برچسب ها: O'Reilly All Book 2011 - A to L Collection -،
English | XVID | 640×480 | SWF, AVI, WMV | 15 fps 459 kbps | 750.64 MB
برچسب ها: hacking، network،
CBT Nuggets Check Point Security CCSE R70 | ISO | 811.66 MB
Genre: Video Training
Systems administrators, Security Managers or Network Engineers with experience supporting Check Point security deployments will love this series.Bobby Meador shows you everything you need to know as you deploy high availability management servers; cluster firewalls to provide redundancy and disaster recovery; and implement SSL & IPSEC VPN technologies.
This training maps to the Check Point CCSE exam.
برچسب ها: CBT، CHECK، NUGGETS، POINT، Security،
TestOut Courses (CCNA, MCSE,CompTIA Linux+, A+ ,Network+, Security+ ….) | 10.31GB
برچسب ها: MCSA/MCSE 2003، CCNA، Novell، CNA، CompTIA A+، CompTIA، Network+، Comp، TIA، Security+، Linux+،
S..gr..s | 2011-06-29 | ISBN: 1597496510 | 432 pages | PDF | 39 MB
Android is now the world’s most popular mobile device platform and still growing at an astonishing rate. Android Forensics provides a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, a detailed review of forensic acquisition techniques and strategies for the subsequent analysis required. A heavy emphasis on open source tools and step-by-step examples are a primary focus on this book.
-Learn techniques to forensically acquire Android devices
-Includes information about Android applications needed for forensics investigations
-Entire chapter focused on Android Device, Data and App Security, which can assist not only forensic investigators but also for app developers and IT security managers
برچسب ها: android، google، Mobile، Security،
James C Foster, “Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Codin
برچسب ها: Security،
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
برچسب ها: Security، Secrets and Lies، امنیت و دروغ ها،
William Lowe, For Dummies | 2008-09-29 | ISBN: 0470277939 | 360 pages | PDF | 4,4 MB
VMware Infrastructure 3 for Dummies will help you understand, design, and deploy a reliable and fault tolerant Virtual Infrastructure 3 environment. Virtualization can save your business a lot of money! You’ll find an introduction to the technology and learn from the key topics covered in each chapter. You will have enough information to design and deploy your first system without being overwhelmed by extensive technical details. You can also use this book as a reference for maintenance and troubleshooting.You will find out what you need to do before you virtualize your machines. Learn about ESX servers, how to install them and their anatomy. Hook up your ESX servers with storage and data networks and understand what you need to know about networking and external storage. You’ll be able to make everything fault tolerant with cluster technology. Find out how to:
برچسب ها: Dummies، Technology،
برچسب ها: hacking،
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.
برچسب ها: secret، Sharing،
William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.
برچسب ها: network، Security،
Mega 26 Lab Collections with 47 CDs | 26.11 GB
Train Signals unique method of instructor led training has something for everyone.
Whether you are just starting out and dont have any networking experience or you are a Senior Administrator looking to refresh your skills and learn some new tips and tricks your going to find Train Signals training to be a priceless addition to your repertoire.
ISO Files Under this compilation can be downloaded individually.
