Free Ebook Video Training

Monday, July 13, 2009

Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks


Chris Fry, Martin Nystrom, “Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks”
O'Reilly Media, Inc. | 2009-02-24 | ISBN: 0596518161 | 246 pages | CHM | 5,75 MB

How well does your enterprise stand up against today's sophisticated security threats? With this book, security experts from Cisco Systems demonstrate how you can detect damaging security incidents on your global network -first by discovering which assets you need to monitor closely, then by helping you develop targeted strategies and pragmatic techniques to identify security incidents.

Security Monitoring offers six steps to improve network monitoring, based on the authors' years of experience conducting incident response to keep Cisco's global network secure. These steps will guide you through the following:
Develop Policies: define the rules, regulations, and criteria against which to monitor
Know Your Network: build knowledge of your infrastructure with network telemetry
Select Your Targets: define the subset of infrastructure where you'll focus monitoring
Choose Event Sources: identify the event types needed to discover policy violations
Feed and Tune: collect data and generate alerts, tuning systems using context
Maintain Dependable Event Sources: prevent critical gaps in your event collection and monitoring

To help you understand this framework, Security Monitoring illustrates its recommendations using a fictional mobile telephony provider. Each chapter's approach and techniques are overlaid against this fictional example with diagrams and detailed examples. These recommendations will help you select and deploy the best techniques for monitoring your own enterprise network.


D0wn10ad
Mirr0r

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast


Paco Hope, Ben Walther, "Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast"
O'Reilly Media, Inc. | 2008-10-28 | ISBN: 0596514832 | 312 pages | CHM | 8,7 MB

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite. Recipes cover the basics from observing messages between clients and servers to multi-phase tests that script the login and execution of web application features. By the end of the book, you'll be able to build tests pinpointed at Ajax functions, as well as large multi-step tests for the usual suspects: cross-site scripting and injection attacks. This book helps you: Obtain, install, and configure useful-and free-security testing tools Understand how your application communicates with users, so you can better simulate attacks in your tests Choose from many different methods that simulate common attacks such as SQL injection, cross-site scripting, and manipulating hidden form fields Make your tests repeatable by using the scripts and examples in the recipes as starting points for automated tests

Don't live in dread of the midnight phone call telling you that your site has been hacked. With Web Security Testing Cookbook and the free tools used in the book's examples, you can incorporate security coverage into your test suite, and sleep in peace.


D0wn10ad
Mirr0r

A Classical Introduction to Cryptography


Serge Vaudenay, "A Classical Introduction to Cryptography"
SPRINGER | 2006 | ISBN: 0387254641 | 343 Pages | PDF | 1.2 MB


A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.

This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes.

A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry.


D0wn10ad
Mirr0r

Global Community: Global Security


Randall E. Osborne, Paul Kriese, “Global Community: Global Security”
Rodopi | 2008-10-22 | ISBN: 9042024925 | 364 pages | PDF | 2,4 MB

Global security cannot be achieved until people view the world as a global community. Until such time, differences will continue to be perceived as threatening. These perceived “threats” are the primary threat to global security. This volume proposes methods for minimizing the “us versus them” mentality so that we can build a sense of global community.

D0wn10ad
Mirr0r

Handbook of Database Security Applications and Trends


Michael Gertz, Sushil Jajodia, "Handbook of Database Security Applications and Trends"
Springer | 2007-11-30 | ISBN:0387485325 | 579 pages | PDF | 4,7 MB

The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents the most comprehensive work on numerous data security aspects published in the last ten years.
The Handbook of Database Security: Applications & Trends places a particular focus on data-centric security aspects that reach beyond traditional and well-studied data security aspects in databases. It also covers security in advanced database systems, data privacy and trust management, and data outsourcing, and outlines directions for future research in these fields.
The Handbook of Database Security: Applications & Trends is designed for a professional audience composed of practitioners and researchers in industry and academia as a reference book. This volume is also suitable for advanced-level students in computer science interested in the state-of-the-art in data security.



D0wn10ad
Mirr0r

Statistical Methods in Computer Security


William W.S. Chen, "Statistical Methods in Computer Security"
CRC | 2004-12-28 | ISBN: 0824759397 | 376 pages | PDF | 5,8 MB

Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.



D0wn10ad
Mirr0r

«HAKIN9 2006 ISSUE 2 English Language»


«HAKIN9 2006 ISSUE 2 English Language»
Publisher: Hakin9 | Issue 02/2006 | ISBN: n/a | Pages: 84 | PDF | 6.7 MB


»Tools – Steganos Security Suite 6

Carlos Ruiz
The author presents SSS 6, a complete security package with different security tools for protecting your PC combining encryption with steganography.

»Tools – WS-DNS-BFX

Daniel de
The author describes how WS-DNS_BFX works and what kind of advantages you can have thanks to using it.

»Constructing a hooking-oriented size disassembler for malware analysis

Ruben Santamarta
How you can fight the malicious code? To achieve this essential objective we have to analyse in detail the inner works of malware using reverse engineering. Ruben Santamarta prompts how to use Structure Exception Handling to create a size disassembler.

»Snort_inline as a solution

Pierpaolo Palazzoli,
From this article you will learn how Snort_inline works, what are the basics of Intriusion Prevention Systems and how to tune Snort_inline configuration. authors also present the ways to add a dedicated device which is best suited for the environment we want to protect.

»Can one fool application-layer fingerprinting

Piotr Sobolewski
Numerous tools exists and allow us to determine what service runs on some given port and what software provides it. Let's try to understand how they work and check than if it's possible (easy) to trick them.

»IE plugins: BHOs and toolbars

Gilbert Nzeka
The author presents online advertisement industry strategies. One of the problem advertisers face is: how can they increase the ROI by targeting more users? The answer - by developing toolbars and other types of Internet Explorer plugins which enable them to spy and sometimes to control the navigation of users.

»Security violation and policy nforcement with IDS and firewall

Arrigo Triulzi,
In this article we discuss how to detect security violation of a firewall policy using a Network Intrusion Detection System (NIDS) comparing in real time traffic on the outside with traffic on the inside and alerting if it's contradicting the rules. Arrigio Triulzi and Antonio Merola show how NIDS can be used in the specific case of firewall failure.

»An interview with Dr. Gary McGraw


Our expert on IT security situation, careless private users, vulnerabilieties in the systems and hackers community.

»Books reviews


Reviews of books: 19 Deadly Sins of Software Security, Fundamentals in Computer Security, Linux Server Security, Network Security Bible.

