Либрус
 
Сделать стартовой
Добавить в избранное
Обратная связь
Карта сайта
Зеркало сайта
Новости RSS 2.0
ПОСТУПЛЕНИЯ 
«    Ноябрь 2024    »
ПнВтСрЧтПтСбВс
 123
45678910
11121314151617
18192021222324
252627282930 
РУБРИКАТОР 
Открыть | Закрыть

ПОПУЛЯРНОЕ  
АРХИВЫ   
Август 2016 (216)
Июль 2016 (456)
Июнь 2016 (321)
Май 2016 (398)
Апрель 2016 (433)
Март 2016 (554)


  Rexx Programmer’s Reference
 Категория: Прочие языки программирования, «Wrox»
   
 
Rexx Programmer’s Reference
Автор: Howard Fosdick
Издательство: Wrox
Год издания: 2005
isbn: 0-7645-7996-7
Количество страниц: 723
Язык: english
Формат: PDF

This book teaches standard Rexx, quickly and simply. It teaches you what you need to know to work with Rexx on any platform. You’ll know a language that runs anywhere—from handheld devices such as personal digital assistants, pocket PCs, Palm Pilots, and mobile and smart phones to desktop and laptop PCs, with operating systems like Windows, Linux, and others, to midrange servers from all the major vendors—right on up to the world’s largest mainframes. Rexx applies to almost any programming problem.
 
  • 0
Опубликовал: flashsoft | 27-12-2005, 00:00 | Просмотров: 1289  Подробнее и с комментариями (0)
  Aggressive Network Self-defense
 Категория: Безопасность, взлом, «Syngress»
   
 
Aggressive Network Self-defense
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-20-5
Количество страниц: 417
Язык: english
Формат: PDF (scan)

When the Worm Turns… Analyze the technical and legal implications of “neutralizing” machines that propagate malicious worms across the Internet. Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences. Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker. To Catch a Thief… Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced. Learn the Definition of “Hostile Corporate Takeover” in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war. Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation. See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes. Where the Wild Things Are… Follow along as a real-life “in-the-wild” format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine. Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
 
  • 0
Опубликовал: flashsoft | 27-12-2005, 00:00 | Просмотров: 1249  Подробнее и с комментариями (0)
  Black Hat Physical Device Security
 Категория: Безопасность, взлом, «Syngress»
   
 
Black Hat Physical Device Security
Издательство: Syngress
Год издания: 2004
isbn: 1-932266-81-X
Количество страниц: 417
Язык: english
Формат: PDF (scan)

The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more. This is the book that answers the questions: How can I protect against physical device exposures if I already have these systems in place? How do I factor risk from not having a secure method of communication over a network that is not trusted I have one or more tools that I use to test for these types of exposures in software and hardware that we manufacture. Do I need to do more than that? So much of the data that I would record through monitoring can be spoofed, so why record it at all? Can you break any embedded device with physical access? If we place high-level communication processes within our devices, isn’t that creating more problems then simply plugging wires that carry raw signals into these devices?
 
  • 0
Опубликовал: flashsoft | 27-12-2005, 00:00 | Просмотров: 1194  Подробнее и с комментариями (0)
  Oracle SQL- Jumpstart with Examples
 Категория: Компьютерная литература » Языки программирования » SQL, MySQL
   
 
Oracle SQL- Jumpstart with Examples
Автор: Gavin Powell, Carol McCullough-Dieter
Издательство: Elsevier
Год издания: 2005
isbn: 1-55558-323-7
Количество страниц: 683
Язык: english
Формат: PDF

Oracle SQL Jumpstart with Examples will be a very useful reference and should be a hit for anyone who may be using Oracle SQL. This book should become very popular not only with Developers and DBAs but also Database Managers, Designers and System Managers. Even busy executives can use the book to quickly write queries on an occasional basis. Additionally, the examples in the book provide a good reference for functional people, (such as systems engineers and project leaders,) who want a better understanding of the true capabilities of Oracle SQL, allowing for better articulation and understanding of user and system requirements.
 
  • 0
Опубликовал: flashsoft | 27-12-2005, 00:00 | Просмотров: 1258  Подробнее и с комментариями (0)
  Cyber Spying Tracking Your Familys Secret Online Lives
 Категория: Безопасность, взлом, «Syngress»
   
 
Cyber Spying Tracking Your Familys Secret Online Lives
Автор: T.Fair, M.Nordfeld
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-41-8
Количество страниц: 465
Язык: english
Формат: PDF (scan)

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using the tools and techniques in this book to check up or spy on them, you can identify the perils, educate your loved ones about impending danger, and avoid potential physical, emotional, or financial disasters. This book was written to help make the Internet safe for families and friends; to raise awareness of the inherent dangers of the Internet; and to help parents keep their children out of trouble.
 
