IT Books : The Code Book: How to Make It, Break It, Hack It, Crack It

Thursday, September 02, 2010

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War, Simon Singh follows the evolution of secret writing.

Delacorte Press | ISBN: 0385730624 | PDF | 272 pages | 2 MB

Download :

http://www.megaupload.com/?d=UK7Y6KIV

password : learning.ge

IT Books : Peer to Peer Application Development: Cracking the Code

This book discusses the design, implementation, and coding of the peer-to-peer programming model (P2P).

Part of the new Cracking the Code Series, Peer to Peer Application Development takes a look at the code behind Napster-style Peer to Peer (P2P) applications. This book covers complete web application with design specifications, flow diagrams and source code with line-by-line explanations. You'll build a completely functional P2P application and clients with audio/video streaming, chat and wireless capabilities. Other topics covered include building the P2P Server, building clients in C# and Java, XML data, wireless integration and more!

Hungry Minds | 2001 | ISBN: 0764549049 | 357 pages | PDF | 8,1 MB

Download :

http://www.4shared.com/file/DXSfqVkV/Peer-to-Peer_Application_Devel.html

Password : learning.ge

IT Books : Build a Website for Free

Build yourself a state-of-the-art website.It’s incredibly easy... and it won’t cost you a dime! You need a website. But you don’t need the hassles that usually go with building one, or the expense of hiring someone else to do it. Here’s your solution: Build a Website for Free! You’ll learn how you can use new Web 2.0 technologies to create a site that’s impressive and effective. And here’s the best part: You’ll do it all with software and tools that won’t cost you a dime!

Que | 2009 | ISBN: 0789739216 | 360 pages | PDF | 12,5 MB  


Password : learning.ge



IT Books : Handbook: Learn how to hack and what it takes to crack even the most secure systems!

The information given in this underground handbook will put you into a hacker's mindset and teach you all of the hacker's secret ways. The Hacker's Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows hacking, wireless hacking, web hacking and malware. Each topic is introduced with an easy to follow, real-world example. The book is written in simple language and assumes the reader is a complete beginner.


Password : learning.ge

IT Books : Thinking in C#

The comprehensive guide to C sharp for the .NET developer -- written by best-selling authors Larry OBrien and Bruce Eckel.
Written in the proven style of Eckels award winning Thinking In Java!
Hundreds of self-contained example programs move the reader to test, extend, and apply lessons learned.
Shows what works/ how concepts like objects, patterns and coupling lead to programs that are short, simple to understand and exciting to build/run. This book uses the award winning structure of TIJ while delivering entirely news programs that explore the hottest areas of Windows programming- Web Services, shell programs, system services, and multimedia. Thinking in C# gives the reader both the content and the context they need to become professionally competent at programming .NET programs of all types, including components, desktop applications, and Web Services. Hundreds of self-contained example programs make it possible for readers to immediately test, extend, and apply lessons learned, while gradually building skills that start from a foundation of facts to practical application and extend to the synthesis of new approaches in their real-world jobs. Thinking in C# provides a comprehensive guide to the new language preferred for programming Microsofts new .NET Framework. Thinking in Java was the winner of the 1995 Jolt Award and the 2000 Best Book JavaWorld Readers Choice Award!
Larry OBrien is very well known in the development community as the founder and Editor of Software Development Magazine, and author of columns for Java Pro magazine and SD Times. In addition to writing and speaking, OBrien is one of the most prolific developers of Web Services. Bruce Eckel is the author of TIJ which won the Software Development Jolt Award for best book in 1995. Hes been professionally programming for 20 years and has been teaching how to program with objects since 1986. He was a voting member of the C++ Standards Committee, has written 5 other books on object-oriented programming, published over 150 articles, and he is a columnist for various computer magazines.
Password:    learning.ge

IT Books : Certified Ethical Hacker Exam Prep

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam.                                                                                                                                      Download :                                                                                                                                                                                                             http://www.megaupload.com/?d=J0H5PIND                                                                                                                                                       Password: learning.ge 
                                                                                                                                                                                                                   
 