»Column – Spammers fortune

Konstantin Klyagin
King for a day, spammer for a lifetime... Konst column on protection against SPAM and outsourcing role.


D0wn10ad

Mirr0r

The Masters of Deception: The Gang That Ruled Cyberspace


Michele Slatalla, "The Masters of Deception: The Gang That Ruled Cyberspace"
Harper Perennial | 1996-01-10 | ISBN: 0060926945 | 240 pages | PDF | 1,2 MB

The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

On January 15, 1990, the AT&T long-distance phone network crashed. Although it was eventually ruled an accident, the event was a wake-up call to telephone companies and law enforcement agencies everywhere, exposing the fragility of the systems that we all heavily depend on. The feds decided that the time had come to crack down on the handful of computer hackers they had been monitoring for several years in connection with the phone companies. The term "hacker" is about to become a household word, and not in the sense of "great programming."

Set against this backdrop, two rival gangs--The Legion of Doom and The Masters of Deception--are about to go to war. What sounds like a clash of comic-book supervillains is actually a feud between factions of teenagers, fueled by misunderstandings and adolescent testosterone. The events leading up to the conflict and its climax are riveting and fun. The book features great depictions of some of the earliest celebrities of hackerdom, including Acid Phreak and Phiber Optik, as well as tales of their exploits and rivalries. Slatalla and Quittner do a great job of portraying the principals as both the powerful cyberspace masters they want to be and the scared, emotional young men they really are.

There is also a nostalgic attraction at work in Masters of Deception. Anyone who remembers their first Commie 64 or TRS-80 will long for those golden days and be thankful that they were elsewhere when the Secret Service came calling.

D0wn10ad
Mirr0r

The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall


Peter Hansteen, "The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall "
No Starch Press | 2008-01-11 | ISBN: 1593271654 | 184 pages | PDF | 6,2 MB

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options. Throughout the book, Hansteen emphasizes the importance of staying in control by having a written network specification, using macros to make rule sets more readable, and performing rigid testing when loading in new rules.
Today's system administrators face increasing challenges in the quest for network quality, and The Book of PF can help by demystifying the tools of modern *BSD network defense. But, perhaps more importantly, because we know you like to tinker, The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to:
Create rule sets for all kinds of network traffic, whether it is crossing a simple home LAN, hiding behind NAT, traversing DMZs, or spanning bridges
Use PF to create a wireless access point, and lock it down tight with authpf and special access restrictions
Maximize availability by using redirection rules for load balancing and CARP for failover
Use tables for proactive defense against would-be attackers and spammers
Set up queues and traffic shaping with ALTQ, so your network stays responsive
Master your logs with monitoring and visualization, because you can never be too paranoid
The Book of PF is written for BSD enthusiasts and network admins at any level of expertise. With more and more services placing high demands on bandwidth and increasing hostility coming from the Internet at-large, you can never be too skilled with PF.



D0wn10ad
Mirr0r

Intelligence Integration in Distributed Knowledge Management


Dariusz Krol, Ngoc Thanh Nguyen "Intelligence Integration in Distributed Knowledge Management"
IGI Global | 2008-07-16 | ISBN: 1599045761 | 388 pages | PDF | 6,2 MB


Intelligent methods are used in distributed environments in countless ways, with examples such as propagation, communication, collaboration, and cooperation. With the abundant purposes for intelligence in distributed systems, it is pertinent for researchers, technicians, and students in various areas of computer science to discover the most current and definitive advances in the field. Intelligence Integration in Distributed Knowledge Management provides recent technologies and practices in intelligence for distributed systems while covering major aspects of the agent based systems. This book is a must for those striving to enhance their understanding of distributed knowledge management and extend their ideas of cooperation using for numerous real-world problems.


D0wn10ad
Mirr0r

GFI Network Security and PCI Compliance Power Tools


Brien Posey, "GFI Network Security and PCI Compliance Power Tools"
Syngress | 2008-09-22 | ISBN: 159749285X | 466 pages | PDF | 15,5 MB

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities. These tasks are also key components for companies who must achieve Payment Card Industry Data Security Standard (PCI) compliance. GFI Network Security is a market leader in this security scanning, reporting, and federal compliance space. Their products are deployed on over 200,000 networks worldwide and they have over 10,000 worldwide re-sellers. The GFI customer base is also extremely active and tightly-knit. Their forums have over 14,000 registered users and there are currently 18,200 topics under discussion. These are good indicators of both the size of the market and users' need to gain more information on GFI products. This book is the first reference for these system administrators and security professionals specifically covering GFI's products. The book is being developed with support of the GFI Engineering team.
GFI LANGuard Network Security Scanner (NSS) combines vulnerability scanning and patch management functions into one, powerful tool set. By analyzing the operating system and the applications running on a network, GFI LANguard NSS identifies potential security issues. It then alerts system administrators and security professionals to weaknesses before a hacker can find them. This allows the IT staff to close any holes before they are exploited. The GFI PCI Suite is a package comprising the core software required for companies to achieve Payment Card Industry Data Security Standard (PCI) compliance. This suite is a component of GFI LANGuard Network Security Scanner (NSS). The GFI PCI Suite also features enhanced reporting functionality with reports created specifically to help organizations become compliant.
GFI products have received introductory coverage in dozens of IT books for system administrators and security professionals. But, these tools have never received the in-depth, substantive coverage required to truly master them. While our book will have a certain amount of introductory material, it will be primarily written for intermediate to advanced users who must push these tools to the limits to do their jobs. Readers of this book have already scoured the user forums and smattering of coverage in other books. Now, they'll finally have the comprehensive reference they need.
* Use GFI EndPointSecurity to Lock Down Hardware
* Create Protection Policies to Control the Level of Device Access
* Master Advanced Features of GFI: Locking Device Categories, Blacklisting and Whitelisting Devices, Using File Type Restrictions and More


D0wn10ad
Mirr0r

Windows Vista Security Guide


javvin.com, “Windows Vista Security Guide”
Javvin Press | 2008 | ISBN: 1602670110 | 6 pages | CHM | 1 MB

Windows Vista security quick guide covers all daily used Windows Vista security features and options, provides quick solutions when crisis happens.


