|
|
bolzano_1989 wrote:
Ky0shir0 wrote:
Theo mình, các bài viết trong đấy giờ lôi ra "nhặt sạn" thì thật là phí thời gian quá .Các bài viết đấy chỉ có tác dụng thám khảo, hơn nữa nếu muốn bàn lại vấn đề cũ thì nên mang xuống box nào đấy phù hợp mà trao đổi.
Sao lại phí thời gian? Đã đưa vào phòng đọc thì bài viết phải có chất lượng cao, thành viên mới có thể đọc và tin tưởng những kiến thức trong đó.
Hi bolzano_1989,
Muốn trao đổi về cái gì từ các bài viết trong phòng đọc hãy theo link bài viết đấy tìm đến chủ đề đã được đăng trong diễn đàn để reply, hoặc tốt hơn là mở một chủ đề mới ở box thích hợp để trao đỗi cho thoải mái. Nói thế bạn hiểu chưa nhỉ?
Phí hay không phí thời gian còn tuỳ vào người tiếp nhận. Không phải bài nào trong "phòng đọc" cũng có chất lượng cao và hữu dụng mãi đâu, đọc sách mà tin sái cổ vào sách thì đừng nên đọc.
|
|
|
Theo mình, các bài viết trong đấy giờ lôi ra "nhặt sạn" thì thật là phí thời gian quá .Các bài viết đấy chỉ có tác dụng thám khảo, hơn nữa nếu muốn bàn lại vấn đề cũ thì nên mang xuống box nào đấy phù hợp mà trao đổi.
|
|
|
Aaron Philipp, "Hacking Exposed Computer Forensics: Secrets & Solutions"
Publisher: Mc/Gra w-H | ISBN: 0071626778 | edition 2009 | PDF | 545 pages | 11,6 mb
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with council, prepare court-ready reports, and work through legal and organizational challenges.
Links download:
http://filepost.com/files/344d5113/44.pdf/
http://depositfiles.com/files/q1lh53qjv
http://turbobit.net/36srx78ci9j8.html
|
|
|
Mình đã đọc qua bài "Mã hóa root file system với FreeBSD geli " của pnco, trước đó là bài "Nếu tôi là Huyremy" của mrro.
Mình muốn mã hoá root file system như pnco đã làm trên FreeBSD nhưng là trên Ubuntu. Bạn nào đã làm qua cho mình xin vài lời khuyên và tài liệu hướng dẫn về cách làm này.
Sau khi thực hiện việc mã hoá, mình muốn sử dụng Tor ( http://tor.eff.org) để kiểm soát mọi thứ đi ra khỏi máy tính của mình khi mình kết nối internet.
cảm ơn.
|
|
|
http://avaxsearch.com/avaxhome_search?q=%22RUBY+language%22&commit=Go
Regards
|
|
|
- "Bank" là bank nào vậy vikjava?
- gamma95: mình là hacker đây nhưng mình ngại tiếp xúc với loại không rõ giới tính
|
|
|
http://congdongit.org/windows/1534-gioi-thieu-tracert-va-cach-su-dung-tracert.html
Google...
|
|
|
Công việc của Ky0shir0 đang làm là quản trị hệ thống web-server của công ty. Thực lòng mà nói, hệ thống hoạt động ổn định hay không là "miếng cơm manh áo" của mình.
Ky0shir0 phản đối mọi hành động chọc ngoáy vào hệ thống của mình đang quản lý vì bất kỳ lý do và động cơ nào! Dĩ nhiên trừ khi đó là chỉ thị bằng văn bản của sếp
|
|
|
Hi anh.
Anh cũng từng quản trị rất nhiều hệ thống, vậy anh đã ứng xử thế nào với những người "đang đêm trổ ngói chui vào". Ở đây, cứ cho mặc định là họ vào "làm việc tốt" và hệ thống anh quản trị là "thương mại".
Ky0shir0
|
|
|
conmale wrote:
Để không bị tóm, điều duy nhất có thể làm là tìm kiếm sự đồng ý của chủ nhân thay vì lẳng lặng mà thực hiện việc này. Không có một bào chữa nào có thể được coi là thoả đáng nếu như không có sự đồng ý của chủ nhân ngay cả việc "hack" này không tạo ra bất cứ dung hại nào. Nếu vẫn muốn tiến hành theo kiểu "underground" thì phải dàn dựng đường đi nước bước để dấu vết và tạo những khó khăn trong việc truy tìm thủ phạm.
Hi anh conmale.
