X
تبلیغات
دانلود رایگان کتاب و نرم افزار - کتاب ها و مقالات
XML For Dummies by Lucinda Dykes

xml for dummies

Product Details
* Paperback: 384 pages
* Publisher: For Dummies; 4 edition (May 20, 2005)
* Language: English
* ISBN: 0764588451

Product Description
See how XML works for business needs and RSS feeds
Create consistency on the Web, or tag your data for different purposes
Tag -- XML is it! XML tags let you share your format as well as your data, and this handy guide will show you how. You'll soon be using this markup language to create everything from Web sites to business forms, discovering schemas and DOCTYPES, wandering the Xpath, teaming up XML with Office 2003, and more.

Discover how to
* Make information portable
* Use XML with Word 2003
* Store different types of data
* Convert HTML documents to XHTML
* Add CSS to XML
* Understand and use DTDs

Download Description
# " Offering the most recent XML core and related specifications including XML 1.1 and Microsoft Office 2003, this book is an ideal introductory resource on the basics of XML, the flexible way to create common information formats and share both the format and the data
# With more than 70 percent revised text, the new coverage includes how to use the XML features in Office 2003, a discussion of the many practical business applications for XML, and how to actually implement XML in a business setting
# Takes into account that XML is not exclusively for Web designers any longer and targets newcomers to XML who need to learn how to solve business issues as well as those who need practical XML solutions
# The companion Web site contains programming code, trial software packages, XML tools and parsers, and sample XSLT transforms
"

Book Info
Discover how to understand XML fundamentals, build document type definitions, style pages using XSL, work with XML linking languages, harness the latest XML applications and tools, and more. Softcover. --This text refers to an out of print or unavailable edition of this title.

From the Publisher
An ideal beginner's guide to XML! --This text refers to an out of print or unavailable edition of this title.

From the Back Cover
See how XML works for business needs and RSS feeds

Create consistency on the Web, or tag your data for different purposes
Tag — XML is it! XML tags let you share your format as well as your data, and this handy guide will show you how. You'll soon be using this markup language to create everything from Web sites to business forms, discovering schemas and DOCTYPES, wandering the Xpath, teaming up XML with Office 2003, and more.

Discover how to
* Make information portable
* Use XML with Word 2003
* Store different types of data
* Convert HTML documents to XHTML
* Add CSS to XML
* Understand and use DTDs

دانلود این کتاب:

دانلود کتاب

 

+ نوشته شده توسط big_bug در یکشنبه هفدهم شهریور 1387 و ساعت 0:11 |

 

Hacker Web Exploitation Uncovered

hacker web exploitation uncovered کتاب

Book info:
Hacker Web Exploitation Uncovered
by Marsel Nizamutdinov
A-LIST Publication
ebook format: CHM
ISBN-10:1931769494
Hacker Web Exploitation UncoveredPublisher: A-List Publishing
Language: english
ISBN: 1931769494
Paperback: 450 pages
Data: June 28, 2005
Format: CHM
Description: A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written from both from the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well as errors such as PHP source code injection, SQL injection, and XSS. The most common vulnerabilities in PHP and Perl scripts and methods of exploiting these weaknesses are described, information on writing intersite scripts and secure systems for the hosted sites, creating secure authorization systems, and bypassing authorization. Uncovered is how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.

This book is about vulnerabilities in Web applications, that is, scripts and programs running on a server and available using Hypertext Transfer Protocol (HTTP). It tries to give you the most comprehensive information about common mistakes made by inexperienced Web programmers. Hackers can exploit these mistakes to obtain access to a system, gain higher privileges in it, or both. It describes common weaknesses in the writing of web pages
This book is written from both the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well as errors such as PHP source code injection, SQL injection, and XSS. The most common vulnerabilities in PHP and Perl scripts and methods of exploiting these weaknesses are described, information on writing inter site scripts and secure systems for the hosted sites, creating secure authorization systems, and bypassing authorization. Uncovered is how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.
Download this digital version of book.
 