D0wn10ad
Mirr0r

Cybercrime: A Reference Handbook


Clemens Martin , Bernadette Schell, Mildred Vasan, "Cybercrime: A Reference Handbook"
ABC-CLIO | 2004-10-18 | ISBN: 1851096833 | 247 pages | PDF | 1,2 MB

Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know. How can a person's identity be stolen? What exactly is a "hacker"? How much damage can a 17 year old really do with a personal computer? This handbook addresses the major questions surrounding this highly controversial topic, and explores the reality of this intriguing world that sometimes seems like science fiction. An issue so new and evolving so quickly, there are few sources from which readers can get the information they need to inform themselves about and protect themselves from cybercrime. Written by experts in the field, this reference work contains original essays, descriptions of technical aspects, and numerous contributions from over 100 sources. Cybercrime uses fascinating case studies to analyze the beginning of cybercrime and the path it has followed to the present day, With biographical sketches of many influential hackers, the reader will better understand the development of the cybercriminal, and how many of these individuals went on to create some of the computer industry's most useful software. From cyberstalking to viruses, scholars and students alike will find the answers they need to understand these issues.



D0wn10ad
Mirr0r

Mechanics of User Identification and Authentication: Fundamentals of Identity Management


Dobromir Todorov, "Mechanics of User Identification and Authentication: Fundamentals of Identity Management "
Auerbach Publications; 1 edition | 2007-06-18 | ISBN: 1420052195 | 760 pages | PDF | 12,7 MB

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.



D0wn10ad
Mirr0r

The Shellcoder's Handbook: Discovering and Exploiting Security Holes


Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte, "The Shellcoder's Handbook: Discovering and Exploiting Security Holes"
Wiley; 2 ed | 2007-08-20 | ISBN: 047008023X | 718 pages | PDF | 3 MB

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
The companion Web site features downloadable code files



D0wn10ad
Mirr0r

CompTIA Security+ All-in-One Exam Guide, Second Edition


Gregory White, Wm. Arthur Conklin, Dwayne Williams, Roger Davis, Chuck Cothren, "CompTIA Security+ All-in-One Exam Guide, Second Edition"
McGraw-Hill Osborne Media | 2009-02-01 | ISBN: 0071601279 | 672 pages | PDF | 6,8 MB

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the CompTIA Security+ exam with ease, this definitive volume also serves as an essential on-the-job reference. Get full details on all exam topics, including how to:

*Combat viruses, Trojan horses, spyware, logic bombs, and worms
*Defend against DDoS, spoofing, replay, TCP/IP hijacking, and other attacks
*Apply best practices for access control methods
*Implement authentication using Kerberos, CHAP, biometrics, and other methods
*Use cryptography and PKI
*Secure remote access, wireless, and virtual private networks (VPNs)
*Harden networks, operating systems, and applications
*Manage incident response and follow forensic procedures


D0wn10ad
Mirr0r

Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference


Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006
Pages: 621 | PDF | Springer-Verlag Gmbh; 1st ed. (15. Sep 2006) | ISBN: 3540374329 | 8 MB


Synopsis
This book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held in Santa Barbara, California, USA in August 2006. The 34 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 250 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.


D0wn10ad
Mirr0r

Cryptology and Network Security: 7th International Conference, CANS 2008


Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008
Pages: 395 | PDF | Springer-Verlag Gmbh; 1st Ed. (Dezember 2008) | ISBN: 3540896406 | 5 MB


Synopsis
This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, held in Hong-Kong, China, in December 2008. The 27 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on cryptosystems, signatures, identification, authentication and key management, cryptographic algorithms and protocols, stream ciphers and block ciphers, cryptographic foundations, applications and implementations, as well as security in ad hoc networks and wireless sensor networks.


D0wn10ad
Mirr0r

Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006


Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006
Pages: 365 | PDF | Springer; 1st Ed. (18. mar 2006) | ISBN: 3540310339 | 9 MB


Synopsis
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2006, CT-RSA 2006, held in San Jose, CA, USA in February 2006.

The 22 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on attacks on AES, identification, algebra, integrity, public key encryption, signatures, side-channel attacks, CCA encryption, message authentication, block ciphers, and multi-party computation.

D0wn10ad
Mirr0r

Topics in Cryptology - CT-RSA 2008: The Cryptographers' Track at the RSA Conference 2008


Topics in Cryptology - CT-RSA 2008: The Cryptographers' Track at the RSA Conference 2008
Pages: 437 | PDF | Springer; 1st Ed. (aprl 2008) | ISBN: 3540792627 | 7 MB


Synopsis
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2008, CT-RSA 2008, held in San Francisco, CA, USA in April 2008. The 26 revised full papers presented together with the abstract of 1 invited talk were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message authentication codes, improved aes implementations, public key encryption with special properties, side channel cryptanalysis, cryptography for limited devices, invited talk, key exchange, cryptanalysis, and cryptographic protocols.


D0wn10ad

Mirr0r

Topics in Cryptology CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007


Topics in Cryptology CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007
Pages: 403 | PDF | Springer 1st Ed. (30. jun 2006) | ISBN: 3540693270 | 5 MB


Synopsis
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held in San Francisco, CA, USA in February 2007.

The 25 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on symmetric-key encryption, signatures and authentication, hash functions, digital signatures, cryptographic protocols, side-channel attacks, and efficient implementation.


D0wn10ad
Mirr0r

The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals


Paul Bocij, "The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals"
Praeger Publishers | 2006-10-30 | ISBN: 027598575X | 272 pages | PDF | 2 MB

In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.


D0wn10ad
Mirr0r

Computer Security and Cryptography


Alan G. Konheim, "Computer Security and Cryptography"
Wiley-Interscience | 2007 | ISBN: 0471947830 | 544 pages | PDF | 8,4 MB

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.
The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.
Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.
Three basic types of chapters are featured to facilitate learning:
* Chapters that develop technical skills
* Chapters that describe a cryptosystem and present a method of analysis
* Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions
With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.

D0wn10ad
Mirr0r

Water Supply in Emergency Situations


Water Supply in Emergency Situations
Springer; 1 edition | June 25, 2007 | ISBN: 1402063032 | 173 pages | PDF | 8 Mb

Water is essential for life and the trigger for this book is in the increasing threats to uninterrupted, good quality water to large concentrations of population, which include natural and manmade, the latter including accidental and, unfortunately, also intentional. Israel in particular is aware of the risks of terror, including to its water supply and it is not surprising that the initiative for a NATO workshop, the outcome of which is presented here, came from this country.

This book reflects the outcome of a three day NATO Advanced Workshop entitled 'Supply of Water to Cities in Emergency Situations' organized by ICTAF at Tel-Aviv University and The University of Thessaly, Department of Planning and Regional Development and sponsored by the NATO Security through Science programme. Some 35 experts from 14 countries from Europe, the Middle East and Asia assembled in Tel-Aviv for this event.

