[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
04/01/2008 11:58:59 (+0700) | #31 | 108205 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Applied XML: A Toolkit for Programmers
Book Description:
The tools and techniques you need to build applications and systems with XML.
IT professionals know that XML is well on its way to becoming the industry standard for information exchange on the World Wide Web. This book provides you with the hands-on details you need to create the next generation of Web applications. With this book/CD-ROM, two former Microsoft XML technologies team members supply you with the know-how and tools you need to harness the power of XML. Alex Ceponkus and Faraz Hoodbhoy walk you through numerous real-world examples illustrating effective techniques for using XML to enhance the data accessing and presentation capabilities of your programs.
You get an in-depth look at how to use the XML Document Object Model, the DOM, and techniques for leveraging the XML Stylesheet Language, XSL.
Learn how to:
* Build sophisticated e-commerce applications with XML.
* Use XSL with XML to facilitate data presentation.
* Radically enhance the data exchange capabilities of intranet and Web applications.
* Create customized markup languages.
* Create intelligent, searchable document structures.
* Access existing data in relational databases.
* Exploit XML in various real-world business scenarios.
http://rapidshare.com/files/80232738/_eB_Applied_XML_-_A_Toolkit_for_Programmers_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
04/01/2008 12:19:00 (+0700) | #32 | 108213 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Building Secure Servers with Linux
Book Description:
This book provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as key services such as DNS, the Apache Web server, mail, file transfer, and secure shell.
Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured--some of which rival expensive commercial equivalents--making Linux a particularly appropriate platform for providing secure Internet services. Building Secure Servers with Linux will help you master the principles of reliable system and network security by combining practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the larger Internet--and shows readers how to harden their hosts against attacks. Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. The book includes:
* Precise directions for securing common services, including the Web, mail, DNS, and file transfer.
* Ancillary tasks, such as hardening Linux, using SSH and certificates for tunneling, and using iptables for firewalling.
* Basic installation of intrusion detection tools.
Writing for Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Building Secure Servers with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as key services such as DNS, the Apache Web server, mail, file transfer, and secure shell. With this book in hand, you'll have everything you need to ensure robust security of your Linux system.
http://rapidshare.com/files/80232862/_eB_Building.Secure.Servers.with.Linux_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
04/01/2008 12:43:02 (+0700) | #33 | 108218 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Beginning SQL (and source code)
Chapter 1: Introduction to SQL
Chapter 2: Entering Information
Chapter 3: Extracting Information
Chapter 4: Advanced Database Design
Chapter 5: Manipulating Data
Chapter 6: Grouping and Aggregating Data
Chapter 7: Selecting Data from Different Tables
Chapter 8: Queries within Queries
Chapter 9: Advanced Queries
Chapter 10: Views
Chapter 11: Transactions
Chapter 12: SQL Security
Chapter 13: Database Tuning
Appendix A: Exercise Answers
Appendix B: Setting Up and Using the Five Database Systems
Appendix C: Initial Data Setup
http://rapidshare.com/files/80232831/_eB_Beginning.SQL._with.source.code__Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
04/01/2008 13:04:57 (+0700) | #34 | 108228 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
C Programming: Just the Faqs
This book is for beginning- to intermediate-level users who need a quick, easy-to-use C reference. As a tutorial for beginners and a reference for experienced programmers, it shows code techniques and the thoughts behind those techniques. “Disk features source code and executable versions of the example programs. Shows how to use the C language to solve real-world programming problems. Techniques discussed include finite state machines, GREP, and bit twiddling, as well as tokenized parser”. Covers All Major C Compilers.
http://rapidshare.com/files/80232976/_eB_C.Programming_-_Just_the_FAQS_Rilwis.tk.rar
|
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
04/01/2008 13:13:26 (+0700) | #35 | 108235 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
C++ in a Nutshell
C++ in a Nutshell is a language reference manual. It is not a tutorial. It is not for beginners. It is a concise, to-the-point reference for professionals and other serious programmers. C++ in a Nutshell is not a comprehensive reference for the entire C++ language, in all its intricacies and complexities. Instead, I focus on what is most important to the working professional. If you feel that I have included too many irrelevant details or omitted too much important information, please let me know.
Chapters 12 and 13 form the bulk of the book. Chapter 12 is an alphabetical reference for all the language keywords and constructs. Chapter 13 is a reference for the entire runtime library, organized alphabetically by header, and within each section, alphabetically by type, function, macro, or other name.
An alphabetical reference is not always the best way to present information, though. The first 8 chapters, therefore, cover the language organized by topic. Chapters 9 through 11 introduce the standard library.
