Showing posts with label Hacking and Security. Show all posts
Showing posts with label Hacking and Security. Show all posts

Friday, August 12, 2011

IT, Hacking, Programming, Security Ebooks Collection

IT, Hacking, Programming, Security Ebooks Collection

IT, Hacking, Programming, Security Ebooks Collection
English | PDF | All In One | 6.34 GB

A big collection of IT, hacking, programming, security ebooks, tutorials, articles, videos.

List on read more

d---- 5/18/2009 6:02 PM 100 linux tips and tricks(pdf)
da--- 1/11/2009 7:05 PM Abstractizarea Datelor. Clase si Obiecte
d---- 5/2/2009 5:06 PM Algoritmi
d---- 9/8/2008 7:08 PM Aplicatii multimedia
d---- 1/13/2009 1:57 PM Application_Programing_Interfaceafcaf
da--- 9/7/2008 9:00 PM Arhitectura Calculatoarelor
d---- 1/11/2009 7:07 PM Atestat FoxPro
da--- 9/7/2008 9:01 PM Automatica
d---- 1/13/2009 1:58 PM Baze de date
da--- 1/13/2009 1:59 PM Baze de Date FoxPro
da--- 1/13/2009 1:59 PM C++
d---- 11/7/2008 4:13 PM Calculatorul electronic.doca2a03.doc
d---- 1/13/2009 2:00 PM Carte MySQL Romana
d---- 4/12/2009 5:05 PM CEH Videos
d---- 4/12/2009 5:01 PM Certified_Ethical_Hacker_Lab_3.0
d---- 9/8/2008 7:27 AM Cibernetica
da--- 9/8/2008 7:20 PM Clase Derivate. Mosteniri. Functii Virtuale
da--- 9/9/2008 11:38 AM Curs ECDL
da--- 1/13/2009 2:04 PM Curs Java
da--- 9/8/2008 6:38 PM Curs Retele
d---- 1/13/2009 2:03 PM Curs Word
d---- 5/18/2009 6:02 PM Curs.Retele.de.Calculatoare
da--- 1/13/2009 2:08 PM Cursuri pentru Fox Pro
d---- 8/25/2008 1:06 PM Curs_Pascal
d---- 2/23/2009 12:55 PM Defcon 15
d---- 9/8/2008 7:27 AM Despre programare
d---- 11/7/2008 4:13 PM E-mail.doc07b21.doc
d---- 11/7/2008 4:13 PM Emailc8f2c
d---- 5/2/2009 9:13 PM Ethical Hacking v6
d---- 4/12/2009 5:05 PM Ethical Hacking Videos
d---- 1/13/2009 2:06 PM grafuri2a4ed
d---- 1/13/2009 2:06 PM GRAFURI_NEORIENTATE[1]e6512
d---- 1/13/2009 2:05 PM Hackeri.docd9c02.doc
d---- 4/12/2009 5:01 PM HackersBlackBook
d---- 5/18/2009 6:02 PM Hackersblog Tutoriale
d---- 1/13/2009 2:06 PM Hardware.doc7d375.doc
d---- 1/13/2009 2:07 PM INF - 3D.docfd537.doc
da--- 9/9/2008 11:38 AM Informatica
d---- 1/13/2009 2:09 PM Informatica_Codul_hackerului92178
da--- 1/13/2009 2:09 PM Inginerie Software
d---- 1/13/2009 2:10 PM Interfere grafice
d---- 8/25/2008 1:05 PM Java books
d---- 1/13/2009 2:10 PM Java vizavi de C.doc13afb.doc
d---- 1/13/2009 2:11 PM Limbaj de asamblare
da--- 9/8/2008 7:21 PM Limbaj de Programare
d---- 5/18/2009 6:02 PM Limbajul.C.in.Limba.Romana-FL.part3
d---- 11/7/2008 4:13 PM LinuxNou_B5_verc34eb
d---- 1/13/2009 2:12 PM Macromedia Flash
d---- 5/18/2009 6:03 PM Manuale
d---- 1/13/2009 2:12 PM Manual_compresie_Video1e3fb
d---- 1/13/2009 2:13 PM Metoda_Backtaking78253
d---- 1/13/2009 2:14 PM Microprocesoarelede2ce
d---- 1/13/2009 2:14 PM pointeri.doc63b1c.doc
da--- 9/8/2008 7:23 PM Prezentari in Power Point Turbo Pascal
dar-- 9/8/2008 7:22 PM Programare in Limbaj de Asamblare
da--- 9/7/2008 9:00 PM Programare Orientata pe Obiecte
da--- 9/7/2008 9:01 PM Programarea Interfetelor Aplicatiilor Windows
d---- 1/13/2009 2:21 PM Proiect SCR.docdf7b8.doc
d---- 1/13/2009 2:21 PM Protocoalele_ARP,_RARP,_DHCP6ca82
d---- 1/13/2009 2:22 PM retele_de_calculatoare7b4f5
d---- 11/7/2008 4:13 PM retele_de_calculatoare984d8
d---- 1/13/2009 2:23 PM Robotica.docee279.doc
d---- 1/13/2009 2:23 PM root.doca9cce.doc
d---- 1/13/2009 2:23 PM Schema_de_alocare_a_fisierelor_pe_medii_de_stocarec2350
d---- 4/12/2009 5:06 PM Secrets_of_a_super_hacker
d---- 1/13/2009 2:24 PM securitatea_si_elemente_de_eticaee28a
da--- 9/8/2008 7:23 PM Supraincarcarea Operatorilor si Functiilor
d---- 1/13/2009 2:25 PM switchul_de_retead4e02
d---- 5/18/2009 6:03 PM Symbian C++ Programming ebooks
d---- 1/13/2009 2:26 PM TCP.doc8c479.doc
da--- 9/8/2008 7:23 PM Tehnici de Compilare
dar-- 9/9/2008 4:03 PM Totul despre Office si Visual Basic
da--- 9/8/2008 6:41 PM Tutorate Internet
d---- 1/13/2009 2:27 PM Tutorial LAN_W2k_Xp.pdf8306b.pdf
d---- 1/13/2009 2:27 PM Tutorial MySQL.zip
d---- 1/13/2009 2:27 PM vectoribd4a5
d---- 1/13/2009 2:28 PM Visual C
d---- 5/18/2009 6:03 PM Windows Vista Annoyances Tips, Secrets, and Solutions - allfreebooks.tk
d---- 5/20/2009 8:39 PM WindowsPowerShell_English_DocumentationPack.zip
d---- 5/18/2009 6:03 PM Wrox.Beginning.PHP.6.Apache.MySQL.6.Web.Development.Jan.2009.eBook-DDU
-a--- 5/18/2009 1:25 PM 227168 %28Ebook - Computer%29 Hacking The Windows Registry.pdf
-a--- 10/16/2006 7:43 PM 6360398 A Practical Guide to Security Engineering and Information Assurance.pdf
-a--- 4/13/2009 7:51 AM 2703359 Accelerated C++.pdf
-a--- 4/15/2009 7:56 PM 58200708 Addison Wesley - Fuzzing Brute Force Vulnerability Discovery_2007_Scaned.p
df
-a--- 4/13/2009 7:51 AM 1232674 Addison Wesley - More Exceptional C++.pdf
-a--- 4/13/2009 7:42 AM 5317174 Addison Wesley - OSPF. Anatomy of an Internet Routing Protocol.pdf
-a--- 4/13/2009 7:50 AM 9912987 Addison Wesley Advanced Windows Debugging.pdf
-a--- 4/13/2009 8:25 AM 33981351 Addison.Wesley.Cocoa.Programming.for.Mac.OS.X.3rd.Edition.May.2008.txt
-a--- 4/13/2009 8:28 AM 2805708 Addison.Wesley.Design.Patterns.in.Ruby.Dec.2007.pdf
-a--- 4/13/2009 7:47 AM 24907459 Addison.Wesley.Mac.OS.X.Internals.A.Systems.Approach.Jun.2006.txt
-a--- 4/13/2009 7:43 AM 4174193 Addison.Wesley.OSPF.and.IS-IS.Choosing.an.IGP.for.Large.Scale.Networks.Nov
.2005.txt
-a--- 4/15/2009 7:52 PM 7951859 Addison.Wesley.Pub.Exploiting.Software.How.to.Break.Code.eBook-kB.pdf
-a--- 4/13/2009 8:30 AM 1565802 Addison.Wesley.The.Art.Of.Unix.Programming.eBook-LiB.txt
-a--- 4/13/2009 8:29 AM 3369501 Advanced Programming in the UNIX Environment, 2nd edition.txt
-a--- 5/18/2009 1:31 PM 1024157 advancedjavascript.pdf
-a--- 4/13/2009 7:53 AM 2959437 AI For Game Developers.txt
-a--- 5/18/2009 1:26 PM 8359388 Ajax For Dummies (2006).pdf
-a--- 3/5/2008 7:43 PM 331264 Algoritmi 2.doc
-a--- 8/31/2007 12:11 AM 3592944 An Introduction To Cryptography 2nd Edition.pdf
-a--- 4/13/2009 7:51 AM 835357 Andrei Alexandrescu - Modern C++ Design, Generic Programming and Design Pa
tterns Applied.txt
-a--- 3/18/2009 2:10 PM 123028 apihooking.pdf
-a--- 7/17/2006 4:37 PM 478208 Aplicatii de retea in internet.doc
-a--- 4/13/2009 8:28 AM 4135519 Apress.Practical.Ruby.Gems.Apr.2007.pdf
-a--- 4/10/2007 10:21 PM 632832 Arhitectura Platformei de Dezvoltare Net Framework.doc
-a--- 3/5/2008 5:38 PM 1416192 Arhitecturi de Retea.doc
-a--- 2/27/2009 3:45 PM 29246197 Art_Science_Of_CSS_Giveaway.pdf
-a--- 6/14/2003 2:21 PM 168448 Aspecte de securitate în retele de calculatoare.doc
-a--- 4/13/2009 8:23 AM 7180921 AspectJ in Action - Practical Aspect Oriented Programming.pdf
-a--- 2/20/2009 9:12 AM 119007 Authenticode_PE.docx
-a--- 9/1/2006 2:05 PM 219136 AutoCad.doc
-a--- 10/28/2007 10:24 PM 43008 Backtracking.doc