The 20 papers presented and the discussions which took place throughout the workshop illuminate a broad spectrum of problems and of concerns to the orderly water supply in the different participating countries ranging from floods, through contamination due to deteriorated infrastructure and to a surprisingly low concern related to intentional terror-related threats. We find insufficient preparedness in many countries to cope with severe disruption of water supply.

We expect publicity and discussion to raise the level of awareness of relevant decision makers worldwide to this essential issue and to encourage development and implementation of procedures and means for combating the threat.

D0wn10ad
Mirr0r

Film Piracy, Organized Crime, and Terrorism


Gregory F. Treverton, Carl Matthies, Karla J. Cunningham, Jeremiah Goulka, Greg Ridgeway, Anny Wong, “Film Piracy, Organized Crime, and Terrorism”
RAND Corporation | 2009 | ISBN: 0833045652 | 190 pages | PDF | 1,2 MB

From Preface
This report presents the findings of research into the involvement of
organized crime and terrorist groups in counterfeiting a wide range
of products, from watches to automobile parts, from pharmaceuticals
to computer software. It presents detailed case studies from around
the globe in one area of counterfeiting, film piracy, to illustrate the
broader problem of criminal—and perhaps terrorist—groups finding a
new and not-much-discussed way of funding their nefarious activities.
Although there is less evidence of involvement by terrorists, piracy is
high in payoff and low in risk for both groups, often taking place under
the radar of law enforcement....

D0wn10ad
Mirr0r

Programming Wireless Devices with the Java2 Platform, Micro Second Edition

Programming Wireless Devices with the Java2 Platform, Micro Second Edition

Roger Riggs, Antero Taivalsaari, Jim Van Peursem, Jyri Huopaniemi, Mark Patel, Aleksi Uotila, «Programming Wireless Devices with the Java2 Platform, Micro Second Edition»
Addison Wesley | ISBN: 0321197984 | 2003 | CHM | 464 pages | 2.36 MB

This book presents the Java(TM) 2 Platform, Micro Edition (J2ME(TM)) standards that support the development of applications for consumer devices such as mobile phones, two-way pagers, and wireless personal organizers. To create these standards, Sun collaborated with such consumer device companies as Motorola, Nokia, NTT DoCoMo, Research In Motion, Samsung, Siemens, Sony Ericsson, and many others. The result is a highly portable, small-footprint application development environment that brings the unique capabilities of Java technology, including platform independence and enhanced security, to the rapidly growing wireless market.

Link download

http://uploading.com/files/QZESWW4Y/booktraining.net_programming-wireless-devices-with-the-java2-platform-micro-seco...chm.html


http://rapidshare.com/files/255449880/booktraining.net_programming-wireless-devices-with-the-java2-platform-micro-second-edition.978032119

Enterprise Security: The Manager's Defense Guide

Enterprise Security: The Manager's Defense Guide

David Leon Clark, «Enterprise Security: The Manager's Defense Guide»
Addison Wesley | ISBN: 020171972X | 2002 | PDF | 288 pages | 2.15 MB

Enterprise Security: The Manager's Defense Guide is a comprehensive, state-of-the-art handbook for harnessing e-Business security. It examines the most recent attack strategies and offers specific techniques for combating attempts at data infiltration, destruction, and denial-of-service attacks. Understanding that security must be incorporated within multiple levels of e-Business technology and practice, the author presents measures for securing your system platform, applications, operating environment, processes, and communication links. He explains how the traditional security technologies of firewalls and virtual private networks (VPNs) can be integrated with risk management, vulnerability assessment, intrusion detection, and content management for a comprehensive security plan.

Link download

http://uploading.com/files/6LX0M7PM/booktraining.net_enterprise-security-the-managers-defense-guide.9780201719727.23...pdf.html


http://rapidshare.com/files/255449890/booktraining.net_enterprise-security-the-managers-defense-guide.9780201719727.23656.pdf

Spring Into HTML and CSS

Spring Into HTML and CSS

Molly E. Holzschlag, «Spring Into HTML and CSS»
Addison Wesley | ISBN: 0131855867 | 2005 | CHM | 336 pages | 5.67 MB

The fastest route to true HTML/CSS mastery!Need to build a web site? Or update one? Or just create some effective new web content? Maybe you just need to update your skills, do the job better. Welcome. This book's for you. We'll leverage what you already know about the web, so you'll go further, faster than you ever expected.

Link download

http://uploading.com/files/MM0WS4YG/booktraining.net_spring-into-html-and-css.9780131855861.594.chm.html

http://rapidshare.com/files/255449899/booktraining.net_spring-into-html-and-css.9780131855861.594.chm

C++ by Dissection

C++ by Dissection

Pohl, «C++ by Dissection»
Addison Wesley | ISBN: 0201743965 | 2001 | PDF | 640 pages | 5.17 MB

C++ by Dissection presents a thorough introduction to the programming process by carefully developing working programs to illuminate key features of the C++ programming language. Program code is explained in an easy-to-follow, careful manner throughout. The code has been tested on several platforms and is found on the bundled CDrom accompanying this text. The code in C++ By Dissection can be used with most C++ systems, including those found in operating systems such as MacOS, MS-DOS, OS/2, UNIX, and Windows.


Link download

http://uploading.com/files/D8BL1SL5/booktraining.net_c-by-dissection.9780201743968.942.pdf.html

http://rapidshare.com/files/255449930/booktraining.net_c-by-dissection.9780201743968.942.pdf

XML Topic Maps: Creating and Using Topic Maps for the Web

XML Topic Maps: Creating and Using Topic Maps for the Web

Jack Park, Sam Hunting, «XML Topic Maps: Creating and Using Topic Maps for the Web»
Addison Wesley | ISBN: 0201749602 | 2002 | CHM | 640 pages | 2.37 MB

The explosive growth of the World Wide Web is fueling the need for a new generation of technologies for managing information flow, data, and knowledge. This developer's overview and how-to book provides a complete introduction and application guide to the world of topic maps, a powerful new means of navigating the World Wide Web's vast sea of information.

