0-DAYS EbookZ and more. Part 2

Статус
В этой теме нельзя размещать новые ответы.

stare0

Турист
Регистрация
18 Июл 2006
Сообщения
4
Реакции
0
Credits
8
Просьба

Можно ли выложить данную книгу? Была выложена во время отпуска в большом файле, но файл к сожалению уже удалён с рапиды из-за того, что никто к нему не обращался. Заранее спасибо!

Que.MCTS.70-431.Exam.Cram.Implementing.and.Maintaining.Microsoft.SQL.Server.2005.Jul.2006.eBook-BBL
 

wrz.netz

Местный
Регистрация
10 Дек 2004
Сообщения
923
Реакции
840
Credits
88
1. CISCO.BUILDING.CISCO.MULTILAYER.SWITCHED.NETWORKS.V.3.0-JGT
2. CISCO.BUILDING.SCALABLE.CISCO.INTERNETWORKS.V.3.0-JGT
3. CISCO.IMPLEMENTING.SECURE.CONVERGED.WIDE.AREA.NETWORKS.V.1.0-JGT
4. CISCO.OPTIMIZING.CONVERGED.CISCO.NETWORKS.V.1.0-JGT


Product Description

eBook:CISCO.BUILDING.CISCO.MULTILAYER.SWITCHED.NETWORKS.V.3.0-JGT hash [MBLMRS7Sq/Tz1UOdllsH8enhD5k]

file:2006_1125_wrz_cis-bui.cis.mul.swi.net.v.3.0.jgt.izp (13606) KB

Код:
[color=magenta]http://rapidshare.com/files/5148481/2006_1125_wrz_cis-bui.cis.mul.swi.net.v.3.0.jgt.izp.html[/color]


Product Description

eBook:CISCO.BUILDING.SCALABLE.CISCO.INTERNETWORKS.V.3.0-JGT hash [Gkb4SFQwZ8MlbYYkfTmirEFuTVA]

file:2006_1125_wrz_cis-bui.sca.cis.int.v.3.0.jgt.izp (11494) KB

Код:
[color=magenta]http://rapidshare.com/files/5149213/2006_1125_wrz_cis-bui.sca.cis.int.v.3.0.jgt.izp.html[/color]


Product Description

eBook:CISCO.IMPLEMENTING.SECURE.CONVERGED.WIDE.AREA.NETWORKS.V.1.0-JGT hash [6M5cSVP8Z2caOaK5hwpLdj29Fi4]

file:2006_1125_wrz_cis-imp.sec.con.wid.are.net.v.1.0.jgt.izp (12664) KB

Код:
[color=magenta]http://rapidshare.com/files/5148859/2006_1125_wrz_cis-imp.sec.con.wid.are.net.v.1.0.jgt.izp.html[/color]


Product Description

eBook:CISCO.OPTIMIZING.CONVERGED.CISCO.NETWORKS.V.1.0-JGT hash [DL/2MsdUGqLft2QMrvatN2B5D2c]

file:2006_1125_wrz_cis-opt.con.cis.net.v.1.0.jgt.izp (11259) KB

Код:
[color=magenta]http://rapidshare.com/files/5148015/2006_1125_wrz_cis-opt.con.cis.net.v.1.0.jgt.izp.html[/color]
 

wrz.netz

Местный
Регистрация
10 Дек 2004
Сообщения
923
Реакции
840
Credits
88
1. Apress.Beginning.Ajax.with.PHP.From.Novice.to.Professional.Oct.2006.eBook-BBL
2. Apress.The.Definitive.Guide.to.db4o.Jun.2006.eBook-BBL
3. Packt.Publishing.PHP.Programming.with.PEAR.Sep.2006.eBook-BBL





1590596676.01._SCMZZZZZZZ_V39352744_.jpg



Beginning Ajax with PHP: From Novice to Professional
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Lee Babin
ISBN: 1590596676
Publisher: Apress
Year: 2006
Pages: 272Product Description

eBook:Apress.Beginning.Ajax.with.PHP.From.Novice.to.Professional.Oct.2006.eBook-BBL hash [0oJVbFn0Qx4+u0+dfHQA3pGl3go]

file:2006_1126_wrz_apr-beg.aja.wit.php.fro.nov.to.pro.oct.200.ebo.bbl.izp (3565) KB

Код:
[color=magenta]http://rapidshare.com/files/5149716/2006_1126_wrz_apr-beg.aja.wit.php.fro.nov.to.pro.oct.200.ebo.bbl.izp.html[/color]


1590596560.01._SCMZZZZZZZ_V38916521_.jpg



The Definitive Guide to db4o
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Stefan Edlich,Henrik Hörning,Reidar Hörning,Jim Paterson
ISBN: 1590596560
Publisher: Apress
Year: 2006
Pages: 512Product Description

eBook:Apress.The.Definitive.Guide.to.db4o.Jun.2006.eBook-BBL hash [+SIuC1L8Igi9achhmLvHDGwbcUE]

file:2006_1126_wrz_apr-the.def.gui.to.db4.jun.200.ebo.bbl.izp (9193) KB

Код:
[color=magenta]http://rapidshare.com/files/5150058/2006_1126_wrz_apr-the.def.gui.to.db4.jun.200.ebo.bbl.izp.html[/color]


1904811795.01._SCMZZZZZZZ_V36363953_.jpg



PHP Programming with PEAR
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Schmidt Stephan,Stoyan Stefanov,Wormus Aaron,Lucke Carsten
ISBN: 1904811795
Publisher: Packt Publishing
Year: 2006
Pages: 292Product Description

eBook:Packt.Publishing.PHP.Programming.with.PEAR.Sep.2006.eBook-BBL hash [i3/8D5xLVNFY92qjjflDAv3Z8OY]

file:2006_1126_wrz_pac-pub.php.pro.wit.pea.sep.200.ebo.bbl.izp (1933) KB

Код:
[color=magenta]http://rapidshare.com/files/5150148/2006_1126_wrz_pac-pub.php.pro.wit.pea.sep.200.ebo.bbl.izp.html[/color]
 

wrz.netz

Местный
Регистрация
10 Дек 2004
Сообщения
923
Реакции
840
Credits
88
Request 2005-0703

1. Addison.Wesley.Professional.Windows.Server.2003.Security.A.Technical.Reference.May.2005.eBook-DDU


0321305019.01._SCMZZZZZZZ_V1114130423_.jpg



Windows Server 2003 Security: A Technical Reference (Microsoft Windows Server System Series)
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Roberta Bragg
ISBN: 0321305019
Publisher: Addison-Wesley Professional
Year: 2005
Pages: 1176Product Description

eBook:Addison.Wesley.Professional.Windows.Server.2003.Security.A.Technical.Reference.May.2005.eBook-DDU hash [ad5Na0AGks1Zpou6wxKwbJEVAqs]

file:2006_0703_wrz_add-wes.pro.win.ser.200.sec.a.tec.ref.may.200.ebo.ddu.izp (27716) KB

Код:
[color=magenta]http://rapidshare.com/files/5347696/2006_0703_wrz_add-wes.pro.win.ser.200.sec.a.tec.ref.may.200.ebo.ddu.izp.html[/color]
 

stare0

Турист
Регистрация
18 Июл 2006
Сообщения
4
Реакции
0
Credits
8

wrz.netz

Местный
Регистрация
10 Дек 2004
Сообщения
923
Реакции
840
Credits
88
1. ActualTests.CISCO.350-020.Exam.Q.and.A.11.08.06-DDU
2. ActualTests.Microsoft.070-217.Exam.Q.and.A.11.07.06-DDU
3. ActualTests.Microsoft.070-220.Exam.Q.and.A.11.06.06-DDU
4. ActualTests.Microsoft.070-222.Exam.Q.and.A.11.08.06-DDU
5. ActualTests.Microsoft.070-226.Exam.Q.and.A.11.06.06-DDU
6. ActualTests.Microsoft.070-228.Exam.Q.and.A.11.06.06-DDU
7. ActualTests.Microsoft.070-230.Exam.Q.and.A.11.06.06-DDU
8. ActualTests.Microsoft.070-285.Exam.Q.and.A.11.06.06-DDU
9. ActualTests.Microsoft.070-447.Exam.Q.and.A.11.08.06-DDU
10. ActualTests.Microsoft.070-528.Exam.Q.and.A.11.06.06-DDU
11. ActualTests.Microsoft.74-134.Exam.Q.and.A.11.08.06-DDU
12. ActualTests.Microsoft.MB2-421.Exam.Q.and.A.11.06.06-DDU
13. ActualTests.Microsoft.MB2-422.Exam.Q.and.A.11.08.06-DDU
14. ActualTests.Microsoft.MB2-423.Exam.Q.and.A.11.06.06-DDU
15. ActualTests.Microsoft.MB3-216.Exam.Q.and.A.11.06.06-DDU
16. ActualTests.Microsoft.MB3-408.Exam.Q.and.A.11.06.06-DDU
17. ActualTests.Microsoft.MB6-204.Exam.Q.and.A.11.06.06-DDU
18. ActualTests.Microsoft.MOS-OXP.Exam.Q.and.A.11.06.06-DDU
19. ActualTests.Microsoft.MOS-WXP.Exam.Q.and.A.11.06.06-DDU
20. ActualTests.VMware.VCP-101V.Exam.Q.and.A.11.06.06-DDU
21. Addison.Wesley.The.Java.Tutorial.A.Short.Course.on.the.Basics.4th.Edition.Sep.2006.eBook-BBL
22. Focal.Press.The.Focal.Easy.Guide.to.Adobe.Audition.2.0.Jun.2006.eBook-BBL
23. Wiley.Cognitive.Radio.Architecture.The.Engineering.Foundations.of.Radio.XML.Sep.2006.eBook-BBL