لینک دانلود این کتاب:
 
دانلود کتاب
 
 
+ نوشته شده توسط big_bug در جمعه یکم شهریور 1387 و ساعت 17:34 |
 

Hack Attacks Revealed

 کتاب آموزش هک hack attack revealed

ebook info:

Hack Attacks Revealed A Complete Reference with Custom Security Hacking Toolkit
by John Chirillo
Wiley Publications
ebook format: PDF
ISBN-10: 0-471-41624-X

Hack Attacks Revealed Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second EditionProduct Details * Paperback: 960 pages * Publisher: Wiley; 2 edition (August 21, 2002) * Language: English * ISBN-10: 0471232823 * ISBN-13: 978-0471232827 The much-anticipated second edition of the bestselling book that details network security through the hacker’s eye Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material.

Beat hackers at their own game — The world of a hacker revealed by a corporate hack master
Hack Attacks Revealed
Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box® system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.

In this highly provocative work, you’ll discover:
• The hacker’s perspective on networking protocols and communication technologies
• A complete hacker’s technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
• Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
• Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks

لینک دانلود این کتاب:


دانلود کتاب

 

+ نوشته شده توسط big_bug در پنجشنبه سی و یکم مرداد 1387 و ساعت 16:40 |

 

The Little Black Book of Computer Virus

کتاب the little black book of computer virus
 
کتاب جامع ویروس های کامپیوتری قابل استفاده دوست داران هک - برنامه نویسان و سازندگان نرم افزار
 
Computer viruses can be classified into several different types. The first and most common type is the virus which infects any application program. On IBM PC’s and clones running under PC-DOS or MS-DOS, most programs and data which do not belong to the operating system itself are stored as files. Each file has a file name eight characters long, and an extent which is three characters long. A typical file might be called “TRUE.TXT”, where “TRUE” is the name and “TXT” is the extent. The extent normally gives some information about the nature of a file—in this case “TRUE.TXT” might be a text file. Programs must always have an extent of “COM”, “EXE”, or “SYS”. Under DOS, only files with these extents can be executed by the central processing unit. If the user tries to execute any other type of file, DOS will generate an error and reject the attempt to execute the file. Since a virus’ goal is to get executed by the computer, it must attach itself to a COM, EXE or SYS file. If it attaches to any other file, it may corrupt some data, but it won’t normally get executed, and it won’t reproduce. Since each of these types of executable files has a different structure, a virus must be designed to attach itself to a particular type of file. A virus designed to attack COM files cannot attack EXE files, and vice versa, and neither can attack SYS files. Of course, one could design a virus that would attack two or even three kinds of files, but it would require a separate reproduction method for each file type. The next major type of virus seeks to attach itself to a specific file, rather than attacking any file of a given type. Thus, we might call it an application-specific virus. These viruses make use of a detailed knowledge of the files they attack to hide better than would be possible if they were able to infiltrate just any file. For example, they might hide in a data area inside the program rather than lengthening the file. However, in order to do that, the virus must know where the data area is located in the program, and that differs from program to program. This second type of virus usually concentrates on the files associated to DOS, like COMMAND.COM, since they are on virtually every PC in existence. Regardless of which file such a virus attacks, though, it must be very, very common, or the virus will never be able to find another copy of that file to reproduce in,and so it will not go anywhere. Only with a file like COMMAND.COM would it be possible to begin leaping from machine to machine and travel around the world. The final type of virus is known as a “boot sector virus.” This virus is a further refinement of the application-specific virus, which attacks a specific location on a computer’s disk drive, known as the boot sector. The boot sector is the first thing a computer loads into memory from disk and executes when it is turned on. By attacking this area of the disk, the virus can gain control of the computer immediately, every time it is turned on, before any other program can execute. In this way, the virus can execute before any other program or person can detect its existence.
 
لینک دانلود این کتاب:

DOWNLOAD
 
+ نوشته شده توسط big_bug در شنبه بیست و ششم مرداد 1387 و ساعت 0:6 |
 

Microsoft Visual C# 2005 Step by Step 

 

کتاب آموزش قدم به قدم microsoft visual c# 2005

آموزش قدم به قدم Visual C# 2005

Microsoft Visual C# is a powerful but simple language aimed primarily at developers creating applications by using the Microsoft .NET Framework. It inherits many of the best features of C++ and Microsoft Visual Basic, but few of the inconsistencies and anachronisms, resulting in a cleaner and more logical language. The advent of C# 2.0 has seen several important new features added to the language, including Generics, Iterators, and anonymous methods. The development environment provided by Microsoft Visual Studio 2005 makes these powerful features easy to use, and the many new wizards and enhancements included in Visual Studio 2005 can greatly improve your productivity as a developer.

