تبلیغات
Computer Book - مطالب امنیت

دانلود O'Reilly All Book 2011 - A to L Collection - مجموعه کامل کتاب های اوریلی از حرف A تا L

نوشته شده در تاریخ : جمعه 29 اردیبهشت 1391   06:59 ق.ظ

دانلود O'Reilly All Book 2011 - A to L Collection - مجموعه کامل کتاب های اوریلی از حرف A تا L

برای اولین بار در میان سایت های فارسی زبان مجموعه ی تمامی کتاب های منتشر شده انتشارات O'Reilly را از پی سی دانلود دریافت کنید.
انتشارات اُریلی یکی از بزرگترین و معتبرترین شرکت انتشارات کتاب های تخصصی در امور کامپیوتر در آمریکا میباشد. تمام کتاب های این شرکت در معروفترین دانشکده ها تدریس می شوند.

در بخش اول کتاب هایی که با حرف اول آنها با حروف A تا L شروع می شوند برای دانلود قرار داده شده است.
برای دیدن لیست کتاب ها به منبع زیر بروید  : 

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: O'Reilly All Book 2011 - A to L Collection -،

Network Hacking -52 video

نوشته شده در تاریخ : یکشنبه 25 دی 1390   11:55 ق.ظ

نوع مطلب :فیلم های آموزشی ،شبکه ،امنیت ،

52 Video Tutorials – Network  Hacking 
English | XVID | 640×480 | SWF, AVI, WMV | 15 fps 459 kbps | 750.64 MB
Genre: eLearning

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: hacking، network،

CBT Nuggets Check Point Security CCSE R70

نوشته شده در تاریخ : سه شنبه 13 دی 1390   09:27 ب.ظ

نوع مطلب :فیلم های آموزشی ،امنیت ،

 CBT Nuggets Check Point Security CCSE R70

CBT Nuggets Check Point Security CCSE R70 | ISO | 811.66 MB
Genre: Video Training

 Systems administrators, Security Managers or Network Engineers with experience supporting Check Point security deployments will love this series.Bobby Meador shows you everything you need to know as you deploy high availability management servers; cluster firewalls to provide redundancy and disaster recovery; and implement SSL & IPSEC VPN technologies.

This training maps to the Check Point CCSE exam.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: CBT، CHECK، NUGGETS، POINT، Security،

TestOut Courses (CCNA, MCSE,CompTIA Linux+, A+ ,Network+, Security+ ….)

نوشته شده در تاریخ : پنجشنبه 8 دی 1390   06:57 ب.ظ

d93a5215c3fdc9de0e4789fe53eafd40 TestOut Courses (CCNA, MCSE,CompTIA Linux+, A+ ,Network+, Security+ ....)
TestOut Courses (CCNA, MCSE,CompTIA Linux+, A+ ,Network+, Security+ ….) | 10.31GB
MCSA/MCSE 2003
CCNA
Novell CNA
CompTIA A+
CompTIA Network+
CompTIA Security+
CompTIA Linux+

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: MCSA/MCSE 2003، CCNA، Novell، CNA، CompTIA A+، CompTIA، Network+، Comp، TIA، Security+، Linux+،

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

نوشته شده در تاریخ : جمعه 25 آذر 1390   05:42 ب.ظ

 Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Andrew Hoog, “Android Forensics: Investigation, Analysis and Mobile Security for Google Android”
S..gr..s | 2011-06-29 | ISBN: 1597496510 | 432 pages | PDF | 39 MB

Android is now the world’s most popular mobile device platform and still growing at an astonishing rate. Android Forensics provides a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, a detailed review of forensic acquisition techniques and strategies for the subsequent analysis required. A heavy emphasis on open source tools and step-by-step examples are a primary focus on this book.