IT Books : Hacker's Beware: The Ultimate Guide to Network Security


In Hackers Beware, Eric Cole succeeds in explaining how hackers break into computers, steal information, and deny services to machines' legitimate users. An intended side effect of his documentary efforts is a feeling for how network-connected computers should be configured for maximum resistance to attack. Cole, who works with the attack-monitoring SANS Institute as an instructor and security consultant, conveys to his readers specific knowledge of offensive and defensive weaponry as well as general familiarity with attack strategies and good security practices. Hackers Beware is a good primer and really earns its price by going into enough detail to enable readers to actually do something to make their resources safer. It also enables its readers to understand more specialized security texts, including Stephen Northcutt's fine Intrusion Signatures and Analysis.
Cole's didactic style is largely conversational, embracing the fact that most computer exploits can be conveyed as stories about what hackers want and the steps they take to achieve their goals. He punctuates his prose passages with line drawings that clarify what gets passed among the machines involved in an attack, and pauses frequently to show programs' user interfaces and passages from their logs. Cole explains all the jargon he uses--a characteristic that alone distinguishes this book from many of its competitors. --David Wall
Topics covered: What motivates black-hat hackers, and the technical means they use to go about satisfying their ambitions. General attack strategies--spoofing, password cracking, social engineering, and buffer overflows, among others--are explained, and the tools used to carry them out are catalogued. The same goes for defensive tools and practices. 
Downloads:

http://www.megaupload.com/?d=URA20B55

Password: learning.ge




IT Books : Expert PHP and MySQL


Best practices and expert techniques for today's most demanding apps 
As the world's most popular, general purpose, open source scripting language, PHP is frequently used with MySQL to create high-traffic, mission-critical applications. This indispensable book shares proven, author-tested best practices and expert techniques that can be applied to even the most demanding MySQL-driven PHP apps. You'll explore ways to extend MySQL with user-defined functions, write PHP extensions, and solve problems when PHP and MySQL alone are not enough and other techniques or third-party tools are necessary. 

Expert PHP and MySQL: 
Reviews essential techniques, such as design patterns, complex queries, and advanced regular expression 
Addresses advanced PHP concepts, such as iterators and closures 
Demonstrates using Gearman for multitasking in your web applications 
Discusses caching using memcached with MySQL and your PHP web applications 
Discusses ways to create PHP Extensions and MySQL User Defined Functions 
Shows how to use Sphinx for search functionality in your PHP web applications 
Wrox Expert books present the wisdom accumulated by an experienced author team who is recognized as experts by the programming community. These experts challenge professional developers to examine their current practices in pursuit of better results. 


Password: learning.ge

IT Books : SQL Clearly Explained

Although the core of the SQL language remains relatively unchanged, the most recent release of the SQL standard (SQL:2008) includes two sets of extensions: 1) support for object-relational databases and 2) support for XML. The second edition of this book included some material about the object-relational extensions. However, that set of commands has been greatly extended and the new edition takes that into account. The XML extensions are entirely new to the third edition. A chapter on basic relational concepts will be also added to broaden the audience and make the book more complete in its own right.

All of the chapters will be revised to be sure they are up to date. Chapter 10 ("Views, Temporary Tables, and Indexes") from the second edition will be expanded to include common table expression (CTEs). The material in the existing Chapter 14 ("Unimplemented SQL-92 Features 251") will be disbursed through the chapters where the particular type of operation is discussed. While the content throughout will be updated where necessary, the existing organizational structure through chapter 14 will remain largely intact because this coverage represents the stable portion of the SQL language. 

Password: learning.ge

Books : The Encyclopedia of Demons and Demonology

This is the truth about demons and demonology - in more than 400 entries. The conflict between good and evil can be found in every culture, mythical tradition, and religion throughout history. In many cases, the source of evil has been personified as demons or devils, and in many belief systems, both are considered to be real entities operating outside the boundaries of the physical world to torment people or lead them astray. In some traditions demons are believed to be the direct opposite of angels, working against the forces of good and challenging them. Real or not, demons are at the heart of many fascinating beliefs and traditions, several of which are widely held today. "The Encyclopedia of Demons and Demonology" explores this dark aspect of folklore and religion and the role that demons play in the modern world. This comprehensive resource presents more than 400 entries and more than 80 black-and-white photographs documenting beliefs about demons and demonology from ancient history to the present. The key topics covered include: Demons in different cultural and religious traditions; Demons in folklore and popular culture; Exorcism and other means of confronting demons; Historical cases of possession and demon activity; The history of demonology; Magic and witchcraft; Possession and other demonic phenomena; Modern-day demonologists and exorcists; Strange creatures and entities related to demons; and, Types of demons.