Link download

http://uploading.com/files/ODEDRQO6/booktraining.net_xml-topic-maps-creating-and-using-topic-maps-for-the-web.978020...chm.html

http://rapidshare.com/files/255449923/booktraining.net_xml-topic-maps-creating-and-using-topic-maps-for-the-web.9780201749601.556.chm

PPP Design, Implementation, and Debugging

PPP Design, Implementation, and Debugging (2nd Edition)

James D. Carlson, «PPP Design, Implementation, and Debugging (2nd Edition)»
Addison Wesley | ISBN: 0201700530 | 2001 | PDF | 416 pages | 1.16 MB

PPP Design, Implementation, and Debugging, Second Edition, provides an overview of PPP design and operation, and follows PPP in detail through each of its three main stages--link establishment, authentication, and data transmission. Each PPP protocol is described in depth, including LCP (Link Control Protocol), CCP (Compression Control Protocol), and ECP (Encryption Control Protocol). PPP's relationship to other networking protocols is also examined.

Link download

http://uploading.com/files/COVOVVNP/booktraining.net_ppp-design-implementation-and-debugging-2nd-edition.97802017005...pdf.html

http://rapidshare.com/files/255449910/booktraining.net_ppp-design-implementation-and-debugging-2nd-edition.9780201700534.24919.pdf

Developing Microsoft Office Solutions

Developing Microsoft Office Solutions: Answers for Office 2003, Office XP, Office 2000, and Office 97

Ken Bluttman, «Developing Microsoft Office Solutions: Answers for Office 2003, Office XP, Office 2000, and Office 97»
Addison Wesley | ISBN: 0201738058 | 2003 | CHM | 608 pages | 9.37 MB

Packed with case studies and code examples, this book covers all of Office, not just one application. Ken Bluttman shares more than a decade's experience as an Office developer, demonstrating how to program every recent version, from Office 2003 back to Office 97. Working with Office 2003? You'll discover exactly how to make the most of its breakthrough XML support--along with improved Smart Tags, task panes, and more!

Link download

http://uploading.com/files/WO4HXARX/booktraining.net_developing-microsoft-office-solutions-answers-for-office-2003-o...97.html

http://rapidshare.com/files/255449903/booktraining.net_developing-microsoft-office-solutions-answers-for-office-2003-office-xp-office-2000

Algorithmic Number Theory: 6th International Symposium ANTS-VI, Burlington

3540221565

Algorithmic Number Theory: 6th International Symposium ANTS-VI, Burlington, VT, USA, June 13-18, 2004, Proceedings (Lecture Notes in Computer Science): Duncan Buell
Springer | ISBN: 3540221565 | 2004-07-27 | PDF (OCR) | 451 pages | 20.26 Mb




This book constitutes the refereed proceedings of the 6th International Algorithmic Number Theory Symposium, ANTS 2004, held in Burlington, VT, USA, in June 2004. The 30 revised full papers presented together with 3 invited papers were carefully reviewed and selected for inclusion in the book. Among the topics addressed are zeta functions, elliptic curves, hyperelliptic curves, GCD algorithms, number field computations, complexity, primality testing, Weil and Tate pairings, cryptographic algorithms, function field sieve, algebraic function field mapping, quartic fields, cubic number fields, lattices, discrete logarithms, and public key cryptosystems.

Link download

http://uploading.com/files/R757SH89/booktraining.net_isbn_3540221565_algorithmic_number_theory.zip.html


http://rapidshare.com/files/255449927/booktraining.net_isbn_3540221565_algorithmic_number_theory.zip

Sams Teach Yourself ATL Programming in 21 Days


Sams Teach Yourself ATL Programming in 21 Days
Publisher: Sams | ISBN: 0672318679 | edition 2006 | PDF | 672 pages | 4,6 mb

Sams Teach Yourself ATL Programming in 21 Days quickly empowers you to create your own small, fast COM components quickly and easily using the Active Template Library. Written by a professional developer who applies ATL in his everyday development, the book provides guidance and direction, leading you through a progression of topics that begin with the basic building blocks of COM programming, and ending with in-depth discussions of the more commonly used features of the Active Template Library. Topics include creating your first ATL COM object, understanding the ATL architecture, using the ATL app wizard, working with ATL helper classes, handling ATL errors, using C++ templates, using multithreading, creating ATL applications, automation with ATL, combining ATL and OLE dB for database access, and using ATL with MTS (transactions).

Link download

http://uploading.com/files/8SNZH15Z/booktraining.net_1755.rar.html


http://rapidshare.com/files/255449916/booktraining.net_1755.rar

4995A Programming with the Microsoft .NET Framework using Microsoft Visual Studio2005 - DeliveryGuide

http://blogs.msdn.com/blogfiles/trika/WindowsLiveWriter/SystemCenterandOperationsManagementcerti_D879/MCTS_4.jpg
About this Course
This five-day instructor-led course enables developers who are migrating from a different development language, an earlier version of Visual Basic .NET or Visual C#, or who have completed entry-level training and experience using Microsoft Visual Studio 2005, to gain in-depth guidance on programming the Microsoft .NET Framework versions 2.0 and 3.0 with Visual Studio 2005.
Audience Profile
The target audience for this course is developers who already have professional programming experience in C, C++, earlier versions of Visual Basic .NET or Visual C#, Java, or another programming language, and who plan to use Visual Studio 2005 to develop enterprise business solutions.
At Course Completion
After completing this course, students will be able to:

* Describe the .NET Framework.
* Create applications with Visual Studio 2005.
* Describe Visual Basic .NET and Visual C# language and syntax features.
* Use essential object-oriented programming features.
* Use advanced object-oriented programming features.
* Explain security in the .NET Framework.
* Access data by using ADO.NET.
* Build Windows Presentation Foundation applications.
* Describe distributed applications, and create distributed applications with Windows Communication Foundation.
* Monitor .NET Framework applications by using instrumentation.
* Compile, test, and deploy .NET Framework applications.
* Interoperate with unmanaged code (optional).
* Describe software design and development (optional).

D0wn10ad
http://www.easy-share.com/1905145341/ebook_Udovice4995A.part1.rar
http://rapidshare.com/files/231949663/ebook_Udovice4995A.part1.rar
http://hotfile.com/dl/2364951/33cb084/ebook_Udovice4995A.part1.rar.html
http://www.enterupload.com/rg7qu48wraj0/ebook_Udovice4995A.part1.rar.html
http://www.easy-share.com/1905145237/ebook_Udovice4995A.part2.rar
http://rapidshare.com/files/231949090/ebook_Udovice4995A.part2.rar
http://hotfile.com/dl/2364953/74935ff/ebook_Udovice4995A.part2.rar.html


2793A Implementing and Maintaining Microsoft SQL Server 2005 Reporting Services

http://blogs.msdn.com/blogfiles/trika/WindowsLiveWriter/SystemCenterandOperationsManagementcerti_D879/MCTS_4.jpg
About this Course
Elements of this syllabus are subject to change.
This three-day instructor-led course teaches students how to implement a Reporting Services solution in an organization. The course discusses how to use the Reporting Services development tools to create reports, and how to use the Reporting Services management and administrative tools to manage a Reporting Services solution.
Audience Profile
This course is intended for information technology (IT) professionals and developers who need to implement reporting solutions by using Microsoft SQL Server 2005 Reporting Services.
At Course Completion
After completing this course, students will be able to:

* Describe SQL Server Reporting Services and its components.
* Create a Reporting Services report.
* Enhance a Reporting Services report.
* Create and manipulate data sets.
* Use report models to implement reporting for business users.
* Configure report publishing and execution settings.
* Implement subscriptions for reports.
* Administer Reporting Services.
* Implement custom Reporting Services applications.

