Subscribe

RSS Feed (xml)

Powered By

Skin Design:
Free Blogger Template

Powered by Blogger

Your Ad Here

Tuesday, July 28, 2009

Dangerous Google : Searching For Secrets


This book will help you learn:
* how to use Google to find sources of personal information and other confidential data
* how to find information about vulnerable systems and Web services
* how to locate publicly available network devices using Google And much more!

What You Should Know...
• how to use a Web browser, Google query operators
• basic rules of operation of the HTTP protocol

Download
http://rapidshare.com/files/260890177/Dangerous_Google_-_Searching_For_Secrets.rar

Read More......

Monday, July 27, 2009

Stealing the Network: The Complete Series Collector's Edition


"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one." - from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black Hat, Inc. and Founder of DEFCON

For the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage!

These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass.

This book contains all of the material from each of the four books in the Stealing the Network series.

All of the stories and tech from:

How to Own the Box

How to Own a Continent

How to Own an Identity

How to Own a Shadow

Plus:

Finally - find out how the story ends! The final chapter is here!

A DVD full of behind the scenes stories and insider info about the making of these cult classics!

* Now for the first time the entire series is one 1000+ page book
* The DVD contains 20 minutes of behind the scenes footage
* Readers will finally learn the fate of "Knuth" in the much anticipated Final Chapter

Download
http://rapidshare.com/files/260858183/Stealing_the_Network_The_Complete_Series_Collectors_Edition.rar

Read More......

Tuesday, July 21, 2009

Java Web Services

At the end of the day, Web services aren't hard to conceptualize. They're just a bunch of software modules with specific rules about how they go about discovering one another and sending messages back and forth. Implementation is another story, however. In the Java language, writing Web services requires an understanding of half a dozen specialized APIs at minimum, and more than that if you want to do fancier stuff. Java Web Services does a very good job of dispersing the confusing terminology (and obfuscating hype) and of showing you exactly how to do Web services work in Java. This doesn't sound like a revolutionary concept, but unfortunately it is. David Chappell and Tyler Jewell have comfortably fit into less than 250 pages what others have not done as well in twice as much space.
Take Universal Description, Discovery, and Integration (UDDI) work as an example. UDDI exists to help software locate other software that does what it wants. How do you do that? Chappell and Jewell present two concise program listings--a client and a server--that show how to do a UDDI lookup. They then refine their code by using a third-party API that makes the work easier. Similarly pragmatic attention goes to Simple Object Access Protocol (SOAP), in which they show how to create a message, populate it with XML, make an attachment if necessary, and send it on its way. You won't find a lot of frills or conceptual explanations (though there are enough "why" sections to ensure that you're not just typing recipes blindly); the emphasis is on writing Java code that interacts with Web services protocols and standards. --David Wall

Topics covered: How to write Web services software in Java, with respect to Universal Description, Discovery, and Integration (UDDI), Simple Object Access Protocol (SOAP), and Web Services Description Language (WSDL). There's also coverage of interprocess communication under JAX-RPC and ways to implement security. All of the low-level stuff is here. Look elsewhere for architecture and design information.

Product Description
Java Web Services gives the experienced Java developer a way into the Web Services world. It helps you to understand what's going on, what the technologies mean and how they relate, and shows Java developers how to put them to use to solve real problems. You'll learn what's real and what isn't; what the technologies are really supposed to do, and how they do it. Java Web Services shows you how to use SOAP to perform remote method calls and message passing; how to use WSDL to describe the interface to a web service or understand the interface of someone else's service; and how to use UDDI to advertise (publish) and look up services in each local or global registry. Java Web Services also discusses security issues, interoperability issues, integration with other Java enterprise technologies like EJB; the work being done on the JAXM and JAX-RPC packages, and integration with Microsoft's .NET services. The web services picture is still taking shape; there are many platforms and APIs to consider, and many conflicting claims from different marketing groups. And although web services are inherently language-independent, the fit between the fundamental principles on which Java and web services are based means that Java will almost certainly be the predominant language for web services development. If you're a Java developer and want to climb on the web services bandwagon, or if you only want to "kick the tires" and find out what web services has to offer, you will find this book indispensable.


Download
http://rapidshare.com/files/258573381/Java_Web_Services.rar

Read More......

The Top One Hundred Lovemaking Techniques Of All Time


Forget all that touchy-feely psycho-babble. You just want some great ways to easily deliver the most incredible orgasms ever! The trick is finding them. And you just did.

Download
http://rapidshare.com/files/258573402/The_Top_One_Hundred_Lovemaking_Techniques_Of_All_Time.rar

Read More......

MySpace For Dummies


MySpace For Dummies

Product Description
MySpace has more than 100 million active users. For many of them, MySpace is their central hub for connecting and communicating. They come to meet new people, keep up to date with family members, learn about new products and services, or catch up on the latest news. They come to check out blogs or to share their music. Don’t you just love the MySpace community?
What — you don’t have a MySpace page yet? Well, we can fix that!

