|
|
Windows Forms in Action» (2nd edition)
Manning Publications | ISBN 1932394656 | 2006 Year | PDF | 7,52 Mb | 752 Pages
Using many examples all on a common theme, this second edition of Windows Forms Programming with C# presents Windows application development in a step-by-step, easy to follow format. Written for beginner and intermediate programmers eager to get their hands dirty, the text covers fundamentals like labels, buttons, and tool strips, as well as advanced concepts like owner-drawn lists, custom controls, and two-way data binding.
The book is a tutorial, leading the reader through Windows application development using C# and Visual Studio .NET. It illustrates how the classes in the .NET Framework interact in a fully functional application. Material added for the second edition includes coverage of the .NET 2.0 Framework, extender providers, cryptographic classes, and application deployment.
Code:
http://d.turboupload.com/d/741924/EBrown.rar.html
|
|
|
Definitive Guide to Excel VBA, Second Edition
Apress | ISBN 1590591038 | 2003 Year | CHM | 936 Pages | 21 Mb
Book Description
This book is definitive. Though assuming no knowledge of VBA or Visual Basic, it covers every aspect of Excel programming. The emphasis is always on solving problems that professionals will encounter in their daily work. Whether it is automatically displaying different views of data through pivot tables or accessing databases through ADO, the latest Microsoft database technology, it's all here. The final chapter provides a reference on Excel objects that is equally definitive. It is important to note that this book is not an advertising brochure for Excel. If there are problems with the Excel object library (and unfortunately there are many of them), they are explained. Whenever possible, Kofler explains a work-around. Still, this book gives the reader a comprehensive look at what you can do with Excel - and despite some problems, the range of possible applications is huge.
Book Info
Guide shows how to write Excel code efficiently, how to access external databases, how to analyze and visualize complex data automatically, and how to build menus and dialogs. Translated from the original text in German.
Code:
http://d.turboupload.com/d/741129/12.rar.html
|
|
|
Wireless Operational Security (Paperback)
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap.
*Presents a new “WISDOM” model for Wireless Security Infrastructures
*Acts as a critical guide to implementing “Converged Networks” wired/wireless with all necessary security considerations
*Rittinghouse’s Cybersecurity Operations Handbook is the only security book recommended by the FCC
Code:
http://d.turboupload.com/d/740902/JRittinghouse.rar.html
|
|
|
Book Description
CD-ROM packed with diagnostic and troubleshooting software! PRACTICAL, AUTHORITATIVE GUIDANCE ON KEEPING A WIRELESS NETWORK WORKING HARD FOR YOUR BUSINESS! With annual equipment sales projected to grow to more than $5 billion by mid-decade, wireless networking is clearly a technology whose time has come. But with many wireless networks expected to be created at both small offices and home offices, where can people charged with maintaining them get comprehensive information to help them do just that? The answer is McGraw-Hill’s Installing, Troubleshooting, and Repairing Wireless Networks. Written with insight by a noted IT expert and commentator, this book provides comprehensive coverage of this rapidly emerging technology, and in the process: * Introduces all wireless components, both off-the-shelf and subscriber products * Covers WiFi technologies as 802.11a and b * Includes all scales of wireless networks, from home to office, cafes and campuses, airports and hotels, to MANs, and describes what’s best for different needs * Shows how to integrate wired and wireless LANs * Discusses the benefits and pitfalls of wireless technologies * Advises how to set up and maintain security features * And much, much more! Basic enough for the hobbyist -; and yet still detailed enough for the IT professional -; Installing, Troubleshooting, and Repairing Wireless Networks is the essential survival guide for keeping a wireless network up and running.
From the Back Cover
CD-ROM packed with diagnostic and troubleshooting software!
PRACTICAL, AUTHORITATIVE GUIDANCE ON KEEPING A WIRELESS NETWORK WORKING HARD FOR YOUR BUSINESS!
With annual equipment sales projected to grow to more than $5 billion by mid-decade, wireless networking is clearly a technology whose time has come. But with many wireless networks expected to be created at both small offices and home offices, where can people charged with maintaining them get comprehensive information to help them do just that? The answer is McGraw-Hill’s Installing, Troubleshooting, and Repairing Wireless Networks.