Finally, the appendix includes brief introductions to some compilers, libraries, and interesting C++ projects, such as Boost and Loki.
http://rapidshare.com/files/80232992/_eB_C___In.NutShell_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
04/01/2008 13:37:39 (+0700) | #36 | 108246 |
|
ThíchHắcKinh
Member
|
0 |
|
|
Joined: 05/11/2007 21:56:23
Messages: 85
Location: Thiếu Lâm Tự
Offline
|
|
Chà ... Làm ăn khấm khá nhỉ? sơ sơ được 2 pages rồi ... Cố lên cố lên.
Cho tôi ké phát, nếu tôi chịu khó đăng hết cái này lên thì được bao nhiêu pages đây ta?
http://downloadebookz.info/
p/s: Chỉ đùa chút thôi nhé, bạn đừng nản lòng nhé.
|
|
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
06/01/2008 11:13:43 (+0700) | #37 | 108656 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Cảm ơn bác Long quan tâm, em kiến thức ít chỉ có mỗi cái chịu khó tìm tòi sưu tầm thôi.
|
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
06/01/2008 11:23:14 (+0700) | #38 | 108660 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Hôm nay xin trân trọng giới thiệu series sách về Hacker và Bảo Mật.
The Art of Deception
Book Description
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
We humans are born with an inner drive to explore the nature of our surroundings. As young men, both Kevin Mitnick and I were intensely curious about the world and eager to prove ourselves. We were rewarded often in our attempts to learn new things, solve puzzles, and win at games. But at the same time, the world around us taught us rules of behavior that constrained our inner urge toward free exploration. For our boldest scientists and technological entrepreneurs, as well as for people like Kevin Mitnick, following this inner urge offers the greatest thrills, letting us accomplish things that others believe cannot be done.
The Art of Deception shows how vulnerable we all are - government, business, and each of us personally - to the intrusions of the social engineer. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data.
This book points out how easy it is to trick insiders and circumvent all this technological protection. Whether you work in business or government, this book provides a powerful road map to help you understand how social engineers work and what you can do to foil them. Using fictionalized stories that are both entertaining and eye-opening, Kevin and co-author Bill Simon bring to life the techniques of the social engineering underworld. After each story, they offer practical guidelines to help you guard against the breaches and threats they're described.
Technological security leaves major gaps that people like Kevin can help us close. Read this book and you may finally realize that we all need to turn to the Mitnick's among us for guidance.
TABLE OF CONTENT:
Chapter 01 - Security's Weakest Link
Chapter 02 - When Innocuous Information Isn't
Chapter 03 - The Direct Attack: Just Asking for it
Chapter 04 - Building Trust
Chapter 05 - "Let Me Help You"
Chapter 06 - "Can You Help Me?"
Chapter 07 - Phony Sites and Dangerous Attachments
Chapter 08 - Using Sympathy, Guilt and Intimidation
Chapter 09 - The Reverse Sting
Chapter 10 - Entering the Premises
Chapter 11 - Combining Technology and Social Engineering
Chapter 12 - Attacks on the Entry-Level Employee
Chapter 13 - Clever Cons
Chapter 14 - Industrial Espionage
Chapter 15 - Information Security Awareness and Training
Chapter 16 - Recommended Corporate Information Security Policies
http://rapidshare.com/files/81391602/The_Art_of_Deception_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
06/01/2008 11:34:49 (+0700) | #39 | 108664 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
The Art of Intrusion
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time.
With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
TABLE OF CONTENT:
Chapter 01 - Hacking the Casinos for a Million Bucks.
Chapter 02 - When Terrorists Come Calling.
Chapter 03 - The Texas Prison Hack.
Chapter 04 - Cops and Robbers.
Chapter 05 - The Robin Hood Hacker.
Chapter 06 - The Wisdom and Folly of Penetration Testing.
Chapter 07 - Of Course Your Bank Is Secure — Right?
Chapter 08 - Your Intellectual Property Isn’t Safe.
Chapter 09 - On the Continent.
Chapter 10 - Social Engineers — How They Work and How to Stop Them.
Chapter 11 - Short Takes.
http://rapidshare.com/files/81390755/The_Art_of_Intrusion_Rilwis.tk.rar
|
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
06/01/2008 11:46:39 (+0700) | #40 | 108668 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Secrets of a Super Hacker
Once more, Loompanics publishes something other houses wouldn't: a guide to violating computer security. Covering hacking scenarios ranging from the merely mischievous to the criminal, the super hacker known as the Knightmare gives step-by-step instructions in meaningful hacking from a personal computer.
