FileMood

Download Collection Of Various Computer Related Books June 05 2007

Collection Of Various Computer Related Books June 05 2007

Name

Collection Of Various Computer Related Books June 05 2007

 DOWNLOAD Copy Link

Total Size

2.0 GB

Total Files

279

Hash

4E9D23F83EB7468FC010CB5693E31A51267666B9

/

(EBOOK - ENG - TELECOMUNICAZIONI) Wiley - The UMTS Network and Radio Access Technology - Air Interface Techniques for Future Mobile Systems.pdf

8.1 MB

(ebook pdf) Teach Yourself TCP-IP in 14 Days 2nd Edition.pdf

1.4 MB

100 Linux Tips And Tricks.pdf

1.2 MB

A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks.pdf

54.2 KB

A Little Bit about Buffer Overflows.pdf

17.2 KB

Absolute Beginner's Guide to Networking, Fourth Edition.chm

7.5 MB

Absolute Beginners Guide To Microsoft Windows XP, Second Edition.chm

14.9 MB

Active Directory Cookbook, 2nd Edition.chm

2.1 MB

Advanced Bash Shell Scripting Gude.pdf

4.8 MB

Advanced SQL Injection In SQL Server Applications.pdf

298.0 KB

Advanced Wireless Networks - 4G Technologies.pdf

21.9 MB

Alternate Data Streams in NTFS.pdf

16.8 KB

An Example of the RSA Algorithm.pdf

16.4 KB

Analysis of a Telnet Session Hijack via Spoofed MAC Addresses.pdf

29.6 KB

Anti-Hacker Tool Kit, Second Edition.chm

30.2 MB

Apache Phrase Book - Essential Code and Commands.chm

476.6 KB

Applied Microsoft .Net Framework Programming.pdf

4.4 MB

Beating IT Risks.pdf

3.2 MB

Blindfolded SQL Injection.pdf

306.7 KB

Bluetooth Security.pdf

1.6 MB

Broadband Packet Switching Technologies.pdf

14.9 MB

Broadband Telecommunications Handbook.pdf

48.3 MB

Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf

5.6 MB

Building DMZs for Enterprise Networks.pdf

12.2 MB

Bulletproof Wireless Security - GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering).pdf

3.5 MB

Bypassing Firewalls Tools and Techniques.pdf

36.3 KB

C# Programming Primer.pdf

4.3 MB

C++ Cookbook.chm

876.8 KB

C++ How to Program, Fifth Edition.chm

10.7 MB

Cabling - The Complete Guide to Network Wiring.pdf

17.5 MB

Certified Ethical Hacker Exam Prep.chm

8.7 MB

Cisco - Password Recovery Procedures.pdf

23.8 KB

CISSP - Certified Information Systems Security Professional Study Guide, Third Edition.pdf

14.9 MB

Cleaning Windows XP For Dummies.pdf

8.9 MB

CompTIA Security+ Certification.chm

1.3 MB

Computer Networks, Fourth Edition.chm

9.0 MB

Content Networking - Architecture, Protocols, and Practice.pdf

8.1 MB

Coreldraw 12 The Official Guide.pdf

17.8 MB

Cross-Site Scripting.pdf

618.3 KB

Crypto - How the Code Rebels Beat the Government - Saving Privacy in the Digital Age.pdf

2.1 MB

CYA - Securing Exchange Server 2003 and Outlook Web Access.pdf

9.6 MB

CYA - Securing IIS 6.0.pdf

9.3 MB

Cyber Terrorism - Political And Economic Implications.pdf

25.4 MB

Datacom overview.pdf

405.8 KB

DDOS Attack Tools.pdf

292.8 KB

Defend I.T. - Security by Example.chm

1.4 MB

Designing and Developing Scalable IP Networks.pdf

2.9 MB

Designing Storage Area Networks - A Practical Reference for Implementing Fibre Channel and IP.chm

