1. Addison.Wesley.Cocoa.Programming.for.Mac.OS.X.3rd.Edition.May.2008.eBook-BBL
2. Addison.Wesley.Designing.and.Engineering.Time.May.2008.eBook-BBL
3. Addison.Wesley.Implementing.SOA.Total.Architecture.in.Practice.Apr.2008.eBook-BBL
4. Apress.Creating.Mac.Widgets.with.Dashcode.May.2008.eBook-BBL
5. Apress.Pro.Web.2.0.Application.Development.with.GWT.May.2008.eBook-BBL
6. Cambridge.Press.Security.and.Quality.of.Service.in.Ad.Hoc.Wireless.Networks.Mar.2008.eBook-BBL
7. IBM.Press.Executing.SOA.A.Practical.Guide.for.the.Service.Oriented.Architect.May.2008.eBook-BBL
8. OReilly.Head.First.Servlets.and.JSP.2nd.Edition.Mar.2008.eBook-BBL
9. OReilly.Windows.PowerShell.Pocket.Reference.May.2008.eBook-BBL
10. Prentice.Hall.Perl.by.Example.4th.Edition.Nov.2007.eBook-BBL
11. Syngress.Check.Point.NGX.R65.Security.Administration.Feb.2008.eBook-BBL
12. Syngress.Google.Hacking.for.Penetration.Testers.Volume.2.Nov.2007.eBook-BBL
Cocoa(R) Programming for Mac(R) OS X (3rd Edition)
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Aaron Hillegass
ISBN: 0321503619
ISBN-13: 9780321503619
Publisher: Addison-Wesley Professional
Year: 2008
Pages: 464
Product Description
The best-selling introduction to Cocoa, once again updated to cover the latest Mac programming technologies,
and still enthusiastically recommended by experienced Mac OS X developers. “Aaron’s
book is the gold standard for Mac OS X programming books—beautifully written, and thoughtfully sculpted.
The best book on Leopard development.” —Scott Stevenson,
Для просмотра ссылки Войди или Зарегистрируйся “This is
the first book I’d recommend for anyone wanting to learn Cocoa from scratch. Aaron’s one
of the few (perhaps only) full-time professional Cocoa instructors, and his teaching experience shows
in the book.” —Tim Burks, software developer and creator of the Nu programming language,
Для просмотра ссылки Войди или Зарегистрируйся
“If you’re a UNIX or Windows developer who picked up a Mac OS X machine recently in hopes of
developing new apps or porting your apps to Mac users, this book should be strongly considered as one of
your essential reference and training tomes.” —Kevin H. Spencer, Apple Certified Technical
Coordinator If you’re developing applications for Mac OS X,
Cocoa® Programming for Mac® OS
X, Third Edition, is the book you’ve been waiting to get your hands on. If you’re new
to the Mac environment, it’s probably the book you’ve been told to read first. Covering
the bulk of what you need to know to develop full-featured applications for OS X, written in an engaging
tutorial style, and thoroughly class-tested to assure clarity and accuracy, it is an invaluable resource
for any Mac programmer. Specifically, Aaron Hillegass introduces the three most commonly used Mac developer
tools: Xcode, Interface Builder, and Instruments. He also covers the Objective-C language and the major
design patterns of Cocoa. Aaron illustrates his explanations with exemplary code, written in the idioms
of the Cocoa community, to show you how Mac programs should be written. After reading this book, you will
know enough to understand and utilize Apple’s online documentation for your own unique needs.
