Learn Java, Cisco, Linux, Microsoft

Provide Learning tools , Ebooks for Java, Cisco, Linux, Microsoft

. .
Showing posts with label Other. Show all posts
Showing posts with label Other. Show all posts
Friday, October 2, 2009

Hacking The PSP



Hacking the PSP covers everything you need to know to:

Transfer video and DVDs to your PSP
Transfer audiobooks and text
Hack the games you play every day (including using the PSP as an XBox game save device)
Move your TiVo and ReplayTV shows to your PSP
Convert your DVDs to run on your PSP
Create your own quick-charge battery packs
Learn how to program the PSP
Repair your PSP
Create your own hacks and run homebrew software
Find all the online and offline resources you need
And much more! 




Wireless Technology: Applications Management and Security explores wireless telecommunications issues such as wireless internet, wireless network modeling and RFID. The contributing authors are researchers who participated in the seventh annual Wireless Telecommunications Symposium, WTS 2007. Their chapters represent the best research presented at the conference.

Topics covered include:
* wireless communications and network technologies;
* algorithms, methods, simulations and software;
* military applications of wireless communications and satellite applications;
* RFID, sensor networks and wireless receivers.
Wireless Technology: Applications, Management and Security is a useful reference for researchers in the field.


Friday, September 11, 2009

Macworld - July 2009

 
This book will take you through the different methods for installing WebSphere application server and demonstrate how to configure and prepare WebSphere resources for your application deployments

Manage and administer your WebSphere application server to create a reliable, secure, and scalable environment for running your applications
- Create a reliable, secure, and flexible environment to build and run WebSphere applications efficiently
- Learn WebSphere security, performance tuning, and debugging concepts with a variety of real-life examples
- Thoroughly covers Java messaging, administrative agent, and product maintenance features
- No previous knowledge of WebSphere is expected

In Detail
As an administrator you need a secure, scalable, resilient application infrastructure to support the developers building and managing J2EE applications and Service Oriented Architecture services. WebSphere application server, a product from IBM, is optimized to ease administration and improve runtime performance. It helps you run applications and services in a reliable, secure, and high-performance environment to ensure business opportunities are not lost due to application downtime.

It's easy to get started and tame this powerful application server when you've got this book to hand. This administration guide will help you provide an innovative, performance-based foundation to build, run, and manage J2EE applications and SOA services, offering the highest level of reliability, security, and scalability.

This book will take you through the different methods for installing WebSphere application server and demonstrate how to configure and prepare WebSphere resources for your application deployments. During configuration you will be shown how to administer your WebSphere server standalone or using the new administrative agent, which provides the ability to administer multiple installations of WebSphere application server using one single administration console. WebSphere security is covered in detail showing the various methods of implanting federated user and group repositories. The facets of data-aware and message-aware applications are explained and demonstrated giving the reader real-world examples of manual and automated deployments. Key administration features and tools are introduced, which will help a WebSphere administrator manage and tune their WebSphere implementation and application for success.

What you will learn from this book?
- Install your applications manually and learn to automate the process using scripts
- Secure the WebSphere application server's administrative console with different levels of access for administration
- Save many hours of manual administrative efforts by automating the configuration of WebSphere
- Learn how to read, configure, and search your server logs
- Allow communication between applications by implementing Java messaging
- Monitor performance and tune your applications and WebSphere for best performance
- Remotely install applications on application servers using the administrative agent
- Change application server configurations, stop and restart application servers, and create additional application servers from a single administrative console
- Administer multiple application servers by using a single administrative console
- Diagnose the problems using command-line tools when your WebSphere or applications are not running as they should
- Keep your products up to date by using WebSphere product maintenance features

Approach
This book is an example-driven tutorial that introduces you to the WebSphere application server and then takes you through all the major aspects of server configuration. It covers everything you need to deploy and tune your applications for best performance.

