Либрус
 
Сделать стартовой
Добавить в избранное
Обратная связь
Карта сайта
Зеркало сайта
Новости RSS 2.0
ПОСТУПЛЕНИЯ 
«    Декабрь 2024    »
ПнВтСрЧтПтСбВс
 1
2345678
9101112131415
16171819202122
23242526272829
3031 
РУБРИКАТОР 
Открыть | Закрыть

ПОПУЛЯРНОЕ  
АРХИВЫ   
Август 2016 (216)
Июль 2016 (456)
Июнь 2016 (321)
Май 2016 (398)
Апрель 2016 (433)
Март 2016 (554)


  Beginning ActionScript 2.0
 Категория: Flash, «Wrox»
   
 
Beginning ActionScript 2.0
Автор: Nathan Derksen, Jeff Berg
Издательство: Wiley, Wrox
Год издания: 2006
isbn: 0-7645-7768-9
Количество страниц: 839
Язык: english
Формат: PDF

Offering guidance in an exercise-oriented format that readers will find helpful, this book is the perfect mix of tutorial and hands-on coding Written by a well-known and well-respected Flash development expert, this code-intensive guide shows readers how to work with objects, write and use various functions, handle dynamic data, and integrate with XML Contains complete coverage of the ActionScript language, including data types, variables, events, and more Addresses important topics such as understanding how code fits into a Flash project and where it goes, working with new screen technology, and scripting for video and sound
 
  • 0
Опубликовал: flashsoft | 12-12-2006, 00:00 | Просмотров: 1349  Подробнее и с комментариями (0)
  Hack the Stack. Using Snort and Ethereal to Master the 8 Layers of an Insecure Netork
 Категория: «Syngress», Безопасность, взлом
   
 
Hack the Stack. Using Snort and Ethereal to Master the 8 Layers of an Insecure Netork
Автор: Michael Gregg
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-109-8
Количество страниц: 480
Язык: english
Формат: PDF

Remember the first time someone told you about the OSI model and described the various layers? It's probably something you never forgot. This book takes that same layered approach but applies it to network security in a new and refreshing way. It guides readers step-by-step through the stack starting with physical security and working its way up through each of the seven OSI layers. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer. It's called the people layer. It's included because security is not just about technology it also requires interaction with people, policy and office politics. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.
 
  • 0
Опубликовал: flashsoft | 7-12-2006, 00:00 | Просмотров: 1179  Подробнее и с комментариями (0)
  WarDriving and Wireless Penetration Testing
 Категория: «Syngress», Безопасность, взлом
   
 
WarDriving and Wireless Penetration Testing
Автор: Chris Hurley, Russ Rogers, Frank Thornton
Издательство: Syngress
Год издания: 2007
isbn: 1-59749-111-X
Количество страниц: 449
Язык: english
Формат: PDF

WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks. As wireless networking continues to spread in corporate and government use, security experts need to become familiar with the methodologies, tools, and tactics used by both penetration testers and attackers to compromise wireless networks and what they can do to both accomplish their jobs as penetration testers and how to protect networks from sophisticated attackers. WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks.
 
  • 0
Опубликовал: flashsoft | 7-12-2006, 00:00 | Просмотров: 1280  Подробнее и с комментариями (0)
  Accessible XHTML and CSS Web Sites. Problem, Design, Solution
 Категория: HTML, DHTML, CFML (Cold Fusion), CSS, «Wrox»
   
 
Accessible XHTML and CSS Web Sites. Problem, Design, Solution
Автор: Jon Duckett
Издательство: Wrox
Год издания: 2005
isbn: 0-7645-8306-9
Количество страниц: 482
Язык: english
Формат: PDF

Shows Web developers how to make the transition from HTML to XHTML, an XML-based reformulation of HTML that offers greater design flexibility. Demonstrates how to work with CSS (Cascading Style Sheets)-now supported by ninety percent of browsers and integral to new site-building tools from Macromedia and others-and implement a consistent style throughout and entire site. Explains how to make a site accessible to people with impaired vision, limited hand use, dyslexia, and other issues-now a legal requirement for many sites in the U.S. and the U.K.
 
  • 0
Опубликовал: flashsoft | 6-12-2006, 00:00 | Просмотров: 1414  Подробнее и с комментариями (0)
  CD and DVD Forensics
 Категория: «Syngress», Безопасность, взлом
   
 
CD and DVD Forensics
Автор: Paul Crowley
Издательство: Syngress
Год издания: 2007
isbn: 1-59749-128-4
Количество страниц: 321
Язык: english
Формат: PDF

CD and DVD Forensics takes the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time when data forensics is becoming a major part of law enforcement and prosecution in the public sector, as well as corporate and system security and integrity in the private sector, the interest in this subject has just begun to blossom. CD and DVD Forensics is a how-to book that gives the reader tools to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public and private sectors. Armed with this information, readers in law enforcement and corporate security and private investigators will be more effective in performing their evidence-related tasks.
 