And you will know enough to write your own stylish code. Updated for Mac OS X 10.4 and 10.5, this revised
edition includes coverage of Xcode 3, Objective-C 2, Core Data, the garbage collector, and CoreAnimation.
eBook:Addison.Wesley.Cocoa.Programming.for.Mac.OS.X.3rd.Edition.May.2008.eBook-BBL hash [HAb5iKVUhAilP6BUpt8HOT+czbs]
file:2008_0518_wrz_add-wes.coc.pro.for.mac.os.x.3rd.edi.may.200.ebo.bbl.izp (33,354) KB
Код:
[color=magenta]http://rapidshare.com/files/118098223/2008_0518_wrz_add-wes.coc.pro.for.mac.os.x.3rd.edi.may.200.ebo.bbl.izp.html
[/color]
Designing and Engineering Time: The Psychology of Time Perception in Software
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Steven C. Seow
ISBN: 0321509188
ISBN-13: 9780321509185
Publisher: Addison-Wesley Professional
Year: 2008
Pages: 224
Product Description
Build Applications, Websites, and Software Solutions that Feel Faster, More Efficient, and More Considerate
of Users’ Time! One hidden factor powerfully influences the way users react to your software,
hardware, User Interfaces (UI), or web applications: how those systems utilize users’
time.
Now, drawing on the nearly 40 years of human computer interaction research–including his own
pioneering work–Dr. Steven Seow presents state-of-the-art best practices for reflecting users’
subjective perceptions of time in your applications and hardware. Seow begins by introducing a simple
model that explains how users perceive and expend time as they interact with technology. He offers specific
guidance and recommendations related to several key aspects of time and timing–including user
tolerance, system responsiveness, progress indicators, completion time estimates, and more. Finally,
he brings together proven techniques for impacting users’ perception of time drawn from multiple
disciplines and industries, ranging from psychology to retail, animal research to entertainment.
• Discover how time and timing powerfully impact user perception, emotions, and behavior •
Systematically make your applications more considerate of users’ time • Avoid common mistakes
that consistently frustrate or infuriate users • Manage user perceptions and tolerance, and build
systems that are perceived as faster • Optimize “flow” to make users feel more productive,
empowered, and creative • Make reasonable and informed tradeoffs that maximize limited development
resources • Learn how to test usability issues related to time–including actual vs. perceived
task duration
Designing and Engineering Time is for every technology developer, designer,
engineer, architect, usability specialist, manager, and marketer. Using its insights and techniques,
technical and non-technical professionals can work together to build systems and applications that
provide far more value–
and create much happier users. Steven C. Seow has a unique combination
of experience in both experimental psychology and software usability. He joined Microsoft as a User
Researcher after completing his Ph.D. in Experimental Psychology at Brown University with a research
focus on human timing and information theory models of human performance. Seow holds Bachelor’s
and Master’s Degrees in Forensic Psychology from John Jay College of Criminal Justice, and wrote
his master’s thesis on distortions in time perception. For more information about Steven Seow
and his research, visit his website at
Для просмотра ссылки Войди или Зарегистрируйся. informit.com/aw
eBook:Addison.Wesley.Designing.and.Engineering.Time.May.2008.eBook-BBL hash [d0aDpeuxxuvFpX3YRW/PLNgF+6M]
file:2008_0518_wrz_add-wes.des.and.eng.tim.may.200.ebo.bbl.izp (4,137) KB
Код:
[color=magenta]http://rapidshare.com/files/118098513/2008_0518_wrz_add-wes.des.and.eng.tim.may.200.ebo.bbl.izp.html
[/color]
Implementing SOA : Total Architecture in Practice
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Paul C. Brown
ISBN: 0321504720
ISBN-13: 9780321504722
Publisher: Addison-Wesley Professional
Year: 2008
Pages: 736
Product Description
Putting Service-Oriented Architecture (SOA) into Practice“This book is a must-have for enterprise
architects implementing SOA. Through practical examples, it explains the relationship between business
requirements, business process design, and service architecture. By tying the SOA implementation
directly to business value, it reveals the key to ongoing success and funding.” —Maja Tibbling,
Lead Enterprise Architect, Con-way, Inc.“While there are other books on architecture and the
implementation of ESB, SOA, and related technologies, this new book uniquely captures the knowledge
and experience of the real world. It shows how you can transform requirements and vision into solid, repeatable,
and value-added architectures. I heartily recommend it.” —Mark Wencek, SVP, Consulting Services
& Alliances, Ultimo Software Solutions, Inc.In his first book, Succeeding with SOA, Paul Brown explained
that if enterprise goals are to be met, business processes and information systems must be designed together
as parts of a total architecture. In this second book, Implementing SOA, he guides you through the entire
process of designing and developing a successful total architecture at both project and enterprise
levels. Drawing on his own extensive experience, he provides best practices for creating services and
leveraging them to create robust and flexible SOA solutions. Coverage includes
Evolving the enterprise
architecture towards an SOA while continuing to deliver business value on a project-by-project basis
Understanding the fundamentals of SOA and distributed systems, the dominant architectural issues,
and the design patterns for addressing them
Understanding the distinct roles of project and enterprise
architects and how they must collaborate to create an SOA
Understanding the need for a comprehensive
total architecture approach that encompasses business processes, people, systems, data, and infrastructure
Understanding the strategies and tradeoffs for implementing robust, secure, high-performance, and
high-availability solutions
Understanding how to incorporate business process management (BPM)
and business process monitoring into the enterprise architectureWhether you’re defining an
enterprise architecture or delivering individual SOA projects, this book will give you the practical
advice you need to get the job done.
