Thoroughly revised for the latest release of the Certified Ethical Hacker (CEH) v8 certification exam
Fully updated for the CEH v8 exam objectives, this comprehensive guide offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the CEH exam. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference.
Covers all exam topics, including:
Introduction to ethical hacking
Reconnaissance and footprinting
Scanning and enumeration
Sniffing and evasion
Attacking a system
Hacking web servers and applications
Wireless network hacking
Trojans and other attacks
Social engineering and physical security
Electronic content includes:
Hundreds of practice questions
Test engine that provides customized exams by chapter
PDF copy of the book
Download các bạn vào trang này:
Site này đã update link
EC-Council | Press là một dự án tiếp cận cộng đồng, được hội đồng Châu Âu bắt đầu vào năm 2009 với sự hợp tác của Cengage Learning. EC-Council và đội ngũ tại Cengage đã làm việc siêng năng để chuyển các chứng chỉ và nội dung toàn cầu hàng đầu từ EC-Council thành nội dung học tập với tất cả các tính năng sư phạm trong các cuốn Sách giáo khoa học thuật kinh điển. Các chủ đề của EC-Council press được thiết kế với sự hỗ trợ của các giáo sư hàng đầu bao gồm các ngân hàng câu hỏi và bài tập giao cho lớp học, các tập tin hướng dẫn, Lab Hướng dẫn và Tài nguyên học tập khác. Mô hình mẫu phát triển các khóa học và được công nhận toàn cầu được cung cấp bởi các dịch vụ của Cengage.
EC-council press được thiết kế để đạt được mục tiêu học tập của các kỳ thi chứng chỉ EC-Council trong một môi trường học thuật. Mỗi lĩnh vực được phân loại là một "Series", mỗi series sau đó được chia thành các cuốn sách. Xem dưới đây một danh sách các chủ đề:
Ethical Hacking and Countermeasures
Để down về đầy đủ bộ sách này, các bạn vào đây down nhé:
có link box.com còn live
Quyển thứ năm:
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.
- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.
- Data-mine popular social media websites and evade modern anti-virus.
Quyển thứ tư:
The Hacker Playbook: Practical Guide To Penetration Testing
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.
Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software.
From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.
Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
Quyển thứ ba:
Hacking For Dummies, 4th Edition
The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.
More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.
Guides you through the techniques and tools you need to stop hackers before they hack you
Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux
Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place
If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.
Quyển thứ hai:
Practical Malware Analysis
There are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid introduction to the tools and methods used to dissect malicious software (malware), showing readers how to discover, debug, and disassemble these threats. The book goes on to examine how to overcome the evasive techniques?stealth, code obfuscation, encryption, file packing, and others?that malware author.
Hiện nay mình có rất nhiều sách mới trên amazon, chia sẻ cho anh em để nâng cao trình độ. Mỗi ngày mình sẽ share một quyển
Quyển thứ nhất:
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.
The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.
Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples
Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques
Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step
Demystifies topics that have a steep learning curve
Includes a bonus chapter on reverse engineering tools
Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
English | PDF | Collection | 1.836 Gb
Addison-Wesley Professional The Android Developer's Cookbook.pdf
Android 3.0 Animations - Beginner's Guide - A. Shaw (Packt, 2011) WW.pdf
Android 3.0 Application Development Cookbook - K. Mew (Packt, 2011) WW.pdf
Android Application Development for Dummies - D. Felker (Wiley, 2011).pdf
Android Application Development.chm
Android Apps for Absolute Beginners - W. Jackson (Apress) WW.pdf
Android Cookbook - I. Darwin, et al., (O'Reilly, 2011) WW.pdf
Android Essentials - Chris Haseman.pdf
Android Forensics - A. Hoog (Syngress, 2011) WW.pdf
Android Fully Loaded - R. Huddleston (Wiley, 2011) WW.pdf
Android in Action 2nd ed - W. Ableson (Manning, 2011) WW.pdf
Android in Action 3rd ed. - F. Ableson, et. al., (Manning, 2012) WW.pdf
Android in Practice - C. Collins, et al., (Manning, 2012) WW.pdf
Android Magazin 01-2012 Januar-Februar.pdf
Android Programming Tutorials - M. Murphy (CommonsWare, 2009-2011) WW.pdf
ANDROID USER 01-2012 Januar Deutsch.pdf
Android User Interface Development - Beginners Guide - J. Morris (Packt, 2011) WW.pdf
Android Welt 2012-01.pdf
Android Wireless Application Development Second Edition 2010.pdf
APress - Pro Android 2 (03-2010) (ATTiCA).pdf
Apress - Pro Android 2.pdf
Apress - Pro Android Games (December 2009) (ATTiCA).pdf
Apress - Pro Android Media Developing Graphics, Music, Video, and Rich Media Apps for Smartphones and Tablets.pdf
APress Android Apps for Absolute Beginners.pdf
APress Android Recipes A Problem-Solution Approach.pdf
APress Beginning Android 3.pdf
APress Beginning Android.pdf
APress Practical Android Projects.pdf
APress Pro Android Media.pdf
APress Pro Android Web Apps.pdf
Apress- Pro Android Web Apps.pdf
Beginning Android Application Development wrox.pdf
Beginning Android Application Development.pdf
Beginning Android Games - M. Zechner (Apress) WW.pdf
Beginning Android Tablet Application Development - W. Lee (Wrox, 2011) WW.pdf
Beginning Android Tablet Application Development-Slicer.pdf
Best Android Apps - The Guide for Discriminating
Chip Spezial 2012 - Das ultimative iPad Handbuch.pdf
Developing Android Applications With Flex 4.5 - R. Tretola (O'Reilly, 2011) WW.pdf
Digital People - From Bionic Humans to Androids - S. Perkowitz (2004) WW.pdf
Elsevier-Flash Mobile Developing Android and iOS Applications 2011.pdf
Flash Mobile Developing Mobile Apps Using ActionScript.pdf
Focal Press Flash Mobile Developing Android and iOS Applications.pdf
Google on the Go - Using an Android-Powered Mobile Phone (John Eddy) (Malestrom).chm
Hello, Android 2nd Edition (November 2009) (ATTiCA).pdf
Manning Android in Action 2nd.pdf
Manning Unlocking Android.pdf
Mark L. Murphy - The Busy Coder's Guide to Android Development, Version 3.6 - 2011.pdf
Matthew David - Flash Mobile Developing Android and iOS Applications - 2011.pdf
OReilly - Learning Android.pdf
OReilly Developing Android Applications with Adobe AIR.pdf
OReilly Developing Android Applications with Flex 4.5.pdf
OReilly-Developing Android Applications with Flex 4.5 2011 .pdf
Packt Publishing Android User Interface Development Beginner's Guide.pdf
Packt Publishing Flash Development for Android Cookbook.pdf
Pearson-The Android Developers Cookbook Building Applications with the Android SDK 2010.pdf
Practical Android Projects.pdf
Pro Android - Sayed Y. Hashimi.pdf
Pro Android 3 - S. Komatineni, et al., (Apress, 2011) WW.pdf
Pro Android Flash - S. Chin, et al., (Apress, 2011) WW.pdf
Professional Android 2 Application Development (2010).pdf
Professional Android Application Development (Wrox Programmer to Programmer).pdf
Professional Android Application Development - Reto Meier.pdf
Sams Teach Yourself Android Application Development in 24 Hours (7Summits).pdf
Sams Teach Yourself Android Application Development in 24 Hours 2010.pdf
Teach Yourself Android App. Devel. in 24 Hours 2nd ed - L. Darcey, S. Conder (SAMS, 2012) WW.pdf
Tech & Learning Magazine-July 2011.pdf
The Android Developer's Cookbook (7Summits).pdf
The Busy Coder's Guide to Adv. Android Development - M. Murphy (CommonWare, 2011) WW.pdf
The Busy Coder's Guide to Advanced Android Development.pdf