Fortunately, he also includes a section on state and federal computer laws, allowing potential hackers to be cognizant of the sanctions they risk with any particular project. Appendixes offer an array of technical explanations and tips for understanding database and system structures; tips cover password divination and searching strategies; and a glossary, besides explaining terms likely to be encountered in any particular documentation being hacked, enhances the hacker's ability to share experiences and tips. As science outstrips society's control of information, systems of secretkeeping proliferate maddeningly. Yet with this book, the keyboard jockey can enter all sorts of "secure" systems, databases, and records; and a hacker-security chapter explains both why hacking is a valuable and useful activity and--equally important because entering and altering systems without clearance is generally illegal--how to avoid getting caught.
http://rapidshare.com/files/81393804/_eB_Secrets_of_a_Super_Hacker_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
06/01/2008 12:06:10 (+0700) | #41 | 108678 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Hacker HighSchool - 13 ebook
01: Being a Hacker
02: Windows and Linux
03: Ports and Protocols
04: Services and Connections
05: System Identification
06: Malware
07: Attack Analysis
08: Forensics
09: Email Security
10: Web Security and Privacy
11: Passwords
12: Legalities and Ethics
HHS TOC Glossary
http://rapidshare.com/files/130601468/_eB_H_cker.H_ghSch00l.13_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
06/01/2008 12:38:07 (+0700) | #42 | 108689 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Hacker Web Exploitation Uncovered
Book Description:
A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written from both from the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well as errors such as PHP source code injection, SQL injection, and XSS.
The most common vulnerabilities in PHP and Perl scripts and methods of exploiting these weaknesses are described, information on writing intersite scripts and secure systems for the hosted sites, creating secure authorization systems, and bypassing authorization. Uncovered is how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.
About the Author
Marsel Nizamutdinov is an operations research and system analysis specialist.
http://rapidshare.com/files/130601534/_eB_H_cker.W3b.Expl0_tation.Unc0vered_Rilwis.tk.rar
|
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
07/01/2008 12:33:33 (+0700) | #43 | 108850 |
|
alextruongvn
Member
|
0 |
|
|
Joined: 11/04/2007 20:27:53
Messages: 6
Location: Đà Nẵng
Offline
|
|
Tốt quá, đang định đi tìm mấy cuốn. Thanks bro nhiều nghe. Hậu tạ sau! |
|
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
09/01/2008 04:40:50 (+0700) | #44 | 109150 |
XxGameoverxX
Member
|
0 |
|
|
Joined: 29/09/2007 10:43:34
Messages: 2
Location: Coi vinh hang
Offline
|
|
Toàn sách ở Wiki mà .Dù sao cũng cám ơn các bro đã up |
|
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
09/01/2008 10:14:04 (+0700) | #45 | 109194 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
The Database Hacker's Handbook: Defending Database Servers
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know
Part I: Introduction
Chapter 1, Why Care About Database Security?
Part II: Oracle
Chapter 2, The Oracle Architecture
Chapter 3, Attacking Oracle
Chapter 4, Oracle: Moving Further into the Network
Chapter 5, Securing Oracle
Part III: DB2
Chapter 6, IBM DB2 Universal Database
Chapter 7, DB2: Discovery, Attack, and Defense
Chapter 8, Attacking DB2
Chapter 9, Securing DB2
Part IV: Informix
Chapter 10, The Informix Architecture
Chapter 11, Informix: Discovery, Attack, and Defense
Chapter 12, Securing Informix
Part V: Sybase ASE
Chapter 13, The Sybase Architecture
Chapter 14, Sybase: Discovery, Attack, and Defense
Chapter 15, Sybase: Moving Further into the Network
Chapter 16, Securing Sybase
Part VI: MySQL
Chapter 17, MySQL Architecture
Chapter 18, MySQL: Discovery, Attack, and Defense
Chapter 19, MySQL: Moving Further into the Network
Chapter 20, Securing MySQL
Part VII: SQL Server
Chapter 21, Microsoft SQL Server Architecture
Chapter 22, SQL Server: Exploitation, Attack, and Defense
Chapter 23, Securing SQL Server
Part VIII: PostgreSQL
Chapter 24, The PostgreSQL Architecture
Chapter 25, PostgreSQL: Discovery and Attack
Chapter 26, Securing PostgreSQL
Appendix A, Example C Code for a Time-Delay SQL Injection Harness
Appendix B, Dangerous Extended Stored Procedures
Appendix C, Oracle Default Usernames and Passwords
Within each section, we discuss the basics of the architecture of the database — how to find it in a network, roughly how it's structured, and any architectural peculiarities it may have. We then move on to describe how the system can be attacked, covering the various categories of security problems, how these problems can be used by an attacker, and how you can defend against them. We then discuss the ways in which an attacker can gain further access to the network, having compromised the database server. Finally, we discuss the best approaches to securing the database system, in a handy quick-reference guide.