-Learn techniques to forensically acquire Android devices
-Includes information about Android applications needed for forensics investigations
-Entire chapter focused on Android Device, Data and App Security, which can assist not only forensic investigators but also for app developers and IT security managers


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: android، google، Mobile، Security،

James C Foster, “Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Codin

نوشته شده در تاریخ : دوشنبه 25 مهر 1390   09:05 ب.ظ

نوع مطلب :امنیت ،

 James C Foster, Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding...
Publisher: Syngress | ISBN: 1597490059 | edition 2005 | PDF | 697 pages | 112,3 mb

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP, sockets are implemented differently in nearly ever language…


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Security،

Secrets and Lies: Digital Security in a Networked World

نوشته شده در تاریخ : شنبه 9 مهر 1390   07:11 ب.ظ

نوع مطلب :شبکه ،امنیت ،

31389516431 Secrets and Lies: Digital Security in a Networked World

Book Description

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network

Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Security، Secrets and Lies، امنیت و دروغ ها،

VMware Infrastructure 3 For Dummies

نوشته شده در تاریخ : شنبه 9 مهر 1390   04:38 ق.ظ

نوع مطلب :امنیت ،

 VMware Infrastructure 3 For Dummies
William Lowe, For Dummies | 2008-09-29 | ISBN: 0470277939 | 360 pages | PDF | 4,4 MB

VMware Infrastructure 3 for Dummies will help you understand, design, and deploy a reliable and fault tolerant Virtual Infrastructure 3 environment. Virtualization can save your business a lot of money! You’ll find an introduction to the technology and learn from the key topics covered in each chapter. You will have enough information to design and deploy your first system without being overwhelmed by extensive technical details. You can also use this book as a reference for maintenance and troubleshooting.You will find out what you need to do before you virtualize your machines. Learn about ESX servers, how to install them and their anatomy. Hook up your ESX servers with storage and data networks and understand what you need to know about networking and external storage. You’ll be able to make everything fault tolerant with cluster technology. Find out how to:


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Dummies، Technology،

Hacking Windows Tools and Tranning

نوشته شده در تاریخ : چهارشنبه 6 مهر 1390   12:34 ب.ظ

نوع مطلب :فیلم های آموزشی ،امنیت ،

1dcee Hacking Windows Tools and Tranning

Hacking Windows Tools and Tranning
FLV | 805 MB
In this tutorial you going to learn more about RAT(s) and how they work. Well RAT(s) are usually used for hacking, and they are detected as backdoors.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: hacking،

Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)

نوشته شده در تاریخ : دوشنبه 4 مهر 1390   01:44 ب.ظ

نوع مطلب :امنیت ،

 Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)
CRC Press | English | 2011 | ISBN: 143983721X | 545 pages | PDF | 9 MB

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: secret، Sharing،

(Cryptography and Network Security: Principles and Practice (5th Edition

نوشته شده در تاریخ : یکشنبه 27 شهریور 1390   05:55 ب.ظ

نوع مطلب :امنیت ،شبکه ،

 Cryptography and Network Security: Principles and Practice (5th Edition)
Pren tice H all | 2010 | ISBN: 0136097049 | 744 pages | PDF | 8 MB

William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: network، Security،

Mega 26 Lab Collections with 47 CDs | 26.11 GB

نوشته شده در تاریخ : سه شنبه 8 شهریور 1390   06:30 ق.ظ

نوع مطلب :Cisco ،امنیت ،شبکه ،فیلم های آموزشی ،

Mega 26 Lab Collections with 47 CDs | 26.11 GB

Train Signals unique method of instructor led training has something for everyone.

Whether you are just starting out and dont have any networking experience or you are a Senior Administrator looking to refresh your skills and learn some new tips and tricks your going to find Train Signals training to be a priceless addition to your repertoire.

ISO Files Under this compilation can be downloaded individually.