5.2 MB

Detection Of Promiscuous Nodes Using ARP Packets.pdf

95.9 KB

Digital Design with CPLD Applications %26 VHDL %28Delmar%29.pdf

9.0 MB

DNS and BIND, 5th Edition.chm

2.5 MB

DNS on Windows Server 2003.chm

2.8 MB

Don't Click on the Blue E!.chm

4.1 MB

Ebook - Math - Boyce, DiPrima. Elementary Differential Equations (Interactive learning edition, Wiley, 7ed., 2001)(1310s).pdf

10.5 MB

Encryption in a Windows Environment - EFS File, 802.1x Wireless, IPSec Transport, and S-MIME Exchange.chm

1.9 MB

Enterprise SOA - Designing IT for Business Innovation.chm

6.5 MB

Ethereal Packet Sniffing.chm

17.9 MB

Ethernet Networks - Design, Implementation, Operation, Management (Fourth Edition).pdf

5.4 MB

Ethical Hacking & Countermeasures.pdf

7.4 MB

Exploiting Software - How to Break Code.pdf

8.0 MB

FAQ Network Intrusion Detection Systems.pdf

241.1 KB

Finite Difference and Spectral Methods for Ordinary and Partial Differential Equations - Trefethen.pdf

2.9 MB

Firefox Hacks.chm

2.9 MB

Firewalking - A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Accessing.pdf

67.8 KB

Fixing Windows XP Annoyances.chm

4.0 MB

FreeBSD Handbook 2006.pdf

9.6 MB

Freeman, 1999. Fundamentals of Telecommunications.pdf

7.1 MB

Fundamentals Of Wireless Communication.pdf

10.3 MB

General Guidelines On Random Query Evaluation.pdf

301.2 KB

Google A Hacker's Best Friend.pdf

232.5 KB

Google Hacking for Penetration Testers.pdf

33.8 MB

Google Secrets - How To Get A Top 10 Ranking.pdf

1.4 MB

Google Spamguide.pdf

114.9 KB

GRC.com Denial Of Service Attack.pdf

135.1 KB

Groupware & Security.pdf

830.4 KB

GSM and GPRS.pdf

590.7 KB

Guide to Elliptic Curve Cryptography.pdf

4.6 MB

Guide To Using Google Discover Google's Buried Treasure.pdf

5.1 MB

Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit.chm

6.6 MB

Hack I.T. - Security Through Penetration Testing.chm

4.8 MB

Hack Proofing Linux.pdf

12.4 MB

Hacker Disassembling Uncovered.chm

5.0 MB

Hacker Web Exploitation Uncovered.chm

568.3 KB

Hacker's Delight.chm

2.2 MB

Hacker's Desk Reference.pdf

534.1 KB

Hackers Beware.pdf

5.1 MB

Hacking - The Art of Exploitation.chm

1.5 MB

Hacking a Terror Network.pdf

8.9 MB

Hacking Exposed Web Applications.pdf

2.8 MB

Hacking Firefox - More Than 150 Hacks, Mods, and Customizations.pdf

14.3 MB

Hacking GPS.pdf

10.8 MB

Hacking Windows XP.pdf

12.7 MB

Hacking Wireless Networks For Dummies.pdf

11.5 MB

How To Build A Freebsd-Stable Firewall With Ipfilter.pdf

68.1 KB

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf

8.1 MB

How to develop a Network Security Policy.pdf

29.4 KB

How to write Buffer Overflows.pdf

34.3 KB

ICMP Crafting and other uses.pdf

232.7 KB

ieee_2002_vhdl_ref_manual.pdf

1.8 MB

ieee_2004_vhdl_ref_manual.pdf

1.7 MB

IGI.Global.Advances.in.Machine.Learning.Applications.in.Software.Engineering.Feb.2007.eBook-LinG.pdf