Wiley | ISBN: 0764578014 | 500 pages | CHM | 1,17 MB
http://rapidshare.com/files/81396154/_eB_The_Database_Hacker_s_Handbook_Defending_Database_Servers_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
09/01/2008 10:30:41 (+0700) | #46 | 109199 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
The Oracle Hacker's Handbook: Hacking and Defending Oracle'
Knowledge is power, and the power can be yours
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems.
Like The Shellcoder's Handbook and The Database Hacker's Handbook, this in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.
* Discover how to deal with the security flaws revealed in the Oracle RDBMS
* Explore some never-before-published forays into Oracle security holes and learn to defend them from attack
* Learn why independent security assessments are not necessarily a guarantee of safety
* See how Oracle 10g Release 2 has improved its security features and where the flaws remain
Chapter 1: Overview of the Oracle RDBMS
Chapter 2: The Oracle Network Architecture
Chapter 3: Attacking the TNS Listener and Dispatchers
Chapter 4: Attacking the Authentication Process
Chapter 5: Oracle and PL/SQL
Chapter 6: Triggers
Chapter 7: Indirect Privilege Escalation
Chapter 8: Defeating Virtual Private Databases
Chapter 9: Attacking Oracle PL/SQL Web Applications
Chapter 10: Running Operating System Commands
Chapter 11: Accessing the File System
Chapter 12: Accessing the Network
Appendix A: Default Usernames and Passwords
Publisher: Wiley | Publication Date: 2007-01-30 | ISBN / ASIN: 0470080221 | 0.5 Mb
http://rapidshare.com/files/81396876/_eB_The_Oracle_Hacker_s_Handbook_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
09/01/2008 10:42:31 (+0700) | #47 | 109200 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DSN server for mapping DNS names to IP addresses, and firewall for system protection is provided.
Chapter 1: Introduction
Chapter 2: Linux Installation and Initial Configuration
Figure 2.1: The main window of the PartitionMagic program
Figure 2.2: The Keyboard Configuration dialog window
Figure 2.3: The file Properties window
Figure 2.4: The Disk Setup dialog window
Figure 2.5: The Add Partition dialog window
Figure 2.6: Configuring Linux boot loader
Figure 2.7: The Set Root Password dialog window
Figure 2.8: The Package Group Selection dialog window
Figure 2.9: The About to Install dialog window
Figure 2.10: The Monitor Configuration window
Figure 2.11: The first-boot Welcome dialog window
Figure 2.12: The User Account dialog window
Figure 2.13: The boot loader dialog window
Figure 2.14: The Linux booting process
Figure 2.15: The login window
Figure 2.16: The main window of the setup utility
Figure 2.17: The KDE desktop
Figure 2.18: The GNOME desktop
Chapter 3: Welcome to Linux!