Product Description

eBook:ActualTests.CISCO.350-020.Exam.Q.and.A.11.08.06-DDU hash [1IZ1qoTOiJisjmKsNeAhjOjqmE4]

file:2006_1109_wrz_act-cis.350.020.exa.q.and.a.11.08.06.ddu.izp (1754) KB

Код:
[color=magenta]http://rapidshare.com/files/5871089/2006_1109_wrz_act-cis.350.020.exa.q.and.a.11.08.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.070-217.Exam.Q.and.A.11.07.06-DDU hash [QD7yObMBiLSDeLHkUl9jWFkMLMc]

file:2006_1109_wrz_act-mic.070.217.exa.q.and.a.11.07.06.ddu.izp (6694) KB

Код:
[color=magenta]http://rapidshare.com/files/5870789/2006_1109_wrz_act-mic.070.217.exa.q.and.a.11.07.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.070-220.Exam.Q.and.A.11.06.06-DDU hash [FnLiJeF0J7vf6rdNLjmQrmpdYpg]

file:2006_1109_wrz_act-mic.070.220.exa.q.and.a.11.06.06.ddu.izp (1642) KB

Код:
[color=magenta]http://rapidshare.com/files/5871432/2006_1109_wrz_act-mic.070.220.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.070-222.Exam.Q.and.A.11.08.06-DDU hash [UoMaFcq3nrzGhcOl7FEdPBvuUVE]

file:2006_1109_wrz_act-mic.070.222.exa.q.and.a.11.08.06.ddu.izp (5205) KB

Код:
[color=magenta]http://rapidshare.com/files/5873435/2006_1109_wrz_act-mic.070.222.exa.q.and.a.11.08.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.070-226.Exam.Q.and.A.11.06.06-DDU hash [FB9YeeOz/7yvwOZPof+y4GViEXU]

file:2006_1109_wrz_act-mic.070.226.exa.q.and.a.11.06.06.ddu.izp (2324) KB

Код:
[color=magenta]http://rapidshare.com/files/5871182/2006_1109_wrz_act-mic.070.226.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.070-228.Exam.Q.and.A.11.06.06-DDU hash [YyzAAHOtQtA0mMSqJqDKte7ETtA]

file:2006_1109_wrz_act-mic.070.228.exa.q.and.a.11.06.06.ddu.izp (2914) KB

Код:
[color=magenta]http://rapidshare.com/files/5871314/2006_1109_wrz_act-mic.070.228.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.070-230.Exam.Q.and.A.11.06.06-DDU hash [W9fFdGtfdwnJ7Plnj9adMVRXlhk]

file:2006_1109_wrz_act-mic.070.230.exa.q.and.a.11.06.06.ddu.izp (972) KB

Код:
[color=magenta]http://rapidshare.com/files/5871358/2006_1109_wrz_act-mic.070.230.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.070-285.Exam.Q.and.A.11.06.06-DDU hash [lou/uXOCN3DD72JAIo/+acjnpKE]

file:2006_1109_wrz_act-mic.070.285.exa.q.and.a.11.06.06.ddu.izp (2583) KB

Код:
[color=magenta]http://rapidshare.com/files/5871548/2006_1109_wrz_act-mic.070.285.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.070-447.Exam.Q.and.A.11.08.06-DDU hash [5TqemBw5+2U20TES+jFpTvaw9mI]

file:2006_1109_wrz_act-mic.070.447.exa.q.and.a.11.08.06.ddu.izp (2686) KB

Код:
[color=magenta]http://rapidshare.com/files/5871678/2006_1109_wrz_act-mic.070.447.exa.q.and.a.11.08.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.070-528.Exam.Q.and.A.11.06.06-DDU hash [U0ZXkUomSBzSYsU2JwoSxwGxeMI]

file:2006_1109_wrz_act-mic.070.528.exa.q.and.a.11.06.06.ddu.izp (367) KB

Код:
[color=magenta]http://rapidshare.com/files/5871710/2006_1109_wrz_act-mic.070.528.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.74-134.Exam.Q.and.A.11.08.06-DDU hash [CyuIPLcql46IUCMOuFmHcSGalsc]

file:2006_1109_wrz_act-mic.74.134.exa.q.and.a.11.08.06.ddu.izp (1138) KB

Код:
[color=magenta]http://rapidshare.com/files/5871761/2006_1109_wrz_act-mic.74.134.exa.q.and.a.11.08.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.MB2-421.Exam.Q.and.A.11.06.06-DDU hash [uNTeTCQ67DcdeZ/EsK4TclbCt1I]

file:2006_1109_wrz_act-mic.mb2.421.exa.q.and.a.11.06.06.ddu.izp (248) KB

Код:
[color=magenta]http://rapidshare.com/files/5871771/2006_1109_wrz_act-mic.mb2.421.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.MB2-422.Exam.Q.and.A.11.08.06-DDU hash [1KuYN17sLvD4SPy3EaPuVvaD0C0]

file:2006_1109_wrz_act-mic.mb2.422.exa.q.and.a.11.08.06.ddu.izp (266) KB

Код:
[color=magenta]http://rapidshare.com/files/5871784/2006_1109_wrz_act-mic.mb2.422.exa.q.and.a.11.08.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.MB2-423.Exam.Q.and.A.11.06.06-DDU hash [zL/xkAesomEAuNBtqFbZyCeA11U]

file:2006_1109_wrz_act-mic.mb2.423.exa.q.and.a.11.06.06.ddu.izp (212) KB

Код:
[color=magenta]http://rapidshare.com/files/5871796/2006_1109_wrz_act-mic.mb2.423.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.MB3-216.Exam.Q.and.A.11.06.06-DDU hash [XfQC2qTAi3o4vvC0nZk8TzeShOE]

file:2006_1109_wrz_act-mic.mb3.216.exa.q.and.a.11.06.06.ddu.izp (249) KB

Код:
[color=magenta]http://rapidshare.com/files/5871810/2006_1109_wrz_act-mic.mb3.216.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.MB3-408.Exam.Q.and.A.11.06.06-DDU hash [2IBDlR8xxarEp4dxVeajfz8VMk0]

file:2006_1109_wrz_act-mic.mb3.408.exa.q.and.a.11.06.06.ddu.izp (208) KB

Код:
[color=magenta]http://rapidshare.com/files/5871833/2006_1109_wrz_act-mic.mb3.408.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.MB6-204.Exam.Q.and.A.11.06.06-DDU hash [LWKdX1dLLXOjE8ke1jXyfQDZHWc]

file:2006_1109_wrz_act-mic.mb6.204.exa.q.and.a.11.06.06.ddu.izp (191) KB

Код:
[color=magenta]http://rapidshare.com/files/5871819/2006_1109_wrz_act-mic.mb6.204.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.MOS-OXP.Exam.Q.and.A.11.06.06-DDU hash [B/gDeeO1wHvznInUBO17XRy+oA8]

file:2006_1109_wrz_act-mic.mos.oxp.exa.q.and.a.11.06.06.ddu.izp (204) KB

Код:
[color=magenta]http://rapidshare.com/files/5871837/2006_1109_wrz_act-mic.mos.oxp.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.Microsoft.MOS-WXP.Exam.Q.and.A.11.06.06-DDU hash [iGq6ZFwBHBgMOr9cnsreUwTe590]

file:2006_1109_wrz_act-mic.mos.wxp.exa.q.and.a.11.06.06.ddu.izp (138) KB

Код:
[color=magenta]http://rapidshare.com/files/5873444/2006_1109_wrz_act-mic.mos.wxp.exa.q.and.a.11.06.06.ddu.izp.html[/color]


Product Description

eBook:ActualTests.VMware.VCP-101V.Exam.Q.and.A.11.06.06-DDU hash [RtT6B94Kp+shBfLKOa3vcGZT+Dg]

file:2006_1109_wrz_act-vmw.vcp.101.exa.q.and.a.11.06.06.ddu.izp (452) KB

Код:
[color=magenta]http://rapidshare.com/files/5873473/2006_1109_wrz_act-vmw.vcp.101.exa.q.and.a.11.06.06.ddu.izp.html[/color]


0321334205.01._SCMZZZZZZZ_V35597465_.jpg



The Java Tutorial: A Short Course on the Basics, 4th Edition (The Java Series)
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Sharon Zakhour,Scott Hommel,Jacob Royal,Isaac Rabinovitch,Tom Risser,Mark Hoeber
ISBN: 0321334205
Publisher: Addison-Wesley Professional
Year: 2006
Pages: 672Product Description

eBook:Addison.Wesley.The.Java.Tutorial.A.Short.Course.on.the.Basics.4th.Edition.Sep.2006.eBook-BBL hash [kah7GtIZySfqAGnmPBxK9xVvCTU]

file:2006_1109_wrz_add-wes.the.jav.tut.a.sho.cou.on.the.bas.4th.edi.sep.200.ebo.bbl.izp (3402) KB

Код:
[color=magenta]http://rapidshare.com/files/5873642/2006_1109_wrz_add-wes.the.jav.tut.a.sho.cou.on.the.bas.4th.edi.sep.200.ebo.bbl.izp.html[/color]