The aim of this book is to teach you the fundamentals of programming with C# by using Visual Studio 2005 and the .NET Framework. You will learn the features of the C# language, and then use them to build applications running on the Microsoft Windows operating system. By the time you complete this book, you will have a thorough understanding of C# and will have used it to build Windows Forms applications, access Microsoft SQL Server databases, develop ASP.NET Web applications, and build and consume a Web service.

لینک دانلود این کتاب:


http://www.itstudy8.org/download.asp?id=6019

 

+ نوشته شده توسط big_bug در جمعه هجدهم مرداد 1387 و ساعت 12:17 |

 

Syngress - Hack Proofing your Network

کتاب hack proofing your network

Book info:
Hack Proofing your Network
by David R. Mirza Ahmad, Ido Dubrawsky, Hal Flynn,
Joseph “Kingpin” Grand, Robert Graham, Norris L. Johnson, Jr., K2,
Dan “Effugas” Kaminsky, F. William Lynch, Steve W. Manzuik, Ryan Permeh,
Ken Pfeil, Rain Forest Puppy, Syngress Publications,
ebook format: PDF
ISBN-10: 1-928994-70-9

Book Description
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some hole that you may have unintentionally left in.

Download Description
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some hole that you may have unintentionally left in. --This text refers to the Digital edition.

About the Author
Julie Traxler is a Senior Software Tester for an Internet software company. During her career, Julie has worked for such organizations as DecisionOne, EXE Technologies, and TV Guide. She has held several positions including Project Manager, Business Analyst, and Technical Writer and has specialized in software systems analysis and design. During her tenure at several organizations, Julie has worked to provide a starting point for software quality assurance and has helped to build QA teams and implement testing processes and strategies. The testing plans she has developed include testing for functionality, usability, requirements, acceptance, release, regression, security, integrity, and performance.

Called "a bold, unsparing tour of information that never serves from the practical", this updated and considerably expanded bestseller will quickly achieve top shelf placement on your information security bookshelf. Hack Proofing Your Network, Second Edition shows you that the only way to stop a hacker is to think like one.
- Know the Laws of Security
- Learn the Seven Categories of Attack
- Prevent Diffing
- Learn about Standard Cryptographic Algorithms
- Understand Format String Vulnerabilities
- Read About Session Hijacking Types
- Understand the Strategic Constraints of Tunnel Design
- Hack Proof Your Hardware
- Download a Free Sniffer from the Book's Web Site

Jeff Forristal is the Lead Security Developer for Neohapsis, a Chicago-based security solution/consulting firm. Apart from assisting in network security assessments and application security reviews (including source code review), Jeff is the driving force behind Security Alert Consensus, a joint security alert newsletter published on a weekly basis by Neohapsis, Network Computing, and the SANS Institute.

Kevin Ziese is a Computer Scientist at Cisco Systems, Inc. Prior to joining Cisco he was a Senior Scientist and Founder of the Wheelgroup Corporation, which was acquired by Cisco Systems in April of 1998. Prior to starting the Wheelgroup Corporation, he was Chief of the Advanced Countermeasures Cell at the Air Force Information Warfare Center.
 
لینک دانلود این کتاب:
 

 
+ نوشته شده توسط big_bug در پنجشنبه هفدهم مرداد 1387 و ساعت 16:42 |

 

JAVA SCRIPT : COMPLETE REFERENCE  2ND EDITION

 



 اینهم رفرنس کامل JAVA SCRIPT

Use this guide to get the most up to date JavaScript 2.0 coverage, including the latest features to use to make developing JavaScript easier and more flexible, and understand the JavaScript principles and develop more advanced JavaScript skills.
 

لینک دانلود این کتاب:

 


Download
+ نوشته شده توسط big_bug در سه شنبه پانزدهم مرداد 1387 و ساعت 0:40 |

 

JAVA SCRIPT FOR DUMMIES

 

 
کتاب آموزشی JAVA SCRIPT برای مبتدی ها !

Responding to reader feedback, the author has thoroughly revamped the book with more step-by-step coverage of JavaScript basics, an exclusive focus on Internet Explorer, and many complete sample scripts
*Updated to cover JavaScript 1.5, the latest release of this popular Web scripting language
*Using lots of examples, including a sample working Web site, the book shows how to create dynamic and interactive pages, build entire sites, and automate pages.

