-
Mark Wilding, Dan Behman - Self-Service Linux®: Mastering the Art of Problem Determination [2005, PDF, ENG]
Подробнее...Залито: 23-01-2012 11:58 (901 просмотр)Mark Wilding, Dan Behman - Self-Service Linux®: Mastering the Art of Problem Determination [2005, PDF, ENG]На иностранных языкахIn a nutshell, this book is about effectively and efficiently diagnosing problems that occur in the Linux environment. It covers good investigation practices, how to use the information and resources on the Internet, and then dives right into detail describing how to use the most important problem determination ...
Раздают: 0
Качают: 0
Размер: 4 MB
-
Yarmosh K. - App Savvy. Turning Ideas into iPad and iPhone Apps Customers Really Want [2010, PDF, ENG]
Подробнее...Залито: 23-01-2012 11:58 (990 просмотров)Yarmosh K. - App Savvy. Turning Ideas into iPad and iPhone Apps Customers Really Want [2010, PDF, ENG]На иностранных языкахHow can you make your iPad or iPhone app stand out in the highly competitive App Store? While many books simply explore the technical aspects of iPad and iPhone app design and development, App Savvy also focuses on the business, product, and marketing elements critical to pursuing, completing, and selling ...
Раздают: 0
Качают: 0
Размер: 14 MB
-
Gruman G. - Mac OS X Lion Bible [2011, PDF, ENG]
Подробнее...Залито: 23-01-2012 11:58 (1122 просмотра)Gruman G. - Mac OS X Lion Bible [2011, PDF, ENG]На иностранных языкахThe latest Mac operating system takes full advantage of the latest multi-touch trackpads, the new App Store for the desktop, and a host of upgrades that incorporate some of the best elements of the iPad experience. This book covers every new feature as well as all the basic Mac information for every ...
Раздают: 0
Качают: 0
Размер: 32 MB
-
Fairbairn C., Fahrenkrug J., Ruffenach C. - Objective-C Fundamentals [2011, PDF, ENG]
Подробнее...Залито: 23-01-2012 11:58 (1993 просмотра)Fairbairn C., Fahrenkrug J., Ruffenach C. - Objective-C Fundamentals [2011, PDF, ENG]На иностранных языкахObjective-C Fundamentals guides you gradually from your first line of Objective-C code through the process of building native apps for the iPhone. Starting with chapter one, you’ll dive into iPhone development by building a simple game that you can run immediately. You’ll use tools like Xcode 4 and the ...
Раздают: 0
Качают: 0
Размер: 13 MB
-
Professional Computing Series - Stevens W.R. - TCP/IP Illustrated, Volumes 1-3 [1994-1996, DjVu, ENG]
Подробнее...Залито: 23-01-2012 11:57 (947 просмотров)Professional Computing Series - Stevens W.R. - TCP/IP Illustrated, Volumes 1-3 [1994-1996, DjVu, ENG]На иностранных языкахVolume 1: The Protocols
...Раздают: 0
Качают: 0
Размер: 33 MB
-
[Apple] Miller C., Dai Zovi D.A. - The Mac Hacker’s Handbook [2009, PDF, ENG]
Подробнее...Залито: 23-01-2012 11:57 (940 просмотров)[Apple] Miller C., Dai Zovi D.A. - The Mac Hacker’s Handbook [2009, PDF, ENG]На иностранных языкахThis book is written for a wide variety of readers, ranging from Mac enthusiasts to hard-core security researchers. Those readers already knowledgeable about Mac OS X but wanting to learn more about the security of the system may want to skip to Chapter 4. Conversely, security researchers may find the ...
Раздают: 0
Качают: 0
Размер: 9 MB
-
Itterheim S., Löw A. - Learn cocos2d Game Development with iOS 5 [2011, PDF, ENG]
Подробнее...Залито: 23-01-2012 11:57 (915 просмотров)Itterheim S., Löw A. - Learn cocos2d Game Development with iOS 5 [2011, PDF, ENG]На иностранных языкахLearn cocos2d Game Development with iOS 5 provides a rock-solid introduction to the cocos2d iPhone and iPad game apps engine and related tools. It focuses on the process of creating several game apps made entirely using cocos2d with little or no use of the iOS 5 SDK and OpenGL code. By creating 2-3 sample ...