0240520181.01._SCMZZZZZZZ_V61258239_.jpg



The Focal Easy Guide to Adobe Audition 2.0 (Focal Easy Guide)
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Antony Brown
ISBN: 0240520181
Publisher: Focal Press
Year: 2006
Pages: 224Product Description

eBook:Focal.Press.The.Focal.Easy.Guide.to.Adobe.Audition.2.0.Jun.2006.eBook-BBL hash [OsXmi0f8mKYFxJJrnzFl+KHRvhM]

file:2006_1109_wrz_foc-pre.the.foc.eas.gui.to.ado.aud.2.0.jun.200.ebo.bbl.izp (3535) KB

Код:
[color=magenta]http://rapidshare.com/files/5873784/2006_1109_wrz_foc-pre.the.foc.eas.gui.to.ado.aud.2.0.jun.200.ebo.bbl.izp.html[/color]


0471742449.01._SCMZZZZZZZ_V61556605_.jpg



Cognitive Radio Architecture: The Engineering Foundations of Radio XML
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Joseph III Mitola
ISBN: 0471742449
Publisher: Wiley-Interscience
Year: 2006
Pages: 473Product Description

eBook:Wiley.Cognitive.Radio.Architecture.The.Engineering.Foundations.of.Radio.XML.Sep.2006.eBook-BBL hash [IyhN5/FM9sKWH7pkxhN5q9B17NA]

file:2006_1109_wrz_wil-cog.rad.arc.the.eng.fou.of.rad.xml.sep.200.ebo.bbl.izp (5028) KB

Код:
[color=magenta]http://rapidshare.com/files/5871016/2006_1109_wrz_wil-cog.rad.arc.the.eng.fou.of.rad.xml.sep.200.ebo.bbl.izp.html[/color]
 

wrz.netz

Местный
Регистрация
10 Дек 2004
Сообщения
923
Реакции
840
Credits
88
1. Academic.Press.Mobile.Broadband.Multimedia.Networks.Jun.2006.eBook-BBL





0123694221.01._SCMZZZZZZZ_V60821061_.jpg



Mobile Broadband Multimedia Networks: Techniques, Models and Tools for 4G
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Luis M. Correia
ISBN: 0123694221
Publisher: Academic Press
Year: 2006
Pages: 600

Product Description
Mobile Broadband Multimedia Networks: Techniques, Models and Tools for 4th Generation Communication
Networks provides the main results of the prestigious and well known European COST 273 research project
on the development of next generation mobile and wireless communication systems. Based on the applied
research of over 350 participants in academia and industry, this book focuses on the radio aspects of
mobile and wireless broadband multimedia communications, by exploring and developing new methods,
models, techniques, strategies and tools towards the implementation of 4th generation mobile and wireless
communication systems.This complete reference includes topics ranging from transmission and signal
processing techniques to antennas and diversity, ultra wide band, MIMO and reference scenarios for
radio network simulation and evaluation. This book will be an ideal source of the latest developments
in mobile multimedia broadband technologies for researchers, R&D engineers, graduates and engineers
in industry implementing simulation models and conducting measurements.* Based on the well known and
respected research of the COST 273 project Towards Mobile Broadband Multimedia Networks, whose previous
models have been adopted by standardisation bodies such as ITU, ETSI and 3GPP * Gives methods, techniques,
models and tools for developing 4th generation mobile and wireless communication systems * Includes
the latest development of key technologies and methods such as MIMO systems, ultra wide-band and OFDM


eBook:Academic.Press.Mobile.Broadband.Multimedia.Networks.Jun.2006.eBook-BBL hash [uy947VpFYl/1zCB1nzFgeK9QTNU]

file:2006_1110_wrz_aca-pre.mob.bro.mul.net.jun.200.ebo.bbl.izp (7782) KB

Код:
[color=magenta]http://rapidshare.com/files/5882314/2006_1110_wrz_aca-pre.mob.bro.mul.net.jun.200.ebo.bbl.izp.html[/color]
 

wrz.netz

Местный
Регистрация
10 Дек 2004
Сообщения
923
Реакции
840
Credits
88
1. Actualtests.EMC.E20-840.Exam.Q.And.A.30.11.06-ARNEBOOK
2. Actualtests.EMC.E20-850.Exam.Q.And.A.30.11.06-ARNEBOOK
3. Actualtests.EMC.E22-106.Exam.Q.And.A.30.11.06-ARNEBOOK
4. Actualtests.SAS.Institute.A00-201.Exam.Q.And.A.30.11.06-ARNEBOOK





eBook:Actualtests.EMC.E20-840.Exam.Q.And.A.30.11.06-ARNEBOOK hash [BimQGyvABRA6LLXJShHACz1GUns]

file:2006_1201_wrz_act-emc.e20.840.exa.q.and.a.30.11.06.arn.izp (513) KB

Код:
[color=magenta]http://rapidshare.com/files/5896245/2006_1201_wrz_act-emc.e20.840.exa.q.and.a.30.11.06.arn.izp.html[/color]


eBook:Actualtests.EMC.E20-850.Exam.Q.And.A.30.11.06-ARNEBOOK hash [+sT95qozyI5QUs1B+Th6syhNiXg]

file:2006_1201_wrz_act-emc.e20.850.exa.q.and.a.30.11.06.arn.izp (336) KB

Код:
[color=magenta]http://rapidshare.com/files/5896176/2006_1201_wrz_act-emc.e20.850.exa.q.and.a.30.11.06.arn.izp.html[/color]


eBook:Actualtests.EMC.E22-106.Exam.Q.And.A.30.11.06-ARNEBOOK hash [fVDmhPTVL5HJ4GcbKQZv8lNAes4]

file:2006_1201_wrz_act-emc.e22.106.exa.q.and.a.30.11.06.arn.izp (218) KB

Код:
[color=magenta]http://rapidshare.com/files/5896206/2006_1201_wrz_act-emc.e22.106.exa.q.and.a.30.11.06.arn.izp.html[/color]


eBook:Actualtests.SAS.Institute.A00-201.Exam.Q.And.A.30.11.06-ARNEBOOK hash [puo6cimsBa9yB0NCBxkT6dAu30s]

file:2006_1201_wrz_act-sas.ins.a00.201.exa.q.and.a.30.11.06.arn.izp (381) KB

Код:
[color=magenta]http://rapidshare.com/files/5896147/2006_1201_wrz_act-sas.ins.a00.201.exa.q.and.a.30.11.06.arn.izp.html[/color]
 

wrz.netz

Местный
Регистрация
10 Дек 2004
Сообщения
923
Реакции
840
Credits
88
1. Adventure.Tourism.The.New.Frontier.eBook-EEn
2. City.Bountiful.A.Century.of.Community.Gardening.in.America.eBook-EEn
3. Manning.iText.in.Action.Dec.2006.eBook-BBL
4. Manning.Java.Persistence.with.Hibernate.Nov.2006.eBook-BBL
5. Patent.Copyright.and.Trademark.An.Intellectual.Property.Desk.Reference.7th.Edition.eBook-EEn
6. The.Global.Nomad.Backpacker.Travel.in.Theory.and.Practice.eBook-EEn





0750651865.01._SCMZZZZZZZ_V52746402_.jpg



Adventure Tourism: The New Frontier
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): John Swarbrooke,Colin Beard,Suzanne Leckie,Gill Pomfret
ISBN: 0750651865
Publisher: Butterworth-Heinemann
Year: 2003
Pages: 368

Product Description
Looking at the past, present and future of adventure tourism, Adventure Tourism: the new frontier examines
the product, the adventure tourist profile, and issues such as supply, geography and sustainability.
International case studies are used to illustrate these issues, including: Gorilla watching holidays,Trekking
on Mount Everest, Diving holidays, and Outward Bound packages.Analysis of the development and nature
of adventure tourism accompanies these studies, ensuring that the title is useful both for undergraduate
and postgraduate students of tourism and for professionals involved in managing adventure tourism
enterprises.There is also a companion website with additional cases, which can be found at Для просмотра ссылки Войди или Зарегистрируйся
International case studies, including wilderness tourism in Siberia, rock-climbing based tourism
in Spain and mountain tourism in Greece* Unique treatment of the subject* A respected team of authors
eBook:Adventure.Tourism.The.New.Frontier.eBook-EEn hash [OPqu8h58MbO+iO+ZWwsONG4Kcrw]

file:2006_1203_wrz_adv-tou.the.new.fro.ebo.een.izp (4441) KB

Код:
[color=magenta]http://rapidshare.com/files/6015575/2006_1203_wrz_adv-tou.the.new.fro.ebo.een.izp.html[/color]


0520243439.01._SCMZZZZZZZ_V1098366870_.jpg



City Bountiful: A Century of Community Gardening in America
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Laura Lawson
ISBN: 0520243439
Publisher: University of California Press
Year: 2005
Pages: 382

Product Description
Since the 1890s, providing places for people to garden has been an inventive strategy to improve American
urban conditions. There have been vacant-lot gardens, school gardens, Depression-era relief gardens,
victory gardens, and community gardens--each representing a consistent impulse to return to gardening
during times of social and economic change. In this critical history of community gardening in America,
the most comprehensive review of the greening of urban communities to date, Laura J. Lawson documents
the evolution of urban garden programs in the United States. Her vibrant narrative focuses on the values
associated with gardening, the ebb and flow of campaigns during times of social and economic crisis,
organizational strategies of these primarily volunteer campaigns, and the sustainability of current
programs. eBook:City.Bountiful.A.Century.of.Community.Gardening.in.America.eBook-EEn hash [DffUdeRebO/hrGR5KqFtcnHtTIo]

file:2006_1203_wrz_cit-bou.a.cen.of.com.gar.in.ame.ebo.een.izp (3297) KB

Код:
[color=magenta]http://rapidshare.com/files/6015762/2006_1203_wrz_cit-bou.a.cen.of.com.gar.in.ame.ebo.een.izp.html[/color]