D0wn10ad
http://www.easy-share.com/1905141948/ebook_Udovice2793A.rar
http://hotfile.com/dl/2327969/83218a7/ebook_Udovice2793A.rar.html
http://rapidshare.com/files/231871950/ebook_Udovice2793A.rar
http://www.enterupload.com/59vdt75nthnl/ebook_Udovice2793A.rar.html

4994A Introduction to Programming Microsoft .NET Applications with Microsoft Visual Studio2005 - DeliveryG

http://blogs.msdn.com/blogfiles/trika/WindowsLiveWriter/SystemCenterandOperationsManagementcerti_D879/MCTS_4.jpg
4994A Introduction to Programming Microsoft .NET Applications with Microsoft Visual Studio2005 - DeliveryG
About this Course
This five-day instructor-led course enables introductory-level developers who are not familiar with the Microsoft .NET Framework or Microsoft Visual Studio 2005 to gain familiarity with the Visual Studio 2005 development environment. Students will also learn basic skills using either Microsoft Visual Basic or Microsoft Visual C# as a programming language.
Audience Profile
The target audience for this course includes both novice programmers who have a minimum of three months’ programming experience and intermediate-level programmers who are otherwise new to .NET Framework development, and want to learn how to use Visual Basic or C#.
At Course Completion
After completing this course, students will be able to:
  • Describe the key features of the .NET Framework and Visual Studio 2005.
  • Create a simple Windows Forms application.
  • Explain programming fundamentals.
  • Create and use data types and variables.
  • Control program execution by using conditional statements and loops.
  • Explain the fundamentals of object-oriented programming.
  • Create simple object-oriented applications.
  • Develop the user interface in a Visual Studio 2005 application.
  • Validate user input on a Windows form.
  • Implement debugging and exception handling in a Visual Studio 2005 application.
  • Access data in a Visual Studio 2005 application.
  • Create simple Web applications and XML Web services.
  • Explain the key features of the .NET Framework version 3.0 technologies.
  • Test and deploy Microsoft .NET Framework applications.

Donwload

http://www.easy-share.com/1905141969/ebook_Udovice4994A.part1.rar
http://www.easy-share.com/1905141956/ebook_Udovice4994A.part2.rar
http://hotfile.com/dl/2328130/5ee7dcd/ebook_Udovice4994A.part1.rar.html
http://hotfile.com/dl/2328132/ab511fe/ebook_Udovice4994A.part2.rar.html
http://rapidshare.com/files/231872042/ebook_Udovice4994A.part1.rar
http://rapidshare.com/files/231870659/ebook_Udovice4994A.part2.rar
http://www.enterupload.com/tvdbjl10p18z/ebook_Udovice4994A.part1.rar.html


Hardware Hacking: Have Fun While Voiding Your Warranty


Hardware Hacking: Have Fun While Voiding Your Warranty
Publisher: Syngress Publishing | ISBN: 1932266836 | edition 2004 | PDF | 576 pages | 35,3 mb

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include:
* Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help".
* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case.
* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players.
* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development.
* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC.
* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point.
* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader.
* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB.

D0wn10ad

Mirr0r

Weaving Services and People on the World Wide Web


Irwin King, Ricardo Baeza-Yates "Weaving Services and People on the World Wide Web"
Springer | English | 2009-08-01 | ISBN: 3642005691 | 358 pages | PDF | 7,2 MB


Ever since its inception, the Web has changed the landscape of human experiences on how we interact with one another and data through service infrastructures via various computing devices. This interweaving environment is now becoming ever more embedded into devices and systems that integrate seamlessly on how we live, both in our working or leisure time. For this volume, King and Baeza-Yates selected some pioneering and cutting-edge research work that is pointing to the future of the Web. Based on the Workshop Track of the 17th International World Wide Web Conference (WWW2008) in Beijing, they selected the top contributions and asked the authors to resubmit their work with a minimum of one third of additional material from their original workshop manuscripts to be considered for this volume. After a second-round of reviews and selection, 16 contributions were finally accepted. The work within this volume represents the tip of an iceberg of the many exciting advancements on the WWW. It covers topics like semantic web services, location-based and mobile applications, personalized and context-dependent user interfaces, social networks, and folksonomies. The presentations aim at researchers in academia and industry by showcasing latest research findings. Overall they deliver an excellent picture of the current state-of-the-art, and will also serve as the basis for ongoing research discussions and point to new directions.


D0wn10ad

Mirr0r

Deploying Qos for Cisco Ip and Next Generation Networks: The Definitive Guide


Vinod Joseph, Brett Chapman "Deploying Qos for Cisco Ip and Next Generation Networks: The Definitive Guide"
Morgan Kaufmann Publishers | English | 2009-05-01 | ISBN: 012374461X | 425 pages | PDF | 10,3 MB


"Deploying QoS for IP Next Generation Networks: The Definitive Guide" provides network architects and planners with insight into the various aspects that drive QoS deployment for the various network types. It serves as a single source of reference for businesses that plan to deploy a QoS framework for voice, video, mobility and data applications creating a converged infrastructure. It further provides detailed design and implementation details for various service deployments across the various Cisco platforms such as the CRS-1, 12000, 7600 & 7200 series routers that are widely deployed in most Carrier Networks. The book covers architectural and implementation specific information plus recommendations for almost all the popular line cards across the various hardware platforms widely used in the market. It also addresses QoS architecture and deployment on the Cisco CRS-1 platform and is considered as a unique selling point of this book. In short, the book serves as an 'On the Job Manual' which can also be used as a study guide for Cisco specialist certification programs (CCNA, CCIP, and CCIE). This book includes detailed illustration and configurations. In addition, it provides detailed case studies along with platform specific tests and measurement results. A link to a detailed tutorial on QoS metrics and associated test results will be available at the book's companion website in order to ensure that the reader is able to understand QoS functionality from a deployment standpoint. This book covers the requirements and solutions in deploying QoS for voice, video, IPTV, mobility and data traffic classes (Quad-play networks), saving the reader time in searching for hardware specific QoS information, given the abundance of Cisco platforms and line cards. It presents real-life deployments by means of detailed case studies, allowing the reader to apply the same solutions to situations in the work place. It provides QoS architecture and implementation details on Cisco CRS-1, 12000, 7600, and 7200 routing platforms using Cisco IOS/IOS-XR software, aiding the reader in using these devices and preparing for Cisco specialist certification.