-a--- 1/11/2009 10:49 AM 760737 Baze de Date - In VFP.pdf
-a--- 5/26/2008 1:01 AM 466432 Baze de Date Acces.doc
-a--- 4/13/2009 8:29 AM 8091180 Beginning Linux Programming 4th ed.pdf
-a--- 4/13/2009 7:53 AM 2818547 Beginning Math and Physics for Game Programmers (New Riders 2004).txt
-a--- 4/13/2009 8:26 AM 3959850 Beginning.CakePHP.From.Novice.to.Professional.Jul.2008.pdf
-a--- 4/13/2009 7:53 AM 7053450 Break Into The Game Industry.pdf
-a--- 4/13/2009 7:51 AM 3025949 Bruce Eckel.Thinking in C++ Vol.1.pdf
-a--- 4/13/2009 7:51 AM 2089683 Bruce Eckel.Thinking in C++ Vol.2.pdf
-a--- 4/15/2009 7:53 PM 1167666 Bruce Schneier.Beyond Fear - Thinking Sensibly about security in an uncert
ain world.pdf
-a--- 4/15/2009 7:53 PM 748010 Bruce Sterling The Hacker Crackdown.pdf
-a--- 4/15/2009 7:53 PM 5134597 Building Internet Firewalls 2nd ed 2000.pdf
-ar-- 6/26/2000 9:25 AM 1346560 C#.DOC
-a--- 4/13/2009 7:51 AM 537192 C++ Coding Standards - 101 Rules, Guidelines, and Best Practices.txt
-a--- 4/13/2009 7:51 AM 510477 C++ Common Knowledge Essential Intermediate Programming.txt
-a--- 4/13/2009 7:51 AM 3089594 C++ In Action Industrial Strength Programming Techniques.pdf
-a--- 4/13/2009 7:51 AM 754998 C++ Templates - The Complete Guide.txt
-a--- 12/4/2007 4:41 PM 302288 Capitolul 5 - Criptografie.pdf
-a--- 5/22/2008 9:31 PM 222208 Caracteristici ale Limbajului HTML.DOC
-a--- 3/15/2009 10:56 AM 438471 Changing the entry-point.pdf
-a--- 4/13/2009 7:53 AM 2255210 Chris Crawford on Game Design.txt
-a--- 11/18/2007 2:21 PM 3474177 Cisco Press LAN Switch Security.pdf
-a--- 4/13/2009 8:30 AM 5378114 Code Complete - A Practical Handbook of Software Construction.2004.pdf
-a--- 1/23/2008 3:49 AM 165939 Combinatorica si grafuri 1.pdf
-a--- 1/23/2008 3:49 AM 105855 Combinatorica si grafuri 2.pdf
-a--- 5/29/2008 5:29 PM 64000 Configurare Bios .doc
-a--- 4/13/2009 7:57 AM 19428088 Core.Java.Volume.I.Fundamentals.8th.Edition.pdf
-a--- 4/13/2009 7:57 AM 20902725 Core.Java.Volume.II.Fundamentals.8th.Edition.txt
-a--- 4/15/2009 7:51 PM 4036624 Covert Java - Techniques For Decompiling, Patching, And Reverse Engineerin
g, 2004.pdf
-a--- 2/11/2009 4:31 PM 2666 cq decode.txt
-a--- 4/15/2009 7:54 PM 7545190 Crimeware- Understanding New Attacks and Defenses (Symantec Press).2008.pd
f
-a--- 2/19/2007 6:06 AM 12999168 Cryptography And Network Security.chm
-a--- 12/20/2006 1:13 PM 276992 Curs Linux.doc
-a--- 10/2/2008 8:46 PM 433444 Curs Socket.pdf
-a--- 4/13/2009 7:55 AM 20564949 Data Structures For Game Programmers.pdf
-a--- 4/13/2009 8:27 AM 7137996 Distributed Computing - Principles, Algorithms, and Systems.pdf
-a--- 4/15/2009 7:54 PM 2017392 Douglas Thomas - Hacker Culture.pdf
-a--- 4/13/2009 7:51 AM 671853 Effective C++ 55 Specific Ways to Improve Your Programs and Designs (3rd E
dition).txt
-a--- 4/13/2009 7:57 AM 2129188 Effective Java 2nd Edition.pdf
-a--- 4/13/2009 7:47 AM 4495794 Essential System Administration, 3rd Edition.txt
-a--- 4/13/2009 7:43 AM 17947070 Ethereal Packet Sniffing.txt
-a--- 4/13/2009 7:52 AM 2251803 Expert C Programming.pdf
-a--- 4/13/2009 8:24 AM 13488353 Expert.F.Sharp.Dec.2007.pdf
-a--- 3/14/2009 9:00 AM 314017 exploiting-drivers.pdf
-a--- 9/24/2006 9:08 PM 2225664 Fibre optice.doc
-a--- 1/20/2007 11:11 PM 94208 Fisiere Visual Basic.doc
-a--- 12/11/2008 2:41 PM 40307719 For.Dummies.CompTIA.A.plus.Certification.All.In.One.Desk.Reference.For.Dum
mies.Jan.2007.pdf
-a--- 4/13/2009 8:30 AM 16714046 Foundations of GTK Development.pdf
-a--- 2/27/2009 3:31 PM 3084234 Friendsofed Html Mastery Semantics Standards and Styling Dec 2006 .pdf
-a--- 4/13/2009 7:56 AM 54528754 Game Scripting Mastery.Alex Varanese.2002.pdf
-a--- 4/13/2009 7:54 AM 6992483 Game.Physics.Engine.Development.Mar.2007.pdf
-a--- 12/6/2006 9:14 AM 139776 Gestiunea datelor multimedia cu interMedia Oracle.ppt
-a--- 4/15/2009 7:55 PM 16016087 Google Hacking for Penetration Testers.pdf
-a--- 7/14/2007 6:48 PM 192512 Grafurile Orientate si Neorientate.doc
-a--- 4/13/2009 8:24 AM 13810445 Groovy in Action.Jan.2007.pdf
-a--- 2/28/2007 9:31 AM 13075155 Hack Proofing Linux - A Guide To Open Source Security.pdf
-a--- 2/28/2007 5:48 PM 6923604 Hack-Proof_Your_Wireless_Network.pdf
-a--- 4/15/2009 7:51 PM 3981854 Hacker Disassembling Uncovered.pdf
-a--- 12/8/2008 1:27 PM 3002507 Hacker Highschool - Security Awareness For Teens.pdf
-a--- 12/31/2006 2:36 PM 4681808 Hacker Linux Uncovered - A.List.chm
-a--- 4/13/2009 8:30 AM 2212948 Hacker's Delight.txt
-a--- 3/8/2007 9:37 PM 568302 Hacker.Web.Exploitation.Uncovered.chm
-a--- 7/26/2004 1:48 AM 4844894 Hackers Beware.pdf
-a--- 12/12/2006 8:48 AM 647740 hacker_crackdown.pdf
-a--- 5/7/2007 3:59 AM 8438744 Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition.pdf
-a--- 1/14/2007 8:39 PM 233984 Hard-Disk-ul.doc
-a--- 1/10/2009 9:14 PM 13269888 Hardware-based Computer Security Techniques to Defeat Hackers.pdf
-a--- 8/30/2008 4:01 PM 1276878 hi level reverse engine.pdf
-a--- 4/15/2009 7:56 PM 2157751 How To Study.pdf
-a--- 5/18/2009 1:26 PM 11312123 HTML 4 for Dummies 5th Edition.pdf
-a--- 4/13/2009 7:52 AM 1186861 Imperfect C++ Practical Solutions for Real Life Programming (Addison Wesl
ey.2004).txt
-a--- 1/11/2009 10:04 AM 1505335 Indrumar FoxPro.pdf
-a--- 9/8/2008 7:15 AM 121410 Inginerie Sociala.pdf
-a--- 2/1/2007 8:20 AM 3114496 Initiere Linux.doc
-a--- 4/15/2009 7:51 PM 4200276 Inside Java 2 Platform Security.pdf
-a--- 4/13/2009 7:43 AM 3196706 Interconnections - Bridges, Routers, Switches, and Internetworking Protoco
ls (2nd Edition).pdf
-a--- 4/13/2009 7:43 AM 4911587 Internet Routing Architectures 2nd Edition.pdf
-a--- 8/9/2008 11:23 AM 171008 Internetul.doc
-a--- 4/13/2009 7:45 AM 38766735 Internetworking with TCP IP Vol.1 Principles, Protocols, and Architecture
(4th Edition).pdf
-a--- 4/13/2009 7:43 AM 8176446 Internetworking with TCPIP Vol. III, Client-Server Programming and Applica
tions--BSD Socket Version (2nd Edition) (Internetworking with TCPIP Vol. 3
) .pdf
-a--- 10/13/2008 6:42 PM 164352 Introducere in Delphi.doc
-a--- 3/5/2008 5:40 PM 577024 Introducere in Retele de Calculatoare.ppt
-a--- 1/11/2007 5:34 PM 2025472 Introducere Matlab.doc
-a--- 8/31/2008 12:53 PM 84160 ipv6 rfc.txt
-a--- 4/13/2009 8:23 AM 887410 J for C Programmers.pdf
-a--- 4/22/2008 1:06 PM 731890 Jargon Informatic.htm
-a--- 9/1/2008 2:58 PM 670208 Java & javascript.DOC
-a--- 4/13/2009 8:26 AM 1218520 Java Concurrency In Practice.txt
-a--- 8/26/2008 1:48 PM 1496064 Java Laborator.pdf
-a--- 4/13/2009 7:56 AM 1298600 Java Puzzlers Traps, Pitfalls, and Corner Cases.txt
-a--- 4/13/2009 7:56 AM 1791524 Java Reflection in Action.Manning.2004.pdf
-a--- 4/13/2009 7:57 AM 4103512 Java.J2EE.Job.Interview.Companion.2nd.Edition.Apr.2007.pdf
