Showing posts with label Software related. Show all posts
Showing posts with label Software related. Show all posts

Imagination of a Monarchy - Studies in Ptolemaic Propaganda

Scholars have long known that the Egyptian Ptolemaic monarchy underwent a transformation between 323 and 30 BC. The queens of that dynasty started as subordinates of the kings but ended as their superiors. Exactly when and how this change occurred has proven problematic for modern scholars. R.A. Hazzard argues that this change was put in motion by Ptolemy II, who glorified his sister ArsinoT and made acceptable a civilian style of kingship based on piety towards his real and mythical ancestors. Ptolemy's support and elevation of his sister inspired the queens of the line to assert themselves at the expense of their male associates. The process culminated in the absolute rule of Kleopatra VII after 47 BC.


HotFile.com

Windows 7 All-in-One for Dummies

When you're looking for a Windows 7 guide that goes above and beyond anything you get from Microsoft, start here. With detailed coverage of all of Windows 7, the best Windows add-on programs, in-depth troubleshooting, and much more, this book offers everything from the basics to the secrets of the pros.

* What Windows 7 can and can't do - get an honest rundown of the good and not-so-good qualities

* Making it work - set up and customize Windows 7, know what to do about security, and make the system work for you

* Control the controls - manage user account controls, know when to automatically update and when not to, and handle the Firewall

* Have some fun - explore Windows games, capture Windows Media streams, set up the Media Center, and make your iPod happy

* Safety first - learn what the Action Center does and how to show filename extensions, scan for rootkits, and protect your network

* Get the best Windows add-ons - discover fabulous free tools, from browsers to antivirus protection to picture editors and music players

* Hardware options - the scoop on cameras, printers, scanners, memory, USB key drives, and what DeviceStage does


http://www.fileserve.com/file/p5QvYVc 

http://rapidshare.com/files/415065550/dummies.-.Tachoz.net.rar

Office 2010: Just the Steps for Dummies

Elaine Marmel, "Office 2010 Just the Steps For Dummies"
For Dummies | 2010 | ISBN: 047053219X, 0470622849 | 360 pages | PDF | 11,8 MB

http://www.fileserve.com/file/DfAaACP


http://rapidshare.com/files/415064583/Just_the_Steps_For_Dummies.-.Tachoz.net.rar

Samba Unleashed

Samba Unleashed shows you how to install, configure, and maintain Samba on a wide variety of platforms. You will learn pratical, focused solutions and strategies so you can seamlessly get Samba working on your network. The main section of the book covers the topics every system administrator needs to know, including configuring custom file share, configuring custom printer share, using server side automation, Samba security, optimizing Samba performance, routed networks, and browsing.




Depositfiles

TurboBit

Filesonic

Java Database Programming Bible

Java Database Bible is a comprehensive approach to learning how to develop and implement a professional level Java 2 database program using the Java database connection API (JDBC 3.0). Includes an introduction to relational databases and designing database applications; covers interacting with a relational database using a Java program; and shows how to create and work with XML data storage using a Java program.
Java delivers powerful tools for creating today’s multi-tier database applications. Packed with lucid explanations and lots of real-world examples, this comprehensive guide gives you everything you need to master Java database programming techniques. Starting with an insightful look into RDBMS, SQL, and JDBC fundamentals, veteran developer John O’Donahue walks you through the development process for both two-tier and three-tier applications, providing detailed coverage of Java database applications, using Swing components, servlets, JSP, XML, and EJB persistence.




Depositfiles

TurboBit

Filesonic

"Cracking the Coding Interview: 150 Programming Interview Questions and Solutions" by Gayle Laakmann

This book gives you the interview preparation you need to get the top software developer jobs.



This book provides:
* 150 Programming Interview Questions and Solutions: From binary trees to binary search, this list of 150 questions includes the most common and most useful questions in data structures, algorithms, and knowledge based questions.
* Ten Mistakes Candidates Make -- And How to Avoid Them: Don't lose your dream job by making these common mistakes. Learn what many candidates do wrong, and how to avoid these issues.
* Steps to Prepare for Behavioral and Technical Questions: Stop meandering through an endless set of questions, while missing some of the most important preparation techniques. Follow these steps to more thoroughly prepare in less time.
* Interview War Stories: A View from the Interviewer's Side: Humorous but instructive stories from our interviewers show you how some candidates really flopped on the most important question - and how you can avoid doing the same.