Đoạn này em chưa hiểu, mong anh nói rõ hơn được không?
|
|
|
Cập nhật link mới:
FileServer:
http://www.fileserve.com/file/FhWkGvK
RapidShare:
http://rapidshare.com/files/455935849/Acunetix.Web.Vulnerability.Scanner.v7.0.Cracked-MESMERiZE.rar
Best Regards
|
|
|
Suresh Krishna and TC Fenstermaker, "IBM Rational Team Concert 2 Essentials"
Pa ckt Publi shing | 2011 | ISBN: 1849681600 | 308 pages | PDF + source code | 10 + 37,6 MB
Improve your team productivity with Integrated Process, Planning, and Collaboration using Team Concert Enterprise Edition
Understand the core features and techniques of Rational Team Concert and Jazz platform through a real-world Book Manager Application
Expand your knowledge of software development challenges and find out how Rational Team Concert solves your tech, team, and collaboration worries
Complete overview and understanding of the Jazz Platform, Rational Team Concert, and other products built on the Jazz Platform
Explore out-of-the-box projects with the 'Sandbox' feature of the Jazz Platform, even before you install Rational Team Concert
A practical guide by a Rational Team Concert expert, with a simple, step-by-step approach to solve your team management and collaboration worries
In Detail
Software development is a collaborative effort needing active and timely input and response from all its members. Every day, project managers face ever-increasing pressures to produce high-quality software with increasing constraints. With IBM's Rational Team Concert collaborative software delivery environment, you can tremendously improve the productivity of your entire team through a web-based user-interface, continuous builds, a customizable process with work support, team support, integration and many more features.
Written by Suresh Krishna and TC Fenstermaker, experts on Rational Team Concert, this book will help you leverage the full potential of the IBM Rational Team Concert platform to improve your individual and team performance. It follows a realistic case-study example enabling you to learn about Rational Team Concert fundamentals and best practices along the way to efficiently manage your software projects and tackle various software development challenges.
Beginning with an in-depth analysis of software development challenges, the book goes on to introduce the Jazz Platform followed by a complete overview of the architecture of Rational Team Concert. After you install Rational Team Concert on WebSphere and learn to configure the server and clients, you will see all the features in relation to Web and Eclipse clients.
From Chapter 3 onwards a realistic sample application is constructed to give you a strong grasp of your concepts. As you proceed, you learn source control, the mechanism to create, control, and manage documents, artifacts in a software development lifecycle, followed by different tools that Rational Team Concert offers for effective team and work management. You tackle the various challenges of Team Collaboration by integrated e-mail, instant messaging, events, feeds, and work items, the basic units of the task. You also learn the various aspects of the software development process and release planning along with process templates, which provide the initial process and iteration of your project. Finally, you extend the Rational Team Concert and make use of the Jazz Platform APIs to customize your process to fit your organizational needs.
A comprehensive and practical guide to get acquainted with Rational Team Concert and Jazz Platform, boosting your individual and team productivity
Download Book
http://uploading.com/files/mf314585/1849681600TeamConcert.pdf/
http://www.filesonic.com/file/416537124/1849681600TeamConcert.pdf
Download source code
http://uploading.com/files/e317a815/1849681600_Code.zip/
http://www.filesonic.com/file/416567311/1849681600_Code.zip
Nguồn: www.avaxhome.ws
|
|
|
Moodle Security By Darko Mileti
Publisher: Pa,.kt Publis hing 2011 | 204 Pages | ISBN: 1849512647 | PDF | 5 MB
Learn how to install and configure Moodle in the most secure way possible
Follow the practical examples to close up any potential security holes, one by one
Choose which parts of your site you want to make public and who you are going to allow to access them
Protect against web robots that send harmful spam mails and scan your site's information
Learn how to monitor site activity and react accordingly
In Detail
Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys at bay.
Moodle Security will show you how to make sure that only authorized users can access the information on your Moodle site. This may seem simple, but, every day, systems get hacked and information gets lost or misused. Imagine the consequences if that were to happen in your school. The straightforward examples in this book will help you to lock down those access routes one door at a time.
By learning about the different types of potential threat, reading this book will prepare you for the worst. Web robots can harvest your e-mail addresses to send spam e-mails from your account, which could have devastating effects. Moodle comes with a number of set roles and permissions - make sure these are assigned to the right people, and are set to keep out the spam bots, using Moodle's authentication features. Learn how to secure both Windows and Linux servers and to make sure that none of your system files are accessible to the wrong people. Many of the most dangerous web attacks come from inside your system, so once you have all of your security settings in place, you will learn to monitor user activity to make sure that there are no threats from registered users. You will learn to work with the tools that help you to do this and enable you to back up your settings so that even a crashed system can't bother you.