Раздают: 0
Качают: 0
Размер: 25 MB
-
Burgess A. - Getting Good with JavaScript [2011, PDF/MOV, ENG] + Code
Подробнее...Залито: 22-01-2012 18:23 (904 просмотра)Burgess A. - Getting Good with JavaScript [2011, PDF/MOV, ENG] + CodeНа иностранных языкахEver wanted to liven up a web design with Javascript but not known where to start? In Getting Good with JavaScript, author Andrew Burgess breaks down programming in JavaScript into easy, straight-forward terms and exercises.
...Раздают: 0
Качают: 0
Размер: 1.1 GB
-
Abrash M. - Graphics Programming Black Book [1997, DjVu, ENG]
Подробнее...Залито: 22-01-2012 13:34 (916 просмотров)Abrash M. - Graphics Programming Black Book [1997, DjVu, ENG]На иностранных языкахMichael Abrash\'s classic Graphics Programming Black Book is a compilation of Michael\'s previous writings on assembly language and graphics programming (including from his "Graphics Programming" column in Dr. Dobb\'s Journal). Much of the focus of this book is on profiling and code testing, as ...
Раздают: 0
Качают: 0
Размер: 20 MB
-
Warner J., LaFontaine D. - Mobile Web Design For Dummies [2010, PDF, ENG]
Подробнее...Залито: 22-01-2012 13:33 (914 просмотров)Warner J., LaFontaine D. - Mobile Web Design For Dummies [2010, PDF, ENG]На иностранных языкахThe perfect place to learn how to design Web sites for mobile devices! With the popularity of Internet access via cell phones and other mobile devices, Web designers now have to consider as many as eight operating systems, several browsers, and a slew of new devices as they plan a new site, a new interface, ...
Раздают: 0
Качают: 0
Размер: 8 MB
-
Tittel E., Burmeister M. - HTML 4 For Dummies, 5th Edition [2005, PDF, ENG]
Подробнее...Залито: 22-01-2012 13:33 (885 просмотров)Tittel E., Burmeister M. - HTML 4 For Dummies, 5th Edition [2005, PDF, ENG]На иностранных языкахAre you fascinated by the look and design of Web pages? Do you wish that you had the knowledge and skills to create a great looking Web site? Whether you’re an up-and-coming Web designer or just an enthusiastic hobbyist, you are probably using HTML, the standard authoring language for the Internet. HTML ...
Раздают: 0
Качают: 0
Размер: 11 MB
-
Bachu R.K., Raffi M. - qooxdoo. Beginner's Guide [2011, PDF, ENG]
Подробнее...Залито: 22-01-2012 13:28 (994 просмотра)Bachu R.K., Raffi M. - qooxdoo. Beginner's Guide [2011, PDF, ENG]На иностранных языкахGain knowledge on core object oriented programming concepts in qooxdoo
...Раздают: 0
Качают: 0
Размер: 7 MB
-
Stolarski T. - Engineering Analysis with ANSYS Software [2007, PDF, ENG]
Подробнее...Залито: 22-01-2012 13:27 (1040 просмотров)Stolarski T. - Engineering Analysis with ANSYS Software [2007, PDF, ENG]На иностранных языкахBook Description
...Раздают: 0
Качают: 0
Размер: 28 MB
-
Moaveni S. - Finite Element Analysis. Theory and Application with ANSYS [1999, PDF, ENG]
Подробнее...Залито: 22-01-2012 13:27 (1013 просмотров)Moaveni S. - Finite Element Analysis. Theory and Application with ANSYS [1999, PDF, ENG]На иностранных языкахWhile many good textbooks cover the theory of finite element modeling, this is the only text available that incorporates ANSYS as an integral part of its content. This book presents the theory of finite element method, explores its application as a design/modelling tool, and explains in detail how to ...
Раздают: 0
Качают: 0
Размер: 29 MB
-
Moaveni S. - Finite Element Analysis. Theory and Application with ANSYS (3rd Edition) [2008, PDF, ENG]
Подробнее...Залито: 22-01-2012 13:27 (930 просмотров)Moaveni S. - Finite Element Analysis. Theory and Application with ANSYS (3rd Edition) [2008, PDF, ENG]На иностранных языкахWhile many authors cover the theory of finite element modeling, this is the only book available that incorporates ANSYS as an integral part of its content. Moaveni presents the theory of finite element analysis, explores its application as a design/modeling tool, and explains in detail how to use ANSYS ...