-a--- 7/15/2006 3:51 PM 41472 java.util.doc
-a--- 4/13/2009 7:58 AM 1704386 javascript - The Good parts.txt
-a--- 4/13/2009 7:58 AM 2328748 javascript The.Definitive Guide 5th.txt
-a--- 4/13/2009 8:24 AM 5262340 Jess in Action - Java Rule-Based Systems.pdf
-a--- 4/13/2009 7:59 AM 24293096 jQuery in Action.pdf
-a--- 4/13/2009 7:59 AM 5078862 jQuery Reference Guide.pdf
-a--- 4/13/2009 7:46 AM 28886269 Kozierok.The.TCP-IP.Guide.A.Comprehensive.Illustrated.Internet.Protocols.R
eference.pdf
-a--- 1/10/2007 1:45 AM 192512 LAB_8087.DOC
-a--- 1/10/2007 1:45 AM 192512 LAB_80871.doc
-a--- 4/13/2009 8:24 AM 11967423 Laszlo in Action.Manning.2007.pdf
-a--- 1/26/2008 9:32 AM 1430526 Learning Visual Basic .NET 2003.chm
-a--- 6/23/2008 11:07 PM 2502656 Limbaje de Programare.doc
-a--- 4/14/1999 3:34 PM 476048 Limbajul C.txt
-a--- 9/3/2007 10:30 AM 1146880 Limbajul Visual FoxPro.doc
-a--- 5/18/2009 1:29 PM 36494870 Linux For You - March 2009 (Malestrom).pdf
-a--- 4/15/2009 7:53 PM 15260814 Manning.SOA.Security.Dec.2007.pdf
-a--- 12/28/2008 3:21 PM 97432720 Manual C#.pdf
-a--- 7/14/2007 9:47 PM 1177600 Manual Grafuri.doc
-a--- 4/13/2009 8:25 AM 21555211 Mastering Delphi 7 (2003).txt
-a--- 7/24/2006 2:24 PM 153088 Medii de transmisie.doc
-a--- 7/17/2006 4:53 PM 103424 Metoda Backtracking.doc
-a--- 1/24/2008 9:42 AM 1567744 Microcontrolere_PIC16F84[1]93a53.doc
-a--- 3/10/2007 3:35 PM 160768 Microprocesor.doc
-a--- 4/15/2009 7:57 PM 7063340 Mobile Malware Attacks and Defense.pdf
-a--- 4/13/2009 8:27 AM 4772437 Modern.Multithreading.Implementing.Testing.and.Debugging.Multithreaded.Jav
a.and.C.Plus.Plus.Pthreads.Win32.Programs.2005.pdf
-a--- 4/13/2009 7:52 AM 1232674 More Exceptional C++.pdf
-a--- 4/13/2009 7:54 AM 12116615 Morgan Kaufmann - Game Physics.djvu
-a--- 8/30/2008 3:59 PM 26057 ms api pointer hijack.pdf
-a--- 4/13/2009 7:50 AM 9967176 MS Windows Internals 4th Edition.txt
-a--- 4/15/2009 7:51 PM 4237070 MSPress Writing Secure Code.pdf
-a--- 12/23/2008 2:36 PM 443317 net framework.pdf
-a--- 1/6/2008 10:40 PM 17585352 Networking with Microsoft Windows Vista - Que.pdf
-a--- 4/13/2009 8:29 AM 2832487 No Starch Press - The Official Gnome 2 Developers Guide.txt
-a--- 4/13/2009 7:44 AM 10451167 No.Starch.Press.Practical.Packet.Analysis.May.2007.pdf
-a--- 4/13/2009 8:30 AM 6684410 No.Starch.Press.The.Book.of.Qt.4.The.Art.of.Building.Qt.Applications.Jul.2
007.1593271476.pdf
-a--- 4/13/2009 7:47 AM 5459301 No.Starch.Press.The.Debian.System.Concepts.and.Techniques.Sep.2005.pdf
-a--- 4/13/2009 8:27 AM 1538215 O'Reilly, Python Cookbook (2005), 2Ed LiB LotB.txt
-a--- 4/13/2009 8:28 AM 3809468 O'Reilly.Media.JRuby.Cookbook.2008.txt
-a--- 12/9/2006 11:13 AM 167936 Oracle - Modelul Relational.doc
-a--- 8/12/2008 2:26 PM 7309312 Oracle .doc
-a--- 4/13/2009 7:44 AM 14109672 OReilly - Network Warrior.pdf
-a--- 4/13/2009 7:44 AM 2158287 OReilly.Cisco IOS Cookbook.2006.txt
-a--- 4/13/2009 7:43 AM 2470225 OReilly.DNS.and.BIND.5th.Edition.May.2006.txt
-a--- 4/13/2009 7:44 AM 1451746 OReilly.JUNOS.Cookbook.Apr.2006.txt
-a--- 4/13/2009 7:45 AM 6996620 OReilly.JUNOS.Enterprise.Routing.Mar.2008.txt
-a--- 4/13/2009 7:48 AM 2381604 OReilly.Linux.Annoyances.for.Geeks.Apr.2006.txt
-a--- 4/13/2009 8:30 AM 1526426 OReilly.Mastering.Regular.Expressions.3rd.Edition.Aug.2006.txt
-a--- 4/13/2007 8:43 PM 4040648 OReilly.Network.Security.Hacks.2nd.Edition.Oct.2006.chm
-a--- 4/13/2009 8:27 AM 3462755 OReilly.Programming.Collective.Intelligence.Aug.2007.pdf
-a--- 4/13/2009 8:28 AM 1895007 OReilly.Ruby.Cookbook.Jul.2006.txt
-a--- 4/13/2009 7:52 AM 1704688 OReilly.The.Art.of.SQL.Mar.2006.download
-a--- 4/13/2009 8:28 AM 10771625 OReilly.The.Ruby.Programming.Language.Jan.2008.txt
-a--- 4/13/2009 7:52 AM 1742125 OReilly.Understanding.MySQL.Internals.Apr.2007.pdf
-a--- 4/13/2009 7:48 AM 2904191 OReilly.Understanding.the.Linux.Kernel.3rd.Edition.Nov.2005.txt
-a--- 4/13/2009 8:24 AM 2783970 OReilly.XQuery.Mar.2007.pdf
-a--- 4/13/2009 7:58 AM 9855175 Packt.Publishing.Learning.JQuery.Jul.2007.pdf
-a--- 4/13/2009 8:29 AM 2378239 Paraglyph.Press.Windows.Admin.Scripting.Little.Black.Book.2nd.Edition.eBoo
k-LiB.txt
-a--- 4/13/2009 8:27 AM 4358955 Parallel Scientific Computing in C++ and MPI.pdf
-a--- 7/13/2006 9:59 PM 84480 Parametrii liniei de comanda in C si C++.doc
-a--- 2/24/2007 8:24 PM 119296 Partitionarea si Formatarea HDD.doc
-a--- 4/13/2009 8:27 AM 3549440 Patterns for Parallel Programming.pdf
-a--- 4/13/2009 7:53 AM 6590563 Paul DuBois.MySQL (4th Edition).2008.pdf
-a--- 2/20/2009 8:41 AM 200366 pecoff_v8.docx
-a--- 2/20/2009 9:01 AM 89362 Peering Insidea PE file.txt
-a--- 5/18/2009 1:18 PM 644875 PHP.pdf
-a--- 9/4/2008 6:55 PM 100352 Pointeri.doc
-a--- 11/6/2007 1:07 PM 308430 Portul Paralel.pdf
-a--- 4/13/2009 8:30 AM 2732426 POSIX Programmer's Guide - Writing Portable UNIX Programs with the POSIX.1
Standard.pdf
-a--- 4/13/2009 8:24 AM 2198847 Practical Common LISP.Peter Seibel.txt
-a--- 4/13/2009 8:24 AM 1132668 Practical Programming in Tcl and Tk.pdf
-a--- 4/13/2009 8:28 AM 4665823 Practical Ruby for System Administration.pdf
-a--- 4/13/2009 8:31 AM 2548557 Pragmatic.The.Definitive.ANTLR.Reference.May.2007.pdf
-a--- 4/13/2009 7:44 AM 8967998 Prentice Hall - Andrew Tanenbaum - Computer Networks, Fourth Edition.txt
-a--- 4/13/2009 7:52 AM 4410486 Prentice Hall - The Standard C Library.djvu
-a--- 4/13/2009 8:29 AM 2196089 Prentice Hall - Unix Shells By Example, Third Edition - 2001 Oct.txt
-a--- 4/13/2009 8:26 AM 6112780 Pro.PHP.Patterns.Frameworks.Testing.and.More.pdf
-a--- 7/15/2008 12:17 AM 18580398 Professional CSS Cascading Style Sheets for Web Design 2008.pdf
-a--- 4/13/2009 8:25 AM 9037194 Professional haXe and Neko.Wrox.2008.pdf
-a--- 4/13/2009 8:27 AM 8420347 Professional.Search.Engine.Optimization.with.PHP.Apr.2007.pdf
-a--- 11/23/2006 8:47 AM 78336 Programare Avansata Utilizand Clase.doc
-a--- 7/3/2007 7:23 PM 1561600 Programare Orientata Obiect in C++.doc
-a--- 10/12/2000 4:39 PM 545280 Programare-C.doc
-a--- 4/13/2009 8:25 AM 2783822 Programming Erlang.Software for a Concurrent World.pdf
-a--- 4/13/2009 7:52 AM 5186669 Programming in C 3rd Edition.pdf
-a--- 4/13/2009 8:24 AM 848757 Programming in Haskell - Graham Hutton (2007).pdf
-a--- 4/13/2009 8:25 AM 5072050 Programming in Scala.pdf
-a--- 4/13/2009 7:57 AM 3103742 Programming Spiders, Bots, and Aggregators in Java.pdf
-a--- 4/13/2009 7:49 AM 2706885 Programming the Microsoft Windows Driver Model 2ed.Microsoft_Press.txt
-a--- 4/13/2009 8:30 AM 3958631 Programming with GNU Software.djvu
-a--- 7/15/2008 12:22 AM 9891772 Programming.Visual.Basic.2008.pdf
-a--- 9/4/2008 1:03 PM 480256 Proiectarea si analiza sistemelor de operare.doc
-a--- 3/5/2008 5:47 PM 354816 Protocoale de Retea.ppt