The Complete Guide to Google Android (7Summits).pdf
Veronique Brossier - Developing Android Applications with Adobe AIR - 2011.pdf
Wei-Meng Lee - Beginning Android Application Development - 2011.pdf
Wiley Amazing Android Apps for DUMmIES.pdf
Wiley Android Application Development for DUMmIES.pdf
Wiley Android Development with Flash Your Visual BluePrint.pdf
Wiley Android Development with Flash.pdf
Wiley Beginning Android Application Development.pdf
Wiley Professional Android 2 Application Development.pdf
Wiley Professional Android Application Development.pdf
Windows Phone 7 Programming for Android and iOS Developers - Z. Zhou, et al., (Wrox, 2011) WW.pdf
Wrox - Professional Flash Mobile Development-Creating Android and iPhone Applications.pdf
Wrox Press Professional Android Application Development(2009)BBS.pdf
Wrox Press Professional Android Application Development.pdf
1,Jeff Atwood, "Effective Programming: More Than Writing Code"
ISBN: 147830054X | 2012 | EPUB/MOBI | 278 pages | 5 MB/4 MB
Jeff Atwood began the Coding Horror blog in 2004, and is convinced that it changed his life. He needed a way to keep track of software development over time - whatever he was thinking about or working on. He researched subjects he found interesting, then documented his research with a public blog post, which he could easily find and refer to later. Over time, increasing numbers of blog visitors found the posts helpful, relevant and interesting. Now, approximately 100,000 readers visit the blog per day and nearly as many comment and interact on the site. Effective Programming: More Than Writing Code is your one-stop shop for all things programming. Jeff writes with humor and understanding, allowing for both seasoned programmers and newbies to appreciate the depth of his research. From such posts as "The Programmer's Bill of Rights" and "Why Cant Programmers... Program?" to "Working With the Chaos Monkey," this book introduces the importance of writing responsible code, the logistics involved, and how people should view it more as a lifestyle than a career. TABLE OF CONTENTS - Introduction - The Art of Getting ~love~ Done - Principles of Good Programming - Hiring Programmers the Right Way - Getting Your Team to Work Together - The Batcave: Effective Workspaces for Programmers - Designing With the User in Mind - Security Basics: Protecting Your Users' Data - Testing Your Code, So it Doesn't Suck More Than it Has To - Building, Managing and Benefiting from a Community - Marketing Weasels and How Not to Be One - Keeping Your Priorities Straight EXCERPT FROM THE BOOK As a software developer, you are your own worst enemy. The sooner you realize that, the better off you'll be.I know you have the best of intentions. We all do. We're software developers; we love writing code. It's what we do. We never met a problem we couldn't solve with some duct tape, a jury-rigged coat hanger and a pinch of code. But Wil Shipley argues that we should rein in our natural tendencies to write lots of code: The fundamental nature of coding is that our task, as programmers, is to recognize that every decision we make is a trade-off. To be a master programmer is to understand the nature of these trade-offs, and be conscious of them in everything we write.In coding, you have many dimensions in which you can rate code: Brevity of codeFeaturefulnessSpeed of executionTime spent codingRobustnessFlexibility Now, remember, these dimensions are all in opposition to one another. You can spend three days writing a routine which is really beautiful and fast, so you've gotten two of your dimensions up, but you've spent three days, so the "time spent coding" dimension is way down.So, when is this worth it? How do we make these decisions? The answer turns out to be very sane, very simple, and also the one nobody, ever, listens to: Start with brevity. Increase the other dimensions as required by testing. I couldn't agree more. I've given similar advice when I exhorted developers to Code Smaller. And I'm not talking about a reductio ad absurdum contest where we use up all the clever tricks in our books to make the code fit into less physical space. I'm talking about practical, sensible strategies to reduce the volume of code an individual programmer has to read to understand how a program works. Here's a trivial little example of what I'm talking about: if (s == String.Empty)if (s == "") It seems obvious to me that the latter case is... ...buy the book to read more!