eBook:Addison.Wesley.Implementing.SOA.Total.Architecture.in.Practice.Apr.2008.eBook-BBL hash [X3I7vZ+QddeN8i0ijPw74V1ncUg]
file:2008_0518_wrz_add-wes.imp.soa.tot.arc.in.pra.apr.200.ebo.bbl.izp (9,840) KB
Код:
[color=magenta]http://rapidshare.com/files/118099143/2008_0518_wrz_add-wes.imp.soa.tot.arc.in.pra.apr.200.ebo.bbl.izp.html
[/color]
Creating Mac Widgets with Dashcode (Firstpress)
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): William Murray,Chris Pappas
ISBN: 1430209674
ISBN-13: 9781430209676
Publisher: Apress
Year: 2008
Pages: 96
Product Description
In 100 pages, you will learn to create and use widgets using Dashcode. Widgets are simple, typically small
applications for a specific purpose, such as a weather report, a calculator, a stock quote, and the like
that reside on the Mac Dashboard. Building these before Dashcode was time consuming though not hard;
but now, you can whip up a widget fast. Creating Mac Widgets with Dashcode teaches you how.
Up to date
with Leopard
The fast and easy way to learn to build widgets. You’ll be building widgets in an hour.
Dashcode makes widget development simple. What you’ll learn
Basics of Dashcode development
Using templates
Using JavaScript for more complex widgets
Including user input in your widget
Using
scripting with your widget
Importing data into your widget Who is this book for? Anyone interested in
taking a shot at doing widgets. Widgets are easy and are quite popular, so there are a lot of hackers interested
in doing it. Widgets can be built for a user’s specific needs, and you don’t need to be a programmer
to do it.
eBook:Apress.Creating.Mac.Widgets.with.Dashcode.May.2008.eBook-BBL hash [Dt0InTX0rZ8qMISZR/Uqz8ZTcRk]
file:2008_0518_wrz_apr-cre.mac.wid.wit.das.may.200.ebo.bbl.izp (7,461) KB
Код:
[color=magenta]http://rapidshare.com/files/118099642/2008_0518_wrz_apr-cre.mac.wid.wit.das.may.200.ebo.bbl.izp.html
[/color]
Pro Web 2.0 Application Development with GWT (Expert's Voice in Web Development)
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Jeff Dwyer
ISBN: 1590599853
ISBN-13: 9781590599853
Publisher: Apress
Year: 2008
Pages: 480
Product Description
The main focus of Pro Web 2.0 Application Development with GWT is a case study of a real Web 2.0 application
called ToCollege.net.
What you’ll learn:
You’ll take a full tour of a modern Web 2.0 startup’s
codebase. That’s 15,000 lines of source code that includes everything from Google Gears integration
to Acegi OpenID, Lucene full–text search, and Google Maps, all of it integrated with GWT 1.5.
