://rapidshare.com/files/238583214/X_Ways_WinHex_15.3_SR_1.rar.html

Angel_A wrote:
Chào các bạn!
Lâu lắm rồi mình mới quay lại diễn đàn... và mạo muổi đặt một câu hỏi hơi chuối một chút. Có ai biết và quan tâm tới vấn đề này thì vào tham gia thảo luận nhé! smilie  

Mình nghĩ là không.
PS: câu hỏi như thế này không nên gởi lên diễn đàn vì nó đã có rất nhiều người hỏi rồi và vấn đề này cũng không nên đặt trong Box Thảo luận bảo mật.
Charles Miller, Dino Dai Zovi "The Mac Hacker's Handbook"
Wiley | English | 2009-03-03 | ISBN: 0470395362 | 384 pages | PDF | 6,5 MB

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.

http://uploading.com/files/ILOSKEGW/0470395362.rar.html
http://rapidshare.com/files/238169994/0470395362.rar
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Rich Cannings, Himanshu Dwivedi, Zane Lackey
Publisher: McGraw-Hill Osborne Media; 1 edition (December 17, 2007) | 258 pages | ISBN: 0071494618 | 4.2 MB

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings.

* Plug security holes in Web 2.0 implementations the proven Hacking Exposed way
* Learn how hackers target and abuse vulnerable Web 2.0 applications, browsers, plug-ins, online databases, user inputs, and HTML forms
* Prevent Web 2.0-based SQL, XPath, XQuery, LDAP, and command injection attacks
* Circumvent XXE, directory traversal, and buffer overflow exploits
* Learn XSS and Cross-Site Request Forgery methods attackers use to bypass browser security controls
* Fix vulnerabilities in Outlook Express and Acrobat Reader add-ons
* Use input validators and XML classes to reinforce ASP and .NET security
* Eliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct Web Remoting, Sajax, and GWT Web applications
* Mitigate ActiveX security exposures using SiteLock, code signing, and secure controls
*
Find and fix Adobe Flash vulnerabilities and DNS rebinding attacks 



About the Author

Rich Cannings is a senior information security engineer at Google.

Himanshu Dwivedi is a founding partner of iSEC Partners, an information security organization, and the author of several security books.

Zane Lackey is a senior security consultant with iSEC Partners.

http://uploading.com/files/M0ID1GBI/9780071494618.rar.html
http://d1.xlget.com/download/1885?language=english
http://www.megaupload.com/?d=5EURPMN1

mrro wrote:

Đọc nhanh và mindmap chỉ là 1 phần nhỏ trong cuốn sách này. Em chỉ hận là mình đọc cuốn sách này muộn, k0 thì em vào ĐH lâu rồi. Sách hay thế này mà k0 đọc thì quá phí. Đọc xong cuốn này mà mình k0 ở No_1 ở mọi lĩnh vực thì phí sách quá
 


lol nếu mà chỉ đơn giản là đọc xong một cuốn sách thì sẽ làm trùm hết tất cả thì sẽ có quá trời thằng trùm, vậy thằng nào sẽ làm trùm của thằng nào đây? 

Thế nhất thiết phải phận định cho được ai là "trùm" sao?
Identity-Based Cryptography - Volume 2 Cryptology and Information Security Series
272 pages | IOS Press (December 15, 2008) | 1586039474 | PDF | 3 Mb

Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. Identity-Based Cryptography looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. Since research on the topic is still actively continuing, this is necessarily a snapshot of a field in motion, rather than the final word about it. Still, the authors felt the main concepts have by now sufficiently matured to collect them in a single dedicated volume.

http://paid4share.net/file/14662/9781586039479-1586039474-rar.html
http://depositfiles.com/files/ulz2c9osx
http://rapidshare.com/files/235841903/9781586039479-1586039474.rar
Distributed Systems Security: Issues, Processes and Solutions
by Abhijit Belapurkar, Anirban Chakrabarti, Harigopal Ponnapalli, Niranjan Varadarajan, Srinivas Padmanabhuni, Srikanth Sundarrajan
Publisher: Wiley (April 6, 2009) | 334 pages | ISBN: 0470519886 | PDF | 9.2 MB

How to solve security issues and problems arising in distributed systems.

Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new security problems and issues. Service oriented architectures, the Web, grid computing and virtualization – form the backbone of today’s distributed systems. A lens to security issues in distributed systems is best provided via deeper exploration of security concerns and solutions in these technologies.