Who this book is written for?
This book is for administrators with some experience in Java who want to get started with WebSphere. Existing WebSphere users will also find this book useful, especially as there are so many new features in the new version.

No previous knowledge of WebSphere is assumed.

Saturday, August 29, 2009

Mastering Maya 2009

 
The Ultimate Maya 2009 Resource for Intermediate to Advanced Users If you already know the basics of Maya, now you can elevate your skills with Maya 2009 and the advanced coverage in this authoritative new reference and tutorial. From modeling, texturing, animation, and visual effects to high-level techniques for film, television, games, and more, this book provides professional-level instruction on Maya Complete and Maya Unlimited.
This fully updated book brings you up to speed on Maya 2009's new features and expands your skills with advanced instruction on cloth, fur, and fluids. You'll learn Dynamics, Maya Muscle, Stereo Cameras, Assets, rendering with mental ray, and more. Filled with challenging tutorials and real-world scenarios from some of the leading professionals in the industry, this one-of-a-kind guide gives you valuable insight into the entire CG production pipeline.

Tuesday, August 25, 2009

Anti-Hacker Tool Kit, 3rd Edition

 
Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the information you'll need to lock down your network from the ground up. Logically organized by category, each tool's function, installation, and configuration is fully described, alongside screenshots and code examples. Brand-new examples and in-depth case studies detail how to implement each vital tool in real-world situations..

Explains how to configure and use these and other key tools:.
MULTIFUNCTIONAL UTILITIES: Netcat, Cryptcat, Sbd.
PORT SCANNERS: Nmap, THC-Amap,IPEye.
EMULATORS: VMware, Virtual PC, Gnoppix, Cygwin.
ENUMERATORS: Samba, Winfingerprint, PsTools, HFNetChk.
WEB HACKING APPLICATIONS: Nikto, LibWhisker, Paros, Burp.
PASSWORD CRACKERS AND BRUTE-FORCE TOOLS: John the Ripper, LophtCrack, THC-Hydra, PwDump.
WAR DIALERS: ToneLoc, THC-Scan.
HOST HARDENING APPLICATIONS: Clamav, Titan, Msec.
BACKDOORS AND REMOTE ACCESS: VNC, Netbus, Back Orifice, SubSeven, Loki, Knark.
AUDITING TOOLS: Flawfinder, RATS, Nessus, STAT, Tripwire.
PORT REDIRECTERS: Datapipe, FPipe, WinRelay.
SNIFFERS: BUTTSniffer, WinDump, Ethereal, Dsniff, Snort.
WIRELESS TOOLS: NetSlumber, TCPsic, ICMpsic, Iptest.
FORENSIC UTILITIES: dd, EnCase, Sleuth Kit, Vnode, WinHex


Stuart McClure
720 pages
PDF
Publisher: McGraw-Hill Osborne Media; 6 edition (January 5, 2009)
Language: English

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.

New and updated material:
New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
New wireless and RFID security tools, including multilayered encryption and gateways
All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
Fully updated chapters on hacking the Internet user, web hacking, and securing code



A Complete Illustrated Guide To The PC Hardware - 5.4MB

Inside this book, you will learn how to:
Configure CMOS and BIOS settings
Identify expansion bus slots and install expansion cards
Work with motherboards, CPUs, and RAM
Provide proper power and cooling
Install, partition, and format hard drives
Install and troubleshoot floppy, CD, and DVD drives
Create SCSI chains
Install sound and video cards
Work with portable PCs, PDAs, and wireless technologies
Manage printers and connect to networks


Thursday, August 6, 2009

Blocking Spam & Spyware for Dummies


Fight back and save money with these expert tips

Find out what spam and spyware cost your company, and how to stop them
Whether yours is a one-person business or a multi-million dollar corporation, here's help giving spammers and spies the bum's rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up and maintain them, and even show the bean-counters why such defenses are essential.