Protect your students and staff by securing Moodle to prevent online attacks and hacks
What you will learn from this book
Use CAPTCHA to make sure that humans are creating new accounts on Moodle - not Spambots
Configure PHP and Apache servers to protect your Windows and Linux systems from malicious threats
Assign the most appropriate permissions to different files to ensure the right level of protection
Create custom roles to control who accesses what
Protect your site from external attacks with secure HTTP
Organize regular anti-virus scans to ensure no new risks have been introduced to the system
Monitor the security of Moodle easily with notifications and security reports
Minimize the downtime of Moodle in the case of actual damage
http://www.filesonic.com/file/383977864
http://depositfiles.com/files/amvrnrk24
http://uploading.com/files/684584ae/Moodle.Security.pdf/
Nguồn: www.avaxhome.ws
|
|
|
Pierpaolo Degano, Sandro Etalle, Joshua Guttman, "Formal Aspects of Security and Trust"
Sp rin ger | 2011 | ISBN: 3642197507 | 249 pages | PDF | 2,5 MB
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies.
http://uploading.com/files/3abe8b9a/3642197507Security.rar/
http://www.filesonic.com/file/351659214/3642197507Security.rar
Nguồn: www.avaxhome.ws
|
|
|
Hacking Exposed: Web Applications, 3rd Edition By Joel Scambray, Vincent Liu, Caleb Sima
Publisher: Mc/Gr.aw-Hi.ll, 3rd Edition 2011 | 482 Pages | ISBN: 0071740643 | PDF | 7 MB
The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource.
* Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster
* See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation
* Understand how attackers defeat commonly used Web authentication technologies
* See how real-world session attacks leak sensitive data and how to fortify your applications
* Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques
* Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments
* Safety deploy XML, social networking, cloud computing, and Web 2.0 services
* Defend against RIA, Ajax, UGC, and browser-based, client-side exploits
* Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures
http://www.filesonic.com/file/253845254/Hacking.Exposed.Web.Applications.3rd.Edition.pdf
http://depositfiles.com/files/0odtcp7rh
http://uploading.com/files/4ce8a94m/Hacking.Exposed.Web.Applications.3rd.Edition.pdf/
Nguồn: www.avaxhome.ws
|
|
|
Tham khảo link mình đưa nhé.
http://avaxsearch.com/avaxhome_search?q=P2P&a=&c=5&l=7&sort_by=&commit=Search
Regards
|
|
|
Committee on Deterring Cyberattacks:
Informing Strategies and Developing Options, "Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy"
Publisher: N/*/*/l Academies Press | 2010 | ISBN: 0309160359 | PDF | 400 pages | 2.9 MB
In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed.
http://depositfiles.com/files/jsbf72cca
http://www.filesonic.com/file/117523441
Nguồn: www.avaxhome.ws
|
|
|
...làm sao để một người có thể ngồi trước máy tính của mình không thể đổi root password?
Làm như thế để được gì nhỉ?
|
|
|
Có hàng vạn câu hỏi như thế này rồi. Tìm đọc ngay trong box "Thảo luận định hướng này"
|
|
|
Gilbert Held, "Learn Encryption Techniques with BASIC and C++"
Wordw.re Publishing | 1998 | ISBN: 1556225989 | CHM | 401 pages | 2,8 MB
A highly experienced computer book author and expert in the area of security and communications provides experienced programmers with a step-by-step examination of the development of encryption techniques, from the Caesar Cipher through modern-day public and private key encryption methods.
This manual provides readers with a step-by-step examination of the development of encryption techniques from the Caesar cipher to modern-day public and private key encryption methods. It gives examples which show how messages, files and notes can be programmed with different levels of security. Numerous techniques are explained in detail, followed by the development of program modules in both Basic and C++.
http://uploading.com/files/62724d2f/1556225989Encryption.rar/
http://depositfiles.com/files/wqbm5zee0
http://www.filesonic.com/file/73968734/1556225989Encryption.rar
Comment: Quyển sách này cũ nhưng Ky0shir0 nghĩ nó hữu ích cho các bạn mới làm quen với Encryp.