Distributed Systems Security provides a holistic insight into current security issues, processes, and solutions, and maps out future directions in the context of today’s distributed systems. This insight is elucidated by modeling of modern day distributed systems using a four-tier logical model –host layer, infrastructure layer, application layer, and service layer (bottom to top). The authors provide an in-depth coverage of security threats and issues across these tiers. Additionally the authors describe the approaches required for efficient security engineering, alongside exploring how existing solutions can be leveraged or enhanced to proactively meet the dynamic needs of security for the next-generation distributed systems. The practical issues thereof are reinforced via practical case studies.

Distributed Systems Security:

* Presents an overview of distributed systems security issues, including threats, trends, standards and solutions.
* Discusses threats and vulnerabilities in different layers namely the host, infrastructure, application, and service layer to provide a holistic and practical, contemporary view of enterprise architectures.
* Provides practical insights into developing current-day distributed systems security using realistic case studies.

This book will be of invaluable interest to software engineers, developers, network professionals and technical/enterprise architects working in the field of distributed systems security. Managers and CIOs, researchers and advanced students will also find this book insightful.

http://uploading.com/files/KAD83Y4Q/9780470519882.rar.html
http://d1.xlget.com/download/1848?language=english
http://www.megaupload.com/?d=SNKGQ91A

TQN wrote:
Nhập gia tùy tục, nhập giang tùy khúc. Thắc mắc cái nỗi gì. Nhà người ta có luật của người ta, chứ có phải nhà mình đâu. 

Hì hì, có lẽ là một số bạn sinh hoạt ở HVA và thấy gắn bó, thân thiết nên nghĩ rẳng HVA là của mình, có trách nhiệm xây dựng, bảo vệ và phát triển HVA ngày càng hoàn thiện hơn. Nhưng chắc là do hơi "quá" nên cơ sự mới ra thế này.
@npkvk2005: hì, tôi đưa vào ý kiến đó vì nhận thấy rõ một điều là vấn đề tuy nhỏ những đã được làm "quá" lên.
Đừng nên dùng chữ "tuyệt đối" khi nói đến nội quy của một diễn đàn, quốc pháp mà còn phải sửa dài dài kia kìa.
Theo tôi thì các bác nên dĩ hòa vi quý thì hơn. Đi soi xét quá kỹ vào người khác thì lẽ đương nhiên là họ cũng sẽ làm vậy với ta.

PS: có một điều buồn cười là một số bạn cứ hễ ức chế một tý là quăng câu "... từ nay tôi không vào đây nữa..."

conmale wrote:

PS: anh luôn ghi nhớ 10 cái "tự" như sau:

nên chuộng: tự trọng, tự chủ, tự tin, tự túc và tự do
không nên chuộng: tự ti, tự ái, tự cao, tự mãn và tự... tử  

Nói hay quá. Nhưng mà theo tôi thì cái gì mà "quá" thì cũng hỏng.
Wesley J. Chun, "Core Python Programming"
Publisher: Prentice Hall PTR ; 1 edition 2000 | 766 Pages | ISBN: 0130260363 | PDF | 4.8 MB

A quick guide to everything anyone would want to know about the soaringly popular Internet programming language, Python. Provides an introduction to new features introduced in Python 1.6, and topics covered include regular expressions, extending Python, and OOP. Softcover.

* New to Python? This is the developer's guide to Python development!
* Learn the core features of Python as well as advanced topics such as regular expressions, multithreaded programming, Web/Internet and network development, GUI development with Tk(inter) and more
* Also includes features found in the new Python 1.6 and 2.0 releases

Python is an Internet and systems programming language that is soaring in popularity in today's fast-paced software development environment, and no wonder: it's simple (yet robust), object-oriented (yet can be used as a procedural language), extensible, scalable and features an easy to learn syntax that is clear and concise. Python combines the power of a compiled object language like Java and C++ with the ease of use and rapid development time of a scripting language. In fact, it's syntax is so easy to understand that you are more likely to pick it up faster than any of the other popular scripting languages in use today!

In Core Python Programming, Internet software engineer and technical trainer Wesley Chun provides intermediate and experienced developers all they need to know to learn Python-fast. Like all Core Series books, Core Python Programming delivers hundreds of industrial-strength code snippets and examples, all targeted at professional developers who want to leverage their existing skills! In particular, Core Python Programming presents numerous interactive examples that can be entered into the Python interpreter right in front of you! Finally, we present a chapter that shows you step-by-step how to extend Python using C or C++.