Раздают: 0
Качают: 0
Размер: 181 MB
-
Wilhelm T. - Professional Penetration Testing. Creating And Operating a Formal Hacking Lab [2010, PDF/ISO, ENG]
Подробнее...Залито: 15-01-2012 18:58 (1188 просмотров)Wilhelm T. - Professional Penetration Testing. Creating And Operating a Formal Hacking Lab [2010, PDF/ISO, ENG]На иностранных языкахThomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab ...
Раздают: 0
Качают: 0
Размер: 3.65 GB
-
Burd B. - Beginning Programming with Java™ For Dummies, 2nd Edition [2005, PDF, ENG]
Подробнее...Залито: 14-01-2012 21:07 (1002 просмотра)Burd B. - Beginning Programming with Java™ For Dummies, 2nd Edition [2005, PDF, ENG]На иностранных языкахCovering everything from basic Java development concepts to the latest tools and techniques used in Java, this book will put would-be programmers on their way to Java mastery
...Раздают: 0
Качают: 0
Размер: 6 MB
-
Mansfield R. - CSS Web Design For Dummies [2005, PDF, ENG]
Подробнее...Залито: 14-01-2012 21:07 (864 просмотра)Mansfield R. - CSS Web Design For Dummies [2005, PDF, ENG]На иностранных языкахCascading Style Sheets (CSS) is a Web markup standard that allows Web designers to define the appearance and position of a Web page using special dynamic effects
...Раздают: 0
Качают: 0
Размер: 13 MB
-
Dykes L., Tittel E.- XML For Dummies, 4th Edition [2005, PDF, ENG]
Подробнее...Залито: 14-01-2012 21:06 (915 просмотров)Dykes L., Tittel E.- XML For Dummies, 4th Edition [2005, PDF, ENG]На иностранных языкахSee how XML works for business needs and RSS feeds. Create consistency on the Web, or tag your data for different purposes.
...Раздают: 0
Качают: 0
Размер: 7 MB
-
Denis T.S. - Cryptography for Developers [2007, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:08 (940 просмотров)Denis T.S. - Cryptography for Developers [2007, PDF, ENG]На иностранных языкахThe only guide for software developers who must learn and implement cryptography safely and cost effectively.
...Раздают: 0
Качают: 0
Размер: 10 MB
-
Orebaugh A. - Nmap in the Enterprise. Your Guide to Network Scanning [2008, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:08 (996 просмотров)Orebaugh A. - Nmap in the Enterprise. Your Guide to Network Scanning [2008, PDF, ENG]На иностранных языкахRichard Stiennon, vice president at Gartner
...Раздают: 0
Качают: 0
Размер: 6 MB
-
Conrad E. - CISSP Study Guide [2010, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:07 (1039 просмотров)Conrad E. - CISSP Study Guide [2010, PDF, ENG]На иностранных языкахCISSP - первая, самая престижная и признаваемая во всем мире ИТ_сертификация, независимая от производителя. Эта книга покрывает весь материал, включенный в экзамен, особо обращая внимание на последние добавления....
Раздают: 0
Качают: 0
Размер: 13 MB
-
ExtremeTech - Wilson J., Tittel E., Wright M., Korelc J. - Hacking MythTV [2006, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:07 (874 просмотра)ExtremeTech - Wilson J., Tittel E., Wright M., Korelc J. - Hacking MythTV [2006, PDF, ENG]На иностранных языкахWant control? Build your own MythTV PC.
...Раздают: 0
Качают: 0
Размер: 14 MB
-
Levy S. - Hackers. Heroes of the Computer Revolution (25th Anniversary Edition) [2010, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:07 (980 просмотров)Levy S. - Hackers. Heroes of the Computer Revolution (25th Anniversary Edition) [2010, PDF, ENG]На иностранных языкахЭто юбилейное 25 издание книги Стивена Левай рассказывает о самых первых хакерах - тех эксцентричных ботаниках, которые рисковали, ломали правила и толкали мир в новом направлении. С обновленным материалом от Билла Гейтса, Марка Цурекберга, Ричарда Сталлмана и Стива Возняка, Hackers - увлекательная история, ...