Nguồn: www.avaxhome.ws
|
|
|
daothinh1991 wrote:
tình hình là nhà mình dùng mạng trả sau
mà thằng bạn hàng xóm lại dùng mạng trả trước nhưng số cổng mạng thì hết toi mất rồi không thể cắm thêm giắc nào.Sau đó mình nghe nói là nếu mình mở port router của nó thì khi truy cập đến route của hắn thì mình sẽ dùng mạng nhà hắn chứ không phải của nhà mình sẽ tiết kiệm được số tiền ít ỏi mẹ mình hạn chế cho dùng mạng mỗi tháng . Nhưng mình vẫn chưa hiểu thực hư của việc này .Bạn nào có hiểu biết về nó có thể chỉ giúp cho mình không .Nếu có thì co thể hướng dẫn mình cụ thể thì cám ơn rất nhiều .Nói chung mình là một tay ngang nên nếu các bạn thấy gà quá cũng đừng cười mình nha
Tình hình rất là tình hình... bạn nên dừng ý nghĩ đó lại đi, trước khi quá muộn!
|
|
|
Social Engineering: The Art of Human Hacking By Christopher Hadnagy, Paul Wilson
Publisher: W i l e y 2010 | 408 Pages | ISBN: 0470639539 | EPUB | 6 MB
The first book to reveal and dissect the technical aspect of many social engineering maneuvers
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.
Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.
* Examines social engineering, the science of influencing a target to perform a desired task or divulge information
* Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
* Reveals vital steps for preventing social engineering threats
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.
http://www.filesonic.com/file/73668365/Social_Engineering_-_Christopher_Hadnagy.rar
http://depositfiles.com/files/4gegbcv6c
http://uploading.com/files/99c1e19d/Social+Engineering+-+Christopher+Hadnagy.rar/
Nguồn: http://avaxhome.ws
|
|
|
eicar wrote:
Theo em thì hvaonline không phải là một nơi tốt để học (em xin lỗi khi nói điều này), để học thì cần sự tập trung và có sự hướng dẫn nghiêm chỉnh để tránh đi vào những điều tiểu tiết. Trên diễn đàn cũng có những người rất giỏi, và một vài ý kiến hiếm hoi của những người này có thể giúp ích đôi chút. Tuy vậy em thấy diễn đàn hvaonline có lẽ sa vào việc trao đổi các tricks hơn là những ý kiến nghiêm túc
Ky0shir0 không đồng tình với bạn về quan điểm này. Học cái gì? Học như thế nào? Học để làm gì?
---> Mình đề nghị bạn nêu dẫn chứng cụ thể, đừng phán suông thế.
eicar wrote:
Em đọc bài của anh conmale thì rất thán phục về khả nãng thực tế của anh cũng như sự nhiệt tình của anh với những người khác. Nhưng em nghĩ cách nhìn của anh conmale cũng thiên về những kinh nghiệm cụ thể mà anh có được khi làm việc cho cơ quan của anh : phân tích TCP/IP, phòng chống tấn công DOS, Unix/Linux, ...Phải nói là anh conmale cực kỳ thành thạo trong những công việc như vậy. Nhưng những kỹ năng cụ thể này, em xin lỗi, lại trở nên vô ích khi phải đối mặt với các vấn đề khác hẳn : Cryptographie, Virus, Windows, ...
về phần này thời gian sinh hoạt ở HVA về lâu dài bạn sẽ tự ngộ ra.
Best Regards
|
|
|
roro95 wrote:
Cho em hỏi có phần mềm nào dịch file văn bản từ Anh sang Việt không?
Em đang dùng babylon nhưng lại không biết thêm bộ từ điển của lạc việt vào như thế nào để nó dịch cho hay và sát nghĩa nữa
Softwares thì theo tôi chỉ nên tra từ vựng. Nếu cần bạn có thể nhờ Google dịch hộ. Dịch hay và sát nghĩa thì chắc là khó tìm
|
|
|
Harold F. Tipton, "Official (ISC)2 Guide to the SSCP CBK, Second Edition"
A,erbach Publications | 2010 | ISBN: 1439804834 | 467 pages | PDF | 3,8 MB
The (ISC)²® Systems Security Certified Practitioner (SSCP®) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK® has quickly become the book that many of today’s security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)² CBK.
Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text:
Presents widely recognized best practices and techniques used by the world's most experienced administrators
Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding
Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)² certification
Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.
http://uploading.com/files/492457c6/1439804834SSCPguideB.rar/
http://depositfiles.com/files/uzs95aspv
http://www.filesonic.com/file/65653274/1439804834SSCP.rar
Nguồn: www.avaxhome.ws
|
|
|
Bhavani Thuraisingham, "Secure Semantic Service-Oriented Systems"
Aue rb ach Publications | 2010 | ISBN: 1420073311 | 463 pages | PDF | 2,7 MB
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is essential.