Lab 01 – Active Directory (2CD)
Lab 02 – File Servers (2CD)
Lab 03 – Web Servers (2CD)
Lab 04 – DNS Infrastructures (2CD)
Lab 05 – DHCP Servers (2CD)
Lab 06 – WINS Infrastructure (2CD)
Lab 07 – Internet Gateways (1CD)
Lab 08 – Virtual Private Networks (1CD)
Lab 09 – Routers and Packet Filters (1CD)
Lab 10 – Server Security (2CD)
Lab 11 – Network Security (1CD)
Lab 12 – Advanced Security (1CD)
Lab 13 – Windows XP (2CD)
Lab 14 – Group Policy (2CD)
Lab 15 – RIS,Ghost and AD Disaster Recovery (2CD)
Lab 16 – Sites and Services (2CD)
Lab 17 – Exchange Server 2000 (2CD)
Lab 18 – Exchange Server 2003 (2CD)
Lab 19 – Cisco Routing (2CD)
Lab 20 – Wireless Networking (2CD)
Lab 21 – ISA Server 2004 (2CD)
Lab 22 – Linux Networks (2CD)
Lab 23 – CCNP-BSCI (2CD)
Lab 24 – CCNP Switched Networks (2CD)
Lab 25 – CCNP BCRAN (2CD)
Lab 26 – CCNP Cisco Internetwork Troubleshooting (2CD)
MS CCNP BSCI Exam Cram 2
English | AVI | Mpeg4 | 640×480 | 120 Min | 29.970 fps 85 kbps | MP3 128 kbps 48 KHz | 398 MB
Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs!
The CCNP BSCI Exam Cram 2 (Exam 642-801) is focused on what you need to know to pass the CCNP BSCI exam. The Exam Cram 2 Method of Study provides you with a concise method to learn the exam topics. The book includes tips, exam notes, acronyms and memory joggers in order to help you pass the exam.
TrainSignal CCNP BSC
برچسب ها: CCNP BSCI Exam،
EC-Council, “Virtualization Security: Business Continuity”
Co rse Tec nology | 2010 | ISBN: 1435488695 | 144 pages | PDF | 7,6 MB
This is one of two books in the DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES, designed to fortify disaster recovery preparation and virtualization technology knowledge of information security students, system administrators, systems engineers, enterprise system architects, and any IT professional who is concerned about the integrity of their network infrastructure. Topics include disaster recovery planning, risk control policies and countermeasures, disaster recovery tools and services, and virtualization principles. The series when used in its entirety helps prepare readers to take and succeed on the E|CDR and E|CVT, Disaster Recovery and Virtualization Technology certification exam from EC-Council. The EC-Council Certified Disaster Recovery and Virtualization Technology professional will have a better understanding of how to set up disaster recovery plans using traditional and virtual technologies to ensure business continuity in the event of a disaster.
برچسب ها: Business، Secure،
The practical guide to simulating, detecting, and responding tonetwork attacks
- Create step-by-step testing plans
- Learn to perform social engineering and host reconnaissance
- Evaluate session hijacking methods
- Exploit web server vulnerabilities
- Detect attempts to breach database security
- Use password crackers to obtain access information
- Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches
- Scan and penetrate wireless networks
- Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
- Test UNIX, Microsoft, and Novell servers for vulnerabilities
- Learn the root cause of buffer overflows and how to prevent them
- Perform and prevent Denial of Service attacks
برچسب ها: cisco، IPS، Networking، Security،
Beginning Database Design: From Novice to Professional, 2 edition جمعه 3 شهریور 1391
Fundamentals of Robotic Mechanical Systems: Theory, Methods, and Algorithms - 3rd edition جمعه 3 شهریور 1391
Ian H. Witten, “Data Mining: Practical Machine Learning Tools and Techniques” جمعه 3 شهریور 1391
Algorithms and Computation جمعه 3 شهریور 1391
Oracle Business Intelligence Enterprise Edition 11g: A Hands-On Tutorial شنبه 28 مرداد 1391
IBM Cognos Business Intelligence 10.1 Dashboarding Cookbook شنبه 28 مرداد 1391
Windows Phone 7.5: Building Location-aware Applications شنبه 28 مرداد 1391
Mastering Prezi for Business Presentations شنبه 28 مرداد 1391
Node Cookbook شنبه 28 مرداد 1391
Oracle Database XE 11gR2 Jump Start Guide پنجشنبه 26 مرداد 1391
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology پنجشنبه 26 مرداد 1391
Joomla! Search Engine Optimization پنجشنبه 26 مرداد 1391
Drupal 7 Cookbook پنجشنبه 26 مرداد 1391
لیست آخرین پستها