1932394796.01._SCMZZZZZZZ_V36350054_.jpg



Itext in Action: Creating and Manipulating PDF
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Bruno Lowagie
ISBN: 1932394796
Publisher: Manning Publications
Year: 2006
Pages: 656

Product Description
Imagine a publisher who wants to "stamp" his ebooks on the fly with the name of the buyer (to discourage
sharing). Such a publisher would (and we know one who does) use iText for the task. Developers looking
to enhance web- and other applications with dynamic PDF document generation and/or manipulation will
find this book unique in content and readability. Based on ongoing examples that encourage learning
"in action," they will finally understand PDF and learn how to build applications that produce professional,
high-quality PDF documents. While the basic functionality of iText is easy to acquire, this book lowers
the learning curve for more advanced functionality. It explains how to use iText to create/manipulate
PDF documents on-the-fly in one or more of the following situations:
Due to time or size, the PDF documents
can't be produced manually
The content of the document must be calculated or based on user input.
The
content needs to be customized or personalized.
The PDF content needs to be served in a web environment.

Documents are to be created in "batch process" mode. All the examples are written in Java, but they can
be easily adapted to .NET by developers using one of the .NET ports: iTextSharp (C#) or iText.NET (#J).
While iText is a free Java library and the examples are written from the point of view of the Java developer,
nine out of ten examples can be run by .NET developers with only minimal changes. eBook:Manning.iText.in.Action.Dec.2006.eBook-BBL hash [QVe/A/X/Q4nuoXz4WtJu5Bs1GRU]

file:2006_1203_wrz_man-ite.in.act.dec.200.ebo.bbl.izp (18403) KB

Код:
[color=magenta]http://rapidshare.com/files/6015402/2006_1203_wrz_man-ite.in.act.dec.200.ebo.bbl.izp.html[/color]


1932394885.01._SCMZZZZZZZ_V36394362_.jpg



Java Persistence with Hibernate
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Christian Bauer,Gavin King
ISBN: 1932394885
Publisher: Manning Publications
Year: 2006
Pages: 880

Product Description
Persistence-the ability of data to outlive an instance of a program-is central to modern applications.
Hibernate, the most popular Java persistence tool, provides automatic and transparent object/relational
mapping making it a snap to work with SQL databases in Java applications. Hibernate applications are
cheaper, more portable, and more resilient to change. Because it conforms to the new EJB 3.0 and Java Persistence
1.0 standard, Hibernate allows the developer to seamlessly create efficient, scalable Java EE applications.
Java Persistence with Hibernate explores Hibernate by developing an application that ties together
hundreds of individual examples. You'll immediately dig into the rich programming model of Hibernate
3.2 and Java Persistence, working through queries, fetching strategies, caching, transactions, conversations,
and more. You'll also appreciate the well-illustrated discussion of best practices in database design,
object/relational mapping, and optimization techniques. In this revised edition of the bestselling
Hibernate in Action, authors Christian Bauer and Gavin King-the founder of the Hibernate project-cover
Hibernate 3.2 in detail along with the EJB 3.0 and Java Persistence standard. eBook:Manning.Java.Persistence.with.Hibernate.Nov.2006.eBook-BBL hash [1UiXee+Ybik2QWgtm44wwOkfbhY]

file:2006_1203_wrz_man-jav.per.wit.hib.nov.200.ebo.bbl.izp (6950) KB

Код:
[color=magenta]http://rapidshare.com/files/6016034/2006_1203_wrz_man-jav.per.wit.hib.nov.200.ebo.bbl.izp.html[/color]


eBook:Patent.Copyright.and.Trademark.An.Intellectual.Property.Desk.Reference.7th.Edition.eBook-EEn hash [oIjZ787znbKxAqi7pB7rVcbAnZo]

file:2006_1203_wrz_pat-cop.and.tra.an.int.pro.des.ref.7th.edi.ebo.een.izp (3627) KB

Код:
[color=magenta]http://rapidshare.com/files/6016238/2006_1203_wrz_pat-cop.and.tra.an.int.pro.des.ref.7th.edi.ebo.een.izp.html[/color]


1873150768.01._SCMZZZZZZZ_V1130068757_.jpg



The Global Nomad: Backpacker Travel in Theory and Practice (Tourism and Cultural Change)
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s):
ISBN: 1873150768
Publisher: Multilingual Matters Limited
Year: 2004
Pages: 300

Product Description
eBook:The.Global.Nomad.Backpacker.Travel.in.Theory.and.Practice.eBook-EEn hash [aD/1lbUcrU8Ud/0IW+1x5tz0mjY]

file:2006_1203_wrz_the-glo.nom.bac.tra.in.the.and.pra.ebo.een.izp (1104) KB

Код:
[color=magenta]http://rapidshare.com/files/6015616/2006_1203_wrz_the-glo.nom.bac.tra.in.the.and.pra.ebo.een.izp.html[/color]
 

wrz.netz

Местный
Регистрация
10 Дек 2004
Сообщения
923
Реакции
840
Credits
88
1. Actualtests.Novell.050-692.Exam.Q.And.A.30.11.06-ARNEBOOK
2. Adobe.Press.Adobe.Digital.Video.How.Tos.Oct.2006.eBook-BBL
3. OReilly.Essential.CVS.2nd.Edition.Nov.2006.eBook-BBL
4. OReilly.iPod.The.Missing.Manual.5th.Edition.Nov.2006.eBook-BBL
5. Packt.Publishing.TrixBox.Made.Easy.Oct.2006.eBook-BBL
6. Peachpit.Press.Apple.Pro.Training.Series.Aperture.1.5.Oct.2006.eBook-BBL
7. Peachpit.Press.Blackberry.Pearl.Pocket.Guide.Nov.2006.eBook-BBL
8. Peachpit.Press.Hollywood.Special.Effects.with.Adobe.Premiere.Elements.3.Oct.2006.eBook-BBL
9. Peachpit.Press.The.Digital.SLR.Guide.Nov.2006.eBook-BBL
10. Prentice.Hall.Computer.and.Communication.Networks.Nov.2006.eBook-BBL
11. Que.How.the.Internet.Works.8th.Edition.Nov.2006.eBook-BBL
12. Syngress.Hack.the.Stack.Oct.2006.eBook-BBL





eBook:Actualtests.Novell.050-692.Exam.Q.And.A.30.11.06-ARNEBOOK hash [uvEO+4XznhaOALmc6flqi3BGdJ8]

file:2006_1204_wrz_act-nov.050.692.exa.q.and.a.30.11.06.arn.izp (2759) KB

Код:
[color=magenta]http://rapidshare.com/files/6134389/2006_1204_wrz_act-nov.050.692.exa.q.and.a.30.11.06.arn.izp.html[/color]


0321473817.01._SCMZZZZZZZ_V35892671_.jpg



Adobe Digital Video How-Tos: 100 Essential Techniques with Adobe Production Studio (How-Tos)
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Jan Ozer
ISBN: 0321473817
Publisher: Adobe Press
Year: 2006
Pages: 256

Product Description
The Adobe Production Studio offers a complete post-production package that combines Adobe's video
and graphics software with the timesaving integration and workflow features of Adobe Dynamic Link and
Adobe Bridge. With the addition of Flash, videographers and filmmakers can bring their content to a rich,
interactive presence on the Web as well. The benefits of using all of the tools in the bundle are many and
here to help guide readers through the wide range of features is an info-packed guide that hits all the
key techniques they are most likely to use in their digital video projects. Each stand-alone tip includes
relevant hints and a graphic example so that readers can learn exactly what they need to know and move on
to the next important technique. When each program has been explored, additional tips on integration
and workflow are included to show how you can use the various programs for a complete solution in this exciting,
integrated environment. eBook:Adobe.Press.Adobe.Digital.Video.How.Tos.Oct.2006.eBook-BBL hash [AnKHebr3BDj0Pjd6aLpEpIwQLZk]

file:2006_1204_wrz_ado-pre.ado.dig.vid.how.tos.oct.200.ebo.bbl.izp (11587) KB

Код:
[color=magenta]http://rapidshare.com/files/6134003/2006_1204_wrz_ado-pre.ado.dig.vid.how.tos.oct.200.ebo.bbl.izp.html[/color]


0596527039.01._SCMZZZZZZZ_V37018671_.jpg



Essential CVS
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Jennifer Vesperman
ISBN: 0596527039
Publisher: O'Reilly Media
Year: 2006
Pages: 428

Product Description
This easy-to-follow reference shows a variety of professionals how to use the Concurrent Versions System
(CVS), the open source tool that lets you manage versions of anything stored in files. Ideal for software
developers tracking different versions of the same code, this new edition has been expanded to explain
common usages of CVS for system administrators, project managers, software architects, user-interface
(UI) specialists, graphic designers and others. Current for version 1.12, Essential CVS, 2nd Edition
offers an overview of CVS, explains the core concepts, and describes the commands that most people use
on a day-to-day basis. For those who need to get up to speed rapidly, the book's Quickstart Guide shows
you how to build and use a basic CVS repository with the default settings and a minimum of extras. You'll
also find:

A full command reference that details all aspects of customizing CVS for automation, logging,
branching, merging documents, and creating alerts
Examples and descriptions of the most commonly
used options for each command
Why and when to tag or branch your project, tagging before releases, and
using branching to create a bugfix version of a project
Details on the systems used in CVS to permit multiple
developers to work on the same project without loss of data An entire section devoted to document version
management and project management includes ways to import and export projects, work with remote repositories,
and shows how to fix things that can go wrong when using CVS. You'll find more screenshots in this edition
as well as examples of using graphical CVS clients to run CVS commands. Essential CVS also includes a FAQ
that answers common queries in the CVS mailing list to get you up and running with this system quickly and
painlessly.
eBook:OReilly.Essential.CVS.2nd.Edition.Nov.2006.eBook-BBL hash [fBh/15VWEaZqSFjH9FszpnF0xYI]

file:2006_1204_wrz_ore-ess.cvs.2nd.edi.nov.200.ebo.bbl.izp (2450) KB

Код:
[color=magenta]http://rapidshare.com/files/6134055/2006_1204_wrz_ore-ess.cvs.2nd.edi.nov.200.ebo.bbl.izp.html[/color]


0596529783.01._SCMZZZZZZZ_V35089076_.jpg



iPod: The Missing Manual
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Jude Biersdorfer
ISBN: 0596529783
Publisher: Pogue Press
Year: 2006
Pages: 255

Product Description
With iPod and iTunes, Apple's gotten the world hooked on portable music, pictures, and videos. One thing
they haven't delivered, though, is an easy guide for getting the most from your sleek little entertainment
center. Enter iPod: The Missing Manual, 5th Edition-a book as breathtaking and satisfying as its subject.
Our latest edition thoroughly covers the redesigned iPod Nanos, the video iPod, the tiny Shuffle and
the overhauled iTunes 7. Each custom-designed page sports easy-to-follow color graphics, crystal-clear
explanations, and guidance on the most useful things your iPod can do. Topics include:

Out of the box
and into your ears. Learn how to install iTunes, load music on your iPod, and how to get rid of that dang,
flashing "Do not disconnect" message.
Bopping around the iPod. Whether you've got a tiny Shuffle or
a big-screen model you'll learn everything from turning your iPod off and on to charging your iPod without
a computer. Special coverage for iPod owners with trickster friends: How to reset the iPod's menus to
English if they've been changed to, say, Korean.
In tune with iTunes. iTunes can do far more than your
father's jukebox. Learn how to pick and choose which parts of your iTunes library loads onto your iPod,
how to move your sacred iTunes Folder to a bigger hard drive, and how to add album covers to your growing
collection.
The power of the 'Pod. Download movies, play photo slideshows, find cool podcasts, and
more: this book shows you how to unleash all your iPod's power. iPod is simply the best music player available,
and this is the manual that should have come with it.
eBook:OReilly.iPod.The.Missing.Manual.5th.Edition.Nov.2006.eBook-BBL hash [S4JMIxAYgZtqwkqgBiXwkllLQt0]

file:2006_1204_wrz_ore-ipo.the.mis.man.5th.edi.nov.200.ebo.bbl.izp (10149) KB

Код:
[color=magenta]http://rapidshare.com/files/6134322/2006_1204_wrz_ore-ipo.the.mis.man.5th.edi.nov.200.ebo.bbl.izp.html[/color]


1904811930.01._SCMZZZZZZZ_V36363332_.jpg



TrixBox Made Easy
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Barrie, Dempster,Kerry, Garrison
ISBN: 1904811930
Publisher: Packt Publishing
Year: 2006
Pages: 168

Product Description
TrixBox is a telephone system based on the popular open source Asterisk PBX (Private Branch eXchange)
Software. TrixBox allows an individual or organization to setup a telephone system with traditional
telephone networks as well as Internet based telephony or VoIP (Voice over Internet Protocol). SugarCRM
is already integrated with Asterisk, hence it has been bundled with Trixbox too to increase flexibility.
This book guides the reader in the setup of this system and how to manage the telephone system. The book
begins by introducing telephony concepts before detailing how to plan a telephone system and moving
on to the installation, configuration, and management of a feature packed PBX. This book provides examples
of a well laid out telephone system with accompanying spreadsheets to aid the reader in building stable
telephony infrastructure. eBook:Packt.Publishing.TrixBox.Made.Easy.Oct.2006.eBook-BBL hash [SHETiBudb8ipboyk9gNi7N0qXJg]

file:2006_1204_wrz_pac-pub.tri.mad.eas.oct.200.ebo.bbl.izp (4036) KB

Код:
[color=magenta]http://rapidshare.com/files/6134475/2006_1204_wrz_pac-pub.tri.mad.eas.oct.200.ebo.bbl.izp.html[/color]


0321496620.01._SCMZZZZZZZ_V34863196_.jpg



Apple Pro Training Series: Aperture 1.5 (Apple Pro Training)
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Orlando Luna,Ben Long
ISBN: 0321496620
Publisher: Peachpit Press
Year: 2006
Pages: 552

Product Description
Now fully updated for version 1.5, this comprehensive book-DVD combo starts with the basics of image
management and takes you step by step all the way through Aperture's powerful photo-editing, image-retouching,
proofing, publishing, and archiving features. Version 1.5's new features are completely covered,
including the new image editing tools, expanded search capabilities, new Loupe tool, and support for
many more RAW file formats. It delivers comprehensive training - the equivalent of a two-day course -
in one project-based book. You'll learn time-saving techniques for sorting, ranking, and organizing
images for use in different jobs, and effective ways to display images for client review, apply metadata,
keep your online portfolio up to date automatically, color-manage your workflow from input to final
print, and much more. Real-world exercises feature professional photography from a variety of genres,
including fashion, sports, wedding, commercial, and portraiture. All the files you need to complete
the exercises are included on the DVD. eBook:Peachpit.Press.Apple.Pro.Training.Series.Aperture.1.5.Oct.2006.eBook-BBL hash [6zBZD+yQVNaKvNewlDhVqpjg3mY]

file:2006_1204_wrz_pea-pre.app.pro.tra.ser.ape.1.5.oct.200.ebo.bbl.izp (29544) KB

Код:
[color=magenta]http://rapidshare.com/files/6135131/2006_1204_wrz_pea-pre.app.pro.tra.ser.ape.1.5.oct.200.ebo.bbl.izp.html[/color]


032149699X.01._SCMZZZZZZZ_V34863201_.jpg



Blackberry Pearl Pocket Guide
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Bart G. Farkas
ISBN: 032149699X
Publisher: Peachpit Press
Year: 2006
Pages: 144

Product Description
Everyone knows how addictive a BlackBerry can be--they don't call them "crackberries" for nothing!
Well, you haven't seen anything until you try the brand new BlackBerry Pearl. This brand new phone has
it all, and it's small, smart, and stylish too. Not only does it have all the features you expect from a BlackBerry
(Phone, Email and Text Messaging, Instant Messaging, Organizer, Browser) but it has some great new "Wow"
features including a camera, media player, and BlackBerry Maps. In The BlackBerry Pearl Pocket Guide,
trusted gadget teacher and best-selling author Bart G. Farkas reveals the secrets to using this amazing
new phone: learn how to take cool pictures and share them with your colleagues, view Web pages, import
songs, manage your appointments, communicate with email, text and instant messaging, retrieve maps
and detailed driving directions, and even import video. This handy pocket-sized guide also walks readers
through the fun lifestyle functions, from playing a new Sudoku game every day to charting your diet and
exercise patterns. In this low-priced guide, you'll find compact-yet-detailed coverage of everything
the BlackBerry Pearl can do, as well as all the necessary information on "why" you should use it to be more
productive. eBook:Peachpit.Press.Blackberry.Pearl.Pocket.Guide.Nov.2006.eBook-BBL hash [wblaf1kn9HQUyLPGl5l5DuJY6ec]

file:2006_1204_wrz_pea-pre.bla.pea.poc.gui.nov.200.ebo.bbl.izp (2323) KB

Код:
[color=magenta]http://rapidshare.com/files/6135200/2006_1204_wrz_pea-pre.bla.pea.poc.gui.nov.200.ebo.bbl.izp.html[/color]


0789736128.01._SCMZZZZZZZ_V35450567_.jpg



Hollywood Special Effects with Adobe Premiere Elements 3
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Carl Plumer
ISBN: 0789736128
Publisher: Peachpit Press
Year: 2006
Pages: 336

Product Description
Hollywood Special Effects with Adobe Premiere Elements 3 is a book that will help users get to the next
level in video editing, and that next level goes beyond simply splicing together clips and creating simple
titles. In no time readers will be overlaying multiple tracks of videos and adjusting transparency;
creating Picture-in-Picture overlays; using key frames and motion paths; setting and refining greenscreens
and bluescreens; using color effects for emotional impact; and a whole range of other special effects
to help them tell their story. What sets this book apart is the author's expertise in carefully showing
readers how to execute each of these effects step-by-step in a clear and friendly writing style. With
this book, budding filmmakers will be well on their way to becoming the next George Lucas! The accompanying
DVD contains royalty free music, sound effects, and video clips from Artbeats, Digital Juice, TwistedTracks,
and the Footage Firm (among others). eBook:Peachpit.Press.Hollywood.Special.Effects.with.Adobe.Premiere.Elements.3.Oct.2006.eBook-BBL hash [MMyKiS7HAdR/WgZ0u+3ZgXosyyo]

file:2006_1204_wrz_pea-pre.hol.spe.eff.wit.ado.pre.ele.3.oct.200.ebo.bbl.izp (46153) KB