D0wn10ad

Mirr0r

Methane Conversion: Proceedings (Studies in Surface Science and Catalysis)


Methane Conversion: Proceedings (Studies in Surface Science and Catalysis)
Elsevier Science Ltd | 758 pages | 1988 | ISBN: 0444429352 | PDF | 8.5 mb

This proceedings volume comprises the invited plenary lectures, contributed and poster papers presented at a symposium organised to mark the successful inauguration of the world's first commercial plant for production of gasoline from natural gas, based on the Mobil methanol-to-gasoline process. The objectives of the Symposium were to present both fundamental research and engineering aspects of the development and commercialization of gas-to-gasoline processes. These include steam reforming, methanol synthesis and methanol-to-gasoline. Possible alternative processes e.g. MOGD, Fischer-Tropsch synthesis of hydrocarbons, and the direct conversion of methane to higher hydrocarbons were also considered. The papers in this volume provide a valuable and extremely wide-ranging overview of current research into the various options for natural gas conversion, giving a detailed description of the gas-to-gasoline process and plant. Together, they represent a unique combination of fundamental surface chemistry catalyst characterization, reaction chemistry and engineering scale-up and commercialization.


D0wn10ad

Mirr0r

Synthesis of High-Silica Aluminosilicate Zeolites (Studies in Surface Science and Catalysis)


Synthesis of High-Silica Aluminosilicate Zeolites (Studies in Surface Science and Catalysis)
Elsevier Science Ltd | 406 pages | 1987 | ISBN: 0444428143 | PDF | 11 mb

This book provides an overview of all new high-silica zeolites which have been discovered between 1975 and 1985. The first part presents some 25 proven recipes for the preparation of high-silica zeolites and describes the characteristics of the materials obtained. This will allow bench-scale production of these materials for scientific research. In the second part, high-silica zeolites with solved structure type are discussed. This part classifies many proprietary materials according to known structure types, and describes the rules and parameters which govern the formation of these materials. In the third part, the formation and characteristics of high-silica zeolites with unknown structure type are discussed. The book contains a wealth of information for all those scientists who incorporate the use of high-silica zeolites in their work.


D0wn10ad

Mirr0r

Embedded Linux: Hardware, Software, and Interfacing

Embedded Linux: Hardware, Software, and Interfacing

Craig Hollabaugh, «Embedded Linux: Hardware, Software, and Interfacing»
Addison Wesley | ISBN: 0672322269 | 2002 | CHM | 432 pages | 1.64 MB
Embedded Linux covers the development and implementation of interfacing applications on an embedded Linux platform. It includes a comprehensive discussion of platform selection, crosscompilation, kernel compilation, root filesystem creation, booting, remote debugging, real-world interfacing, application control, data collection, archiving, and presentation.

D0wn10ad

Mirr0r

Content Networking Fundamentals


Silvano Da Ros, «Content Networking Fundamentals»
Cisco Press | ISBN 1587052407 | 2006 Year | CHM | 15,53 Mb | 576 Pages

A comprehensive introduction to the theory and practical applications of content networking

Get a strong introduction to the basic networking concepts necessary for content networking, including network address translation, IP multicast content delivery, quality of service, and streaming media
Master the application-layer protocols, including HTTP, SSL, RSTP, RTP and FTP
Design redundancy and high availability by using server load balancing, Domain Name System (DNS) directory services, Cisco DistributedDirector software, proximity-based load balancing, and global sticky databases

Learn to switch and offload encrypted content by importing, creating, and configuring certificates and keys in Secure Sockets Layer (SSL) termination devices
Examine how to configure routers with Web Cache Communication Protocol (WCCP) and to switch content requests to content engines for serving frequently requested objects
Learn how to configure caching, live push- and pull-splitting, content acquisitioning, and pre-positioning using Cisco Application and Content Networking System (ACNS) software
Content networking is the most popular technology used to enhance network and application performance. The growth of content networking has been driven by end-user demands for richer content and lowered response times. These demands have caused the field of content networking to flourish with technological advances. Today many companies use content networking to add a layer of intelligence to their systems, scaling server availability and optimizing content delivery.

Content Networking Fundamentals introduces you to content networking solutions and the underlying networking technologies that content networking uses to accelerate your applications in new and unique ways. You’ll discover various algorithms behind content networking and learn how the Cisco Systems® product suite implements them.

In this comprehensive guide, you start with a review of the protocols required for content networking, building your knowledge of introductory concepts and applications. From there, you delve into the components specific to content networking, with a focus on the content-aware Open Systems Interconnection (OSI) Layers 4 through 7. Numerous deployment examples help you understand the more advanced topics. You can use the configuration snapshots in this book as skeletal configurations for your production network.

Following the valuable lessons taught in Content Networking Fundamentals, you’ll be able to effectively design, deploy, maintain, and troubleshoot content networks.


D0wn10ad

Mirr0r

Parallel Computing Technologies: Proceedings of the International Conference, Novosibirsk, Ussr, 7-11 September 1991

9810206984

Parallel Computing Technologies: Proceedings of the International Conference, Novosibirsk, Ussr, 7-11 September 1991: N. N. Mirenkov
World Scientific Pub Co Inc | ISBN: 9810206984 | 1991-10 | djvu (ocr) | 516 pages | 6.86 Mb

We are currently entering ah era of developed parallelism. Parallelism provides the high performance needed in science and engineering, the responsiveness required in real-time control, the fault-tolerance necessary for high reliability systems, etc. These capabilities become available for use in an increasing number of applications but offer new challenges to the system designer and programmer.