Figure 3.1: The Midnight Commander program launched in the terminal window
Figure 3.2: Launching the Services utility from the Main Menu
Figure 3.3: The main window of the Services utility
Figure 3.4: A sample of the results produced by the top program
Figure 3.5: The main window of the KPPP program
Figure 3.6: The menuconfig utility
Figure 3.7: The gconf utility
Chapter 4: Access Control
Figure 4.1: A block diagram of a chroot file system
Figure 4.2: A network firewall
Figure 4.3: The Options tab
Figure 4.4: The Rules tab
Figure 4.5: The dialog window for adding new rules
Figure 4.6: Location of the public and closed service servers
Figure 4.7: Doubled network protection
Figure 4.8: Protecting two networks with one firewall
Figure 4.9: Replacing the IP address
Chapter 5: Administration
Figure 5.1: The netconfig window
Figure 5.2: The common-bus network topology
Figure 5.3: The star network topology
Figure 5.4: Channel encryption
Figure 5.5: A secure connection indication in Internet Explorer
Figure 5.6: An Internet page's properties
Figure 5.7: Connecting to the Internet via a Web server
Chapter 7: Web Server
Figure 7.1: The main window of the Apache graphical configuration utility
Figure 7.2: The user authentication window
Figure 7.3: Intercepting traffic
Chapter 8: Electronic Mail
Figure 8.1: The main window of the KMail program
Figure 8.2: The network configuration window
Figure 8.3: The SMTP server configuration window
Figure 8.4: The Local mailbox configuration window
Chapter 9: Gateway to Internet
Figure 9.1: Accessing the Internet via a proxy server
Figure 9.2: Configuring a proxy server in Mozilla
Figure 9.3: Configuring Mozilla cache
Chapter 10: File Transfer
Figure 10.1: The main window of CyD FTP Client XP
Figure 10.2: A text file transmitted in the binary mode
Figure 10.3: A text file transmitted in the ASCII mode
Figure 10.4: The main window of the kwuftpd utility
Chapter 11: Network Addressing
Figure 11.1: The domain namespace hierarchy
Figure 11.2: DNS control windows
Chapter 12: System Monitoring
Figure 12.1: A screenshot of the /var/log/messages file contents
Chapter 13: Backing Up and Restoring Data
Figure 13.1: The iDisk site
Chapter 14: Advice from a Hacker
Figure 14.1: The OSI model
Figure 14.2: A network with two routers
Figure 14.3: An example of an attack notification email
Figure 14.4: Honey-pot network construction
http://rapidshare.com/files/81397614/_eB_Hacker_Linux_Uncovered_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
09/01/2008 14:08:18 (+0700) | #48 | 109233 |
mabongdem01
Member
|
0 |
|
|
Joined: 02/01/2008 23:04:49
Messages: 1
Offline
|
|
Toàn là English sao mà đọc hả trời............ |
|
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
11/01/2008 11:32:11 (+0700) | #49 | 109591 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Hacking: The Art of Exploitation
Hacking is the art of creative problem solving, whether used to find an unconventional solution to a difficult problem or to exploit holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation that a hacker needs to be successful. Hacking: The Art Of Exploitation explains things that every real hacker should know.
While many hacking books show you how to run other people’s exploits without really explaining the technical details, Hacking: The Art Of Exploitation introduces you to the spirit and theory of hacking as well as the science behind it all. By learning some of the core techniques and clever tricks of hacking, you will begin to understand the hacker mindset. Once you learn to think like a hacker, you can write your own hacks and innovate new techniques, or you can thwart potential attacks on your system.
In Hacking: The Art Of Exploitation you will learn how to:
* Exploit programs using buffer overflows and format strings
* Write your own printable ASCII polymorphic shellcode
* Defeat non-executable stacks by returning into libc
* Redirect network traffic, conceal open ports, and hijack TCP connections
* Crack encrypted 802.11b wireless trafffic using the FMS attack
If you’re serious about hacking, this book is for you, no matter what side of the fence you’re on.
http://rapidshare.com/files/81398686/_eB_Hacking-The_Art_of_Exploitation_Rilwis.tk.rar
|
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
11/01/2008 15:01:52 (+0700) | #50 | 109631 |
|
rong_tuech
Locked
|
0 |
|
|
Joined: 01/01/2007 10:39:36
Messages: 128
Location: C15
Offline
|
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
12/01/2008 07:17:35 (+0700) | #51 | 109767 |
|
osamabinladel
Member
|
0 |
|
|
Joined: 02/07/2006 11:11:38
Messages: 410
Location: bãi bom
Offline
|
|
thanks for sharing, Hacker Linux Uncovered
có cuốn nào nói chung chgung về Linux cho tớ xin
nghĩa là nó không nói về bất kì một dòng nào mà chỉ nói về cài đặt cấu hình , lênh linux thôi ấy mà |
|
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
12/01/2008 09:58:18 (+0700) | #52 | 109795 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Thực tế mình "mù" Linux , có sách up lên để chia sẻ cho người khác thôi chứ mình có đọc hết đâu.
Vấn đề bạn hỏi về lệnh trong linux thì mình nhớ có lần post quyển "Linux Complete Command Reference" cũng trong box này rồi, bạn tìm lại nhé |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
12/01/2008 10:56:48 (+0700) | #53 | 109807 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Effective awk Programming, Third Edition
Book description:
Effective awk Programming delivers complete coverage of the gawk 3.1 language and the most up-to-date coverage of the POSIX standard for awk available anywhere. Author Arnold Robbins clearly distinguishes standard awk features from GNU awk (gawk)-specific features, shines light into many of the “dark corners” of the language, and devotes two full chapters to example programs. A brand new chapter is devoted to TCP/IP networking with gawk. This book is the official “User’s Guide” for the GNU implementation of awk.