  • 0
Опубликовал: flashsoft | 6-12-2006, 00:00 | Просмотров: 1244  Подробнее и с комментариями (1)
  Essential Computer Security
 Категория: Безопасность, взлом, «Syngress»
   
 
Essential Computer Security
Автор: Tony Bradley
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-114-4
Количество страниц: 321
Язык: english
Формат: PDF

This book is not intended to be comprehensive.There are hundreds of books on the shelf covering all areas of computer and network security.You can find many books that cover general information security in a much deeper and technical sense than this book will.There are also books that cover specific areas of security, such as encryption, firewalls, backup and recovery, and so on, in much more depth and detail than this book.
 
  • 0
Опубликовал: flashsoft | 6-12-2006, 00:00 | Просмотров: 1087  Подробнее и с комментариями (0)
  Beginning Visual Basic .NET Database Programming
 Категория: Basic, VB, «Wrox»
   
 
Beginning Visual Basic .NET Database Programming
Автор: Denise Gosnell, Matthew Reynolds, Bill Forgey
Издательство: Wrox
Год издания: 2001
isbn: 1861005555
Количество страниц: 689
Язык: english
Формат: PDF

This book has been fully tested on and is compliant with the official release of NET. Almost all applications have to deal with data access in some way or another. This book will teach you how to build Visual Basic .NET applications that make effective use of databases. Visual Basic .NET is the latest version of the most widely used programming language in the world, popular with professional developers and beginners alike. Starting with a guide to the basic principles of database design, we then examine how to query databases and how to access their data - both in Windows applications and remotely using the Internet and Web Services. Every new concept is explained thoroughly with Try It Out examples, plenty of code samples, and end-of-chapter questions to test you.
 
  • 0
Опубликовал: flashsoft | 29-11-2006, 00:00 | Просмотров: 1584  Подробнее и с комментариями (0)
  Professional Perl Programming
 Категория: Perl, Ruby, «Wrox»
   
 
Professional Perl Programming
Автор: Peter Wainwright
Издательство: Wrox
Год издания: 2001
isbn: 1-861004-49-4
Количество страниц: 1200
Язык: english
Формат: PDF

Perl is one of the most important scripting languages in use today. Open source, freely available, portable, versatile, and robust, powerful and easy to use, Perl is the first choice for thousands of professional web developers. But Perl is far more than a scripting language for the web. Supported by a comprehensive standard library and hundreds of third-party libraries, Perl is an increasingly popular choice for application programming. This book provides comprehensive coverage of the Perl language. It covers the fundamentals of data types and file handling through advanced features like regular expressions, object-oriented programming, threads, internationalization, and integrating Perl with the C programming language. The latest version of the language, Perl 5.6, is used throughout, with commentary for those with earlier versions
 
  • 0
Опубликовал: flashsoft | 28-11-2006, 00:00 | Просмотров: 1366  Подробнее и с комментариями (0)
  Virtualization with Microsoft Virtual Server 2005
 Категория: Windows, «Syngress»
   
 
Virtualization with Microsoft Virtual Server 2005
Автор: David Rule Jr., Ken Majors, Matthijs ten Seldam
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-106-3
Количество страниц: 481
Язык: русский
Формат: PDF

A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot. Virtual Server allows you to consolidate 15 to 20 or even more servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs.
 
  • 0
Опубликовал: flashsoft | 15-11-2006, 00:00 | Просмотров: 1005  Подробнее и с комментариями (0)
  Security Log Management - Identifying Patterns in the Chaos
 Категория: Безопасность, взлом, «Syngress»
   
 
Security Log Management - Identifying Patterns in the Chaos
Автор: Jacob Babbin, Dave Kleiman, Everett F. Carter Jr
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-042-3
Количество страниц: 352
Язык: русский
Формат: PDF

As a system administrator or security professionals, you probably find yourself inundated each day with a deluge of log files from seemingly countless devices, servers, and applications on your network ranging from Windows Server to Snort to your PIX firewall and everything in between. At times, the task of "seeing the forest through the trees" to extract useful, repeatable information from these logs may seem almost impossible. This unique book will show you how to use a combination of open source software such as Tcpdstats, and Snort perfmonitor to create succinct, meaningful reports that give you the big picture of your network's overall health and well being. So, if you need to analyze and prioritize everything from how much of your bandwidth is devoted to browsing ESPN.com, to the most targeted machines in your IDS logs, this is the book for you. This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools.
 
  • 0
Опубликовал: flashsoft | 15-11-2006, 00:00 | Просмотров: 1148  Подробнее и с комментариями (0)
  Главная страница | Регистрация | Новое на сайте | Статистика |
 
«Librus - Mountain of Knowledge»
«Либрус - гора знаний» 2004-2020
Design by Flashsoft © 2005-2020