Код:
[color=magenta]http://rapidshare.com/files/6136461/2006_1204_wrz_pea-pre.hol.spe.eff.wit.ado.pre.ele.3.oct.200.ebo.bbl.izp.html[/color]


0321492196.01._SCMZZZZZZZ_V34644364_.jpg



The Digital SLR Guide: Beyond Point-and-Shoot Digital Photography
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Jon Canfield
ISBN: 0321492196
Publisher: Peachpit Press
Year: 2006
Pages: 216

Product Description
Have you stepped up to a digital single-lens-reflex (dSLR) camera only to find the range of capabilities
daunting? Combining features traditionally found on 35mm film cameras — precise shutter speed and exposure
settings, interchangeable lenses and accessories, superior image quality — with the ease and storage
capacity of digital cameras, a dSLR is a powerful new tool that can create truly great digital pictures.
But the learning curve for photographers moving from the point-and-shoot digital world can be formidable.
In this book, photo-grapher and industry consultant Jon Canfield shows you how to take full advantage
of dSLR photography, illuminating the entire process with nuggets of hard-won expertise. He also shows
you how to use popular image-editing software such as Adobe Photoshop and Adobe Photoshop Elements to
improve your images.The Digital SLR Guide is brimming with tips and tricks for getting the most from your
equipment. The book is heavily illustrated with images and provides everything you need to know about
choosing and using dSLR cameras and equipment. You’ll learn how to:• Get the right stuff.
Explore popular digital SLR cameras and compare accessories, such as lenses, flashes, and filters.•
Learn the camera inside and out. Master dSLR camera controls and advanced features for maximum impact.•
shoot like an expert. Cut to the chase with innovative, time-saving, and creative photography techniques.•
Edit your images. Use Photoshop and Photoshop Elements to make your pictures even better.• Boost
quality. Work with high-quality raw capture modes for the best possible photos. eBook:Peachpit.Press.The.Digital.SLR.Guide.Nov.2006.eBook-BBL hash [AJwAJXV23KBljLPs+DtNfINpAik]

file:2006_1204_wrz_pea-pre.the.dig.slr.gui.nov.200.ebo.bbl.izp (9431) KB

Код:
[color=magenta]http://rapidshare.com/files/6136689/2006_1204_wrz_pea-pre.the.dig.slr.gui.nov.200.ebo.bbl.izp.html[/color]


0131747991.01._SCMZZZZZZZ_V35889926_.jpg



Computer and Communication Networks
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Nader F. Mir
ISBN: 0131747991
Publisher: Prentice Hall PTR
Year: 2006
Pages: 656

Product Description
eBook:Prentice.Hall.Computer.and.Communication.Networks.Nov.2006.eBook-BBL hash [fhJZqR16KDYRqOM0p2o+q2tHHT4]

file:2006_1204_wrz_pre-hal.com.and.com.net.nov.200.ebo.bbl.izp (10705) KB

Код:
[color=magenta]http://rapidshare.com/files/6137053/2006_1204_wrz_pre-hal.com.and.com.net.nov.200.ebo.bbl.izp.html[/color]


0789736268.01._SCMZZZZZZZ_V35889644_.jpg



How the Internet Works (8th Edition) (How It Works)
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Preston Gralla
ISBN: 0789736268
Publisher: Que
Year: 2006
Pages: 432

Product Description
How the Internet Works, Sixth Edition is divided into eight parts, starting with a brief introduction
to the Internet and followed by seven additional parts talking about connecting and communicating on
the Internet, security and privacy, multimedia, Intranets and more. This book is up to date on the hottest
technologies! eBook:Que.How.the.Internet.Works.8th.Edition.Nov.2006.eBook-BBL hash [lhlVRMTPADBZiT/U066H6SLgFtA]

file:2006_1204_wrz_que-how.the.int.wor.8th.edi.nov.200.ebo.bbl.izp (61501) KB

Код:
[color=magenta]http://rapidshare.com/files/6138867/2006_1204_wrz_que-how.the.int.wor.8th.edi.nov.200.ebo.bbl.izp.html[/color]


1597491098.01._SCMZZZZZZZ_V36394295_.jpg



Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Michael Gregg
ISBN: 1597491098
Publisher: Syngress Publishing
Year: 2006
Pages: 442

Product Description
Remember the first time someone told you about the OSI model and described the various layers? It's probably
something you never forgot. This book takes that same layered approach but applies it to network security
in a new and refreshing way. It guides readers step-by-step through the stack starting with physical
security and working its way up through each of the seven OSI layers. Each chapter focuses on one layer
of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The
book even includes a chapter on the mythical eighth layer. It's called the people layer. It's included
because security is not just about technology it also requires interaction with people, policy and office
politics. This book is designed to offer readers a deeper understanding of many common vulnerabilities
and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications.
The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort
(IDS). The sniffer is used to help readers understand how the protocols should work and what the various
attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide
the reader with the skills needed to recognize and detect attacks when they occur. What makes this book
unique is that it presents the material in a layer by layer approach which offers the readers a way to learn
about exploits in a manner similar to which they most likely originally learned networking. This methodology
makes this book a useful tool to not only security professionals but also for networking professionals,
application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed
but each from a security perspective. The authors convey the mindset of the attacker by examining how
seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds
of things that may be monitored that would have alerted users of an attack.
eBook:Syngress.Hack.the.Stack.Oct.2006.eBook-BBL hash [M0ZXPoCTxhPt+aIvCcrqN/dUK8Y]

file:2006_1204_wrz_syn-hac.the.sta.oct.200.ebo.bbl.izp (6169) KB

Код:
[color=magenta]http://rapidshare.com/files/6133746/2006_1204_wrz_syn-hac.the.sta.oct.200.ebo.bbl.izp.html[/color]
 

wrz.netz

Местный
Регистрация
10 Дек 2004
Сообщения
923
Реакции
840
Credits
88
13. Syngress.Cryptography.for.Developers.Nov.2006.eBook-BBL
14. Syngress.Essential.Computer.Security.Oct.2006.eBook-BBL
15. Syngress.Force.Emerging.Threat.Analysis.From.Mischief.to.Malicious.Oct.2006.eBook-BBL
16. Syngress.Network.Security.Assessment.Nov.2006.eBook-BBL
17. Syngress.Scripting.VMware.Power.Tools.Oct.2006.eBook-BBL
18. Syngress.Wardriving.and.Wireless.Penetration.Testing.Oct.2006.eBook-BBL


1597491047.01._SCMZZZZZZZ_V35089047_.jpg



Cryptography for Developers
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Tom St Denis
ISBN: 1597491047
Publisher: Syngress Publishing
Year: 2006
Pages: 400

Product Description
Developers tasked with security problems are often not cryptographers themselves. They are bright
people who, with careful guidance, can implement secure cryptosystems. This book will guide developers
in their journey towards solving cryptographic problems. If you have ever asked yourself "just how do
I setup AES?" then this text is for you.
ASN.1 Encoding The chapter on ASN.1 encoding delivers a treatment
of the Abstract Syntax Notation One (ASN.1) encoding rules for data elements such as strings, binary
strings, integers, dates and times, and sets and sequences.
Random Number Generation This chapter
discusses the design and construction of standard random number generators (RNGs) such as those specified
by NIST.
Advanced Encryption Standard This chapter discusses the AES block cipher design, implementation
trade-offs, side channel hazards, and modes of use. It concentrates on the key design elements important
to implementers and how to exploit them in various trade-off conditions.
Hash Functions This chapter
discusses collision resistance, provides examples of exploits, and concludes with known incorrect
usage patterns.
Message Authentication Code Algorithms This chapter discusses the HMAC and CMAC Message
Authentication Code (MAC) algorithms, which are constructed from hash and cipher functions.
Encrypt
and Authenticate Modes This chapter discusses the IEEE and NIST encrypt and authenticate modes GCM and
CCM. Both modes introduce new concepts to cryptographic functions. Focus is given to the concept of replay
attacks, and initialization techniques are explored in depth.
Large Integer Arithmetic This chapter
discusses the techniques behind manipulating large integers such as those used in public key algorithms.