As you get ready for your interviews, consider these suggestions:
»»Write Code on Paper: Most interviewers won’t give you a computer and will instead expect you to write code on a whiteboard or on paper. To simulate this environment, try answering interview problems by writing code on paper first, and then typing them into a computer as-is. Whiteboard / paper coding is a special skill, which can be mastered with constant practice.
»»Know Your Resume: While technical skills are extremely important, that’s no reason to neglect your own resume. Make sure to prepare yourself to give a quick summary of any project or job you were involved with, and to discuss the hardest and most interesting problems you encountered along the day.
»»Don’t Memorize Solutions: While this book offers a representative sample of interview questions, there are still thousands of interview questions out there. Memorizing solutions
is not a great use of your time. Rather, use this book to explore approaches to problems, to learn new concepts, and to practice your skills.
»»Talk Out Loud: Interviewers want to understand how you think and approach problems,
so talk out loud while you’re solving problems. Let the interviewer see how you’re tackling the problem, and they just might guide you as well.


Table of Contents
Foreword
Introduction
Behind the Scenes
The Microsoft Interview
The Amazon Interview
The Google Interview
The Apple Interview
The Yahoo Interview
Interview War Stories
Before the Interview
Resume Advice
Behavioral Preparation
Technical Preparation
The Interview and Beyond
Handling Behavioral Questions
Handling Technical Questions
Five Algorithm Approaches
The Offer and Beyond
Top Ten Mistakes Candidates Make
Frequently Asked Questions
Interview Questions
Data Structures
Chapter 1 Arrays and Strings
Chapter 2 Linked Lists
Chapter 3 Stacks and Queues
Chapter 4 Trees and Graphs
Concepts and Algorithms
Chapter 5 Bit Manipulation
Chapter 6 Brain Teasers
Chapter 7 Object Oriented Design
Chapter 8 Recursion
Chapter 9 Sorting and Searching
Chapter 10 Mathematical
Chapter 11 Testing
Chapter 12 System Design and Memory Limits
Knowledge Based
Chapter 13 C++
Chapter 14 Java
Chapter 15 Databases
Chapter 16 Low Level
Chapter 17 Networking
Chapter 18 Threads and Locks
Additional Review Problems
Chapter 19 Moderate
Chapter 20 Hard
Solutions
Index
Mock Interviews
About the Author

Hacker Linux Uncovered

Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DSN server for mapping DNS names to IP addresses, and firewall for system protection is provided.


depositfiles
uploading
filesonic
turbobit

Composing Software Components: A Software-testing Perspective

Software components and component-based software development (CBSD) are acknowledged as the best approach for constructing quality software at reasonable cost. Composing Software Components: A Software-testing Perspective describes a 10-year investigation into the underlying principles of CBSD.
Composing Software Components: A Software-testing Perspective will help software researchers and practitioners to understand the underlying principles of component testing. Advanced students in computer science, engineering, and mathematics can also benefit from the book as a supplemental text and reference.

My Links

Download

CCA Citrix Metaframe: Citrix Metaframe XP 1.0 Administration

Here's the book you need to prepare for exam 220, Citrix MetaFrame XP 1.0 for Windows Administration. This study guide provides:
In-depth coverage of every exam objective Practical information on administering MetaFrame XP 1.0 for Windows Hundreds of challenging review questions, in the book and on the CD Leading-edge exam preparation software, including a testing engine, and electronic flashcards
Authoritative coverage of all exam objectives, including: Installing and configuring MetaFrame XP 1.0 for Windows Using the Citrix Management Console Configuring applications for use in a MetaFrame environment Assessing load management and security requirements Installing the Citrix ICA client software Customizing Program Neighborhood Interface Identifying NFuse features and components Replicating print drivers and importing print servers Monitoring and troubleshooting MetaFrame XP servers


download

download

mirror

Sams Teach Yourself C++ in One Hour a Day

In just one hour a day, you’ll have all the skills you need to begin programming in C++. With this complete tutorial, you’ll quickly master the basics and then move on to more advanced features and concepts:
- Master the fundamentals of C++ and object-oriented programming
- Learn some of the more advanced features of C++
- Learn the Standard Template Library and the containers and algorithms used in most real-world C++ applications
- Learn how to build effective programs in C++ with hands-on exercises
- Get expert tips on implementing C++ in the corporate environment




Depositfiles

TurboBit

Filesonic

Netcat Power Tools


Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.

* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.

* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.

* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.

* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.

* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.

* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.

* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.

* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.

* Comprehensive introduction to the #4 most popular open source security tool
available
* Tips and tricks on the legitimate uses of Netcat
* Detailed information on its nefarious purposes
* Demystifies security issues surrounding Netcat
* Case studies featuring dozens of ways to use Netcat in daily tasks


depositfiles
uploading
turbobit
filesonic

Access 2003 Bible

* The most comprehensive reference on this popular database management tool, fully updated with the new features of Access "X" including increased use of XML and Web services
* Explores the new, tighter integration with SharePoint and BizTalk in Office "X" that enables greater flexibility for gathering and manipulating data
* Written by an international bestselling author team with several books to their credit, including previous editions of Access Bible
* Gets Access beginners started with hundreds of examples, tips, and techniques for getting the most from Access
* Offers advanced programming information for serious professionals...