* Python syntax and style
* Development and Run-time Environments
* Objects and Python memory management
* Standard data types, methods, and operators
* Loops and conditionals
* Files and Input/Output
* Exceptions and error handling
* Functions, scope, arguments, and functional programming
* Importing modules and module attributes
* Object-oriented Programming with classes, methods, and instances
* Callable Objects
* Extending Python

Coverage of the Python standard module library and client-server application development includes comprehensive introductions to the following topics in Python programming:
* Regular expressions
* TCP/IP and UDP/IP Network programming using sockets
* Operating system interface
* GUI development with Tk using Tkinter
* Multithreaded programming
* Interactive Web/CGI/Internet applications
* Executing code in a restricted environment
* Inheritance, type emulation, operator overloading, and delegation in an OOP environment

Finally, we provide an introduction to the new features introduced in Python 1.6. These include Unicode string support, the new function invocation syntax which lets the caller provide a tuple of positional arguments and/or a dictionary of keyword arguments, and the new string methods. We also provide a glimpse into features that will only be found in the newer 2.0 release.

Every Core Series book:
* DEMONSTRATES how to write commercial-quality code
* FEATURES dozens of programs and examples!
* FOCUSES on the features and functions most important to real developers
* PROVIDES objective, unbiased coverage of cutting-edge technologies-no
* hype!

Core Python Programming delivers:
* Coverage of the core parts of the Python language
* Real-world insights for developing Web/Internet, network, multithreaded and GUI applications
* Tables and charts detailing Python modules, built-in functions, operators, and attributes
* Code snippets to try live with Python's interactive interpreter, hammering the concepts home
* Extensive code examples-including several complete sample applications

http://uploading.com/files/BS4A933K/wesley_chun_core_python_programming(eng).rar.html
http://www.megaupload.com/?d=L2GVTL44
- Kiểm tra xem có nhiễm virut hay spyware không.
- Có triệu chứng hay thông báo lỗi nào từ windows không? (xem trong Event Viewer)
- Kiểm tra cáp HDD.
- Cần chắc chắn rằng cả 2 thanh RAM đó vẫn còn sống.
- Kiểm tra xem có sự xung đột giữa các phần mềm mới cài đặt vào máy không.
Hacking Exposed Cisco Networks (Hacking Exposed) by Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky

Publisher: McGraw-Hill Osborne Media; 1 edition (December 15, 2005) | ISBN-10: 0072259175 | CHM | 10 Mb | 400 pages

Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.

http://www.uploading.com/files/CF9XXKN3/ebook.Hacking_Exposed._Cisco_Networks_Ci...zip.html

http://depositfiles.com/files/mp5l9ktgp

http://www.filefactory.com/file/aghdg7e/n/ebook_Hacking_Exposed_Cisco_Networks_Cisco_Security_Secrets_and_Solutions_Hacking_0072259175_zip

==============

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition by Joel Scambray
Publisher: McGraw-Hill Osborne Media; 3 edition (December 4, 2007) | 451 pages | ISBN: 007149426X | PDF | 4.9 MB

The latest Windows security attack and defense strategies
"Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to:

*
Establish business relevance and context for security by highlighting real-world risks
* Take a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoided
* Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems
* Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques
* Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable services
* See up close how professional hackers reverse engineer and develop new Windows exploits
* Identify and eliminate rootkits, malware, and stealth software
* Fortify SQL Server against external and insider attacks
* Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats
* Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomization


About the Author

Joel Scambray, CISSP, is Chief Strategy Officer at Leviathan Security Group (leviathansecurity.com). His nearly 15 years of information security experience encompasses roles as a corporate leader (senior management positions at Microsoft and Ernst & Young), entrepreneur (co-founder of Foundstone), successful technical consultant for Fortune 500 firms, and internationally recognized speaker and author of multiple security books, including all five editions of Hacking Exposed: Network Security Secrets & Solutions.

Stuart McClure, CISSP, an independent computer security consultant, is one of today's leading authorities on information security. He was SVP of Global Threats and Research for McAfee where he led an elite global security team fighting the most vicious cyber attacks ever seen. Stuart is the coauthor of multiple security books, including all five editions of Hacking Exposed: Network Security Secrets & Solutions.

http://uploading.com/files/HOVAQ410/McGraw_Hill_HacWind_3rd_Edition_Dec_2007.rar.html
http://d1.xlget.com/download/1544?language=english
http://www.megaupload.com/?d=MEZ0KQXC

==================

Hacking Exposed Linux, 3rd Edition by ISECOM

Publisher: McGraw-Hill Osborne Media; 3 edition (July 15, 2008) | 614 pages | ISBN: 0072262575 | PDF | 5.6 MB

The Latest Linux Security Solutions

This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.