-a--- 4/13/2009 8:25 AM 3642695 Purely Functional Data Structures.djvu
-a--- 8/30/2008 4:05 PM 985514 rainbow tables.pdf
-a--- 4/13/2009 8:25 AM 4061446 Real World Haskell.txt
-a--- 4/13/2009 8:25 AM 767500 REBOL Essentials (2003).pdf
-a--- 4/13/2009 8:31 AM 1642472 Refactoring Improving the Design of Existing Code - Fowler-Beck-Brant-Opdy
ke-Roberts.txt
-a--- 4/13/2009 8:31 AM 3265410 RESTful Web Services - Leonard Richardson, Sam Ruby.2007.pdf
-a--- 3/5/2008 5:33 PM 161792 Retea Token-Ring.ppt
-a--- 3/28/2008 1:13 PM 480618 Retele de Calculatoare - Linux.pdf
-a--- 10/2/2008 8:47 PM 205841 Retele de calculatoare.pdf
-a--- 3/18/2002 10:46 AM 637165 Retele Locale fara Fir.pdf
-a--- 1/14/2007 5:07 PM 223232 Retele Virtual-LAN.doc
-a--- 8/30/2008 3:57 PM 339097 reverse engeinering anti crack.pdf
-a--- 4/15/2009 7:53 PM 8779584 Reversing - Secrets of Reverse Engineering(Eldad Eilam ).pdf
-a--- 4/13/2009 8:25 AM 8523146 Rexx Programmer's Reference.pdf
-a--- 4/13/2009 7:52 AM 2900111 Ritchie & Kernighan.The Ansi C Programming Language - 2nd Ed.pdf
-a--- 4/13/2009 8:25 AM 434261 Roberto Ierusalimschy Programming in Lua.pdf
-a--- 4/13/2009 8:28 AM 1596967 Ruby Phrasebook - Essential Code and Commands.pdf
-a--- 4/15/2009 7:57 PM 888546 Secrets of a Superthief.pdf
-a--- 8/30/2008 4:01 PM 368856 Secure file upload in PHP web applications.pdf
-a--- 9/2/2007 3:57 PM 5790398 Securing VoIP Networks.pdf
-a--- 7/15/2006 4:03 PM 60416 Serializarea obiectelor in Java.doc
-a--- 9/15/2002 7:33 PM 350895 Serviciul IRC - Internet Relay Chat.pdf
-a--- 7/22/2006 12:55 PM 194048 Sintaxa limbajului HTML.doc
-a--- 6/13/2008 5:56 PM 629760 Sisteme cu Microprocesoare.doc
-a--- 7/15/2008 11:35 PM 268288 Sisteme Operare MS-DOS.doc
-a--- 4/13/2009 8:25 AM 13109569 Smalltalk, Objects and Design.pdf
-a--- 8/31/2008 1:02 PM 196927 smtp rfc.txt
-a--- 7/22/2006 4:44 PM 59904 Sockets.doc
-a--- 12/6/2006 7:08 PM 188416 Socluri - Modelul Client Server.ppt
-a--- 10/5/2008 6:31 PM 77486 Socluri.pdf
-a--- 4/13/2009 7:48 AM 4704820 Solaris Internals - Core Kernel Components.pdf
-a--- 4/13/2009 7:48 AM 8996259 Solaris Internals - Solaris 10 and OpenSolaris Kernel Architecture.txt
-a--- 4/13/2009 8:31 AM 1452649 Spidering Hacks.txt
-a--- 4/13/2009 7:53 AM 690164 SQL Cookbook (2005).txt
-a--- 4/13/2009 7:53 AM 6572222 SQL for Smarties - Advanced SQL Programming.pdf
-a--- 2/14/2007 2:28 AM 1427309 SSL and TLS Essentials - Securing the Web.pdf
-a--- 8/24/2008 12:19 PM 121926 Studiu asupra sistemelor de autentificare cu baze criptografice.pdf
-a--- 4/13/2009 7:50 AM 4437884 Subclassing and Hooking With Visual Basic.pdf
-a--- 4/13/2009 7:57 AM 3115765 Sun Certified Programmer for Java 6 Study Guide.pdf
-a--- 4/13/2009 8:29 AM 4530611 SYNGRESS - Ruby Developers Guide.pdf
-a--- 4/15/2009 7:53 PM 11694630 Syngress,.Writing.Security.Tools.and.Exploits.(2006).pdf
-a--- 4/13/2009 7:45 AM 16552820 Syngress.Linksys.WRT54G.Ultimate.Hacking.May.2007.pdf
-a--- 4/15/2009 8:00 PM 77537545 Syngress.Sockets.Shellcode.Porting.And.Coding.Reverse.Engineering.Exploits
.And.Tool.Coding.For.Se.pdf
-a--- 4/13/2009 7:45 AM 8672375 TCP-IPIllustratedvol01.txt
-a--- 4/13/2009 7:47 AM 28623839 TCP-IPIllustratedvol02.txt
-a--- 4/13/2009 8:27 AM 4651352 The Art of Multiprocessor Programming.pdf
-a--- 4/13/2009 8:25 AM 2988283 The Art of Prolog 2nd Edition Advanced Programming Techniques (Logic Progr
amming).djvu
-a--- 9/22/2008 2:10 PM 6199697 The Best of 2600 ~0470294191.pdf
-a--- 4/15/2009 7:57 PM 925853 The Cuckoo's Egg.pdf
-a--- 4/13/2009 8:26 AM 12677798 The Definitive Guide to Symfony.pdf
-a--- 4/13/2009 7:48 AM 6541125 The Design And Implementation Of The FreeBSD Operating System (2004).txt
-a--- 4/13/2009 7:53 AM 1704305 The Guru's Guide to SQL Server Architecture and Internals - Ken Henderson
(2003).txt
-a--- 7/12/2005 3:50 PM 1454742 The little black book of computer virus.pdf
-a--- 4/13/2009 8:31 AM 950148 The Pragmatic Programmer - From Journeyman to Master.txt
-a--- 4/13/2009 8:28 AM 1867525 The Ruby Way - Solutions and Techniques in Ruby Programming, 2Ed.txt
-a--- 3/26/2004 5:15 PM 1323741 The Secure Online Business E.Commerce It Functionality and Business Contin
uity.pdf
-a--- 4/13/2009 8:25 AM 5405561 The Tomes of Delphi - Algorithms and Data Structures - Julian Bucknall.pdf
-a--- 12/11/2007 4:14 PM 6038226 The Web Application - Hacker's Handbook.pdf
-a--- 4/15/2009 7:52 PM 114690 The.Shellcoders.Handbook Source_Code.tgz.tar
-a--- 6/18/2008 8:23 AM 895694 TheZendPHPCertificationPracticeTestBook.pdf
-a--- 4/13/2009 8:26 AM 4488777 Thinking Forth.Leo Brodie.pdf
-a--- 6/24/2008 7:55 PM 4924631 Tutorial IT.pdf
-a--- 2/20/2009 9:10 AM 32231 Tutorial PE 2.txt
-a--- 4/13/2009 7:49 AM 3652078 Ubuntu Hacks(2006).pdf
-a--- 4/13/2009 7:49 AM 6495768 Ubuntu Kung-fu.pdf
-a--- 2/27/2009 3:38 PM 10671127 Ultimate HTLM Reference.pdf
-a--- 4/15/2009 7:57 PM 1550334 Underground - Hacking, Madness & Obsession on theElectronic Fr.pdf
-a--- 1/28/2007 1:47 AM 1214150 Understanding IPv6.chm
-a--- 4/13/2009 7:49 AM 7868419 Understanding Linux Network Internals.txt
-a--- 4/13/2009 7:49 AM 418610 Unix in a Nutshell System V & Solaris 2.0.tar.gz.gz
-a--- 4/13/2009 7:45 AM 5671225 Unix Network Programming Vol 1 - The Sockets Networking API.txt
-a--- 4/13/2009 7:49 AM 2349896 UNIX Power Tools, Third Edition.txt
-a--- 4/13/2009 7:49 AM 2631449 Unix.systems.programming.second.edition.txt
-a--- 3/19/2009 4:54 PM 6019 Vista DLL Injection.txt
-a--- 8/17/2008 5:19 PM 13956564 Visual C# 2008.pdf
-a--- 1/4/2007 2:28 PM 165376 Visual Fox Pro.doc
-a--- 1/11/2009 10:51 AM 1152547 Visual FoxPro.pdf
-a--- 1/11/2009 10:50 AM 3735340 Visual FoxPro_DECRIPTAT.pdf
-a--- 4/13/2009 8:26 AM 2424371 Webbots.Spiders.and.Screen.Scrapers.Mar.2007.txt
-a--- 4/13/2009 8:29 AM 4740100 Wiley - Mastering UNIX Shell Scripting - 2003.pdf
-a--- 3/23/2007 6:00 AM 13364081 Wiley.Simple.Computer.Security.Disinfect.Your.PC.Jan.2007.pdf
-a--- 4/15/2009 7:58 PM 10457138 Wiley.The.Best.of.2600.A.Hacker.Odyssey.Jul.2008.eBook-DDU.pdf
-a--- 4/15/2009 7:53 PM 9159460 Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.pdf
-a--- 4/13/2009 7:49 AM 3374387 Wiley.Ubuntu.Linux.Toolbox.1000.plus.Commands.for.Ubuntu.and.Debian.Power.
Users.Nov.2007.pdf
-a--- 4/13/2009 7:50 AM 12402098 Windows NT File System Internals - A Developers Guide.oreilly.pdf
-a--- 4/13/2009 7:50 AM 4001379 Windows via CC++.txt
-a--- 4/13/2009 8:29 AM 7157724 Windows.PowerShell.in.Action.Feb.2007.pdf
-a--- 4/13/2009 7:50 AM 2392392 Windows.System.Programming.Third.Edition.txt
-a--- 5/19/2009 8:50 PM 1772743 Windows_7_Developer_Guide_v1.4.docx
-a--- 8/17/2008 5:19 PM 17394621 Wrox.Ivor.Hortons.Beginning.Visual.C.Plus.Plus.2008.pdf
-a--- 2/21/2009 9:26 AM 7696778 XSS Attacks.pdf