Lab 01 – Active Directory (2CD)
Lab 02 – File Servers (2CD)
Lab 03 – Web Servers (2CD)
Lab 04 – DNS Infrastructures (2CD)
Lab 05 – DHCP Servers (2CD)
Lab 06 – WINS Infrastructure (2CD)
Lab 07 – Internet Gateways (1CD)
Lab 08 – Virtual Private Networks (1CD)
Lab 09 – Routers and Packet Filters (1CD)
Lab 10 – Server Security (2CD)
Lab 11 – Network Security (1CD)
Lab 12 – Advanced Security (1CD)
Lab 13 – Windows XP (2CD)
Lab 14 – Group Policy (2CD)
Lab 15 – RIS,Ghost and AD Disaster Recovery (2CD)
Lab 16 – Sites and Services (2CD)
Lab 17 – Exchange Server 2000 (2CD)
Lab 18 – Exchange Server 2003 (2CD)
Lab 19 – Cisco Routing (2CD)
Lab 20 – Wireless Networking (2CD)
Lab 21 – ISA Server 2004 (2CD)
Lab 22 – Linux Networks (2CD)
Lab 23 – CCNP-BSCI (2CD)
Lab 24 – CCNP Switched Networks (2CD)
Lab 25 – CCNP BCRAN (2CD)
Lab 26 – CCNP Cisco Internetwork Troubleshooting (2CD)


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری



MS CCNP BSCI Exam Cram 2

نوشته شده در تاریخ : دوشنبه 7 شهریور 1390   10:46 ب.ظ

نوع مطلب :Cisco ،امنیت ،شبکه ،


MS CCNP BSCI Exam Cram 2
English | AVI | Mpeg4 | 640×480 | 120 Min | 29.970 fps 85 kbps | MP3 128 kbps 48 KHz | 398 MB
Genre: Elearning

Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs!
The CCNP BSCI Exam Cram 2 (Exam 642-801) is focused on what you need to know to pass the CCNP BSCI exam. The Exam Cram 2 Method of Study provides you with a concise method to learn the exam topics. The book includes tips, exam notes, acronyms and memory joggers in order to help you pass the exam.
TrainSignal CCNP BSC


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: CCNP BSCI Exam،

Virtualization Security: Business Continuity

نوشته شده در تاریخ : چهارشنبه 2 شهریور 1390   07:57 ب.ظ

نوع مطلب :امنیت ،تجارت ،

26511389668 Virtualization Security: Business Continuity

EC-Council, “Virtualization Security:  Continuity” 
Co rse Tec nology | 2010 | ISBN: 1435488695 | 144 pages | PDF | 7,6 MB

This is one of two books in the DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES, designed to fortify disaster recovery preparation and virtualization technology knowledge of information security students, system administrators, systems engineers, enterprise system architects, and any IT professional who is concerned about the integrity of their network infrastructure. Topics include disaster recovery planning, risk control policies and countermeasures, disaster recovery tools and services, and virtualization principles. The series when used in its entirety helps prepare readers to take and succeed on the E|CDR and E|CVT, Disaster Recovery and Virtualization Technology certification exam from EC-Council. The EC-Council Certified Disaster Recovery and Virtualization Technology professional will have a better understanding of how to set up disaster recovery plans using traditional and virtual technologies to ensure business continuity in the event of a disaster.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Business، Secure،

Penetration Testing and Network Defense

نوشته شده در تاریخ : چهارشنبه 2 شهریور 1390   05:23 ب.ظ

نوع مطلب :امنیت ،شبکه ،

26511389672 Penetration Testing and Network Defense

Book Description

The practical guide to simulating, detecting, and responding to attacks

  • Create step-by-step testing plans
  • Learn to perform social engineering and host reconnaissance
  • Evaluate session hijacking methods
  • Exploit web  vulnerabilities
  • Detect attempts to breach database 
  • Use password crackers to obtain access information
  • Circumvent Intrusion Prevention Systems () and firewall protections and disrupt the service of routers and switches
  • Scan and penetrate wireless networks
  • Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
  • Test UNIX, Microsoft, and Novell servers for vulnerabilities
  • Learn the root cause of buffer overflows and how to prevent them
  • Perform and prevent Denial of Service attacks

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: cisco، IPS، Networking، Security،
  • تعداد کل: 2 
  • 1  
  • 2