Effective awk Programming,3rd Edition, focuses entirely on awk, exploring it in the greatest depth of the three awk titles we carry. It’s an excellent companion piece to the more broadly focused second edition. This book provides complete coverage of the gawk 3.1 language as well as the most up-to-date coverage of the POSIX standard for awk available anywhere. Author Arnold Robbins clearly distinguishes standard awk features from GNU awk (gawk)-specific features, shines light into many of the “dark corners” of the language (areas to watch out for when programming), and devotes two full chapters to example programs. A brand new chapter is devoted to TCP/IP networking with gawk. He includes a summary of how the awk language evolved. The book also covers:
* Internationalization of gawk
* Interfacing to i18n at the awk level
* Two-way pipes
* TCP/IP networking via the two-way pipe interface
* The new PROCINFO array, which provides information about running gawk
* Profiling and pretty-printing awk programs
In addition to covering the awk language, this book serves as the official “User’s Guide” for the GNU implementation of awk (gawk), describing in an integrated fashion the extensions available to the System V Release 4 version of awk that are also available in gawk. As the official gawk User’s Guide, this book will also be available electronically, and can be freely copied and distributed under the terms of the Free Software Foundation’s Free Documentation License (FDL). A portion of the proceeds from sales of this book will go to the Free Software Foundation to support further development of free and open source software. The third edition of Effective awk Programming is a GNU Manual and is published by O’Reilly & Associates under the Free Software Foundation’s Free Documentation License (FDL). A portion of the proceeds from the sale of this book is donated to the Free Software Foundation to further development of GNU software. This book is also available in electronic form; you have the freedom to modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development.
http://rapidshare.com/files/80233374/_eB_Effective.awk.Programming.3rd.Edition_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
12/01/2008 11:13:32 (+0700) | #54 | 109808 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Enterprise JavaBeans, Fourth Edition
Book description
This authoritative guide includes everything that made previous editions of Enterprise JavaBeans the single must-have book for EJB developers: the author’s solid grasp on the complexities of EJBs; hundreds of clear, practical examples; adept coverage the key concepts EJBs ; and diagrams to illustrate the concepts presented. The fourth edition also includes everything you need to get up to speed quickly on the changes in EJB version 2.1 as well as a JBoss implementation guide.
The new 2.1 version of the Enterprise JavaBeans (EJB) spec extends its support for web services and the Java Web Services APIs, expands its asynchronous messaging support, adds XML Schema for deployment descriptors, and introduces a new Timer service, which allows for scheduling EJB jobs. The essential–and award winning–book on EJBs, Enterprise JavaBeans, has been completely revised and updated in this new fourth edition, to provide the real-world, nitty-gritty detail developers need to master EJB 2.1. Previous editions of this clear and engaging introduction to EJBs were voted the “Best Java Book” by the editors and readers of Java Developer’s Journal, the “Best Java Book for Experts,” by JavaPro editors, and one of the Top Computer Books by Amazon.com. The fourth edition lives up to–and surpasses–the excellent reputation earned by its predecessors. This authoritative and thorough guide includes everything that made previous editions the single must-have book for EJB developers: the authors solid grasp on the complexities of EJBs coupled with his succinct, easy-to-follow style; hundreds of clear, practical examples; adept coverage the key concepts EJBs ; and diagrams to illustrate the concepts presented. It also includes everything you need to get up to speed quickly on the changes wrought by EJB version 2.1, an architecture overview, information on resource management and primary services, design strategies, and XML deployment descriptors. In this edition, we’re adding an EJB workbook for JBoss 4.0. The workbook shows how to deploy all of the examples on the JBoss 4.0 application server. It addresses an important problem with EJB: deploying the software on a server can be extremely difficult. JBoss is an open source project that has become the most widely used J2EE application server. Good technical authors may lay the facts before you, but great ones offer the distilled essence of their own experience and insight. Richard Monson-Haefel has provided just what Java developers need to know to harness the complexity of EJBs. What makes Monson-Haefel a master of technical authoring can be seen in his well-thought-out and logical progression of ideas, and in his examples practical, precise, usable examples, large enough to test key concepts but still small enough to be comprehensible taken apart and explained in the detail you need to deploy those principles in other situations. If you work with EJBs–or want to–this book will earn a favored spot on your bookshelf.