2,Kevlin Henney, "97 Things Every Programmer Should Know: Collective Wisdom from the Experts"
English | 2010 | ISBN-10: 0596809484 | EPUB, MOBI | 258 pages | 3,4 + 3,7 MB
Tap into the wisdom of experts to learn what every programmer should know, no matter what language you use. With the 97 short and extremely useful tips for programmers in this book, you'll expand your skills by adopting new approaches to old problems, learning appropriate best practices, and honing your craft through sound advice.
With contributions from some of the most experienced and respected practitioners in the industry--including Michael Feathers, Pete Goodliffe, Diomidis Spinellis, Cay Horstmann, Verity Stob, and many more--this book contains practical knowledge and principles that you can apply to all kinds of projects.
A few of the 97 things you should know:
"Code in the Language of the Domain" by Dan North
"Write Tests for People" by Gerard Meszaros
"Convenience Is Not an -ility" by Gregor Hohpe
"Know Your IDE" by Heinz Kabutz
"A Message to the Future" by Linda Rising
"The Boy Scout Rule" by Robert C. Martin (Uncle Bob)
"Beware the Share" by Udi Dahan
3,Stefan M. Moser, Po-Ning Chen, "A Student's Guide to Coding and Information Theory"
2012 | ISBN-10: 1107015839, 1107601967 | 206 pages | PDF | 7 MB
This easy-to-read guide provides a concise introduction to the engineering background of modern communication systems, from mobile phones to data compression and storage. Background mathematics and specific engineering techniques are kept to a minimum so that only a basic knowledge of high-school mathematics is needed to understand the material covered. The authors begin with many practical applications in coding, including the repetition code, the Hamming code and the Huffman code. They then explain the corresponding information theory, from entropy and mutual information to channel capacity and the information transmission theorem. Finally, they provide insights into the connections between coding theory and other fields. Many worked examples are given throughout the book, using practical applications to illustrate theoretical definitions. Exercises are also included, enabling readers to double-check what they have learned and gain glimpses into more advanced topics, making this perfect for anyone who needs a quick introduction to the subject.
4,Victor Pankratius, "Fundamentals of Multicore Software Development"
English | ISBN: 143981273X | 2012 | PDF | 330 pages | 4 MB
With multicore processors now in every computer, server, and embedded device, the need for cost-effective, reliable parallel software has never been greater. By explaining key aspects of multicore programming, Fundamentals of Multicore Software Development helps software engineers understand parallel programming and master the multicore challenge.
Accessible to newcomers to the field, the book captures the state of the art of multicore programming in computer science. It covers the fundamentals of multicore hardware, parallel design patterns, and parallel programming in C++, .NET, and Java. It also discusses manycore computing on graphics cards and heterogeneous multicore platforms, automatic parallelization, automatic performance tuning, transactional memory, and emerging applications.
As computing power increasingly comes from parallelism, software developers must embrace parallel programming. Written by leaders in the field, this book provides an overview of the existing and up-and-coming programming choices for multicores. It addresses issues in systems architecture, operating systems, languages, and compilers.
5,Maureen Sprankle, Jim Hubbard - Problem Solving and Programming Concepts (9th Edition)
Published: 2011-03-05 | ISBN: 0132492644 | PDF | 512 pages | 3 MB
Problem Solving and Programming Concepts, 9/e, is a core or supplementary text for one-semester, freshman/sophomore-level introductory courses taken by programming majors in Problem Solving for Programmers, Problem Solving for Applications, any Computer Language Course, or Introduction to Programming.
Revised to reflect the most current issues in the programming industry, this widely adopted text emphasizes that problem solving is the same in all computer languages, regardless of syntax. Sprankle and Hubbard use a generic, non-language-specific approach to present the tools and concepts required when using any programming language to develop computer applications. Designed for students with little or no computer experience — but useful to programmers at any level — the text provides step-by-step progression and consistent in-depth coverage of topics, with detailed explanations and many illustrations.