Раздают: 0
Качают: 0
Размер: 13 MB
-
Mularien P. - Spring Security 3 [2010, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:07 (1064 просмотра)Mularien P. - Spring Security 3 [2010, PDF, ENG]На иностранных языкахProduct Description
...Раздают: 0
Качают: 0
Размер: 5 MB
-
Vacca J.R. - Network and System Security [2010, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:07 (838 просмотров)Vacca J.R. - Network and System Security [2010, PDF, ENG]На иностранных языкахNetwork and System Security provides focused coverage of network and system security technologies. Explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors\' ...
Раздают: 0
Качают: 0
Размер: 5 MB
-
Cache J., Wright J., Liu V. - Hacking Exposed Wireless, Second Edition [2010, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:07 (1055 просмотров)Cache J., Wright J., Liu V. - Hacking Exposed Wireless, Second Edition [2010, PDF, ENG]На иностранных языкахProtect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today\'s established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom ...
Раздают: 0
Качают: 0
Размер: 11 MB
-
Krutz R.L., Vines R.D. - Cloud Security. A Comprehensive Guide to Secure Cloud Computing [2010, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:07 (843 просмотра)Krutz R.L., Vines R.D. - Cloud Security. A Comprehensive Guide to Secure Cloud Computing [2010, PDF, ENG]На иностранных языкахWell-known security experts decipher the most challenging aspect of cloud computing-security
...Раздают: 0
Качают: 0
Размер: 5 MB
-
Fogie S., Grossman J., Hansen R., Rager A., Petkov P.D. - XSS Attacks. Cross Site Scripting Exploits and Defense [2007, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:06 (891 просмотр)Fogie S., Grossman J., Hansen R., Rager A., Petkov P.D. - XSS Attacks. Cross Site Scripting Exploits and Defense [2007, PDF, ENG]На иностранных языкахCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various ...
Раздают: 0
Качают: 0
Размер: 6 MB
-
Liu R., Trappe W. - Securing Wireless Communications at the Physical Layer [2009, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:06 (872 просмотра)Liu R., Trappe W. - Securing Wireless Communications at the Physical Layer [2009, PDF, ENG]На иностранных языкахThe book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the physical ...
Раздают: 0
Качают: 0
Размер: 13 MB
-
Shema M., Johnson B.C. - Anti-Hacker Tool Kit, Second Edition [2004, CHM, ENG]
Подробнее...Залито: 13-01-2012 12:06 (935 просмотров)Shema M., Johnson B.C. - Anti-Hacker Tool Kit, Second Edition [2004, CHM, ENG]На иностранных языкахStop hackers in their tracks. Organized by category, "Anti-Hacker Tool Kit, Third Edition" provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. Completely revised to include the latest ...
Раздают: 0
Качают: 0
Размер: 29 MB
-
Eagle C. - The IDA Pro Book [2008, CHM, ENG]
Подробнее...Залито: 13-01-2012 12:06 (1096 просмотров)Eagle C. - The IDA Pro Book [2008, CHM, ENG]На иностранных языкахNo source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you\'ll learn how to turn that ...
Раздают: 0
Качают: 0
Размер: 6 MB
-
de Guise P. - Enterprise Systems Backup and Recovery. A Corporate Insurance Policy [2008, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:06 (956 просмотров)de Guise P. - Enterprise Systems Backup and Recovery. A Corporate Insurance Policy [2008, PDF, ENG]На иностранных языкахThe success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce—business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup ...
Раздают: 0
Качают: 0
Размер: 4 MB
-
Reyes M. - Hacking Firefox™. More Than 150 Hacks, Mods, and Customizations [2005, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:05 (949 просмотров)Reyes M. - Hacking Firefox™. More Than 150 Hacks, Mods, and Customizations [2005, PDF, ENG]На иностранных языкахTo use this book, all you need to do is have a basic understanding of how Firefox works, how to install it, and how to find files on your computer.As you read, you will begin to unravel the marvels of coding for Firefox using the basics of Cascading Style Sheets (CSS) and JavaScript and then later diving ...