http://rapidshare.com/files/80233477/_eB_Enterprise.JavaBeans.4th.Edition_Rilwis.tk.rar
|
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
12/01/2008 11:26:22 (+0700) | #55 | 109811 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Excel 2007 PivotTables and PivotCharts
Devoted entirely to Excel 2007 to PivotTables and PivotCharts, this book shows you how to take full advantage of these powerful tools, which enable you to pull meaningful information from masses of seemingly meaningless data. Loaded with illustrations and real-world examples, it takes you step by step through creating a PivotTable; formatting, filtering, and grouping data; creating PivotCharts from those data; and more. You’ll learn to work with multidimensional data, how to create and manipulate PivotTables using VBA, and—most importantly—you’ll discover what these tools can do for you.
http://rapidshare.com/files/80233783/_eB_Excel.2007.PivotTables.and.PivotCharts.Apr.2007_Rilwis.tk.rar
|
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
13/01/2008 12:17:03 (+0700) | #56 | 110002 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Firewalls 24Seven (2nd Edition)
Introduction
Since the first edition of this book, firewalls have gone from esoteric and somewhat optional
machines for the paranoid to mandatory guardians of the Internet required by just about everyone.
Developed from rudimentary security systems that major computer vendors like Compaq and IBM
created to secure their own networks in the mid_eighties, these network sentinels have developed
in lock_step with the burgeoning threat of information warfare. Recently, there have been only
incremental improvements in firewall technology, such as improvements in VPN interoperability
between vendors. Much of the change in the firewall market has simply been a shakeout, where the
strong firewalls have survived and the weak, expensive, and difficult to configure or buy have
withered away.
The security problems of the past could be solved with simple packet filters and dial_back modem
banks. The security problems of the future will require rifling through and validating every byte of an
Internet message, requiring encrypted certification of a website's true identity before connecting,
and then encrypting nearly everything that travels between. Fortunately, as technology and the
technological society it mirrors progress, these measures will become simple and invisible. As
vendors make operating systems more hardened against attack, the World Wide Web will secretly
grow more secure for people who will freely surf the Web as they please, hampered only by the
occasionally warning that a site is not accredited or that a message contains suspicious content.
Linux already contains very strong built_in firewalling; and by the next edition of this book, Windows
will be just as hardened_if Microsoft expects it to survive as an Internet service platform. This is as
it should be.
The security problems of today are most effectively solved with firewalls and virtual private tunnels.
Peripheral security utilities like intrusion detectors and security scanners do their part to alarm and
alert, but firewalls will remain the foundation of Internet security until their functionality is built into
the very protocols upon which the Internet operates and until every Internet_connected computer
contains the equivalent of a firewall. Even then, centralized management of Internet policy may
make firewalls a permanent addition to corporate networking.
About This Book
This book was written to accomplish one goal: to teach network administrators what they need to
know to understand the Internet security threat, the technologies used to prevent it, and the
products that exist to help them. It's the book I wish I'd had when I couldn't find a common language
between various vendors that I could use to compare firewall literature and books heavy on theory
to the marketing blurbs I read on websites, or when I needed help matching a specific customer's
requirements to a specific firewall product.
This book will help you answer questions like these:
What's the difference between packet filtering and stateful inspection, and why is it important?
What's the difference between using Network Address Translation and a proxy server to
hide clients ?
How much can I expect to budget for a firewall?
Which firewall is right for my company ?
This book was written primarily for active network administrators with the assumption that they
understand the use and configuration of TCP/IP, who are used to working with Windows, or Unix
(although very little operating system_specific information is presented).
If you're not a network administrator, but you know you need a firewall, this book can still help you
find one; a number of plug_and_play firewall devices exist that are both secure and easy to use and
configure. If you fall into this later category, you may find your eyes glazing over during some of the
more technical discussions early in the book. Feel free to skip over anything you don't understand
and come back to it later if you need to.
http://rapidshare.com/files/80234168/_eB_Firewalls.24Seven.2nd.Edition_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
13/01/2008 12:30:21 (+0700) | #57 | 110003 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Java and XML (Second Edition): Solutions to Real-World Problems
Introductory chapters are typically pretty easy to write. In most books, you give an overview of the technology covered, explain a few basics, and try and get the reader interested. However, for this second edition of Java and XML, things aren’t so easy. In the first edition, there were still a lot of people coming to XML, or skeptics wanting to see if this new type of markup was really as good as the hype. Over a year later, everyone is using XML in hundreds of ways. In a sense, you probably don’t need an introduction. But I’ll give you an idea of what’s going to be covered, why it matters, and what you’ll need to get up and running.
First, let me simply say that XML matters. I know that sounds like the beginning of a self-help seminar, but it’s worth starting with. There are still many developers, managers, and executives who are afraid of XML. They are afraid of the perception that XML is “cutting-edge,” and of XML’s high rate of change. (This is a second edition, a year later, right? Has that much changed?) They are afraid of the cost of hiring folks like you and me to work in XML. Most of all, they are afraid of adding yet another piece to their application puzzles.