Link Download
http://www.wupload.com/file/92704429/[GigaPack] eBooks IT, hacking, programming, security.part01.rar
http://www.wupload.com/file/92704430/[GigaPack] eBooks IT, hacking, programming, security.part02.rar
http://www.wupload.com/file/92704431/[GigaPack] eBooks IT, hacking, programming, security.part03.rar
http://www.wupload.com/file/92704432/[GigaPack] eBooks IT, hacking, programming, security.part04.rar
http://www.wupload.com/file/92704433/[GigaPack] eBooks IT, hacking, programming, security.part05.rar
http://www.wupload.com/file/92704434/[GigaPack] eBooks IT, hacking, programming, security.part06.rar
http://www.wupload.com/file/92704435/[GigaPack] eBooks IT, hacking, programming, security.part07.rar
http://www.wupload.com/file/92704436/[GigaPack] eBooks IT, hacking, programming, security.part08.rar
http://www.wupload.com/file/92704437/[GigaPack] eBooks IT, hacking, programming, security.part09.rar
http://www.wupload.com/file/92704438/[GigaPack] eBooks IT, hacking, programming, security.part10.rar
http://www.wupload.com/file/92704439/[GigaPack] eBooks IT, hacking, programming, security.part11.rar
http://www.wupload.com/file/92704441/[GigaPack] eBooks IT, hacking, programming, security.part12.rar
http://www.wupload.com/file/92704442/[GigaPack] eBooks IT, hacking, programming, security.part13.rar
http://www.wupload.com/file/92704443/[GigaPack] eBooks IT, hacking, programming, security.part14.rar
http://www.wupload.com/file/92704444/[GigaPack] eBooks IT, hacking, programming, security.part15.rar
http://www.wupload.com/file/92704445/[GigaPack] eBooks IT, hacking, programming, security.part16.rar
http://www.wupload.com/file/92704446/[GigaPack] eBooks IT, hacking, programming, security.part17.rar
http://www.wupload.com/file/92704447/[GigaPack] eBooks IT, hacking, programming, security.part18.rar
http://www.wupload.com/file/92704453/[GigaPack] eBooks IT, hacking, programming, security.part19.rar
http://www.wupload.com/file/92704454/[GigaPack] eBooks IT, hacking, programming, security.part20.rar
http://www.wupload.com/file/92704455/[GigaPack] eBooks IT, hacking, programming, security.part21.rar
http://www.wupload.com/file/92704456/[GigaPack] eBooks IT, hacking, programming, security.part22.rar
http://www.wupload.com/file/92704457/[GigaPack] eBooks IT, hacking, programming, security.part23.rar
http://www.wupload.com/file/92704458/[GigaPack] eBooks IT, hacking, programming, security.part24.rar
http://www.wupload.com/file/92704459/[GigaPack] eBooks IT, hacking, programming, security.part25.rar
http://www.wupload.com/file/92704460/[GigaPack] eBooks IT, hacking, programming, security.part26.rar