Written with insight by a noted IT expert and commentator, this book provides comprehensive coverage of this rapidly emerging technology, and in the process:
* Introduces all wireless components, both “off-the-shelf” and subscriber products
* Covers WiFi technologies as 802.11a and b
* Includes all scales of wireless networks, from home to office, cafes and campuses, airports and hotels, to MANs, and describes what’s best for different needs
* Shows how to integrate wired and wireless LANs
* Discusses the benefits and pitfalls of wireless technologies
* Advises how to set up and maintain security features
* And much, much more!
Basic enough for the hobbyist — and yet still detailed enough for the IT professional — Installing, Troubleshooting, and Repairing Wireless Networks is the essential survival guide for keeping a wireless network up and running.
Code:
http://d.turboupload.com/d/740788/0071410708.rar.html
|
|
|
Coffee, Tea, Chocolate, and the Brain (Nutrition, Brain, and Behavior)
Book Description
Coffee, tea, and chocolate are among the most frequently consumed products in the world. The pleasure that many experience from these edibles is accompanied by a range of favorable and adverse effects on the brain that have been the focus of a wealth of recent research.
Coffee, Tea, Chocolate and the Brain presents new information on the long-debated issue about the beneficial and/or potentially negative effects on the brain of the consumption of coffee, tea, and chocolate. With caffeine as the common component in these beverages and food, this volume features important data on the effects of caffeine on sleep, memory, cognition, mood, performance, and more. It also contains specific information on new directions of research on the effect of caffeine on Parkinson's disease, seizures, ischemia, the stress axis, and brain development. Debate on the potential addiction to caffeine is included, as well as discussion of how chocolate and caffeine can induce or alleviate various types of headaches.
With contributions from world-renowned experts in the field, this up-to-date reference provides important information for scientists, researchers, industry professionals, and students involved in nutrition, neurology, neuropharmacology, clinical psychology, and other health-related sciences.
Code:
http://d.turboupload.com/d/740639/CTCBrain.rar.html
|
|
|
Outdoor Photographer Tip- Photographing the Moon
Code:
http://d.turboupload.com/d/740566/1.rar.html
|
|
|
Signal Transduction Protocols (Methods in Molecular Biology)
This newly revised edition features a collection of 'hands-on' desciptions of establishd laboratory protocols on receptor-mediated cell signaling, with particular attention devoted to those receptors that are part of the G-protein-linked superfamily.:
Code:
http://d.turboupload.com/d/740560/1.rar.html
|
|
|
Certified Ethical Hacking Exam prep
Certified Ethical Hacker Exam Prep By Michael Gregg
Publisher: Que
Pub Date: April 07, 2006
Print ISBN-10: 0-7897-3531-8
Print ISBN-13: 978-0-7897-3531-7
Pages: 696
The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam.
Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores.
Code:
http://d.turboupload.com/d/740524/CEHEP.rar.html
|
|
|
Mổi một bộ gõ đâu có cái nào phát huy hết tác dụng đâu nhĩ, có bộ gõ này thích hợp với trình duyệt Internet Explorer, bộ gõ kia thích hợp với trình duyệt Firefox nhưng không thích hợp với trình duyệt Opera .
Đâu có bộ gõ nào làm việc chính xác 100% và phát huy hết tác dụng đâu . HVA sử dụng bộ gõ nhằm tạo một phần điều kiện nào đó cho anh em có thể gõ tiếng Việt trên diễn đàn cho thuận lợi chứ có phải tạo bộ gõ này để anh em bàn tán ví dụ như : bộ gõ này có vấn đề, bộ gõ này bị gì đó mấy bồ ơi, ... Anh em không thông cảm và tích cực phát triễn diễn đàn trở lại vững mạnh như xưa thì thôi đằng này .... cứ đóng góp ý kiến .
Nói thật, nếu anh em muốn phát huy hết tác dụng bộ gõ này thì contact với tác giả của bộ gõ này vì qua kinh nghiệm thực tế của tôi, tôi sử dụng rất nhiều bộ gõ cho nhiều diễn đàn nhưng có bộ gõ này thích hợp với trình duyệt này nhưng không thích ứng với trình duyệt kia và bộ gõ trên HVA forum này cũng không ngoại lệ .
Nếu anh em muốn gõ tiếng Việt tốt thì nên download Unikey về và ... thử nghiệm . Nó hoàn toàn miễn phí và dung lượng khá nhỏ .