Reviewing cutting-edge developments, Secure Semantic Service-Oriented Systems focuses on confidentiality, privacy, trust, and integrity management for Web services. It demonstrates the breadth and depth of applications of these technologies in multiple domains. The author lays the groundwork with discussions of concepts in trustworthy information systems and security for service-oriented architecture. Next, she covers secure Web services and applications—discussing how these technologies are used in secure interoperability, national defense, and medical applications.
Divided into five parts, the book describes the various aspects of secure service oriented information systems; including confidentiality, trust management, integrity, and data quality. It evaluates knowledge management and e-business, concepts in services technologies, information management, semantic Web security, and service-oriented computing. You will also learn how it applies to Web services, service-oriented analysis and design, and specialized and semantic Web services.
The author covers security and design methods for service-oriented analysis, access control models for Web Services, identity management, access control and delegation, and confidentiality. She concludes by examining privacy, trust, and integrity, the relationship between secure semantic Web technologies and services, secure ontologies, and RDF. The book also provides specific consideration to activity management such as e-business, collaboration, healthcare, and finance.
http://depositfiles.com/files/w8yo15jg8
http://www.filesonic.com/file/65648157/1420073311Semantic.rar
Nguồn: www.avaxhome.ws
|
|
|
Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard, "Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code" ( DVD included )
Wiley | ISBN: 0470613033 | November 2, 2010 | 744 pages PDF + ISO | 703 MB
A computer forensics "how-to" for fighting malicious code and analyzing incidents
With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
Download:
http://hotfile.com/dl/98097387/443ac26/Malware_Analysts.part1.rar.html
http://hotfile.com/dl/98097391/dbf3c15/Malware_Analysts.part2.rar.html
http://hotfile.com/dl/98097392/452caaf/Malware_Analysts.part3.rar.html
http://hotfile.com/dl/98097393/f49886d/Malware_Analysts.part4.rar.html
http://hotfile.com/dl/98097390/d2f3bd4/Malware_Analysts.part5.rar.html
http://hotfile.com/dl/98097389/c57c4df/Malware_Analysts.part6.rar.html
http://hotfile.com/dl/98097394/1abfaa1/Malware_Analysts.part7.rar.html
Nguồn: www.avaxhome.ws
|
|
|
dazzlingvit wrote:
Em đang học BK HN. Anh (chị) có thể phân tích cho em nên học Công nghệ thông tin hay Điện tử viễn thông không ạ? Em hơi phân vân
Nếu đã phân vân thì đừng chọn CNTT.
|
|
|
Programming Python By Mark Lutz
Publisher: O'R e i l l y Me dia 2010 | 1630 Pages | ISBN: 0596158106 | PDF + EPUB | 49 MB
If you've mastered Python's fundamentals, you're ready to start using it to get real work done. Programming Python will show you how, with in-depth tutorials on the language's primary application domains: system administration, GUIs, and the Web. You'll also explore how Python is used in databases, networking, front-end scripting layers, text processing, and more. This book focuses on commonly used tools and libraries to give you a comprehensive understanding of Python’s many roles in practical, real-world programming.
You'll learn language syntax and programming techniques in a clear and concise manner, with lots of examples that illustrate both correct usage and common idioms. Completely updated for version 3.x, Programming Python also delves into the language as a software development tool, with many code examples scaled specifically for that purpose.
Topics include:
* Quick Python tour: Build a simple demo that includes data representation, object-oriented programming, object persistence, GUIs, and website basics
* System programming: Explore system interface tools and techniques for command-line scripting, processing files and folders, running programs in parallel, and more
* GUI programming: Learn to use Python’s tkinter widget library
* Internet programming: Access client-side network protocols and email tools, use CGI scripts, and learn website implementation techniques
* More ways to apply Python: Implement data structures, parse text-based information, interface with databases, and extend and embed Python
http://www.filesonic.com/file/60275509/Programming.Python.4th.Edition.rar
http://depositfiles.com/files/wthwi4afx
http://uploading.com/files/e5a36cce/Programming.Python.4th.Edition.rar/
Nguồn: http://avaxhome.ws
|
|
|
Hì hì, tơ tưởng cô bé này à? dùng cái nick "p3My_shjnk" quăng lên google có khối thứ để tìm. Bạn cố lên!
Mấy cái này chẳng có gì là "thâm nhập" cả, kỹ năng tìm kiến sẽ giúp bạn có gần như mọi thứ trong trường hợp này.
|
|
|
|
|
|
|