Published: By: ebookstraining - 8:17 AM

REDHAT eBooks Collection

REDHAT eBooks Collection
REDHAT eBooks Collection
English | 70 eBooks | PDF + CHM | 200MB


Listbooks:
Hungry Minds Red Hat Linux Networking and System Administrat.pdf 7.82 MB
Hungry Minds Red Hat Linux Security and Optimization.pdf 5.13 MB
Linux Annoyances for Geeks.chm 2.27 MB
Linux.Commands.Editors.and.Shell.Programming.Jul.2005.eBook-.chm 3.61 MB
Linux.Troubleshooting.Bible.eBook-LiB.chm 16.82 MB
MD5SUM.md5 1.06 kB
McGraw.Hill.Fedora.Core.7.and.Red.Hat.Enterprise.Linux.The.Compl/MD5SUM.md5 0.10 kB
McGraw.Hill.Fedora.Core.7.and.Red.Hat.Enterprise.Linux.The.Compl/McGraw.Hill.Fedora.Core.7.and.Red.Hat.Enterprise.Linux.The.C.pdf 13.59 MB
McGraw.Hill.RHCE.Red.Hat.Certified.Engineer.Linux.Study.Guide.5th/MD5SUM.md5 0.10 kB
McGraw.Hill.RHCE.Red.Hat.Certified.Engineer.Linux.Study.Guide.5th/McGraw.Hill.RHCE.Red.Hat.Certified.Engineer.Linux.Study.Guid.chm 10.40 MB
RHCT-RHCE-Exams/Actualtests_Redhat_Certified_Internetworking_Expert_Exams__R.pdf 359.13 kB
RHCT-RHCE-Exams/MD5SUM.md5 0.19 kB
RHCT-RHCE-Exams/Redhat_Certified_Technician_On_Redhat_Enterprise_Linux_4_Lab.pdf 276.88 kB
Red Hat Linux Bible - Fedora and Enterprise Edition.chm 13.73 MB
Red.Hat.Linux.Fedora.Core.and.Red.Hat.Enterprise.Linux.3rd.E.chm 10.88 MB
RedHat-4.6/MD5SUM.md5 0.26 kB
RedHat-4.6/RHEL-Installtion-Guide-x86-64-multi-en.pdf 949.56 kB
RedHat-4.6/Reference_Guide-450.pdf 1.53 MB
RedHat-4.6/Security_Guide-450.pdf 556.49 kB
RedHat-4.6/System_Administration_Guide-450.pdf 4.93 MB
RedHat-5.2/Cluster_Administration.pdf 1.35 MB
RedHat-5.2/Cluster_Logical_Volume_Manager.pdf 747.45 kB
RedHat-5.2/Cluster_Suite_Overview.pdf 2.57 MB
RedHat-5.2/DM_Multipath.pdf 223.67 kB
RedHat-5.2/Deployment_Guide.pdf 7.27 MB
RedHat-5.2/Global_File_System.pdf 307.55 kB
RedHat-5.2/Global_Network_Block_Device.pdf 55.46 kB
RedHat-5.2/Installation_Guide.pdf 3.81 MB
RedHat-5.2/MD5SUM.md5 0.64 kB
RedHat-5.2/Package_Manifest.pdf 202.75 kB
RedHat-5.2/Virtual_Server_Administration.pdf 992.36 kB
RedHat-5.2/Virtualization.pdf 3.43 MB
RedHat-Courses/MD5SUM.md5 0.13 kB
RedHat-Courses/RH033.pdf 1.44 MB
RedHat-Courses/RH133.pdf 1.04 MB
RedHat-Courses/RH253.pdf 1.50 MB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Intro (Redhat Enterprise Linux System Administration).ppt 344.00 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/MD5SUM.md5 0.85 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit01 (Installation).ppt 941.50 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit02 (System Initialization And Services).ppt 798.50 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit03 (Kernel Services And Configuration).ppt 445.00 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit04 (Filesystem Management).ppt 743.00 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit05 (Network Configuration).ppt 671.50 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit06 (Rpm And Kickstart).ppt 880.00 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit07 (User Administration).ppt 1.01 MB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit08 (Printing And Administration Tools).ppt 768.00 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit09 (The X Windows System).ppt 468.50 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit10 (Advanced Filesystem Management).ppt 422.50 kB
RedHat-Courses/Red Hat Enterprise Linux System Administration (Rh133) Slides/Unit11 (Troubleshooting).ppt 472.00 kB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Introduction.ppt 1.04 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/MD5SUM.md5 0.85 kB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit01 (Intrdocution To System Services).ppt 1.61 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit02 (Organizing Networked Systems).ppt 3.04 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit03 (Network File Sharing Services).ppt 2.09 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit04 (Electronic Mail Services).ppt 2.72 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit05 (The Http Service).ppt 1.46 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit06 (Security Concerns And Policy).ppt 1.35 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit07 (Authentication Services).ppt 2.96 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit08 (System Monitoring).ppt 1.70 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit09 (Securing Networks).ppt 2.81 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit10 (Securing Services).ppt 1.32 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Unit11 (Securing Data).ppt 2.00 MB
RedHat-Courses/Red Hat Network Services And Security Administration (Rh253)/Welcome.ppt 195.50 kB
SELinux.by.Example.Using.Security.Enhanced.Linux.Jul.2006.chm 3.93 MB
Sams - Red Hat Enterprise Linux 5 Administration Unleashed.pdf 7.30 MB
Sams.Fedora.7.Unleashed.Aug.2007.eBook-BBL/MD5SUM.md5 0.07 kB
Sams.Fedora.7.Unleashed.Aug.2007.eBook-BBL/Sams.Fedora.7.Unleashed.Aug.2007.pdf 14.61 MB
Sams.Red.Hat.Fedora.4.Unleashed.Jun.2005.eBook-DDU.chm 12.00 MB
Securing and Optimizing Linux - RedHat Editi.pdf 4.90 MB
The.Complete.Reference.Enterprise.Linux.and.Fedora.Edition.e.chm 5.59 MB


Download
http://www.wupload.com/file/92554997/RedHat.part1.rar
http://www.wupload.com/file/92554998/RedHat.part2.rar
Published: By: ebookstraining - 3:30 AM

Tuesday, August 9, 2011

Hacking Exposed Linux (Essential Ebooks)

Hacking Exposed Linux (Essential Ebooks)
Hacking Exposed Linux (Essential Ebooks)
English | 2010 | PDF | 100 Mb

Security best practices, approached from the perspective of what can go wrong and what can be done about the problems. Specific coverage goes to all major services, including user management, FTP, HTTP, and firewalling.

Download
http://www.wupload.com/file/86170119/Linuxx_H4.rar
Published: By: ebookstraining - 10:42 PM

Wednesday, July 20, 2011

Hacking the Cable Modem Tutorial Ebook

Hacking the Cable Modem Tutorial Ebook

Hacking the Cable Modem Tutorial Ebook
English | 2010 | PDF | 18MB

n the beginning there was dial-up, and it was slow; then came broadband in the form of cable, which redefined how we access the internet, share information, and communicate with each other online. Hacking the Cable Modem goes inside the device that makes Internet via cable possible and, along the way, reveals secrets of many popular cable modems, including products from Motorola, RCA, WebSTAR, D-Link and more.

[b]Download[/b]
http://www.wupload.com/file/62774855
or
http://www.filesonic.com/file/1487110474/Hack.Cable.Modem.rar
Published: By: ebookstraining - 10:16 AM

Monday, July 11, 2011

Enterprise Mac Security: Mac OS X Snow Leopard

Enterprise Mac Security: Mac OS X Snow Leopard
Enterprise Mac Security: Mac OS X Snow Leopard
Ap,..s | 2010 | ISBN: 1430227303| 648 pages | PDF | 15,5 MB

A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats
Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new Snow Leopard operating system.

Download Depositifiles.com (For only USA pls)
Depositfiles
Mirror Filesonic.com (For All Countries)
Filesonic
Published: By: ebookstraining - 4:30 AM

Saturday, July 9, 2011

CEH Ethical Hacking v5: Videos, Tools and Slax CD

CEH Ethical Hacking v5: Videos, Tools and Slax CD

CEH Ethical Hacking v5:Videos, Tools and Slax CD | ISO | 4.52 GB
Genre: Video Training

If you Want to Stop hackers from invading your network, you've got to first Invade Their Minds. Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes
The Goal of the ethical hacker is to help the Organization Take Measures Against Malicious PreEmptive Attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. Technology Advances as and Technology Organization depend on increasingly, information assets Have evolved INTO Critical Components of Survival. If hacking involves creativity and thinking 'out-of-the-Box', then Vulnerability Testing and Security audits Will Not the ensure the Security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of 'defense in depth'. In Other Words, They must Penetrate Their Networks and the Security Posture ASSESS Vulnerabilities and Exposure for. The Definition of an Ethical Hacker is very Similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and / or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. Most Important Point the is an Ethical Hacker That Has authorization to Probe the target. The CEH Program certifies Individuals in the network Specific Security Discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. Video codec : Video-Application Video : Video-Application Audio : Missing

Download
http://www.wupload.com/file/48826724/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part01.rar
http://www.wupload.com/file/48826741/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part02.rar
http://www.wupload.com/file/48826726/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part03.rar
http://www.wupload.com/file/48826743/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part04.rar
http://www.wupload.com/file/48826727/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part05.rar
http://www.wupload.com/file/48826744/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part06.rar
http://www.wupload.com/file/48826730/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part07.rar
http://www.wupload.com/file/48826746/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part08.rar
http://www.wupload.com/file/48826882/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part09.rar
http://www.wupload.com/file/48826908/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part10.rar
http://www.wupload.com/file/48826883/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part11.rar
http://www.wupload.com/file/48826910/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part12.rar
http://www.wupload.com/file/48826714/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part13.rar
http://www.wupload.com/file/48826715/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part14.rar
http://www.wupload.com/file/48826716/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part15.rar
http://www.wupload.com/file/48826719/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part16.rar
http://www.wupload.com/file/48826722/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part17.rar
http://www.wupload.com/file/48826738/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part18.rar
http://www.wupload.com/file/48826723/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part19.rar