6,Mike McShaffry, David Graham, "Game Coding Complete, 4th Edition"
ISBN: 1133776574 | 2012 | PDF | 960 pages | 7 MB
Welcome to Game Coding Complete, Fourth Edition, the newest edition of the essential, hands-on guide to developing commercial-quality games. Written by two veteran game programmers, the book examines the entire game development process and all the unique challenges associated with creating a game. In this excellent introduction to game architecture, you'll explore all the major subsystems of modern game engines and learn professional techniques used in actual games, as well as Teapot Wars, a game created specifically for this book. This updated fourth edition uses the latest versions of DirectX and Visual Studio, and it includes expanded chapter coverage of game actors, AI, shader programming, LUA scripting, the C# editor, and other important updates to every chapter. All the code and examples presented have been tested and used in commercial video games, and the book is full of invaluable best practices, professional tips and tricks, and cautionary advice.
7,Ron Roth, "Introduction to Coding Theory"
2006 | ISBN-10: 0521845041 | 580 pages | PDF | 5,5 MB
Error-correcting codes constitute one of the key ingredients in achieving the high degree of reliability required in modern data transmission and storage systems. This book introduces the reader to the theoretical foundations of error-correcting codes, with an emphasis on Reed-Solomon codes and their derivative codes. After reviewing linear codes and finite fields, Ron Roth describes Reed-Solomon codes and various decoding algorithms. Cyclic codes are presented, as are MDS codes, graph codes, and codes in the Lee metric. Concatenated, trellis, and convolutional codes are also discussed in detail.
8,Regular Expression Pocket Reference: Regular Expressions for Perl, Ruby, PHP, Python, C, Java and .NET, 2nd edition
by Tony Stubblebine
English | 2007 | ISBN: 0596514271 | 126 pages | PDF | 1.26 MB
This concise and easy-to-use reference puts a very powerful tool for manipulating text and data right at your fingertips. Composed of a mixture of symbols and text, regular expressions can be an outlet for creativity, for brilliant programming, and for the elegant solution. Regular Expression Pocket Reference offers an introduction to regular expressions, pattern matching, metacharacters, modes and constructs, and then provides separate sections for each of the language APIs, with complete regex listings including:
* Supported metacharacters for each language API
* Regular expression classes and interfaces for Ruby, Java, .NET, and C#
* Regular expression operators for Perl 5.8
* Regular expression module objects and functions for Python
* Pattern-matching functions for PHP and the vi editor
* Unicode Support for each of the languages
With plenty of examples and other resources, Regular Expression Pocket Reference summarizes the complex rules for performing this critical text-processing function, and presents this often-confusing topic in a friendly and well-organized format. This guide makes an ideal on-the-job companion.
9,Ian Sommerville, "Software Engineering (9th Edition)"
English | 2010 | ISBN: 0137035152 | 792 pages | PDF | 13,8 MB
Intended for a sophomore/junior level course in software engineering.
The ninth edition of Software Engineering presents a broad perspective of software engineering, focusing on the processes and techniques fundamental to the creation of reliable, software systems. Increased coverage of agile methods and software reuse, along with coverage of 'traditional' plan-driven software engineering, gives readers the most up-to-date view of the field currently available. Practical case studies, a full set of easy-to-access supplements, and extensive web resources make teaching the course easier than ever.
The book is now structured into four parts:
1: Introduction to Software Engineering
2: Dependability and Security
3: Advanced Software Engineering
4: Software Engineering Management
10,Structured Parallel Programming: Patterns for Efficient Computation By Michael McCool, James Reinders, Arch Robison
2012 | 432 Pages | ISBN: 0124159931 | PDF | 5 MB
Programming is now parallel programming. Much as structured programming revolutionized traditional serial programming decades ago, a new kind of structured programming, based on patterns, is relevant to parallel programming today. Parallel computing experts and industry insiders Michael McCool, Arch Robison, and James Reinders describe how to design and implement maintainable and efficient parallel algorithms using a pattern-based approach. They present both theory and practice, and give detailed concrete examples using multiple programming models. Examples are primarily given using two of the most popular and cutting edge programming models for parallel programming: Threading Building Blocks, and Cilk Plus. These architecture-independent models enable easy integration into existing applications, preserve investments in existing code, and speed the development of parallel applications. Examples from realistic contexts illustrate patterns and themes in parallel algorithm design that are widely applicable regardless of implementation technology.