12.9 MB

Illustrated TCPIP - A Graphic Guide to the Protocol Suite.chm

6.2 MB

Illustrated Windows XP 101 Hot Tips.pdf

59.1 MB

Information Security Management Handbook, Fifth Edition.pdf

45.0 MB

Information Systems - The State of the Field.pdf

3.9 MB

Inside Network Perimeter Security, Second Edition.chm

9.0 MB

Insider Threat - Protecting The Enterprise From Sabotage, Spying, And Theft.pdf

7.0 MB

Internet Denial of Service - Attack and Defense Mechanisms.chm

2.2 MB

Internet Security - A Jumpstart for Systems Administrators and IT Managers.chm

4.0 MB

Introduction To Algorithms 2nd Edition Solutions (Instructors.Manual).pdf

1.7 MB

Intrusion Prevention Fundamentals.chm

2.2 MB

IP Addressing and Subnetting, Including IPv6.chm

3.1 MB

IP in Wireless Networks.chm

2.7 MB

IP Storage Networking - Straight to the Core.chm

5.2 MB

IPSec - The New Security Standard for the Internet, Intranets, and Virtual Private Networks.chm

1.6 MB

IPSec VPN Design.chm

9.3 MB

IPv6 Essentials.pdf

2.8 MB

IPv6 Network Programming.pdf

3.3 MB

ISDN - Integrated Services.pdf

595.9 KB

Java.pdf

468.3 KB

John.Wiley.and.Sons.Wireless.Communications.over.MIMO.Channels.Sep.2006.pdf

6.1 MB

Kerberos - The Definitive Guide.chm

1.5 MB

LAN.pdf

3.5 MB

LDAP System Administration.chm

1.2 MB

Learning PHP and MySQL.chm

4.4 MB

Linux Basic Commands.pdf

76.7 KB

Linux Command Directory.pdf

10.9 MB

Linux Complete Command Reference.pdf

10.6 MB

Linux in a Nutshell, 5th Edition .chm

1.4 MB

Linux Kernel Development, 2nd Edition.chm

1.3 MB

Linux Network Administrator's Guide, Second Edition.pdf

1.6 MB

Linux Power Tools.chm

12.6 MB

Linux Quick Fix Notebook.chm

2.9 MB

Linux Server Hacks.pdf

35.7 MB

Linux Timesaving Techniques For Dummies.pdf

16.0 MB

Linux Troubleshooting for System Administrators and Power Users.chm

4.3 MB

Linux+ Certification Bible.pdf

3.8 MB

Malware - Fighting Malicious Code.chm

6.7 MB

Mastering Active Directory for Windows Server 2003.chm

19.8 MB

McGraw-Hill Science, Engineering, Math - Digital Communications - John Proakis - 4 edition (August 15, 2000) - ISBN 0072321113a.pdf