Mirror
http://www.filesonic.com/file/1402525021/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part01.rar
http://www.filesonic.com/file/1402525041/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part02.rar
http://www.filesonic.com/file/1402525061/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part03.rar
http://www.filesonic.com/file/1402525101/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part04.rar
http://www.filesonic.com/file/1402526881/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part05.rar
http://www.filesonic.com/file/1402526891/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part06.rar
http://www.filesonic.com/file/1402526911/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part07.rar
http://www.filesonic.com/file/1402526931/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part08.rar
http://www.filesonic.com/file/1402526981/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part09.rar
http://www.filesonic.com/file/1402527031/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part10.rar
http://www.filesonic.com/file/1402527081/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part11.rar
http://www.filesonic.com/file/1402521351/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part12.rar
http://www.filesonic.com/file/1402521371/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part13.rar
http://www.filesonic.com/file/1402521391/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part14.rar
http://www.filesonic.com/file/1402524921/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part15.rar
http://www.filesonic.com/file/1402524931/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part16.rar
http://www.filesonic.com/file/1402524951/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part17.rar
http://www.filesonic.com/file/1402525001/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part18.rar
http://www.filesonic.com/file/1402524961/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part19.rar

or

http://www.fileserve.com/file/XCV4hcp/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part01.rar
http://www.fileserve.com/file/gW9ar3D/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part02.rar
http://www.fileserve.com/file/9kstVAJ/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part03.rar
http://www.fileserve.com/file/PcaVcgj/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part04.rar
http://www.fileserve.com/file/4cxjz3x/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part05.rar
http://www.fileserve.com/file/YERT2gf/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part06.rar
http://www.fileserve.com/file/wBtGZZ2/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part07.rar
http://www.fileserve.com/file/8quk6p5/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part08.rar
http://www.fileserve.com/file/rawEzUG/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part09.rar
http://www.fileserve.com/file/FQ8kMe9/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part10.rar
http://www.fileserve.com/file/WEfBE9N/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part11.rar
http://www.fileserve.com/file/48p44Tq/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part12.rar
http://www.fileserve.com/file/2EQHUNP/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part13.rar
http://www.fileserve.com/file/FxpbMKa/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part14.rar
http://www.fileserve.com/file/cgvHNCG/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part15.rar
http://www.fileserve.com/file/5nqajWP/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part16.rar
http://www.fileserve.com/file/S39CExV/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part17.rar
http://www.fileserve.com/file/c29RsK3/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part18.rar
http://www.fileserve.com/file/YNHCjap/Ethical.Hacking.Videos.Tools.and.Slax.CD.5.0.part19.rar
Published: By: ebookstraining - 7:39 AM

Thursday, March 10, 2011

180 Best Hack Video Collection (2011)

180 Best Hack Video Collection (2011)
180 Best Hack Video Collection
English | 1040x480 | XviD | 25fps 866kbps | MP3 128kbps | 9.46GB
Genre: Video Training

This package contain a collection from Best multiple web sites for the Best Hacking Video.

Videos:
milw0rm videos/(WBB Portal) Cross-Site Scripting Using Unsanitized jpg File by Tontonq.flv 9.93 MB
milw0rm videos/0-DAY Simple SQL Injection by x128.swf 8.89 MB
milw0rm videos/A Small Rooting Video by SeventotheSeven.swf 4.29 MB
milw0rm videos/Aircrack-ptw by FBi.swf 13.03 MB
milw0rm videos/Attack on Windows Systems based on the ActiveX Vulnerability by Michal Bucko.flv 1.62 MB
milw0rm videos/CA BrightStor ARCserve Backup Remote Heap Overflow Vulnerability by LSsecurity.swf 3.32 MB
milw0rm videos/Classical Basic Local Buffer Overflow by UniquE-Key.flv 5.59 MB
milw0rm videos/Clientless WEP Cracking (fragmentation attack using the air crack suite) by muts.swf 10.55 MB
milw0rm videos/Cracking the Bluetooth Pin and Link key by Thierry Zoller.swf 1.28 MB
milw0rm videos/Cracking WEP in 10 Minutes (kismac) by Oliver Greiter.wmv 11.65 MB
milw0rm videos/CRLF (Carriage Return and Line Feed) Injection Demonstration by Paisterist.flv 27.58 MB
milw0rm videos/Cross Site Scripting HQ 0 Day by fUSiON.flv 13.07 MB
milw0rm videos/Cursed Animations from teh Wid W3st by muts.swf 12.90 MB
milw0rm videos/Demonstrating Exploration of Simple Buffer Overflows by Qnix.swf 2.55 MB
milw0rm videos/Demonstration of Blind MySQL Injection (bsqlbf) by aramosf.flv 12.85 MB
milw0rm videos/Demonstration of Blind MySQL Injection (mysql_bftools) by reversing.flv 9.84 MB
milw0rm videos/Dns Spoofing by Febrônio.swf 8.98 MB
milw0rm videos/Ettercap Video by Yugal.ras.flv 23.51 MB
milw0rm videos/Exploiting Microsoft RPC DCOM using Metasploit Framework by ChrisG.flv 6.72 MB
milw0rm videos/faking wep using linux wifislax by Komtec.swf 5.73 MB
milw0rm videos/Hacking Mac OS X - A Case Study by skillTube.swf 12.32 MB
milw0rm videos/Hacking SQL in Linux using the SecureState Swiss Army Knife by rel1k.swf 3.41 MB
milw0rm videos/Hacking up Bluetooth with his WIDCOMM Code by Kevin Finisterre.flv 5.60 MB
milw0rm videos/Heap Overflow Basics (Spanish) by Paisterist.flv 7.11 MB
milw0rm videos/How to Exploit Stack Base Buffer Overrun Under Windows XP SP2 by Omega7.swf 1.61 MB
And more Videos....



Download Filesonic:
Upgrade to a FileSonic Premium account and download at incredible speed! And Make Money Sharing your files
http://www.filesonic.com/file/187658521/All.Best.Hack.Video.part01.rar
http://www.filesonic.com/file/187661541/All.Best.Hack.Video.part02.rar
http://www.filesonic.com/file/187663411/All.Best.Hack.Video.part03.rar
http://www.filesonic.com/file/187661591/All.Best.Hack.Video.part04.rar
http://www.filesonic.com/file/187661611/All.Best.Hack.Video.part05.rar
http://www.filesonic.com/file/187658831/All.Best.Hack.Video.part06.rar
http://www.filesonic.com/file/187661571/All.Best.Hack.Video.part07.rar
http://www.filesonic.com/file/187661471/All.Best.Hack.Video.part08.rar
http://www.filesonic.com/file/187661501/All.Best.Hack.Video.part09.rar
http://www.filesonic.com/file/187660021/All.Best.Hack.Video.part10.rar
http://www.filesonic.com/file/187661701/All.Best.Hack.Video.part11.rar
http://www.filesonic.com/file/187661711/All.Best.Hack.Video.part12.rar
http://www.filesonic.com/file/187660041/All.Best.Hack.Video.part13.rar
http://www.filesonic.com/file/187661581/All.Best.Hack.Video.part14.rar
http://www.filesonic.com/file/187661561/All.Best.Hack.Video.part15.rar
http://www.filesonic.com/file/187660001/All.Best.Hack.Video.part16.rar
http://www.filesonic.com/file/187661731/All.Best.Hack.Video.part17.rar
http://www.filesonic.com/file/187659981/All.Best.Hack.Video.part18.rar
http://www.filesonic.com/file/187661521/All.Best.Hack.Video.part19.rar
http://www.filesonic.com/file/187658501/All.Best.Hack.Video.part20.rar
http://www.filesonic.com/file/187660031/All.Best.Hack.Video.part21.rar
http://www.filesonic.com/file/187643871/All.Best.Hack.Video.part22.rar
Published: By: Anonymous - 12:03 AM

Friday, February 18, 2011

Gray Hat Hacking Essential Ebooks

Gray Hat Hacking Essential Ebooks
Gray Hat Hacking Essential Ebooks
Publisher: Mc/Graw-H ill | 720 + 550 Pages | ISBN: 0071742557 | PDF | 22 MB

Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

Download HotFile:

Hotfile
Published: By: Anonymous - 8:43 AM

Thursday, February 10, 2011

Network Security: A Decision and Game - Theoretic Approach

Network Security: A Decision and Game - Theoretic Approach

Network Security: A Decision and Game - Theoretic Approach
Publisher: Cambridge University Press | English | 0521119324 | PDF | 332 pages | 12.02 Mb

Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security.

Download HotFile:

http://hotfile.com/dl/83129296/a307981/.rar.html
FileServe
http://www.fileserve.com/file/XNZuc4Z/Network.Security.rar
Published: By: Anonymous - 7:48 AM

Thursday, January 27, 2011

Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition

Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition
Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition
Wil.y | 2008 | ISBN: 0470068523 | 1080 pages | PDF | 5,3 MB

Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice. Better, Ross Anderson offers a lot of thoughts on how information can be made more secure (though probably not absolutely secure, at least not forever) with the help of both technologies and management strategies. His work makes fascinating reading and will no doubt inspire considerable doubt--fear is probably a better choice of words--in anyone with information to gather, protect, or make decisions about.

Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret. Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment. In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards. In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. A terrific read for security professionals and general readers alike. --David Wall

Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway. Mostly, this takes the form of essays (about, for example, how the U.S. Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet). Sections deal with technologies, policies, psychology, and legal matters.

Download HotFile:

http://hotfile.com/dl/100028438/1fc00cf/0470068523SecurityEngineering.rar.html

http://www.fileserve.com/file/phcptNr/0470068523SecurityEngineering.rar
Published: By: Anonymous - 6:51 PM

Friday, January 14, 2011

LSS+ locks safes and security 5

LSS+ locks safes and security 5

LSS+ locks safes and security 5
Publisher: Charles C Thomas Pub Ltd | 2004 | English | 4049 pages | PDF | 183.23 MB

Depending upon security level, information is provided that details sophisticated methods for covert bypass of most locking systems. Forced entry, forensics, burglary investigation, physical security, and alarm systems are also presented in far greater detail than within the bound edition.