The patterns-based approach offers structure and insight that developers can apply to a variety of parallel programming models
Develops a composable, structured, scalable, and machine-independent approach to parallel computing
Includes detailed examples in both Cilk Plus and the latest Threading Building Blocks, which support a wide variety of computers
11,The Art of Multiprocessor Programming, Revised Reprint By Maurice Herlihy, Nir Shavit
2012 | 536 Pages | ISBN: 0123973376 | EPUB | 9 MB
Revised and updated with improvements conceived in parallel programming courses, The Art of Multiprocessor Programming is an authoritative guide to multicore programming. It introduces a higher level set of software development skills than that needed for efficient single-core programming. This book provides comprehensive coverage of the new principles, algorithms, and tools necessary for effective multiprocessor programming. Students and professionals alike will benefit from thorough coverage of key multiprocessor programming issues.
This revised edition incorporates much-demanded updates throughout the book, based on feedback and corrections reported from classrooms since 2008
Learn the fundamentals of programming multiple threads accessing shared memory
Explore mainstream concurrent data structures and the key elements of their design, as well as synchronization techniques from simple locks to transactional memory systems
Visit the companion site and download source code, example Java programs, and materials to support and enhance the learning experience
12,Pratap K J Mohapatra, "Software Engineering: A Lifecycle Approach"
2010 | ISBN: 8122427219 | 429 pages | PDF | 5,5 MB
Software Engineering: A Lifecycle Approach traces the development of the four-decade-old discipline of Software Engineering and compiles the important historical and modern concepts, approaches, and tools of software development, grouping them as chapters specific to phases in the software development lifecycle. Two distinguishing features of the book are: (i) A strong emphasis on the engineering aspects of software development with the total exclusion of the topics on software project management, and (ii) An elaborate coverage of the requirement analysis.
The former has enabled the author to focus on the engineering aspects of the subject, and the latter makes an improvement over the deficiencies of other books on the subject, which often make passing reference to this very important phase of software development. Another highlight of the book is the reference to a large number of original sources from which much of the contents has been drawn.
The book is organized in 24 chapters, with two chapters devoted to the Basics, eight chapters to Requirements, six chapters to Design, two chapters to Detailed Design and Coding, five chapters to Testing, and one chapter to Beyond Development of Software.
The Basics- Introduction Software Development Life Cycles
Traditional Tools for Requirements Gathering
Other Requirements Analysis Tools
Object-oriented Analysis Software Requirements Specification
Introduction to Software Design
Object-oriented Software Design
Design Patterns Software Architecture
Detailed Design and Coding-
Detailed Design Coding
Overview of Software Testing
White-box Testing Integration and Higher-level Testing
13,Dustin Boswell, Trevor Foucher, "The Art of Readable Code"
English | 2011-11-23 | ISBN: 0596802293 | 206 pages | EPUB + MOBI | 7.52 mb + 6.07 mb
As programmers, we’ve all seen source code that’s so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they’re bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it—even if that someone else is you.
This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languages, each chapter dives into a different aspect of coding, and demonstrates how you can make your code easy to understand.
- Simplify naming, commenting, and formatting with tips that apply to every line of code;
- Refine your program’s loops, logic, and variables to reduce complexity and confusion;
- Attack problems at the function level, such as reorganizing blocks of code to do one task at a time;
- Write effective test code that is thorough and concise—as well as readable.
"Being aware of how the code you create affects those who look at it later is an important part of developing software. The authors did a great job in taking you through the different aspects of this challenge, explaining the details with instructive examples."