Leveraging this book’s available source code, you’ll see the nitty–gritty details
of how to merge a modern Web 2.0 application stack including Hibernate, Spring, Spring MVC 2.5, SiteMesh,
and Freemarker together.
You’ll see how to wire GWT into an industry standard Maven build environment,
which will help you get up to speed quickly and avoid configuration headaches.
The great pitfall of many
Ajax applications is they’re mostly opaque to search engines. You’ll see the ToCollege.net
solution to this thorny problem.
Protection from XSS and XSRF attacks is beyond the scope of simple GWT
tutorials, but they are a real concern for a site like ToCollege.net. The book will cover the ToCollege.net
security architecture in detail. Who is this book for? This book is for developers who are ready to move
beyond small proof–of–concept sample applications and want to look at the issues surrounding
a real deployment of GWT. If you want to see what the guts of a full–fledged GWT application look
like, this is the book for you.
GWT 1.5 is a game–changing technology, but it doesn’t exist
in a bubble. Real deployments need to connect to your database, enforce authentication, provide protection
from security threats, and allow good search engine optimization.
To show you all this, this book looks
at the code behind a real live web site called ToCollege.net. This application specializes in helping
students who are applying to colleges, allowing them to manage their application process and compare
the rankings that they give to each school. It’s a slick application that’s ready for you
to sign up and use.
The audience for this book either owns another GWT book for the basic tutorials or is
comfortable using the online documentation and forums when they’re stuck, which allows this
book to move quickly and focus on answering the bigger architecture questions.
About the Apress Pro
Series The Apress Pro series books are practical, professional tutorials to keep you on and moving up
the professional ladder.
You have gotten the job, now you need to hone your skills in these tough competitive
times. The Apress Pro series expands your skills and expertise in exactly the areas you need. Master the
content of a Pro book, and you will always be able to get the job done in a professional development project.
Written by experts in their field, Pro series books from Apress give you the hard–won solutions
to problems you will face in your professional programming career.
eBook:Apress.Pro.Web.2.0.Application.Development.with.GWT.May.2008.eBook-BBL hash [dJbtMsl5gwV70irMI+fhTF2fCOQ]
file:2008_0518_wrz_apr-pro.web.2.0.app.dev.wit.gwt.may.200.ebo.bbl.izp (3,883) KB
Код:
[color=magenta]http://rapidshare.com/files/118099906/2008_0518_wrz_apr-pro.web.2.0.app.dev.wit.gwt.may.200.ebo.bbl.izp.html
[/color]
Security and Quality of Service in Ad Hoc Wireless Networks
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Amitabh Mishra
ISBN: 0521878241
ISBN-13: 9780521878241
Publisher: Cambridge University Press
Year: 2008
Pages: 194
Product Description
Ensuring secure transmission and good quality of service (QoS) in ad hoc wireless networks are key commercial
concerns. Focusing on practical potential solutions, this text covers security and QoS in these networks.
Starting with a review of the basic principles of ad hoc wireless networking, coverage progresses to
vulnerabilities, and the requirements and solutions necessary to tackle them. QoS in relation to ad
hoc networks is covered in detail, with specific attention to routing, QoS support in unicast communication,
and recent developments in the area. Secure routing, intrusion detection, security in WiMax networks
and trust management are also covered, the latter being based on principles and practice of key management
and authentication in distributed networks. Representing the state-of-the-art in ad hoc wireless
network security, this book is a valuable resource for researchers in electrical and computer engineering,
as well as practitioners in the wireless communications industry.