Public Key Algorithms This chapter introduces public key cryptography, including the RSA algorithm
and its related PKCS #1 padding schemes. It also introduces new math in the form of various elliptic curve
point multipliers. eBook:Syngress.Cryptography.for.Developers.Nov.2006.eBook-BBL hash [MlwmrmDu+BjtV8yFoZQ8XyHAciA]

file:2006_1204_wrz_syn-cry.for.dev.nov.200.ebo.bbl.izp (2857) KB

Код:
[color=magenta]http://rapidshare.com/files/6215502/2006_1204_wrz_syn-cry.for.dev.nov.200.ebo.bbl.izp.html[/color]


1597491144.01._SCMZZZZZZZ_V35089051_.jpg



Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Tony Bradley
ISBN: 1597491144
Publisher: Syngress Publishing
Year: 2006
Pages: 279

Product Description
Essential Security Advice from Tony Bradley, About.com's Guide for Internet/Network Security "Security
is a process, not a product, and computer security is everyone's responsibility. You wouldn't leave
the backdoor of your home or business open to intruders, and your computer merits the same prudence. Even
Dodge City had a Wyatt Earp to keep order if things got out of hand. In the wild world of the Internet, there
is no sheriff. With Essential Computer Security you can act as your own deputy by arming yourself with
fundamental knowledge of the important aspects of computer security."-Douglas Schweitzer, Sc.D.,
security expert and author of Securing the Network from Malicious Code Coverage includes:
Basic Windows
Security
Passwords
Viruses, Worms, and Other Malware
Patching
Perimeter Security
E-mail Safety

Web Surfing Privacy and Safety
Wireless Network Security
Spyware and Adware
Glossary of Technology
and Terminology eBook:Syngress.Essential.Computer.Security.Oct.2006.eBook-BBL hash [RS69hK8+SevX9PGyic3suYQ91d8]

file:2006_1204_wrz_syn-ess.com.sec.oct.200.ebo.bbl.izp (6567) KB

Код:
[color=magenta]http://rapidshare.com/files/6215366/2006_1204_wrz_syn-ess.com.sec.oct.200.ebo.bbl.izp.html[/color]


1597490563.01._SCMZZZZZZZ_V35089108_.jpg



Syngress Force Emerging Threat Analysis: From Mischief to Malicious
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s):
ISBN: 1597490563
Publisher: Syngress Publishing
Year: 2006
Pages: 610

Product Description
A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This is the perfect
reference for any IT professional responsible for protecting their enterprise from the next generation
of security threats. This anthology represents the "best of" this year's top Syngress books on the Human,
Malware, VoIP, Device Driver, RFID, Phishing and Spam threats likely to be unleashed in the near future.

From Practical VoIP Security, Thomas Porter, Ph.D. and Director of IT Security for the FIFA 2006 World
Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security.

From Phishing Exposed, Lance James, Chief Techology Officer of Secure Science Corporation, presents
the latest information on phishing and spam.
From Combating Spyware in the Enterprise, Brian Baskin,
instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection
and removal of spyware.
Also from Combating Spyware in the Enterprise, About.com's security expert
Tony Bradley covers the transformation of spyware.
From Inside the SPAM Cartel, Spammer-X shows how
spam is created and why it works so well.
From Securing IM and P2P Applications for the Enterprise, Paul
Piccard, former manager of Internet Security Systems' Global Threat Operations Center, coveres Skype
security.
Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of
the IRC security software IRC Defender, discusses global IRC security.
From RFID Security, Brad "Renderman"
Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application
attacks.
Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless
networks, discusses management of RFID security.
From Hack the Stack, security expert Michael Gregg
covers attacking the people layer.
Bonus coverage includes exclusive material on device driver attacks
by Dave Maynor, Senior Researcher at SecureWorks. eBook:Syngress.Force.Emerging.Threat.Analysis.From.Mischief.to.Malicious.Oct.2006.eBook-BBL hash [FJQXnMLiLOTpBixrHnehIgoBChA]

file:2006_1204_wrz_syn-for.eme.thr.ana.fro.mis.to.mal.oct.200.ebo.bbl.izp (6419) KB

Код:
[color=magenta]http://rapidshare.com/files/6215793/2006_1204_wrz_syn-for.eme.thr.ana.fro.mis.to.mal.oct.200.ebo.bbl.izp.html[/color]


1597491012.01._SCMZZZZZZZ_V34022824_.jpg



Network Security Assessment: From Vulnerability to Patch
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Steve Manzuik,Ken Pfeil,Andre Gold
ISBN: 1597491012
Publisher: Syngress Publishing
Year: 2006
Pages: 504

Product Description
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding
exploits, through a complete security assessment, all the way through deploying patches against these
vulnerabilities to protect their networks. This book is unique in that it details both the management
and technical skill and tools required to develop an effective vulnerability management system. Business
case studies and real world vulnerabilities are used through the book. This book starts by introducing
the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines
of exploit development, vendors' time to patch, and corporate path installations. Next, the differences
between security assessment s and penetration tests will be clearly explained along with best practices
for conducting both.
Next, several case studies from different industries will illustrate the effectiveness
of varying vulnerability assessment methodologies. The next several chapters will define the steps
of a vulnerability assessment including: defining objectives, identifying and classifying assets,
defining rules of engagement, scanning hosts, and identifying operating systems and applications.

The next several chapters provide detailed instructions and examples for differentiating vulnerabilities
from configuration problems, validating vulnerabilities through penetration testing. The last section
of the book provides best practices for vulnerability management and remediation.
eBook:Syngress.Network.Security.Assessment.Nov.2006.eBook-BBL hash [SojzBbUBI6Vmikuok7ZJVNXeDq8]

file:2006_1204_wrz_syn-net.sec.ass.nov.200.ebo.bbl.izp (7869) KB

Код:
[color=magenta]http://rapidshare.com/files/6216169/2006_1204_wrz_syn-net.sec.ass.nov.200.ebo.bbl.izp.html[/color]


1597490598.01._SCMZZZZZZZ_V35089049_.jpg



Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Al Muller
ISBN: 1597490598
Publisher: Syngress Publishing
Year: 2006
Pages: 398

Product Description
This book covers the native tools that VMware provides with ESX Server. It then discusses in detail the
different scripting API's and how they can be leveraged to provide some very useful, practical and time
saving tools to manage a virtual infrastructure. From virtual server provisioning to backups and everything
in between, all are covered in detail with real world examples that have been tested and will work either
copied directly from the book or with slight modifications for the reader's specific environments.
This book is a one stop shop for virtual tools. VMware provides the most robust virtualization platform
in the market and it has very cool management tools like VirtualCenter and the MUI. Yet more often then
not, the most overlooked and most powerful management tools are either not considered ort unknown. These
are the native command line tools and scripting possibilities the ESX Server has built right in it. From
simple shell scripts to COM and Perl and new in ESX Server 2.5 Common Information Model (CIM) VMware provides
API's to access your virtual infrastructure and leverage 100% of its functionality.
Additionally,
VMware has included outstanding command line tools the provide powerful possibilities for those willing
to use them. The scripts found in this book have been used in real world engagements and deployments of
ESX Server. The reader will be able to copy almost directly with very little customization if any. By combining
the graphical tools such like those found in the MUI and VirtualCenter with the power you'll find with
the scripts detailed within the following chapters, you will be able to get under the hood of your virtual
infrastructure, tune it up and make it purr.
eBook:Syngress.Scripting.VMware.Power.Tools.Oct.2006.eBook-BBL hash [lIlRuVM+zbqpXvk2iRlXn08U9ik]

file:2006_1204_wrz_syn-scr.vmw.pow.too.oct.200.ebo.bbl.izp (3897) KB

Код:
[color=magenta]http://rapidshare.com/files/6216327/2006_1204_wrz_syn-scr.vmw.pow.too.oct.200.ebo.bbl.izp.html[/color]


159749111X.01._SCMZZZZZZZ_V35089106_.jpg



Wardriving & Wireless Penetration Testing
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Chris Hurley,Russ Rogers,Frank Thornton,Daniel Connelly,Brian Baker
ISBN: 159749111X
Publisher: Syngress Publishing
Year: 2006
Pages: 400

Product Description
WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers
to outline how successful penetration testing of wireless networks is accomplished, as well as how to
defend against these attacks. As wireless networking continues to spread in corporate and government
use, security experts need to become familiar with the methodologies, tools, and tactics used by both
penetration testers and attackers to compromise wireless networks and what they can do to both accomplish
their jobs as penetration testers and how to protect networks from sophisticated attackers. WarDriving
and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline
how successful penetration testing of wireless networks is accomplished, as well as how to defend against
these attacks. eBook:Syngress.Wardriving.and.Wireless.Penetration.Testing.Oct.2006.eBook-BBL hash [QNXsP3rIuzi8UXqkPTefGWdafLE]

file:2006_1204_wrz_syn-war.and.wir.pen.tes.oct.200.ebo.bbl.izp (17203) KB

Код:
[color=magenta]http://rapidshare.com/files/6217161/2006_1204_wrz_syn-war.and.wir.pen.tes.oct.200.ebo.bbl.izp.html[/color]
 

wrz.netz

Местный
Регистрация
10 Дек 2004
Сообщения
923
Реакции
840
Credits
88
1. Springer.Computer.Viruses.and.Malware.Jul.2006.eBook-BBL
2. Syngress.CD.and.DVD.Forensics.Dec.2006.eBook-BBL
3. Syngress.Configuring.Juniper.Networks.Netscreen.and.SSG.Firewalls.Nov.2006.eBook-BBL
4. Syngress.FISMA.Certification.and.Accreditation.Handbook.Nov.2006.eBook-BBL
5. Syngress.Google.Talking.Nov.2006.eBook-BBL
6. Syngress.Wireshark.and.Ethereal.Network.Protocol.Analyzer.Toolkit.Nov.2006.eBook-BBL





0387302360.01._SCMZZZZZZZ_V59355471_.jpg



Computer Viruses and Malware (Advances in Information Security)
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): John Aycock
ISBN: 0387302360
Publisher: Springer
Year: 2006
Pages: 227

Product Description
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers
from malicious software have never been a bigger concern. Computer Viruses and Malware draws together
hundreds of sources to provide an unprecedented view of malicious software and its countermeasures.
This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus
software. It also looks at the application of malicious software to computer crime and information warfare.
Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners
in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
eBook:Springer.Computer.Viruses.and.Malware.Jul.2006.eBook-BBL hash [V3ZYImkeMS/FTmS3ucpsxd4izvA]

file:2006_1205_wrz_spr-com.vir.and.mal.jul.200.ebo.bbl.izp (9642) KB

Код:
[color=magenta]http://rapidshare.com/files/6277907/2006_1205_wrz_spr-com.vir.and.mal.jul.200.ebo.bbl.izp.html[/color]