Discover how to
* Understand how spammers get addresses
* Calculate the cost of spam and spyware
* Re-engineer your business processes
* Select spam and spyware filters
* Manage implementation and maintenance



David N. Blank-Edelman "Automating System Administration with Perl, Second Edition"
May 2009 | English | ISBN-13: 978-0-596-00639-6 | 668 Pages | PDF | 6.21 MB

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely automate recurring tasks.

Updated and expanded to cover the latest operating systems, technologies, and Perl modules, this edition of the "Otter Book" will help you:
* Manage user ***s
* Monitor filesystems and processes
* Work with configuration files in important formats such as XML and YAML
* Administer databases, including MySQL, MS-SQL, and Oracle with DBI
* Work with directory services like LDAP and Active directory
* Script email protocols and spam control
* Effectively create, handle, and analyze log files
* Administer network name and configuration services, including NIS, DNS and DHCP
* Maintain, monitor, and map network services, using technologies and tools such as SNMP, nmap, libpcap, GraphViz and RRDtool
* Improve filesystem, process, and network security

This edition includes additional appendixes to get you up to speed on technologies such as XML/XPath, LDAP, SNMP, and SQL. With this book in hand and Perl in your toolbox, you can do more with less -- fewer resources, less effort, and far less hassle.
ess effort, and far less hassle.


248 pages | eBook Format : PDF | Released Date : December 6, 2007 | Size : 7 MB

Description: In 2005, the U.S. Government Accountability Office recommended that all agencies begin planning a coherent transition to IPv6. IPv6 will solve the problem of limited IP addresses and improve internetworking capabilities. This promising protocol is gaining momentum and it is only a matter of time before the transition will have to occur globally. The problem is that during the three-to-six year transition period, IPv6 and its predecessor, IPv4, will have to successfully coexist in order to ensure service continuity.


Not only federal agencies, but corporations and institutions must start planning the transition to IPv6 now to maintain the operation, security, and interoperability of their networks.
The implementation of IPv6 is essential to the continued growth of the internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6.


Hacking Firefox: More Than 150 Hacks, Mods, and Customizations

They dreamed of a better browser . . . and before you could say “”explore no more,”" Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you’ve always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control. Step-by-step instructions for these hacks and dozens more Settings, content, and extension hacks Hacking the interface and themes Performance boosters Anti-phishing and security hacks Toolbar and status bar tweaks Navigation, download, and search hacks Hacks for common plugins Extension and theme creation.


Virtual Reality and the Built Environment,| October 8, 2002 | English | PDF | 165 Pages | 5,78 Mb

Description : As this book shows, rather than leading to uniform processes and standard design practices, these tools are being used in many divergent ways across different segments of the design community. There are expectations of further technological refinement and cost reduction, and this is likely to stimulate more widespread use in future. This book provides a thought-provoking and practical guide to how design organizations – large and small – might benefit by engaging with these new technologies of design. It illustrates the excitement of designing in a multimedia environment and creates a real sense of how we might integrate different parts of the processes of design, production and management to provide better buildings.


"Pro C# with .NET 3.0, Special Edition (With source Code)" Jan 2007 | English | 1239 Pages | PDF | 22.4 MB

C# 2005 has enjoyed huge success in the year since its launch, firmly establishing itself as the premier language for development on Microsofts successful .NET 2.0 platform. With the launch of the .NET 3.0 extensions in early 2007, the horizons of this language are being extended, and it is becoming even more powerful as it is able to leverage the new .NET 3.0 Foundations.


In recognition of this, Apress presents Pro C# with .NET 3.0, Special Edition to provide you with a complete A-to-Z reference for using C# with the .NET 2.0 platform and the .NET 3.0 extensions. The book contains new chapters that explore the interactions between the existing framework and the new extensions, giving you an edge when you evaluate and implement .NET 3.0 for the first time. To provide even more support, a bonus PDF download will be available with each purchase, offering over 500 pages of carefully selected additional content to help broaden your understanding of both .NET 2.0 and .NET 3.0.