19.6 MB

Methods of Hacking - Social Engineering.pdf

16.0 KB

Microsoft IIS 6.0 Administrator's Pocket Consultant.chm

8.7 MB

Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant.chm

9.4 MB

Microsoft SQL Server 2005 Implementation and Maintenance.pdf

27.9 MB

Microsoft Windows Scripting Self-Paced Learning Guide.pdf

5.4 MB

Microsoft Windows Server 2003 Administrator's Pocket Consultant.chm

6.0 MB

Microsoft Windows XP Networking Inside Out.pdf

19.5 MB

Microsoft Windows XP Power Toolkit.chm

12.7 MB

MIT Encyclopedia Of The Cognitive Sciences.pdf

12.1 MB

Modern Cryptography - Theory and Practice.pdf

18.7 MB

Moving to Linux - Kiss the Blue Screen of Death Goodbye!.chm

5.6 MB

MS Press - Microsoft Encyclopedia of Security.pdf

11.0 MB

MS Press Windows Server 2003 Administrators Companion 2nd Edition March 2006.pdf

22.6 MB

Nagios - System and Network Monitoring.pdf

6.5 MB

Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf

7.5 MB

Netware Hacking.pdf

132.7 KB

Network Intrusion Detection, Third Edition.pdf

2.6 MB

Network Management.pdf

821.0 KB

Network Security Assessment.chm

1.8 MB

Network Security Hacks.chm

1.7 MB

Network Security with OpenSSL.pdf

2.5 MB

Network Tutorial, Fifth Edition.chm

9.1 MB

O'Reilly - Google Hacks 2nd Edition.chm

5.5 MB

Open Source Network Administration.chm

540.6 KB

Open-Source Security Testing Methodology Manual.pdf

446.8 KB

PC Disaster and Recovery.chm

26.3 MB

PC Hardware in a Nutshell, Second Edition.chm

7.6 MB

PC networks.pdf

653.5 KB

PC Upgrade and Repair Bible Desktop Edition.pdf

20.7 MB

Peer to Peer - Harnessing the Power of Disruptive Technologies.pdf

2.2 MB

Penetration Testing Templates.pdf

660.9 KB

Perl Medic - Transforming Legacy Code.chm

1.3 MB

php.pdf

2.6 MB

Placing Backdoors Through Firewalls.pdf

26.0 KB

Practical VoIP Security.pdf

10.2 MB

Pro DNS and BIND.pdf

3.3 MB

Programming Applications for Microsoft Windows, Fourth Edition.chm

6.0 MB

Programming the Microsoft Windows Driver Model, Second Edition.chm

2.7 MB

Programming with Microsoft Visual C++ .NET, Sixth Edition.chm

14.9 MB

Python in A Nutshell, 2nd Edition.chm

1.2 MB

Real 802.11 Security - Wi-Fi Protected Access and 802.11i.chm

3.1 MB

Red Hat Fedora 5 Unleashed.chm

16.9 MB

Red Hat Linux Networking and System Administration.pdf

8.2 MB

Red Hat Linux Security and Optimization.pdf

5.4 MB

Reversing - Secrets of Reverse Engineering.pdf

8.8 MB

RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition.chm

10.6 MB

Routers and Networking.pdf

1.5 MB

RSA Encryption Algorithm, a simple example.pdf

35.6 KB

Sams Teach Yourself HTML in 10 Minutes, Fourth Edition.chm

6.8 MB

Sams Teach Yourself Microsoft SQL Server 2005 Express in 24 Hours.chm

31.6 MB

Sarbanes-Oxley - IT Compliance Using COBIT and Open Source Tools.chm

1.7 MB

Securing Linux Servers for Service Providers.pdf

1.1 MB

Security and Usability - Designing Secure Systems that People Can Use.chm

8.0 MB

Security Assessment - Case Studies for Implementing the NSA IAM.pdf

5.2 MB

Security Patterns - Integrating Security and Systems Engineering.pdf

15.0 MB

Security Warrior.chm

4.7 MB

Skinning Windows XP.chm

18.4 MB

Skype - The Definitive Guide.chm

5.6 MB

Skype Hacks.chm

3.9 MB

Sniffer Pro - Network Optimization and Troubleshooting Handbook.pdf

8.4 MB

Snort 2.1 - Intrusion Detection, Second Edition.pdf

12.7 MB

Social Engineering – A Real Story in a Multi-national Company.pdf

215.1 KB

Software Abstractions - Logic, Language, and Analysis.pdf

5.2 MB

Software Fortresses - Modeling Enterprise Architectures.chm

3.3 MB

Software Piracy Exposed.pdf

6.5 MB

Software Requirements, Second Edition.chm

5.7 MB

Solaris 10 System Administration Exam Prep.chm

6.2 MB

Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf

17.8 MB

Spring Into Linux.chm

19.3 MB

SQL Injection, Are Your Web Applications Vulnerable.pdf

542.5 KB

SSL and TLS Essentials - Securing the Web.pdf

1.4 MB

Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm

14.4 MB

Steal This File Sharing Book - What They Won't Tell You About File Sharing.chm

17.7 MB

Stealing the Network - How to Own a Continent.chm

2.9 MB

Stealing The Network - How To Own The Box.pdf

4.8 MB

Storage Networking Protocol Fundamentals.chm

7.0 MB

Strategic Information Security.chm

844.5 KB

SUSE Linux.chm

5.7 MB

Switching to VoIP.chm

3.6 MB

SysAdmin - Security Tools in FreeBSD.pdf

188.1 KB

TCP IP Foundations.pdf

7.1 MB

TCPIP.pdf

2.6 MB

TDD-CDMA for Wireless Communications by Riaz Esmailzadeh Masao Nakagawa.pdf

2.5 MB

Teach Yourself The C# Language in 21 Days.pdf

8.5 MB

Terminal Services for Microsoft Windows Server 2003 - Advanced Technical Design Guide.chm