1597491284.01._SCMZZZZZZZ_V34022778_.jpg



CD and DVD Forensics
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Paul Crowley
ISBN: 1597491284
Publisher: Syngress Publishing
Year: 2006
Pages: 320

Product Description
Handle, Examine, and Process CD and DVD Evidence for Computer Forensics CD and DVD Forensics takes the
reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics.
At a time when data forensics is becoming a major part of law enforcement and prosecution in the public
sector, as well as corporate and system security and integrity in the private sector, the interest in
this subject has just begun to blossom. CD and DVD Forensics is a how-to book that gives the reader tools
to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public
and private sectors. Armed with this information, readers in law enforcement and corporate security
and private investigators will be more effective in performing their evidence-related tasks. The book
is divided into four basic parts:
CD and DVD "physics" dealing with the history, construction, and technology
of CD and DVD media.
File systems present on CDs and DVDs and how these are different from those which are
found on hard disks, floppy disks, and other media
Considerations for handling CD and DVD evidence to
both recover the maximum amount of information present on a disc and to do so without destroying or altering
the disc in any way.
Using the InfinaDyne product CD/DVD Inspector to examine discs in detail and to collect
evidence. eBook:Syngress.CD.and.DVD.Forensics.Dec.2006.eBook-BBL hash [igsj5aAjnyrewmJ4j7D95P46tf8]

file:2006_1205_wrz_syn-cd.and.dvd.for.dec.200.ebo.bbl.izp (4537) KB

Код:
[color=magenta]http://rapidshare.com/files/6277982/2006_1205_wrz_syn-cd.and.dvd.for.dec.200.ebo.bbl.izp.html[/color]


1597491187.01._SCMZZZZZZZ_V34058249_.jpg



Configuring Juniper Networks Netscreen & Ssg Firewalls
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Rob Cameron,Chris Cantrell,Anne Hemni,Lisa Lorenzin
ISBN: 1597491187
Publisher: Syngress Publishing
Year: 2006
Pages: 512

Product Description
Configuring Juniper Networks NetScreen & SSG Firewalls is the only complete reference to this family
of products. It covers all of the newly released features of the product line as highlighted by Juniper
Networks, including: Complete Coverage of Integrated Intrusion Prevention Step-by-Step Instructions
for Protecting Against Worms, Trojans, Spyware, and Malware Advanced Information on Virtualization
Technologies And coverage of important new updates: Deep inspection firewall, Centralized- policy-based
management, Built-in high availability features, & Rapid deployment features. eBook:Syngress.Configuring.Juniper.Networks.Netscreen.and.SSG.Firewalls.Nov.2006.eBook-BBL hash [2CmbHICyddmhd22IEUnQpSeuT/M]

file:2006_1205_wrz_syn-con.jun.net.net.and.ssg.fir.nov.200.ebo.bbl.izp (9702) KB

Код:
[color=magenta]http://rapidshare.com/files/6278129/2006_1205_wrz_syn-con.jun.net.net.and.ssg.fir.nov.200.ebo.bbl.izp.html[/color]


1597491160.01._SCMZZZZZZZ_V34022899_.jpg



Fisma Certification & Accreditation Handbook
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Laura Taylor
ISBN: 1597491160
Publisher: Syngress Publishing
Year: 2006
Pages: 504

Product Description
Complete Coverage of Federally Mandated Certification and Accreditation Requirements C&A is still
a nascent science, and although excellent guidance exists on how to evaluate the risk exposure of federal
information systems, agencies are still working on improving their C&A programs. C&A is, however, a
large endeavor. Although the process has been proven to reduce risk to federal information systems,
many folks new to C&A don't know where to start or how to get going on their C&A projects. Seasoned C&A experts
continue to look for new ideas on how to improve their existing processes. This book is the first publication
with numerous practical examples than can help you step through the C&A process from beginning to end.
I wish this book had existed while I was the Security Staff Director of the FDIC so that I could have provided
copies to my staff. - from the Foreword by Sunil J. Porter, Former Security Staff Director of the FDIC In
This Book You Will Find:
What Is Certification and Accreditation?
Types of Certification and Accreditation

Understanding the Certification and Accreditation Process
Establishing a Certification and Accreditation
Program
Developing a Certification Package
Preparing the Hardware and Software Inventory
Determining
the Certification Level
Performing and Preparing the Self-Assessment
Addressing Security Awareness
and Training Requirements
Addressing End-User Rules of Behavior
Addressing Incident Response

Performing the Security Tests and Evaluation
Conducting a Privacy Impact Assessment
Performing
the Business Risk Assessment Preparing the Business Impact Assessment Developing the Contingency
Plan Performing a System Risk Assessment Developing a Configuration Management Plan Preparing the
System Security Plan Submitting the C&A Package Evaluating the Certification Package for Accreditation
Addressing C&A Findings Improving Your Federal Computer Security Report Card Scores eBook:Syngress.FISMA.Certification.and.Accreditation.Handbook.Nov.2006.eBook-BBL hash [/mxhkQXPRxM7S0pOCzlpPGOeZiw]

file:2006_1205_wrz_syn-fis.cer.and.acc.han.nov.200.ebo.bbl.izp (4125) KB

Код:
[color=magenta]http://rapidshare.com/files/6278203/2006_1205_wrz_syn-fis.cer.and.acc.han.nov.200.ebo.bbl.izp.html[/color]


1597490555.01._SCMZZZZZZZ_V52640529_.jpg



Google Talking
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Johnny Long,Joshua Brashars
ISBN: 1597490555
Publisher: Syngress Publishing
Year: 2006
Pages: 304

Product Description
Are you tired of running a dozen programs to stay in touch with the people you care about? Are you looking
for a way to call back home, without spending an arm and a leg? Then you need to read Google Talking! Discover
the "Google way" to instant message your friends, with the power of voice and text! Make calls from your
computer to any phone in the world! When you pick up your phone and make a call, you can reach that person,
regardless of what phone company they use. Why should instant messaging be any different? Instant Messaging
has become the favorite way of internet users to stay in touch. But to keep in contact with friends across
several IM networks, you had to run a dozen different programs? Until now! Google Talk is Google's foray
into the Instant Messaging universe. In tradition with Google's embrace of the Open Source community,
Google Talk breaks free of proprietary messaging, allowing you to connect to the chat service of your
choice, without the need to install several different programs. You can also connect to Google's own
instant messaging networks with the Voice and Jabber-enabled client of your choice. eBook:Syngress.Google.Talking.Nov.2006.eBook-BBL hash [1tgr+L1IRYiCAS3ZaUkWH1j2rQw]

file:2006_1205_wrz_syn-goo.tal.nov.200.ebo.bbl.izp (6989) KB

Код:
[color=magenta]http://rapidshare.com/files/6277724/2006_1205_wrz_syn-goo.tal.nov.200.ebo.bbl.izp.html[/color]


1597490733.01._SCMZZZZZZZ_V36350714_.jpg



Wireshark & Ethereal Network Protocol Analyzer Toolkit
Для просмотра ссылки Войди или Зарегистрируйся

Product Details
Author(s): Angela D Orebaugh,Gilbert Ramirez,Jay Beale
ISBN: 1597490733
Publisher: Syngress Publishing
Year: 2006
Pages: 552

Product Description
Ethereal Network Protocol Analyzer Toolkit provides the reader with a completely integrated book and
companion Web site to analyze network traffic using Ethereal, the world's most popular network protocol
analyzer on Windows, Unix, and Apple OS X. This book covers everything from the fundamentals of protocol
analysis, to analyzing real world malicious code to programming advanced protocol dissectors. The
companion Web site for the book offers dozens of working tools and scripts created for this book. This
book provides complete information and step-by-step Instructions for analyzing protocols and network
traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available
today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple
environments including Windows, Unix and Mac OS X as well as building Ethereal from source and will also
be guided through Ethereal's graphical user interface. The following sections will teach readers to
use command-line options of Ethereal as well as using Tethereal to capture live packets from the wire
or to read saved capture files. This section also details how to import and export files between Ethereal
and WinDump, Snort, Snoop, Microsoft Network Monitor, and EtherPeek. The book then teaches the reader
to master advanced tasks such as creating sub-trees, displaying bitfields in a graphical view, tracking
requests and reply packet pairs as well as exclusive coverage of MATE, Ethereal's brand new configurable
upper level analysis engine. The final section to the book teaches readers to enable Ethereal to read
new Data sources, program their own protocol dissectors, and to create and customize Ethereal reports.
eBook:Syngress.Wireshark.and.Ethereal.Network.Protocol.Analyzer.Toolkit.Nov.2006.eBook-BBL hash [uRdwMy77n8Y+N1iLQRGgHW5DNNE]

file:2006_1205_wrz_syn-wir.and.eth.net.pro.ana.too.nov.200.ebo.bbl.izp (10906) KB

Код:
[color=magenta]http://rapidshare.com/files/6278403/2006_1205_wrz_syn-wir.and.eth.net.pro.ana.too.nov.200.ebo.bbl.izp.html[/color]
 
Статус
В этой теме нельзя размещать новые ответы.