RSS 2.0
 
«     2005    »
 1234
567891011
12131415161718
19202122232425
262728293031 
 
|

  
   
2016 (216)
2016 (456)
2016 (321)
2016 (398)
2016 (433)
2016 (554)

 
  Cyber Spying Tracking Your Familys Secret Online Lives
 : , , Syngress
   
 
Cyber Spying Tracking Your Familys Secret Online Lives
: T.Fair, M.Nordfeld
: Syngress
: 2005
isbn: 1-931836-41-8
: 465
: english
: PDF (scan)

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using the tools and techniques in this book to check up or spy on them, you can identify the perils, educate your loved ones about impending danger, and avoid potential physical, emotional, or financial disasters. This book was written to help make the Internet safe for families and friends; to raise awareness of the inherent dangers of the Internet; and to help parents keep their children out of trouble.
 
  • 0
: flashsoft | 27-12-2005, 00:00 | : 700   (0)
  Oracle SQL- Jumpstart with Examples
 : » » SQL, MySQL
   
 
Oracle SQL- Jumpstart with Examples
: Gavin Powell, Carol McCullough-Dieter
: Elsevier
: 2005
isbn: 1-55558-323-7
: 683
: english
: PDF

Oracle SQL Jumpstart with Examples will be a very useful reference and should be a hit for anyone who may be using Oracle SQL. This book should become very popular not only with Developers and DBAs but also Database Managers, Designers and System Managers. Even busy executives can use the book to quickly write queries on an occasional basis. Additionally, the examples in the book provide a good reference for functional people, (such as systems engineers and project leaders,) who want a better understanding of the true capabilities of Oracle SQL, allowing for better articulation and understanding of user and system requirements.
 
  • 0
: flashsoft | 27-12-2005, 00:00 | : 956   (0)
  Black Hat Physical Device Security
 : , , Syngress
   
 
Black Hat Physical Device Security
: Syngress
: 2004
isbn: 1-932266-81-X
: 417
: english
: PDF (scan)

The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more. This is the book that answers the questions: How can I protect against physical device exposures if I already have these systems in place? How do I factor risk from not having a secure method of communication over a network that is not trusted I have one or more tools that I use to test for these types of exposures in software and hardware that we manufacture. Do I need to do more than that? So much of the data that I would record through monitoring can be spoofed, so why record it at all? Can you break any embedded device with physical access? If we place high-level communication processes within our devices, isnt that creating more problems then simply plugging wires that carry raw signals into these devices?
 
  • 0
: flashsoft | 27-12-2005, 00:00 | : 878   (0)
  Aggressive Network Self-defense
 : , , Syngress
   
 
Aggressive Network Self-defense
: Syngress
: 2005
isbn: 1-931836-20-5
: 417
: english
: PDF (scan)

When the Worm Turns Analyze the technical and legal implications of neutralizing machines that propagate malicious worms across the Internet. Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences. Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker. To Catch a Thief Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced. Learn the Definition of Hostile Corporate Takeover in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war. Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation. See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes. Where the Wild Things Are Follow along as a real-life in-the-wild format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine. Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
 
  • 0
: flashsoft | 27-12-2005, 00:00 | : 969   (0)
  Scientific American (Vol.290 No.6 June 2004)
 : » » Scientific American
   
 
Scientific American (Vol.290 No.6 June 2004)
: 2004
: 85
: english
: PDF

 
 
  • 0
: flashsoft | 27-12-2005, 00:00 | : 655   (0)
  Scientific American (Vol.290 No.3 March 2004)
 : » » Scientific American
   
 
Scientific American (Vol.290 No.3 March 2004)
: 2004
: 84
: english
: PDF

 
 
  • 0
: flashsoft | 27-12-2005, 00:00 | : 651   (0)
  Scientific American (Vol.290 No.5 May 2004)
 : » » Scientific American
   
 
Scientific American (Vol.290 No.5 May 2004)
: 2004
: 87
: english
: PDF

 
 
  • 0
: flashsoft | 27-12-2005, 00:00 | : 680   (0)
  Scientific American (Special Edition Vol.9 No.4 April 1998) - Exploring Intelligence
 : » » Scientific American
   
 
Scientific American (Special Edition Vol.9 No.4 April 1998) - Exploring Intelligence
: 1998
: 100
: english
: PDF

 
 
  • 0
: flashsoft | 27-12-2005, 00:00 | : 690   (0)
  Scientific American (Vol.292 No.4 April 2005)
 : » » Scientific American
   
 
Scientific American (Vol.292 No.4 April 2005)
: 2005
: 83
: english
: PDF

 
 
  • 0
: flashsoft | 27-12-2005, 00:00 | : 699   (0)
  Rexx Programmers Reference
 : , Wrox
   
 
Rexx Programmers Reference
: Howard Fosdick
: Wrox
: 2005
isbn: 0-7645-7996-7
: 723
: english
: PDF

This book teaches standard Rexx, quickly and simply. It teaches you what you need to know to work with Rexx on any platform. Youll know a language that runs anywherefrom handheld devices such as personal digital assistants, pocket PCs, Palm Pilots, and mobile and smart phones to desktop and laptop PCs, with operating systems like Windows, Linux, and others, to midrange servers from all the major vendorsright on up to the worlds largest mainframes. Rexx applies to almost any programming problem.
 
  • 0
: flashsoft | 27-12-2005, 00:00 | : 820   (0)
  | | | |
 
Librus - Mountain of Knowledge
- 2004-2015
Design by Flashsoft © 2005-2015