The hardcover book, Locks Safes and Security by Marc Weber Tobias 2nd edition, was published in 2002. This work was followed by an electronic version called LSS+ CD a few years later.

The LSS+ CD contains a lot more content than the book. Content has been updated as of 2004. It is released with 3 separate security levels, Public, Locksmith, and Government. This document is a pdf version of the material extracted from LSS+. It contains material at Public, Locksmith and Government Levels Locksmith vs Government Level Material:

Book 1 Chapters 1 thru 23 are identical
Book 2 Chapter 24 thru 30 are identical
Book 2 Chapter 31 is different (Decoding)
Book 2 Chapter 32 is identical
Book 3 Chapters 33 thru 36 are identical
Book 4 Chapters 37 thru 39 are identical
Book 4 Chapter 40 is different (Alarms)

There are 4049 pages within this pdf.

Download HotFile:

http://hotfile.com/dl/96819627/a0c5668/LSS_locks_safes_and_security_5.part1.rar
http://hotfile.com/dl/96819628/0ab9c12/LSS_locks_safes_and_security_5.part2.rar
Published: By: Anonymous - 10:31 PM

Saturday, January 8, 2011

How Personal & Internet Security Works

How Personal & Internet Security Works
How Personal & Internet Security Works
Publisher: Q u e 2006 | 288 Pages | ISBN: 0789735539 | CHM | 52 MB

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!
How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.

Download HotFile:

Hotfile
Published: By: Anonymous - 11:47 PM

Wednesday, January 5, 2011

Security 5 Boot Camp Interactive CDRom Reupload

Security 5 Boot Camp Interactive CDRom Reupload

Security 5 Boot Camp Interactive CDRom Reup
English | ISO | 625Mb

Identity theft, credit card fraud, online banking phishing scams, virus and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information and hackers are some of the threats you will face on a daily basis. Are you prepared to face them and defend yourself? If you are someone who banks online, pays utility bills online, shops online, have children chatting online, downloads shareware and games, communicates over email, subscribes to a broadband connection or someone who uses a computer system at work or home, then you need to have Security5 training to help you guard your information assets.


The course is targeted towards today’s knowledge workers who use computing resources in their daily activities. It educates them on practical aspects of security and networking to give them an advantage over common users.
HomePage: http://www.koenig-solutions.com/training/security5.asp


Download HotFile:

http://hotfile.com/dl/94301827/ce4f3db/Security5____BC.part1.rar.html
http://hotfile.com/dl/94301823/3a25076/Security5____BC.part2.rar.html
http://hotfile.com/dl/94301822/bacd7c9/Security5____BC.part3.rar.html
http://hotfile.com/dl/94301828/1df58a3/Security5____BC.part4.rar.html
http://hotfile.com/dl/94301826/369ae93/Security5____BC.part5.rar.html
http://hotfile.com/dl/94301824/28061ba/Security5____BC.part6.rar.html
http://hotfile.com/dl/94301825/e043073/Security5____BC.part7.rar.html
Published: By: Anonymous - 3:22 AM

Monday, January 3, 2011

Networking Professional : Network Security

Networking Professional : Network Security
Networking Professional : Network Security
TSCC | 640x480 | 43kbps | 352kbps | 22050Hz | 600MB

Genre: eLearning


Video 1


Lab Setup Video


This video is important because it lays out the scenario that you will be using throughout the video.


Video 2


Analyzing and Applying Security Settings


Setting up a Security Template on an individual system is a great way to configure your security settings. The benefit of this video is that you will also see how to import your Security Template to the domain controller and deploy it in your server’s organizational unit, so that it applies to all systems in this unit.


* Security Templates


* Security Configuration and Analysis Tool


* Exporting and Importing Security Templates


* Differences Between Windows 2000 and Windows Server 2003


Video 3


Securing Network Using Group Policy


If you are looking to have your network more organized and you want to apply settings to multiple users and groups, then you need to know how to secure your network using Group Policy.


* GPO Lockdown


* System Services Lockdown


* Authentication Protocols


* Third Party Tool


Video 4


Installing and Configuring Software Update Services (SUS)

Networking Professional : Network Security


Download HotFile:

http://hotfile.com/dl/93945700/cbedfbd/TUT.Lab11.NS.part1.rar.html
http://hotfile.com/dl/93945691/d5a74c7/TUT.Lab11.NS.part2.rar.html
http://hotfile.com/dl/93945688/3e8f007/TUT.Lab11.NS.part3.rar.html
http://hotfile.com/dl/93945687/a56e590/TUT.Lab11.NS.part4.rar.html
Published: By: Anonymous - 12:01 PM

Saturday, January 1, 2011

Security of Self-Organizing Networks: MANET, WSN, WMN, VANET

Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
Auerb.ch Publications | 2010 | ISBN: 143981919X | 638 pages | PDF | 8 MB

Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats.
Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and other networks that use wireless technology for communications. The book is organized into four sections for ease of reference:

General Topics—Security of Wireless and Self-Organizing Networks
Mobile Ad-Hoc Network and Vehicular Ad-Hoc Network Security
Wireless Sensor Network Security
Wireless Mesh Network Security

Highlighting potential threats to network security, most chapters are written in a tutorial manner. However, some of the chapters include mathematical equations and detailed analysis for advanced readers. Guiding you through the latest trends, issues, and advances in network security, the text includes questions and sample answers in each chapter to reinforce

Download HotFile:

Hotfile
Published: By: Anonymous - 8:43 PM

Friday, December 31, 2010

Certification and Security in Health-Related Web Applications: Concepts and Solutions

Certification and Security in Health-Related Web Applications: Concepts and Solutions
Certification and Security in Health-Related Web Applications: Concepts and Solutions
Publisher: Medical Information Science Reference | 2010 | PDF | 326 pages | ISBN: 1616928956 | 10.17 Mb

Health-related Web applications have provided advanced services, such as telemedicine, to patients and doctors. However, with the creation of these applications has come the need to record, process and store medical information by following standard and lawful procedures, to protect medical data from unauthorized access, and to ensure continuity and constant availability of healthcare services. Certification and Security in Health-Related Web Applications: Concepts and Solutions aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications.


Download HotFile:

http://hotfile.com/dl/93277297/4076d97/1616928956WebHealth.rar.html
Published: By: Anonymous - 8:18 AM

Thursday, December 30, 2010

Gray Hat Hacking, Second Edition

Gray Hat Hacking, Second Edition

Gray Hat Hacking, Second Edition by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness
MGH | 2007-12-20 | ISBN: 0071495681 | PDF | 550 pages | 12 MB


"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group
"Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker

Download HotFile:

Hotfile
Published: By: Anonymous - 10:20 PM

Wednesday, December 29, 2010

Hackers: Heroes of the Computer Revolution

Hackers: Heroes of the Computer Revolution

Hackers: Heroes of the Computer Revolution
O'Reilly (5-2010) | PDF | 528 pages | 1449388396 | 12.2Mb

Book Description: This 25th anniversary edition of Steven Levy’s classic book traces the exploits of the computer revolution’s original hackers — those brilliant and eccentric nerds from the late 1950s through the early ’80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as “the hacker ethic,” that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today’s digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.
About the Author
Levy is a senior writer for Wired. Previously, he was chief technology writer and a senior editor for Newsweek. Levy has written six books and had articles published in Harper’s, Macworld, The New York Times Magazine, The New Yorker, Premiere, and Rolling Stone. Steven has won several awards during his 30+ years of writing about technology, including Hackers, which PC Magazine named the best Sci-Tech book written in the last twenty years and, Crypto, which won the grand eBook prize at the 2001 Frankfurt Book festival.

Download HotFile:

http://hotfile.com/dl/76807340/8e3b959/HackerHero.rar.html
Published: By: Anonymous - 12:06 AM

Wednesday, December 22, 2010

Trust and Security in Collaborative Computing

Trust and Security in Collaborative Computing (Computer and Network Security) By Xukai Zou, Yuan-shun Dai, Yi Pan
Publisher: World Scientific Publishing Company 2008 | 248 Pages | ISBN: 9812703683 | PDF | 6MB

Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing.

This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described.
Contents:
Secure Group Communication (SGC);
Cryptography Based Access Control;
Intrusion Detection and Defence;
Security in Grid Computing;
Trusted and Seamless Medical Information Systems.

Download HotFile:

http://hotfile.com/dl/91379055/5afa161/TrustandSecurityinCollaborativeComputing.rar.html
Published: By: Anonymous - 10:55 PM

Halo2 Hacks

OReilly Halo2 Hacks

OReilly Halo2 Hacks
English | 3 PDF | 272 pages | 14.54 MB


OReilly Excel Hacks,Halo2 Hacks,VoIP Hacks Tips & Tools for Internet Telephony
Download HotFile:

http://hotfile.com/dl/90088258/3df1f0e/OReilly_Excel_Hacks.rar.html
Published: By: Anonymous - 12:50 PM
 

Find Us: FaceBook