Vài ý kiến đóng góp .
|
|
|
Để kết nối internet thì người ta sử dụng trình ppp để kết nối .
Việc cần làm là bạn cài đặt driver cho PC của bạn (nếu chưa được cài đặt)
Driver modem
http://www.linmodems.org/
Sau đó sử dụng man ppp để mò xem chức năng này là gì ? từ đó khám phá nhiều cái thú vị
|
|
|
Quét virus, sử dụng Kaspersky để quét đảm bảo sẽ không gặp hiện tượng như trên . Máy tính của bạn có dính virus vì trường hợp này tôi có gặp khi post bài trên HVA . Chĩ có Kaspersky mới quét hết .
Sau khi quét xong thì từ đó đến nay không còn gặp lỗi giống như bạn nữa
Thân
|
|
|
Luật chơi tại Box Thông tin về các địa chỉ và tài liệu hữu ích
Box Thông tin về các địa chỉ và tài liệu hữu ích nhằm mục đích chia sẻ các tài nguyên như sách, báo, tạp chí, ... đến tay anh chị em .
Xin nán lại vài phút để đọc quy định của box này, HVA cần sự giúp đỡ và hỗ trợ của anh chị em để HVA ngày càng vững mạnh hơn .
Phân mục Thông tin về các địa chỉ và tài liệu hữu ích này không phải là nơi để quảng cáo, quảng bá các trang web cá nhân và các diễn đàn khác. Những bài mang tính quảng cáo sẽ bị xóa không cần báo trước. Các tài khoản vi phạm quy định này sẽ bị khóa 1 tuần cho vi phạm lần thứ nhất, 1 tháng cho vi phạm lần thứ nhì và 1 năm cho vi phạm lần thứ ba.
- Xin vui lòng nói KHÔNG đưa địa chĩ email của bạn lên Box này, những trường hợp đưa địa chĩ mail lên Box này, chúng tôi sẻ di chuyển bài viết của bạn xuống Box Trash mà không cần thông báo đến bạn qua chức năng tin nhắn có trong diễn đàn
- Các bài viết liên quan đến chat chit trong Box này đều được xóa .
- Bài viết gởi nhiều box và có hiện tương spam trong HVA đều bị xóa và có thể tài khoản của bạn bị treo một tháng hoặc xóa .
- Khi giới thiệu một cuốn sách, bạn nên ghi thông tin về cuốn sách đó bao gồm tên chính xác của sách, khái quát về cuốn sách đó, nếu có hình ảnh thì càng tốt .
- Link download phải tồn tại ít nhất 7 ngày để anh em khác có dịp tra cứu nhanh chóng hơn.
- Cấm gởi ebook của các tạp chí vi phạm đến thuần phong, mỹ tục của người Việt Nam . Anh em nên lựa chọn chủ đề sách để trao đổi với anh chị em khác như Security, System, Programming, Database, Operating System và Tạp chí liên quan đến tin học (Computer Science)
- Các link mà anh em cung cấp đảm bảo sau 3 tháng không tồn tại vì vậy nếu link hỏng hoặc không download được nữa thì anh em có nhu cầu cần upload lại thì cứ việc đặt yêu cầu lên,
Khi upload sách để chia sẻ với các anh em khác, anh em cần chú ý :
Upload sách thông qua các free hosting sau :
http://www.megaupload.com
http://rapidshare.de
http://www.mytempdir.com
http://www.zshare.net
http://www.turboupload.com
Sau khi upload xong, anh em đưa link trực tiếp vào HVA .
|
|
|
Photoshop Paint Hair and Clothes Like The Pros
"Hair and Clothes like the Pros Bundle" is a package that contains three easy to follow,
step by step tutorials that will teach you how to paint realistic hair and clothes for
your digital characaters.