لینک دانلود این کتاب:

Download

 
+ نوشته شده توسط big_bug در سه شنبه پانزدهم مرداد 1387 و ساعت 0:6 |
 
eBOOK Photoshop CS3 All-in-One Desk Reference For Dummies
 
 
 eBOOK Details:
Publisher For Dummies
Release Date May 29, 2007
ISBN 047011195X

eBOOK Description
This free ebook is written for the person who has a good grasp of using a computer and navigating the operating system and at least a cursory knowledge of Photoshop. It is intended to be a comprehensive reference book that you can read cover to cover or reach for when you’re looking for specific information about a particular task.
Wherever I can, I sneak in a useful tip or an interesting technique to help you put Photoshop to work for your project needs. Sometimes, knowing how to use a tool doesn’t necessarily mean that you know what to do with it. That’s why this free ebook contains several Putting It Together exercises that help you make a connection between the multiple Photoshop tools at your disposal and the very specific task you need to accomplish. Want to get the red out of a subject’s eyes or create a collage? Just check out the Putting-It-Together sections in Books III through IX. These sections present info in easy-to-follow numbered steps, in a hands-on style, building on what’s presented in the chapter so that you can go to the next level, put concepts to work, and move on to the next task.
 
+ نوشته شده توسط big_bug در جمعه یازدهم مرداد 1387 و ساعت 21:38 |

 

کتاب آموزشی PHP

 

 

http://download4u.rack111.com/PHP_farsi_Ebook.zip

+ نوشته شده توسط big_bug در جمعه یازدهم مرداد 1387 و ساعت 21:26 |

 

McGraw Hill - 19 Deadly Sins of Software Security 

 

Book info:
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
by Michael Howard, David LeBlanc and John Viega
McGraw-Hill/Osborne Publication
ebook format: CHM
ISBN-10:0072260858

I read six books on software security recently, namely “Writing Secure Code, 2nd Ed” by Michael Howard and David LeBlanc; “19 Deadly Sins of Software Security” by Michael Howard, David LeBlanc, and John Viega; “Software Security” by Gary McGraw; “The Security Development Lifecycle” by Michael Howard and Steve Lipner; “High-Assurance Design” by Cliff Berg; and “Security Patterns” by Markus Schumacher, et al. Each book takes a different approach to the software security problem, although the first two focus on coding bugs and flaws; the second two examine development processes; and the last two discuss practices or patterns for improved design and implementation. My favorite of the six is Gary McGraw’s, thanks to his clear thinking and logical analysis. The other five are still noteworthy books. All six will contribute to the
production of more security software.

The main reason to read 19DS is to quickly become acquainted with various security problems facing software developers. At less than 300 pages, it’s not a thick tome like WSC2E. 19DS also is not afraid to mix bugs (coding errors, like buffer overflow conditions) with flaws (design problems, like “failing to protect network traffic.”) This sort of lax categorization bothers me (and Gary McGraw, as noted in his book “Software Security”), but it shouldn’t interfere with the quality content of 19DS.

Probably the most interesting aspect (to me) of 19DS was sin 10, which discussed problems with Secure Sockets Layer (SSL). The chapter didn’t describe algorithmic or protocol problems. Instead, it explained how programmers make poor assumptions about the features provided by their language of choice with respect to SSL. For example, many SSL libraries do not properly validate certificates. Without this functionality, the authors argue that SSL is almost worthless. While I don’t necessarily agree with this statement, I really like reading this sort of criticism. I’d like to note that p 134 berates Python’s ssl() but ignores pyOpenSSL, which probably provides the features the authors would want.

Other “sins” take slightly different looks at security issues. Sin 17, for example, explains the importance of key exchange AND authentication. These are the sorts of problems I imagine are only discovered by examining multiple real-world implementations, and I value the authors sharing their experiences.

I subtracted one star because the quality of the “sins” isn’t even. Some don’t adequately explain the problem at hand (e.g., integer overflows). If the authors assume the reader knows the problem well enough to not introduce it properly, then why discuss it at all?

Overall, however, 19DS is a great book to get to your developers. It’s short enough that they might actually read it, and the content is presented in a convincing enough manner to perhaps influence their coding choices.
+ نوشته شده توسط big_bug در جمعه یازدهم مرداد 1387 و ساعت 21:16 |


Powered By
BLOGFA.COM