Password: learning.ge


Children's Books : First Children's Encyclopedia (First Reference)

 Discover everything you ever wanted to know about anything with this first reference for young readers and writers. This is an inspiring and comprehensive collection of the best in the "DK First Reference" series, all gathered together in one superb volume. From prehistoric life to space travel, bacteria to the human brain help, your child discover all about the world we live in. They'll discover how life on Earth began, how the human body works, how people lived in Ancient Egypt, why some dinosaurs were so huge, what makes machines work, the countries of the world and much, much more. Full of fantastic photos, bite-sized facts and quiz questions kids will love getting their teeth into, there's lots to see and explore. This title is perfect for homework or just for fun. Go ahead; let your child find out more about everything.


Password: learning.ge

Books : Encylcopaedia of Vampire Mythology


From the earliest days of oral history to the present, the vampire myth persists among mankind's deeply-rooted fears. This encyclopedia, with entries ranging from "Abchanchu" to "Zmeus," includes nearly 600 different species of historical and mythological vampires, fully described and detailed.

Download:


Password: learning.ge

Books : Encyclopedia of Adventure Fiction

Adventure stories filled with danger, action, and unusual events have been popular with readers from ancient times to the present day. The new "A-to-Z Encyclopedia of Adventure Fiction" covers the very best of adventure fiction, from literary classics such as Charles Dickens' "A Tale of Two Cities" and Joseph Conrad's "The Secret Agent" to tales that have enthralled younger readers for many years, such as "Treasure Island" and "The Wizard of Oz", to the finest of today's adventure stories. Written by a well-known writer of horror and science fiction, this essential reference to the great works and writers of adventure fiction is sure to delight and intrigue any reader.

Download:   


Password: learning.ge

Books : The Mafia Encyclopedia

They're all there, starting with Anthony Joseph Accardo (1906-1992), the Chicago mob leader known as Tony to crime pals, Mr. Accardo to underlings, Joe Batters to his subordinates, and as "having more brains before breakfast than Al Capone had all day" to syndicate supporters, and working through the alphabet to Abner "Longy" Zwillman (1899-1959), a crime-syndicate founder and New Jersey boss, one of the most feared of the Jewish Mafia, known as the "Al Capone of new Jersey," and much revered for his love affair with Jean Harlow.

Between Accardo and Zwillman, Carl Sifakis explores the lives, reputations, exploits, and subcultures of more than 450 Mafia perpetrators and personalities. Sifakis describes the individuals, codes of behavior, misdeeds, legal scrapes, rivalries, and flamboyant lifestyles associated with the world of organized crime--an entity whose existence J. Edgar Hoover denied for 30 years. Sifakis's research is thorough, and his subjects are nefarious and riveting. It's his feel for storytelling, however, that makes his encyclopedia so enjoyable. He writes about infamous characters such as Al Capone (who felt his bootlegging was merely a public service) and John Gotti (a.k.a. the Teflon Don, who's now serving a life sentence) as well as the Mafia Social Clubs, Donnie Brasco (the FBI agent who infiltrated the mob and sent more than 100 mobsters to prison), and the importance of slot machines to the post-Prohibition welfare of organized crime.

With nearly 100 pictures and illustrations, Sifakis's mob opus is required reading for Mafia buffs, and a remarkably engaging guide for anyone interested in a factual report on organized crime. --Stephanie Gold.
 
Download Links:
Password: learning.ge

Kindle Wireless Reading Device, Wi-Fi, 6" Display, Graphite - Latest GenerationKindle Wireless Reading Device, Wi-Fi, 6" Display, Graphite - Latest Generation

.sidebar { height:200px; overflow:auto; }