eBook:Cambridge.Press.Security.and.Quality.of.Service.in.Ad.Hoc.Wireless.Networks.Mar.2008.eBook-BBL hash [MFM6WFGZ07LF/pgeD4caPh/IGow]
file:2008_0518_wrz_cam-pre.sec.and.qua.of.ser.in.ad.hoc.wir.net.mar.200.ebo.bbl.izp (2,455) KB
Код:
[color=magenta]http://rapidshare.com/files/118100062/2008_0518_wrz_cam-pre.sec.and.qua.of.ser.in.ad.hoc.wir.net.mar.200.ebo.bbl.izp.html
[/color]
Executing SOA: A Practical Guide for the Service-Oriented Architect
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Norbert Bieberstein,Robert G. Laird,Keith Jones,Tilak Mitra
ISBN: 0132353741
ISBN-13: 9780132353748
Publisher: IBM Press
Year: 2008
Pages: 240
Product Description
The Expert, Practical Guide to Succeeding with SOA in the Enterprise In Executing SOA, four experienced
SOA implementers share realistic, proven, “from-the-trenches” guidance for successfully
delivering on even the largest and most complex SOA initiative. This book follows up where the authors’
best-selling Service-Oriented Architecture Compass left off, showing how to overcome key obstacles
to successful SOA implementation and identifying best practices for all facets of execution—technical,
organizational, and human. Among the issues it addresses: introducing a services discipline that supports
collaboration and information process sharing; integrating services with preexisting technology
assets and strategies; choosing the right roles for new tools; shifting culture, governance, and architecture;
and bringing greater agility to the entire organizational lifecycle, not just isolated projects. Executing
SOA is an indispensable resource for every enterprise architect, technical manager, and IT leader tasked
with driving value from SOA in complex environments. Coverage includes · Implementing SOA governance
that reflects the organization’s strategic and business focus · Running SOA projects successfully:
practical guidelines and proven methodologies around service modeling and design · Leveraging reusable
assets: making the most of your SOA repository · Enabling the architect to choose the correct tools and
products containing the features required to execute on the SOA method for service design and implementation
· Defining information services to get the right information to the right people at the right time · Integrating
SOA with Web 2.0 and other innovative products and solutions · Providing highly usable human interfaces
in SOA environments
eBook:IBM.Press.Executing.SOA.A.Practical.Guide.for.the.Service.Oriented.Architect.May.2008.eBook-BBL hash [OElymz17FnUP9f4kk1qqb9ouw34]
file:2008_0518_wrz_ibm-pre.exe.soa.a.pra.gui.for.the.ser.ori.arc.may.200.ebo.bbl.izp (5,258) KB
Код:
[color=magenta]http://rapidshare.com/files/118100386/2008_0518_wrz_ibm-pre.exe.soa.a.pra.gui.for.the.ser.ori.arc.may.200.ebo.bbl.izp.html
[/color]
Head First Servlets and JSP: Passing the Sun Certified Web Component Developer Exam (Brain-Friendly Guides)
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Bryan Basham,Kathy Sierra,Bert Bates
ISBN: 0596516681
ISBN-13: 9780596516680
Publisher: O'Reilly Media, Inc.
Year: 2008
Pages: 911
Product Description
Looking to study up for the new J2EE 1.5 Sun Certified Web Component Developer (SCWCD) exam? This book
will get you way up to speed on the technology you'll know it so well, in fact, that you can pass the brand
new J2EE 1.5 exam. If that's what you want to do, that is. Maybe you don't care about the exam, but need to
use servlets and JSPs in your next project. You're working on a deadline. You're over the legal limit for
caffeine. You can't waste your time with a book that makes sense only AFTER you're an expert (or worse,
one that puts you to sleep). Learn how to write servlets and JSPs, what makes a web container tick (and what
ticks it off), how to use JSP's Expression Language (EL for short), and how to write deployment descriptors
for your web applications. Master the c
ut tag, and get a handle on exactly what's changed since the older
J2EE 1.4 exam. You don't just pass the new J2EE 1.5 SCWCD exam, you'll understand this stuff and put it to
work immediately. Head First Servlets and JSP doesn't just give you a bunch of facts to memorize; it drives
knowledge straight into your brain. You'll interact with servlets and JSPs in ways that help you learn
quickly and deeply. And when you're through with the book, you can take a brand-new mock exam, created
specifically to simulate the real test-taking experience.
eBook:OReilly.Head.First.Servlets.and.JSP.2nd.Edition.Mar.2008.eBook-BBL hash [dVoC+tvmMXEq7LHV36wIYALvGZs]
file:2008_0518_wrz_ore-hea.fir.ser.and.jsp.2nd.edi.mar.200.ebo.bbl.izp (29,280) KB
Код:
[color=magenta]http://rapidshare.com/files/118093425/2008_0518_wrz_ore-hea.fir.ser.and.jsp.2nd.edi.mar.200.ebo.bbl.izp.html
[/color]
Windows PowerShell Pocket Reference: Pocket Reference
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Lee Holmes
ISBN: 0596521782
ISBN-13: 9780596521783
Publisher: O'Reilly Media, Inc.