Whether you’ve just decided to join MySpace, need to give your profile more pizzazz, or simply want to find out as much about MySpace as your teenager already knows, MySpace For Dummies, Second Edition has what you’re looking for. Find out how to get started, use MySpace safely, customize your page, start a blog, showcase your skills, and lots more. This friendly guide will help you:

Open an account and set up your profile
Turn on and use the MySpace safety and security tools
Find and add friends to your profile
Stay in touch by e-mail, bulletins, and profile comments
Sell, buy, and market on MySpace
Show off your talents as a filmmaker, author, comic, or musician
Upgrade your profile with photos, music, and a whole new look
Everything’s arranged to help you quickly find what you’re looking for. With MySpace For Dummies, Second Edition, you can easily make your MySpace experience truly exceptional!


Download

http://rapidshare.com/files/258573414/MySpace_For_Dummies.rar

Read More......

Sunday, July 19, 2009

Anti Tank Weapons


Author: John Norris
Release: 1997
Publisher: Brassey's Inc
Format: PDF 143 pages
ISBN: 1857531779 (1-85753-177-9)
ISBN 13: 9781857531770 (978-1-85753-177-0)
List Price: $32.95

Description:
The impact of the tank in any conflict scenario is well recognized. Heavily armored, carrying formidable firepower, capable of traveling at speed in any weather across almost any terrain. The requirement for effective anti-tank systems is, therefore, of paramount concern to all armed forces of all nations. This volume describes all systems commonly available today. From shoulder-fired ATGWs, through to the new and highly sophisticated "fire-and-forget" ground-based and airborne systems. This is an easy-to-use guide to an essential element of a fighting power's deterrent.

Download
http://rapidshare.com/files/257837179/Anti_Tank_Weapons_ThePoet.rar

Read More......

Thursday, July 9, 2009

Core Java(tm), Volume I Fundamentals (8th Edition)

The full coverage you need for the PMP Exam

Get the preparation you need for the challenging Project Management Professional (PMP) certification exam in this comprehensive study guide. In addition to coverage of all exam objectives, you'll find practical advice including "How This Applies to Your Current Project" and "Real World Scenario" sidebars, as well as coverage for the Certified Associate in Project Management (CAPM) exam, and much more.

* Full coverage of all exam objectives in a systematic approach, so you can be confident you're getting the instruction you need for the exam
* Practical hands-on exercises to reinforce critical skills
* Real-world scenarios that put what you've learned in the context of actual job roles
* Challenging review questions in each chapter to prepare you for exam day
* Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam
* A handy tear card that maps every official exam objective to the corresponding chapter in the book, so you can track your exam prep objective by objective

Look inside for complete coverage of all exam objectives.

Download
http://rapidshare.com/files/253726793/PH_.Core.Java.Volume-I.Fundamentals_8Ed.rar

Read More......

Now You Know - The Book Of Answers

Now You Know - The Book Of Answers

Why are golf assistants called caddies? Why do the British drive on the left and North Americans on the right? Why is football played on a “gridiron,” and a leg injury called a “Charlie horse”? The answers to these questions and the origins of hundreds of other expressions and customs are brought together in this fascinating collection of the history behind everyday words and routines. With all the conciseness of his original radio scripts, Doug Lennox “cuts to the quick” in telling you the things you always wanted to know.

Download
http://rapidshare.com/files/253719864/Now_You_Know_-_The_Book_Of_Answers.rar

Read More......

Wednesday, July 8, 2009

Hacking Exposed Linux

he Latest Linux Security Solutions

This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.

*
Secure Linux by using attacks and countermeasures from the latest OSSTMM research
*
Follow attack techniques of PSTN, ISDN, and PSDN over Linux
*
Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
*
Block Linux signal jamming, cloning, and eavesdropping attacks
*
Apply Trusted Computing and cryptography tools for your best defense
*
Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
*
Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
*
Find and repair errors in C code with static analysis and Hoare Logic

Download

http://rapidshare.com/files/253721395/Hacking_Exposed_Linux.rar

Read More......

Hackers Black Book + All About Hacking


Download

Read More......

Hacking TCP IP Security

Language of the book is Italian.

The result of all of this familiarity with bad-guy tools is a leg up on defending against them. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective. Taking on the major network operating systems and network devices one at a time, the authors tell you exactly what Unix configuration files to alter, what Windows NT Registry keys to change, and what settings to make in NetWare. They spare no criticism of products with which they aren't impressed, and don't hesitate to point out inherent, uncorrectable security weaknesses where they find them. This book is no mere rehashing of generally accepted security practices. It and its companion Web site are the best way for all of you network administrators to know thine enemies.

Download

Read More......

Microsoft SQL Server Black Book - Patrick Dalton

Book Description
Teaches, with step-by-step guides, the most important SQL Server tasks. Troubleshoots common database and client-server problems. Improves performance with sophisticated SQL Server tuning techniques. Develops powerful database features that can easily be integrated into your current database system. Uses ready-to-run database examples and SQL code.

About the Author
Patrick Dalton has been designing databases for 14 years, and for the last 7 years he has focused exclusively on client-server development with Microsoft SQL Server and other database systems. He is certified by Microsoft as aTrainer and a Solution Developer in SQL Server Administration.

Download
http://rapidshare.com/files/253278410/Microsoft_SQL_Server_Black_Book.pdf


Read More......