Раздают: 0
Качают: 0
Размер: 12 MB
-
Bruce Perens' Open Source Series - Rehman R.U. - Intrusion Detection Systems with Snort: Advanced IDS Techniques with Snort, Apache, MySQL, PHP, and ACID [2003, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:03 (935 просмотров)Bruce Perens' Open Source Series - Rehman R.U. - Intrusion Detection Systems with Snort: Advanced IDS Techniques with Snort, Apache, MySQL, PHP, and ACID [2003, PDF, ENG]На иностранных языкахNetwork security has become an important part of corporate IT strategy and safeguarding all the nooks and crannies of your network can be timely and expensive. This book provides information about how to use free Open Source tools to build and manage an Intrusion Detection System. Rehman provides detailed ...
Раздают: 0
Качают: 0
Размер: 2 MB
-
Gerg C., Cox K.J. - Managing Security with Snort and IDS Tools [2004, CHM, ENG]
Подробнее...Залито: 13-01-2012 12:03 (1029 просмотров)Gerg C., Cox K.J. - Managing Security with Snort and IDS Tools [2004, CHM, ENG]На иностранных языкахIntrusion detection is not for the faint at heart. But, if you are a network administrator chances are you\'re under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, ...
Раздают: 0
Качают: 0
Размер: 2 MB
-
Gupta A., Laliberte S. - Defend I.T. Security by Example [2004, CHM, ENG]
Подробнее...Залито: 13-01-2012 12:03 (866 просмотров)Gupta A., Laliberte S. - Defend I.T. Security by Example [2004, CHM, ENG]На иностранных языкахWhat does a cyber security professional do? This is a question often posed by individuals who have heard a lot about security—especially the need to secure their electronic assets—but who are not entirely clear on what is involved. Cyber security involves a variety of things. Although we, the cyber security ...
Раздают: 0
Качают: 0
Размер: 1 MB
-
Systems and Network Attack Center (SNAC). Microsoft Windows 2000 Network Architecture Guides [2001, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:03 (979 просмотров)Systems and Network Attack Center (SNAC). Microsoft Windows 2000 Network Architecture Guides [2001, PDF, ENG]На иностранных языкахМатериалы Агентства национальной безопасности США, посвящённые ОС Microsoft Windows 2000....
Раздают: 0
Качают: 0
Размер: 10 MB
-
Reverse Engineering in Computer Applications [2001, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:03 (983 просмотра)Reverse Engineering in Computer Applications [2001, PDF, ENG]На иностранных языкахThe sole purpose of these lecture notes is to provide an aid to the high school students attending the HSSP course “C-01B Reverse Engineering in Computer Applications” taught during Spring 2001 at the Massachusetts Institute of Technology. The information presented hereby is on an “as-is” basis and the ...
Раздают: 0
Качают: 0
Размер: 671 KB
-
Kennedy D., O'Gorman J., Kearns D., Aharoni M. - Metasploit. The Penetration Tester's Guide [2011, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:03 (969 просмотров)Kennedy D., O'Gorman J., Kearns D., Aharoni M. - Metasploit. The Penetration Tester's Guide [2011, PDF, ENG]На иностранных языкахThe free and open source Metasploit Framework is the most popular suite of penetration testing tools in the world, with more than one million downloads yearly.
...Раздают: 0
Качают: 0
Размер: 7 MB
-
CISA Review Manual 2011 [2010, PDF, ENG]
Подробнее...Залито: 13-01-2012 12:03 (1222 просмотра)CISA Review Manual 2011 [2010, PDF, ENG]На иностранных языкахThe content in this manual has been substantially updated and reformatted to improve the study process. Most of the changes made were to recognize and Illap to the new domains, tasks and knowledge statements that resulted from the recent elSA job practice analysis. The ClSA Certification Committee approved ...
Раздают: 0
Качают: 0
Размер: 155 MB
-
[Журнал] Antennas and Propagation, IEEE Transactions on - Volume 58 (1-12), 59 (1-12), 60 (1) [2010-2012, PDF, ENG]
Подробнее...Залито: 12-01-2012 19:38 (1453 просмотра)[Журнал] Antennas and Propagation, IEEE Transactions on - Volume 58 (1-12), 59 (1-12), 60 (1) [2010-2012, PDF, ENG]На иностранных языкахIEEE Transactions on Antennas and Propagation is one of the most cited journals, ranking number sixteen in telecommunications in 2004, according to the annual Journal Citation Report (2004 edition).
...Раздают: 0
Качают: 0
Размер: 1.2 GB
|