Year: 2008
Pages: 174
Product Description
This portable reference to Windows PowerShell summarizes both the command shell and scripting language,
and provides a concise reference to the major tasks that make PowerShell so successful. It's an ideal
on-the-job tool for Windows administrators who don't have time to plow through huge books or search online.
Written by Microsoft PowerShell team member Lee Holmes, and excerpted from his Windows PowerShell Cookbook,
Windows PowerShell Pocket Reference offers up-to-date coverage of PowerShell's 1.0 release. You'll
find information on .NET classes and legacy management tools that you need to manage your system, along
with chapters on how to write scripts, manage errors, format output, and much more. Beginning with a whirlwind
tour of Windows PowerShell, this convenient guide covers:
PowerShell language and environment
Regular
expression reference
PowerShell automatic variables
Standard PowerShell verbs
Selected .NET
classes and their uses
WMI reference
Selected COM objects and their uses
.NET string formatting
.NET datetime formatting An authoritative source of information about PowerShell since its earliest
betas, Lee Holmes' vast experience lets him incorporate both the "how" and the "why" into the book's discussions.
His relationship with the PowerShell and administration community -- through newsgroups, mailing
lists, and his informative blog Lee Holmes -- gives him insight into problems faced by administrators
and PowerShell users alike. If you're ready to learn this powerful tool without having to break stride
in your routine, this is the book you want.
eBook:OReilly.Windows.PowerShell.Pocket.Reference.May.2008.eBook-BBL hash [nrzTCh0hm0ktbRT90vAkQHfI87Q]
file:2008_0518_wrz_ore-win.pow.poc.ref.may.200.ebo.bbl.izp (466) KB
Код:
[color=magenta]http://rapidshare.com/files/118093473/2008_0518_wrz_ore-win.pow.poc.ref.may.200.ebo.bbl.izp.html
[/color]
Perl by Example (4th Edition) (By Example)
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Ellie Quigley
ISBN: 0132381826
ISBN-13: 9780132381826
Publisher: Prentice Hall PTR
Year: 2007
Pages: 1008
Product Description
“I picked up a copy of
JavaScript by Example over the weekend and wanted to thank you for
putting out a book that makes JavaScript easy to understand. I’ve been a developer for several
years now and JS has always been the “monster under the bed,” so to speak. Your book has answered
a lot of questions I’ve had about the inner workings of JS but was afraid to ask. Now all I need is a
book that covers Ajax and Coldfusion. Thanks again for putting together an outstanding book.”
–
Chris Gomez, Web services manager, Zunch Worldwide, Inc. “I have been reading
your
UNIX® Shells by Example book, and I must say, it is brilliant. Most other
books do not cover all the shells, and when you have to constantly work in an organization that uses tcsh,
bash, and korn, it can become very difficult. However, your book has been indispensable to me in learning
the various shells and the differences between them…so I thought I’d email you, just to let you
know what a great job you have done!” –
Farogh-Ahmed Usmani, B.Sc. (Honors), M.Sc.,
DIC, project consultant (Billing Solutions), Comverse “I have been learning Perl for about
two months now; I have a little shell scripting experience but that is it. I first started with
Learning
Perl by O’Reilly. Good book but lacking on the examples. I then went to
Programming Perl
by Larry Wall, a great book for intermediate to advanced, didn’t help me much beginning Perl.