To try and assuage these fears, let me quickly run down the major reasons that you should start working with XML, today. First, XML is portable. Second, it allows an unprecedented degree of interoperability. And finally, XML matters. . . because it doesn’t matter! If that’s completely confusing, read on and all will soon make sense.
XML is portable. If you’ve been around Java long, or have ever wandered through Moscone Center at JavaOne, you’ve heard the mantra of Java: “portable code.” Compile Java code, drop those .class or .jar files onto any operating system, and the code runs. All you need is a Java Runtime Environment (JRE) or Java Virtual Machine (JVM), and you’re set. This has continually been one of Java’s biggest draws, because developers can work on Linux or Windows workstations, develop and test code, and then deploy on Sparcs, E4000s, HP-UX, or anything else you could imagine.
http://www.oreilly.com/catalog/javaxml2/toc.html
http://rapidshare.com/files/80234312/_eB_Java___XML__2nd_Edition_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
13/01/2008 12:37:35 (+0700) | #58 | 110006 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
Beat hackers at their own game — The world of a hacker revealed by a corporate hack master
Hack Attacks Revealed
Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box® system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.
In this highly provocative work, you’ll discover:
• The hacker’s perspective on networking protocols and communication technologies
• A complete hacker’s technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
• Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
• Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks
http://rapidshare.com/files/81399714/_eB_Hack_Attacks_Revealed_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
13/01/2008 14:34:37 (+0700) | #59 | 110029 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Cambridge Certificate of Proficiency in English
University of Cambridge Local Examinations Syndicate, “Cambridge Certificate of Proficiency in English 1 Student’s Book with Answers:
Examination papers from the University of Cambridge Local Examinations Syndicate”
Cambridge Certificate of Proficiency in English 1 contains four complete tests for the Cambridge Certificate of Proficiency in English (CPE) examination from Cambridge ESOL. These past examination papers provide the most authentic exam preparation available. They allow candidates to familiarise themselves with the content and format of the examination and to practise useful examination techniques. Attractive colour visual material for Paper 5 is included with each test, enabling students to prepare thoroughly for the paired interview. The Student’s Book is also available as a “with answers” edition which contains a comprehensive section of keys and transcripts, making it suitable for self study
Cambridge University Press | 184 pages | PDF
http://rapidshare.com/files/81350910/Cambridge_University_Press_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
[Question] Re: Có vài cuốn sách muốn chia sẻ ! |
14/01/2008 12:59:39 (+0700) | #60 | 110151 |
|
napoleon_tq
Elite Member
|
0 |
|
|
Joined: 05/12/2006 12:06:39
Messages: 1295
Offline
|
|
Learning Debian GNU/Linux
Book Description:
Learning Debian GNU/Linux guides the new user of Linux through the installion and configuration of Debian GNU/Linux. Debian is the purely Open Source Linux distribution, crafted and maintained by a worldwide network of volunteers. Windows users will gain a gentle introduction to this exciting computing world guided by Bill McCarty in Learning Debian GNU/Linux.
Linux and Open Source are attracting unprecedented attention in the high tech world. Debian GNU/Linux is a remarkable demonstration of what the Open Source model can produce: Debian is an all volunteer organization, and their distribution contains only open-source software. This exciting new world can be intimidating for those whose primary computing experience is Microsoft Windows. In Learning Debian/GNU Linux, Bill McCarty has written a book for this new audience, aimed at introducing them to a Unix style operating system. Learning Debian GNU/Linux will guide any new user of Linux through the installing and use of Debian GNU/Linux, the entirely Open Source version of the Linux operating system. It demystifies Linux in terms familiar to Windows users and gives readers only what they need to start being successful users of Linux. Learning Debian GNU/Linux takes the reader step by step through the process of installing and setting up a Debian system, and provides a thorough but gentle introduction to the basics of using Debian GNU/Linux. Because the book is written specifically for the included CD, the reader needs nothing else to get started with this exciting new operating system.
http://rapidshare.com/files/80234404/_eB_Learning.Debian.GNU.Linux_Rilwis.tk.rar |
|
Tuỳ tâm biến hiện. |
|
|
|
|
|
|
Users currently in here |
1 Anonymous
|
|
Powered by JForum - Extended by HVAOnline
hvaonline.net | hvaforum.net | hvazone.net | hvanews.net | vnhacker.org
1999 - 2013 ©
v2012|0504|218|
|
|