The advanced research in parallel computing technologies as well as the development of high industrial quality products are now especially important for the USSR trying to do perestroika's steps to be tightly integrated with the world community. We believe that increasing research contacts and scientific cooperation is one of the first steps to take. So, in spite of the considerable number of international conferences and workshops on parallel systems, we decided to establish a Soviet series on parallel computing technologies (the PaCT series). As a result you have in your hands the proceedings of the PaCT-91 Conference, which is organized by the Computing Centre of the Siberian Division of the USSR Academy of Sciences in cooperation with the Soviet Parallel Computing Association, and held in Novosibirsk in September 1991. This is the first time such a big international conference on parallel computing technologies is taking place in the USSR. The aim of the conference is to give an overview of new developments, applications and trends in the field of parallelism.


D0wn10ad

Mirr0r

Sams Teach Yourself Networking in 24 Hours (4th Edition)


Uyless Black "Sams Teach Yourself Networking in 24 Hours (4th Edition)"
Sams | English | 2009-06-05 | ISBN: 0768685761 | 432 pages | PDF | 4,1 MB


In just 24 sessions of one hour or less, learn how to use today’s key networking techniques and technologies to build, secure, and troubleshoot both wired and wireless networks. Using this book’s straightforward, step-by-step approach, you master every skill you need—from working with Ethernet and Bluetooth to spam prevention to network troubleshooting. Each lesson builds on what you’ve already learned, giving you a rock-solid foundation for real-world success!

Step-by-step instructions carefully walk you through the most common networking tasks.

Q&A sections at the end of each hour help you test your knowledge.

By the Way notes present interesting information related to the discussion.

Did You Know? tips offer advice or show you easier ways to perform tasks.

Watch Out! cautions alert you to possible problems and give you advice on how to avoid them.

Learn how to…
• Choose the right network hardware and software and use it to build efficient, reliable networks
• Implement secure, high-speed Internet connections
• Provide reliable remote access to your users
• Administer networks to support users of Microsoft, Linux, and UNIX environments
• Use low-cost Linux servers to provide file and print services to Windows PCs
• Protect your networks and data against today’s most dangerous threats
• Use virtualization to save money and improve business flexibility
• Utilize RAID technologies to provide flexible storage at lower cost
• Troubleshoot and fix network problems one step at a time
• Preview and prepare for the future of networking


D0wn10ad

Mirr0r

Linux HPC Cluster Installation: IBM Redbooks

0738422789

Linux HPC Cluster Installation: IBM Redbooks
IBM | ISBN: 0738422789 | 2001-06 | PDF (OCR) | 248 pages | 5.73 Mb

This redbook will guide system architects and systems engineers toward a basic understanding of cluster technology, terminology, and the installation of a Linux High-Performance Computing (HPC) cluster (a Beowulf type of cluster) into an IBM eServer xSeries cluster.

This document focus on xCAT (xCluster Administration Tools) for installation and administration. All nodes and components of the cluster, such as compute nodes and management nodes, are installed with xCAT. This tool is a collection of scripts, tables, and commands used to build and administer a Beowulf type of cluster or a farm of replicated nodes. All these xCAT components are explained in the appendixes of the Redbook. Detailed procedures on how to install and properly configure a Linux Red Hat operating system in the nodes of an IBM eServer xSeries HPC cluster are presented.

For architectural design, we present a generic cluster architecture, specifics for an HPC type of cluster, and the physical and logical components of an HPC cluster. A solution design guideline is presented as well, giving the key concepts and design principals to be used during the architectural and planning phases.
Table of contents

Chapter 1 Introduction
Chapter 2 General cluster architecture
Chapter 3 Components overview
Chapter 4 Solution guide
Chapter 5 Hardware preparation
Chapter 6 Management node installation
Chapter 7 Compute node installation
Chapter 8 Installation of additional components


D0wn10ad

Mirr0r

Biomimetic Robotics: Mechanisms and Control


Ranjan Vepa "Biomimetic Robotics: Mechanisms and Control"
Cambridge University Press | English | 2009-01-26 | ISBN: 0521895944 | 360 pages | PDF | 1,8 MB


This book is written as an initial course in robotics. It is ideal for study of unmanned aerial or underwater vehicles, a topic on which few books exist. It presents the fundamentals of robotics, from an aerospace perspective, by considering only the field of robot mechanisms. For an aerospace engineer, three dimensional and parallel mechanisms - flight simulation, unmanned aerial vehicles, and space robotics - take on an added significance. Biomimetic robot mechanisms are fundamental to manipulators, walking, mobile, and flying robots. As a distinguishing feature, this book gives a unified and integrated treatment of biomimetic robot mechanisms. It is ideal preparation for the next robotics module: practical robot control design. While the book focuses on principles, computational procedures are also given due importance. Students are encouraged to use computational tools to solve the examples in the exercises. The author has also included some additional topics beyond his course coverage for the enthusiastic reader to explore.


D0wn10ad

Mirr0r

How to Display Data


How to Display Data
Jenny V. Freeman, Stephen J. Walters, Michael J. Campbell | ISBN: 1405139749 | PDF | 120 pages | 2008 | 2 MB

Effective data presentation is an essential skill for anybody wishing to display or publish research results, but when done badly, it can convey a misleading or confusing message. This new addition to the popular “How to” series explains how to present data in journal articles, grant applications or research presentations clearly, accurately and logically, increasing the chances of successful publication.


D0wn10ad

Mirr0r

David D. Busch - Canon EOS Digital Rebel XTi/400D Guide to Digital SLR Photography



David D. Busch - Canon EOS Digital Rebel XTi/400D Guide to Digital SLR Photography
Course Technology PTR | 2007 | ISBN: 1598634569 | Pages: 280 | PDF | 10.59 MB

As the new owner of a Digital Rebel XTi/400D you are serious about photography and want to take professional-looking photographs. You also want to quickly and easily discover how, when, and why to use the most important features of your cutting-edge camera. "Canon EOS Digital Rebel XTi/400D Guide to Digital SLR Photography" provides you with a concise guide to the essential functions and features of the Digital Rebel XTi/400D, teaching you how to select the best autofocus mode, shutter speed, f/stop, or flash capability to take perfect pictures of any kind under any conditions. Brimming with full-color images and examples, this book will help photographers of any level enhance their digital photography skills and techniques. Go in-depth with your Digital Rebel XTi/400D as you learn: -Basic controls and menu settings -How to choose and use lenses -Working with flash and lighting -Advanced shooting techniques You will also learn how to edit and enhance your photographs, as well as troubleshooting tips to maintain the condition of your Digital Rebel XTi/400D and its accessories.

D0wn10ad

Mirr0r
This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at youzhny197@gmail.com, we will immediately respond to you.