I then picked up
Perl by Example, Third Edition–this book is a superb, well-written programming
book. I have read many computer books and this definitely ranks in the top two, in my opinion. The examples
are excellent. The author shows you the code, the output of each line, and then explains each line in every
example.” –
Dan Patterson, software engineer, GuideWorks, LLC “Ellie
Quigley has written an outstanding introduction to Perl, which I used to learn the language from scratch.
All one has to do is work through her examples, putz around with them, and before long, you’re relatively
proficient at using the language. Even though I’ve graduated to using
Programming Perl by
Wall et al., I still find Quigley’s book a most useful reference.” –
Casey Machula,
support systems analyst, Northern Arizona University, College of Health and Human Services “When
I look at my bookshelf, I see eleven books on Perl programming.
Perl by Example, Third Edition, isn’t
on the shelf; it sits on my desk, where I use it almost daily. When I bought my copy I had not programmed in
several years and my programming was mostly in COBOL so I was a rank beginner at Perl. I had at that time purchased
several popular books on Perl but nothing that really put it together for me. I am still no pro, but my book
has many dog-eared pages and each one is a lesson I have learned and will certainly remember. “I
still think it is the best Perl book on the market for anyone from a beginner to a seasoned programmer using
Perl almost daily.” –
Bill Maples, network design tools and automations analyst, Fidelity
National Information Services “We are rewriting our intro to OS scripting course and selected
your text for the course. It’s an exceptional book. The last time we considered it was a few years
ago (second edition). The debugging and system administrator chapters at the end nailed it for us.”
–
Jim Leone, Ph.D., professor and chair, Information Technology, Rochester Institute of
Technology “Quigley’s book acknowledges a major usage of PHP. To write some kind of
front end user interface program that hooks to a back end MySQL database. Both are free and open source,
and the combination has proved popular. Especially where the front end involves making an HTML web page
with embedded PHP commands. “Not every example involves both PHP and MySQL. Though all examples
have PHP. Many demonstrate how to use PHP inside an HTML file. Like writing user-defined functions, or
nesting functions. Or making or using function libraries. The functions are a key idea in PHP, that take
you beyond the elementary syntax. Functions also let you gainfully use code by other PHP programmers.
Important if you are part of a coding group that has to divide up the programming effort in some manner.”
–
Dr. Wes Boudville, CTO, Metaswarm Inc. The World’s Easiest Perl Tutorial–Fully
Updated!
Perl by Example, Fourth Edition, is the easiest, most hands-on way
to learn Perl. Legendary Silicon Valley programming instructor Ellie Quigley has thoroughly updated
her classic to deliver the skills and information today’s Perl users need most–including
all-new coverage of MySQL database programming and a Perl QuickStart designed to get experienced users
up and running fast. Quigley illuminates every technique with focused, classroom-tested code examples,
detailed line-by-line explanations, and real program output. This exceptionally clear, easy-to-understand
book takes you from your first Perl script to database-driven applications. It’s the only Perl
book you’ll ever need! New in this edition: Perl programming QuickStart: makes first-time Perl
programmers productive in just twenty pages All-new chapter on using the Perl DBI with the MySQL database–plus
an easy SQL primer to quickly get you started programming any database New introductions to Perl in biology
(bioinformatics) and to mod_perl, a Perl interpreter embedded in the Apache server, which allows you
to create fast, dynamic content; manage the Apache server; authenticate users; and much more Completely
updated: Includes many new and completely rewritten code examples Contains fully revised CGI coverage
for building dynamic Web sites with Perl Covers modern Perl 5.8 concepts and principles–and provides
a great foundation for Perl 6 More than 30,000 sysadmins, power users, and developers have used previous
editions of
Perl by Example to become expert Perl programmers. With
Perl by Example, Fourth
Edition, you can, too–even if you’re completely new to Perl. After you’ve
become an expert, you’ll turn to this book constantly as the best source for reliable answers,
solutions, and code. About the CD-ROM: The CD-ROM includes all code and files for this book’s hundreds
of example scripts.