4.8 MB

The A+ Certification and PC Repair Handbook.chm

28.9 MB

The A+ Exams Guide - (Exam 220-301, 220-302) (TestTaker's Guide Series).chm

8.2 MB

The Art of Computer Virus Research and Defense.chm

7.0 MB

The Best Damn Firewall Book Period.pdf

22.6 MB

The Best Damn Windows Server 2003 Book Period.pdf

22.4 MB

The BitTorrent Bible.pdf

507.4 KB

The Database Hacker's Handbook - Defending Database Servers.chm

1.2 MB

The Ethical Hack - A Framework for Business Value Penetration Testing.pdf

4.1 MB

The Everyday Internet All-In-One Desk Reference For Dummies.pdf

17.8 MB

The Hacker Ethic.pdf

13.9 MB

The Internet and its applications.pdf

3.2 MB

The Practical Guide to HIPAA Privacy and Security Compliance.chm

1.1 MB

The Shellcoder's Handbook - Discovering and Exploiting Security Holes.chm

2.2 MB

The SMB Man-In-The-Middle Attack.pdf

24.7 KB

The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm

16.2 MB

The XP Files - Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration.pdf

4.2 MB

Tripwire_exploit_poster.pdf

767.2 KB

Understanding IPv6.chm

1.2 MB

UNIX Power Tools, Third Edition.chm

2.3 MB

Upgrading and Repairing Networks, Fourth Edition.chm

12.2 MB

Upgrading and Repairing Pcs, 17th Edition.chm

25.0 MB

Upgrading and Repairing Servers.chm

17.4 MB

VHDL Beginners Book.pdf

8.4 MB

VHDL examples.pdf

342.9 KB

VHDL Reference Manual.pdf

1.5 MB

VHDL.pdf

688.9 KB

Video Conferencing Over IP - Configure, Secure, and Troubleshoot.pdf

10.6 MB

Voice Over 802.11.pdf

2.0 MB

WAN, Wide Area Networks.pdf

1.1 MB

WarDriving Drive, Detect, Defend - A Guide to Wireless Security.chm

38.9 MB

WebJacking.pdf

71.1 KB

Website Secrets Unleash the Power of, Google, Amazon, eBay & more.pdf

16.4 MB

Well Known Trojans and Their Ports.pdf

15.4 KB

Why Wireless Data.pdf

322.7 KB

Wi-Foo - The Secrets of Wireless Hacking.chm

7.1 MB

Windows Forensics and Incident Recovery.chm

7.5 MB

Windows NT File System Internals - A Developers Guide.pdf

12.4 MB

Windows Server 2003 Security Cookbook.chm

848.4 KB

Windows Server 2003 Security Infrastructures - Core Security Features.chm

28.1 MB

Windows XP Bible.pdf

16.8 MB

Windows XP for Power Users - Power Pack.pdf

13.2 MB

Windows XP Services That Can Be Disabled.pdf

164.7 KB

Winternals - Defragmentation, Recovery, and Administration Field Guide.pdf

11.0 MB

Wireless and Mobile Data.pdf

455.1 KB

Wireless Communications by Andrea Goldmsith.pdf

3.5 MB

Wireless Communications.pdf

50.8 MB

Wireless Hacking - The Invisible Network.pdf

336.2 KB

Wireless Hacks.chm

4.2 MB

Wireless Technologies.pdf

462.8 KB

Wireless WAN System.pdf

623.9 KB

wireless-communication-technologies.pdf

210.3 KB

WWW techniques.pdf

719.0 KB

XP Tips & Tweaks.pdf

517.6 KB

[ ITA ] Nozioni fondamentali sui router.pdf

217.6 KB

 

Total files 279


Copyright © 2024 FileMood.com