Size : 18 MB
* - Amazing Hair Tutorial in PDF format
- Color Swatches used in my best images in ACT and jpg format
* - Paint Clothes like Pro's- Vol.1 in PDF format
- Color Swatch for the dress in ACT format
* - Paint Clothes like the Pros- Vol.2 in PDF format
- Color Swatches for the top, pants and scarf in ACT format
-The Poser poses from "Paint Clothes like the Pros" Tutorial Vol.1 and Vol.2
Code:
http://d.turboupload.com/d/737315/ptbundle.rar.html
|
|
|
Tải file .swf thì có thể sử dụng Save Flash
|
|
|
34 Collection of Nulled Scripts
-adRevenue [Nullified]
-Auto Gallery SQL v 2.1 [Nullified]
-AutoGallery Pro v2.0.0b [Nullified]
-AutoRank Pro v4.0.0 [Nullified]
-Calendar Now Pro v 2.0 [Nullified]
ClickSee AdNow v2.2.7 [Nullified]
DeskPRO Enterprise v2.0.1 [Nullified]
Devil TGP v2.9 [Nullified]
DigiShop 2.0.2 [Nullified]
Done Right Bid Search Engine v2.0 [Nullified]
e-Classifieds v4.1.2 Photo Edition [Nullified]
faqmaster
ImageFolio Commerce v1.0 [Nullified]
Lots more
Code:
http://d.turboupload.com/d/737288/34Scripts.rar.html
|
|
|
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
PDF | 755 pages | 11.33 MB
Author: Wenbo Mao (Hewlett Packard's Security Expert)
Publisher: Prentice Hall PTR, Copyright: Hewlett Packard (2004)
Language: English
ISBN: 0130669431
"This book would be a good addition to any cryptographer's bookshelf. The book is self-contained; it presents all the background material to understand an algorithm and all the development to prove its security. I'm not aware of another book that's as complete as this one."
--Christian Paquin, Cryptographic/Security Developer, Silanis Technology Inc. "The book is both complete, and extraordinarily technically accurate. It would certainly be a useful addition to any cryptographer's or crypto-engineer's library."
--Marcus Leech, Advisor, Security Architecture and Planning, Nortel Networks Build more secure crypto systems--and prove their trustworthiness Modern Cryptography is the indispensable resource for every technical professional who needs to implement strong security in real-world applications.
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents practical examples throughout and provides all the mathematical background you'll need.
Coverage includes:
- Crypto foundations: probability, information theory, computational complexity, number theory, algebraic techniques, and more
- Authentication: basic techniques and principles vs. misconceptions and consequential attacks
- Evaluating real-world protocol standards including IPSec, IKE, SSH, TLS (SSL), and Kerberos
- Designing stronger counterparts to vulnerable "textbook" crypto schemes
Mao introduces formal and reductionist methodologies to prove the "fit-for-application" security of practical encryption, signature, signcryption, and authentication schemes. He gives detailed explanations for zero-knowledge protocols: definition, zero-knowledge properties, equatability vs. simulatability, argument vs. proof, round-efficiency, and non-interactive versions.
Download
Code:
http://d.turboupload.com/d/737280/modcrypt_tnp.rar.html
|
|
|
Kết nối Internet trong Linux bạn sử dụng Kết nối trực tiếp hay thông qua proxy server ?
Nếu không qua Proxy server thì chẹck SAMBA
Nếu kết nối trực tiếp thông qua modem thì sử dụng setserial để scan device .
check lại /etc/wvdial.conf
Thân
|
|
|
Tôi đang sử dụng gõ tiếng Việt đây bạn, mọi việc đều ổn .
Code:
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.4)
Gecko/20060508 Firefox/1.5.0.4
Làm việc tốt khi sử dụng Windows XP , tôi test thử gõ tiếng Việt bằng kiểu gõ VNI hay Telex trên HVA đều được . Bạn check lại .
Để chuyển sang kiểu gõ khác, nhấn phím F9
|
|
|
HVA đang sử dụng JForum mà em .
|
|
|
Grammar Practice for Elementary Students
Product Details
Paperback: 178 pages
Publisher: Pearson English Language Teaching (May 2, 2000)
Language: English
ISBN: 0582417066
Synopsis
Organized into three stages, each dealing with a major area of grammar - nouns, adjectives and adverbs; prepositions; and verbs - this book provides students with straightforward grammar. It presents grammar points clearly and concisely and offers practice exercises to reinforce understanding. There are tests at the end of each stage and the book is designed for class or self-study.
Code:
http://d.turboupload.com/d/732196/Grammar.Practice.for.Elementary.Students.rar.html
|
|
|
Thread này close nhé anh em .
Vào đây chĩ tổ rắc rối cho PC của anh em mà thôi .
|
|
|
|
|
|
|