eBook:Prentice.Hall.Perl.by.Example.4th.Edition.Nov.2007.eBook-BBL hash [zVYj3WwCi3lQXaVQqHhwXF8cwm0]
file:2008_0518_wrz_pre-hal.per.by.exa.4th.edi.nov.200.ebo.bbl.izp (11,218) KB
Код:
[color=magenta]http://rapidshare.com/files/118094364/2008_0518_wrz_pre-hal.per.by.exa.4th.edi.nov.200.ebo.bbl.izp.html
[/color]
Check Point NGX R65 Security Administration
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Ralph Bonnell
ISBN: 1597492450
ISBN-13: 9781597492454
Publisher: Syngress
Year: 2008
Pages: 800
Product Description
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which
has over 750,000 registered users. Check Point's NGX is the underlying security software platform for
all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all
sizes to reduce the cost and complexity of security management and ensure that their security systems
can be easily extended to adapt to new and emerging threats. This title is a continuation of Syngress'
best-selling references on Check Point's market leading Firewall and VPN products.* First book to market
covering Check Point?s new, flagship NGX R65 Firewall/VPN. * Provides bonus coverage for Check Point?s
upcoming NGX R65 Certification exams.* Companion Web site offers customized scripts for managing log
files.
eBook:Syngress.Check.Point.NGX.R65.Security.Administration.Feb.2008.eBook-BBL hash [QeXjVWH7ssxWB8nENgLaiRHUEW8]
file:2008_0518_wrz_syn-che.poi.ngx.r65.sec.adm.feb.200.ebo.bbl.izp (8,202) KB
Код:
[color=magenta]http://rapidshare.com/files/118095047/2008_0518_wrz_syn-che.poi.ngx.r65.sec.adm.feb.200.ebo.bbl.izp.html
[/color]
Google Hacking for Penetration Testers, Volume 2
Для просмотра ссылки Войди или Зарегистрируйся
Product Details
Author(s): Johnny Long
ISBN: 1597491764
ISBN-13: 9781597491761
Publisher: Syngress
Year: 2007
Pages: 448
Product Description
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search
after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush
from sharing those queries and trading screenshots of their findings. I know because Ive seen it with
my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums
at
Для просмотра ссылки Войди или Зарегистрируйся, I am constantly amazed at what the Google hacking community comes
up with. It turns out the rumors are truecreative Google searches can reveal medical, financial, proprietary
and even classified information. Despite government edicts, regulation and protection acts like HIPPA
and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out
onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new
volume of information.Johnny Long Learn Google Searching BasicsExplore Googles Web-based Interface,
build Google queries, and work with Google URLs. Use Advanced Operators to Perform Advanced QueriesCombine
advanced operators and learn about colliding operators and bad search-fu. Learn the Ways of the Google
HackerSee how to use caches for anonymity and review directory listings and traversal techniques. Review
Document Grinding and Database DiggingSee the ways to use Google to locate documents and then search
within the documents to locate information. Understand Googles Part in an Information Collection
FrameworkLearn the principles of automating searches and the applications of data mining. Locate
Exploits and Finding TargetsLocate exploit code and then vulnerable targets. See Ten Simple Security
SearchesLearn a few searches that give good results just about every time and are good for a security assessment. Track
Down Web ServersLocate and profile web servers, login portals, network hardware and utilities. See
How Bad Guys Troll for DataFind ways to search for usernames, passwords, credit card numbers, social
security numbers, and other juicy information. Hack Google ServicesLearn more about the AJAX Search
API, Calendar, Blogger, Blog Search, and more.
eBook:Syngress.Google.Hacking.for.Penetration.Testers.Volume.2.Nov.2007.eBook-BBL hash [g+k9TKikq3LuYdb8K1CQkb5aiFA]
file:2008_0518_wrz_syn-goo.hac.for.pen.tes.vol.2.nov.200.ebo.bbl.izp (12,248) KB
Код:
[color=magenta]http://rapidshare.com/files/118095930/2008_0518_wrz_syn-goo.hac.for.pen.tes.vol.2.nov.200.ebo.bbl.izp.html
[/color]