  • 0
Опубликовал: flashsoft | 27-12-2005, 00:00 | Просмотров: 993  Подробнее и с комментариями (0)
  Delphi. Разработка баз данных
 Категория: Компьютерная литература » Языки программирования » Delphi
   
 
Delphi. Разработка баз данных
Автор: Андрей Сорокин
Издательство: Питер
Год издания: 2005
isbn: 5-469-00927-0
Количество страниц: 473
Язык: русский
Формат: PDF

Разработка приложений баз данных является одной из наиболее востребованных возможностей среды программирования Delphi. Эта среда программирования предоставляет разработчику поистине великолепный набор простых в использовании инструментов, позволяющих быстро разрабатывать сложные проекты. В этой книге подробно рассматриваются все наиболее распространенные серверы баз данных и приводятся примеры взаимодействия с каждым из них. Также уделено внимание вопросам проектирования эффективных баз данных, что позволит читателю, не обладающему необходимым опытом, незамедлительно приступить к работе. Книга в первую очередь ориентирована на начинающих программистов, работающих с Delphi, и на тех, кто хочет углубить свои знания в сфере разработки баз данных.
 
  • 0
Опубликовал: flashsoft | 27-12-2005, 00:00 | Просмотров: 1549  Подробнее и с комментариями (1)
  Design for Web Developers: Colour and Layout for the Artistically Overwhelemed
 Категория: Компьютерная литература » WEB - строительство » Дизайн
   
 
Design for Web Developers: Colour and Layout for the Artistically Overwhelemed
Автор: Linda Goin
Издательство: DMXzone
Год издания: 2005
Количество страниц: 222
Язык: english
Формат: PDF

This book is for anyone with an interest in developing their skills as a visual communicator, who wants to get to grips with the basics of graphical design, so they can develop their artistic skills and make more powerful and effective web sites.
 
  • 0
Опубликовал: flashsoft | 27-12-2005, 00:00 | Просмотров: 1178  Подробнее и с комментариями (0)
  The Best Damn Cisco Internetworking Book Period
 Категория: Cisco, «Syngress»
   
 
The Best Damn Cisco Internetworking Book Period
Издательство: Syngress
Год издания: 2003
isbn: 1-931836-91-4
Количество страниц: 1169
Язык: english
Формат: PDF

Step-by-Step Instructions for Integrating Wired and Wireless LAN Technologies, Including Coverage of the Cisco Aironet Line of Devices. Detailed Coverage of Cisco WAN Technologies, Including Configuration and Deployment. Build a Working PIX Firewall Design, from Initial Planning to Robust Configuration.
 
  • 0
Опубликовал: flashsoft | 26-12-2005, 00:00 | Просмотров: 1118  Подробнее и с комментариями (0)
  The Best Damn Firewall Book Period
 Категория: Безопасность, взлом, «Syngress»
   
 
The Best Damn Firewall Book Period
Издательство: Syngress
Год издания: 2003
isbn: 1-931836-90-6
Количество страниц: 1329
Язык: english
Формат: PDF

The Internets explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it, from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internets vulnerable public infrastructure. The Best Damn Firewalls Book Period covers the most popular Firewall products, from Ciscos PIX Firewall to Microsofts ISA Server to CheckPoint NG, and all the components of an effective firewall set up. Anything needed to protect the perimeter of a network can be found in this book.
 
  • 0
Опубликовал: flashsoft | 26-12-2005, 00:00 | Просмотров: 1156  Подробнее и с комментариями (0)
  The Consumer’s Guide to Wireless Phones and Service Plans
 Категория: Телефония, сотовая связь, мобильные телефоны, «Syngress»
   
 
The Consumer’s Guide to Wireless Phones and Service Plans
Издательство: Syngress
Год издания: 2002
isbn: 1-928994-52-0
Количество страниц: 259
Язык: english
Формат: PDF

Consumers are paying between 50% and 500% too much every month got the services that keep them in touch, in tune, and informed. Why would anyone pay $.30 per minute for long distance when they could pay just $.05? The answer is because there has not been a good way to determine the correct services based on the way YOU use your wireless phone.
 
  • 0
Опубликовал: flashsoft | 26-12-2005, 00:00 | Просмотров: 1074  Подробнее и с комментариями (0)
  Главная страница | Регистрация | Новое на сайте | Статистика |
 
«Librus - Mountain of Knowledge»
«Либрус - гора знаний» 2004-2020
Design by Flashsoft © 2005-2020