Depositfiles

TurboBit

Filesonic

Open Source Fuzzing Tools

Fuzzing is often described as a "black box" software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program errors and crashes are indicative of the existence of a security vulnerability, which can later be researched and fixed.

Fuzz testing is now making a transition from a hacker-grown tool to a commercial-grade product. There are many different types of applications that can be fuzzed, many different ways they can be fuzzed, and a variety of different problems that can be uncovered. There are also problems that arise during fuzzing; when is enough enough? These issues and many others are fully explored.

. Learn How Fuzzing Finds Vulnerabilities
Eliminate buffer overflows, format strings and other potential flaws
. Find Coverage of Available Fuzzing Tools
Complete coverage of open source and commercial tools and their uses
. Build Your Own Fuzzer
Automate the process of vulnerability research by building your own tools
. Understand How Fuzzing Works within the Development Process
Learn how fuzzing serves as a quality assurance tool for your own and third-party software


depositfiles
uploading
turbobit
filesonic

Blogging with the New Google Blogger

Blogging with the New Google Blogger is a digital short cut that covers Google's newest version of Blogger, their free software for creating a website from which to post thoughts, interact with people, and more. This short cut serves as an introduction to the world of blogging and to the Blogger application, as well as a guide to the new version of Blogger. Readers will learn how the new version of Blogger differs from the original version and how to create a Blogger blog. Advanced users will appreciate the information on customizing blog templates, using HTML, hosting their own Blogger blog, syndicating their blogs with RSS and Atom feeds, and making money with blog advertising.




Depositfiles

TurboBit

Filesonic

Software Design

This book provides a balanced view of the varied software design methodologies most widely used by practitioners. Readers become better judges of what method to adopt when working in the field through a discussion of the strengths and limitations of each method. The text provides a general overview of software design within the context of software development along with a general presentation of design issues. It examines the nature of design activities, as well as their applications within software development. Design practices are also reviewed in a concise way based on the more widely used design methodologies. Software engineers looking to broaded their skills in requirements analysis and software design.




Depositfiles

mirror

mirror

Google Talking

This book will cover the program "Google Talk" in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.
* Google has 41% of the search engine market making it by far the most commonly used search engine
* The Instant Messaging market has 250 million users world wide
* Google Talking will be the first book to hit the streets about Google Talk




Depositfiles

TurboBit

Filesonic

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer.
Drawing on their extraordinary experience, they introduce a start-to-finish methodology for “ripping apart” applications to reveal even the most subtle and well-hidden security flaws. The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications.




Depositfiles

mirror

mirror

Macromedia Flash 8 ActionScript: Training from the Source

As any Flash developer worth his or her salt knows, you’re not tapping all of the program’s power unless you’re taking advantage of its scripting language. Not to worry: With Flash 8’s improved scripting language (which includes a visual interface!) and this project-based guide you don’t have to be a master programmer to do so. In these pages authors Jobe Makar and Danny Patterson, use hands-on lessons and simple, step-by-step instructions to translate real-life activities into scripts, in the process demonstrating that scripting is something you already instinctively know how to do. To that end, the authors have provided methodologies and techniques for building nearly 40 real-life Flash 8 ActionScript projects, including sample games, wireless applications, Web sites, and more—all of which will help you work faster and more efficiently.




Depositfiles

mirror

mirror

Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer.
This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur.




Depositfiles

mirror

mirror

Pro Tools 101 Official Courseware

Digidesign’s Official Pro Tools 101 Courseware takes a comprehensive approach to learning the fundamentals of Pro Tools|HD, Pro Tools LE, or Pro Tools M-Powered systems. Now updated for Pro Tools 8 software, this new edition from the definitive authority on Pro Tools covers everything you need to know to complete a Pro Tools project. Learn to build sessions that include multitrack recordings of live instruments, MIDI sequences, software synthesizers, and virtual instruments. Through hands-on tutorials, develop essential techniques for recording, editing, and mixing. The included DVD-ROM offers tutorial files and videos, additional documentation, and Pro Tools sessions to accompany the projects in the text. Developed as the foundation course of the official Digidesign Training and Education program, the guide can be used to learn on your own or to pursue formal Pro Tools certification through a Digidesign-authorized school. Join the ranks of audio professionals around the world as you unleash the creative power of your Pro Tools system.




Depositfiles

mirror

mirror