14,Randall Hyde, "Write Great Code: Volume 1: Understanding the Machine"
2004 | ISBN-10: 1593270038 | EPUB, PDF | 440 pages | 6 + 5 MB
If you've asked someone the secret to writing efficient, well-written software, the answer that you've probably gotten is "learn assembly language programming." By learning assembly language programming, you learn how the machine really operates and that knowledge will help you write better high-level language code. A dirty little secret assembly language programmers rarely admit to, however, is that what you really need to learn is machine organization, not assembly language programming. Write Great Code, the first in a series from assembly language expert Randall Hyde, dives right into machine organization without the extra overhead of learning assembly language programming at the same time. And since Write Great Code concentrates on the machine organization, not assembly language, the reader will learn in greater depth those subjects that are language-independent and of concern to a high level language programmer. Write Great Code will help programmers make wiser choices with respect to programming statements and data types when writing software, no matter which language they use.
15,Write Great Code, Volume 2: Thinking Low-Level, Writing High-Level By Randall Hyde
Publisher: No Starch Press 2006 | 640 Pages | ISBN: 1593270658 | PDF | 4 MB
It's a critical lesson that today's computer science students aren't always being taught: How to carefully choose their high-level language statements to produce efficient code. Write Great Code, Volume 2: Thinking Low-Level, Writing High-Level shows software engineers what too many college and university courses don't - how compilers translate high-level language statements and data structures into machine code. Armed with this knowledge, they will make informed choices concerning the use of those high-level structures and help the compiler produce far better machine code - all without having to give up the productivity and portability benefits of using a high-level language.
Down xong thấy hay thì thank nha
Đây là cuốn textbook nỏi tiếng của William stallings, cuốn sách gối đầu giường của ngành học an ninh mạng tại Mĩ. Hiện nay, chưa có bản free online đâu nhé.Đây là link down:
Bạn nào thấy hay thì thank nhớ, mình đã phải mất công lắm mới có được bản cop của bọn nước ngoài
Mình dùng cc chùa chôm được mấy quyển sách của bọn nước ngoài, post lên đây cho các bạn tham khảo. Quyển này là quyển 7, quyển mới nhất của hacking exposed:
Giá của nó là hơn 50$, chưa có bản free online đâu nhé.
Mình dùng sql injection để hack 1 site shop ( xin ko tiện nói ở đây) đã tìm ra chính xác bảng login của admin là admin_login. Nhưng khi sử dụng union select để truy vấn username, password thì nó báo Lỗi "Table 'mbstech_newstore.admin_login' doesn't exist " .Mình đoán chắc là nó sử dụng lọc, nên đã tìm ra chính xác bảng login là admin_login rồi mà nó vẫn báo là bảng ko tồn tại. Câu truy vấn cuối của mình là
Vậy có bạn nào biết cách truy vấn để bypass cái này ko, mình bí quá, thank trước
Mình là newbie, mình xin hỏi một câu. Giả sử có một máy kết nối ra internet thông qua 1 modem, cấu hình là ip private tĩnh. Mình xin hỏi trong trường hợp này, một máy tính khác có thể xâm nhập vào máy tính trên qua IP public được không (dùng telnet chẳng hạn).Một giả sử khác là 1 mạng Lan có 2 máy chẳng hạn, dùng chung 1 IP public, liệu ta có thể xâm nhập vào bất cứ máy nào trong 2 máy này qua IP public được không?Mong sự trả lòi của các bạn
Các bạn cho hỏi chống keylogger cách nào tốt nhất. Và nếu bị nhiễm rồi, thì làm thế nào loại bỏ được chúng, để bảo vệ các thông tin cá nhân trên mạng
Đây là tuyển tập các tut về hacking mới nhất năm 2010 dành cho những người quan tâm đến lĩnh vực hack.Nó bao gồm các kĩ thuật mới nhất về hack hệ thống , hack web và các kĩ thuật liên quan đến máy tính, mạng.... khác.Đây là link down:
.Chúc các bạn vui vẻ!