*
Secure Linux by using attacks and countermeasures from the latest OSSTMM research
*
Follow attack techniques of PSTN, ISDN, and PSDN over Linux
*
Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
*
Block Linux signal jamming, cloning, and eavesdropping attacks
*
Apply Trusted Computing and cryptography tools for your best defense
*
Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
*
Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
*
Find and repair errors in C code with static analysis and Hoare Logic



About the Author

ISECOM (Institute for Security and Open Methodologies) is an open, nonprofit security research organization established in January 2001 with the mission to make sense of security. The research project team involved in the making of this book is also involved in other ISECOM projects such as the Open Source Security Testing Methodology Manual, Hacker Highschool, and the professional security certifications and trainings: OPST, OPSA, OPSE, and OWSE.

http://uploading.com/files/Q8CITPLB/McGraw_Hill_Hacking_Exposed_Linux_Third_Edition_Jul_2008_eBook-DDU.rar.html
http://d1.xlget.com/download/1542?language=english
http://www.megaupload.com/?d=KPFSNKDZ
Computer Security: Art and Science

Matt Bishop, "Computer Security: Art and Science"
Addison-Wesley Professional | 2002 | ISBN: 0201440997 | 1136 pages | PDF | 2,6 MB


"This is an excellent text that should be read by every computer security professional and student."
—Dick Kemmerer, University of California, Santa Barbara.

"This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!"
—Marvin Schaefer, Former Chief Scientist, National Computer Security Center, NSA

This highly anticipated book fully introduces the theory and practice of computer security. It is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference filled with valuable information for even the most seasoned practitioner. In this one extraordinary volume the author incorporates concepts from computer systems, networks, human factors, and cryptography. In doing so, he effectively demonstrates that computer security is an art as well as a science.

Computer Security: Art and Science includes detailed discussions on:
The nature and challenges of computer security
The relationship between policy and security
The role and application of cryptography
The mechanisms used to implement policies
Methodologies and technologies for assurance
Vulnerability analysis and intrusion detection

Computer Security discusses different policy models, and presents mechanisms that can be used to enforce these policies. It concludes with examples that show how to apply the principles discussed in earlier sections, beginning with networks and moving on to systems, users, and programs.

This important work is essential for anyone who needs to understand, implement, or maintain a secure network or computer system.
Download:
http://uploading.com/files/671FE6WG/CoSecuArt.zip.html
http://depositfiles.com/files/370c876rv
http://www.megaupload.com/?d=5803VA2V

======================

Computer Security Basics

Rick Lehtinen, G.T. Gangemi, "Computer Security Basics"
O'Reilly Media, Inc.; 2 ed | 2006 | ISBN: 0596006691 | 310 pages | CHM | 1,6 MB


This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.

This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.
Topics include:
Computer security concepts
Security breaches, such as viruses and other malicious programs
Access controls
Security policy
Web attacks
Communications and network security
Encryption
Physical security and biometrics
Wireless network security
Computer security and requirements of the Orange Book
OSI Model and TEMPEST

Download:
http://uploading.com/files/ER06OQMK/CompSecBas.rar.html
http://depositfiles.com/files/ooq9p8smf
http://rapidshare.com/files/227770042/CompSecBas.rar

mrdeath wrote:
Chào cả nhà!

Em không biết post vấn đề này vào đấy có hợp lí không, nếu ko đúng thì move topic hộ em nhé. Em muốn hỏi là có bác nào đã tham gia viết phần mềm hay một cái gì đại loại như thế trong việc chống spam cho mail server chưa? có thể chỉ cho em về cơ chế (chi tiết) để thực hiện việc này ko? cảm ơn các bác. mong sớm nhận đc reply smilie 

Google với từ khóa chống spam mail hoặc anti spam mail.

PS: đặt title rõ ràng một chút kẻo mods phàn nàn.
Google với từ khóa Nodenable.exe
Híc, sao phải tìm ra "nó" là cái gì nhỉ trong khi clear "nó" quá dễ dàng smilie
Mình võ đoán là đề tài của bạn là nghiên cứu về các giải thuật mã hóa mật khẩu trên nền windows.
@kamikazeq: lolz không biết thì đừng có khuyên càn.
@satzoom: bạn nên bình tĩnh, thử ngắt mạng, tắt System Restore rồi dùng đĩa Hiren Boot(phiên bản mới nhất nhé) quét virus xem sao.

Chào bác Defender. Tui cũng đang có 1 việc giống bác đấy.
Bác cho em xin ít kinh nghiệm nhá.

Hy vọng là tôi cũng được sự quan tâm hướng dẫn như bác.
 
Go to Page:  First Page Page 1 2 3 4

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|