PDF, 65MB
Download
http://rapidshare.com/files/24344771/PhotoCS2BA.part3.rar
http://rapidshare.com/files/24343477/PhotoCS2BA.part2.rar
http://rapidshare.com/files/24341239/PhotoCS2BA.part1.rar
pass: metacafe.com/watch/463742/baby_funny_action
Photoshop CS2 For Dummies
Photoshop CS2 For Dummies
PDF, 37MB
Download
http://rapidshare.com/files/24354758/PhotoCS2Dum.part2.rar
http://rapidshare.com/files/24353860/PhotoCS2Dum.part1.rar
pass: metacafe.com/watch/463742/baby_funny_action
Photoshop Elements 4 for Dummies
Real World Camera Raw with Adobe Photoshop CS
Real World Camera Raw with Adobe Photoshop CS
PDF, 20MB
Download
pass: metacafe.com/watch/463742/baby_funny_action
Securing SCADA Systems
Securing SCADA Systems
By Ronald L. Krutz
Download
http://rapidshare.com/files/28479516/securingScada.rar
pass: http://girlsvietnam.blogspot.com/
Shoot Like a Pro! Digital Photography Techniques
Shoot Like a Pro! Digital Photography Techniques
PDF, 8MB
Download
pass: metacafe.com/watch/463742/baby_funny_action
Statistical Modeling by Wavelets
Statistical Modeling by Wavelets
Download
http://rapidshare.com/files/26463560/StatisticalWavelets.rar
pass: http://girlsvietnam.blogspot.com/
Vietnam War Reference Library: With Cumulative Index
Vietnam War Reference Library: With Cumulative Index
Download
http://rapidshare.com/files/5964942/VWAR_1.rar (1.9 Mb)
http://rapidshare.com/files/5964980/VWAR_2.rar (1.7 Mb)
http://rapidshare.com/files/5965065/VWAR_3.rar (3.5 Mb)
http://rapidshare.com/files/5964890/VWAR_4.rar (4Mb)
mirror
http://mihd.net/gy2klm
pass: http://vnphotos.blogspot.com/
The Welcome to the Creative Age - Bananas, Business and the Death of Marketing
The Welcome to the Creative Age - Bananas, Business and the Death of Marketing
Download
http://rapidshare.com/files/26895705/WelcomCreative.rar
pass: http://girlsvietnam.blogspot.com/
100 Super Supplements for a Longer Life
Frank Murray, «100 Super Supplements for a Longer Life»
McGraw-Hill | ISBN 0658009737 | 1 edition (November 1, 2000) | PDF | 1 Mb | 448 pages
Although humans can't live forever, life can be prolonged by paying more attention to diet, lifestyle, exercise, and the supplements that are the cornerstone of today's modern medicine. 100 Super Supplements for a Longer Life highlights the many vitamins, minerals, herbs, amino acids, phytonutrients, and other natural substances that are being used to prevent and/or treat heart disease, stroke, cancer, high blood pressure, diabetes, Alzheimer's disease, aging, and other debilitating illnesses.
Download
http://rapidshare.com/files/31214687/100.rar
pass: http://girlsvietnam.blogspot.com/
Business Week 2007 June 04th
Business Week 2007 June 04th
HQ Scan PDF | 120 pages | 26.0 MB
Download
http://rapidshare.com/files/33243938/BusinessWeek.07.06.04.rar
pass: http://www.vngirl.info/
Business Week 2007 May 28th
Business Week 2007 May 28th
HQ Scan PDF | 112 pages | 38.0 MB
Download
http://rapidshare.com/files/31927450/BusinessWeek.07.05.28.part2.rar
http://rapidshare.com/files/31926896/BusinessWeek.07.05.28.part1.rar
pass: http://bandwidth-test.blogspot.com/
Business week May 14 2007
Businessweek May 14 2007
PDF | English | 19 MB
PDF | English | 19 MB
BusinessWeek is a business magazine published by McGraw-Hill. It was first published in 1929 (as The Business Week) under the direction of Malcolm Muir, who was serving as president of the McGraw-Hill Publishing company at the time.
Download
http://rapidshare.com/files/55591657/BW.07.05.14.rar
pass: deadzoners.info
Business Week May 14 2007
Business week May 14 2007
PDF | English | 19 MB
PDF | English | 19 MB
BusinessWeek is a business magazine published by McGraw-Hill. It was first published in 1929 (as The Business Week) under the direction of Malcolm Muir, who was serving as president of the McGraw-Hill Publishing company at the time.
Download
http://rapidshare.com/files/29809728/BusinessWeek.07.05.14.rar
pass: http://girlsvietnam.blogspot.com/
Businessweek May 21 2007
BusinessWeek is a business magazine published by McGraw-Hill. It was first published in 1929 (as The Business Week) under the direction of Malcolm Muir, who was serving as president of the McGraw-Hill Publishing company at the time.
Download
http://rapidshare.com/files/30748409/Businessweek.07.05.21.rar
pass: http://girlsvietnam.blogspot.com/
Download
http://rapidshare.com/files/30748409/Businessweek.07.05.21.rar
pass: http://girlsvietnam.blogspot.com/
CNC Robotics: Build Your Own Workshop Bot
CNC Robotics: Build Your Own Workshop Bot
Download
http://rapidshare.com/files/28531849/CNC.rar
Pass:warez_akis
Dead - Essentials of Sport Nutrition 2nd Edition
Essentials of Sport Nutrition 2nd Edition
This book provides a concise introduction to the links between nutrition and physical performance. The author, a leading expert in the field, presents all the latest research and findings connecting diet and nutrition to peak performance. Armed with this information, readers can design and implement comprehensive nutritional programs for athletes and athletic teams based on their specific goals and needs.
Download
Link dead
http://rapidshare.com/files/869933/essentials_of_sports_nutrition.pdf
Link dead
http://rapidshare.com/files/869933/essentials_of_sports_nutrition.pdf
.
Exploiting Software : How to Break Code
Exploiting Software : How to Break Code
ISBN: 0201786958
Author: Greg Hoglund / Gary McGraw
Publisher: Addison-Wesley Professional
URL: /http://www.amazon.com/exec/obidos/redirect?tag=songstech-20&path=ASIN%2F0201786958
Summary:
Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, and Exploiting Software: How to Break Code shows you how to design your software so it's as resistant as possible to attack. Sure, everything's phrased in offensive terms (as instructions for the attacker, that is), but this book has at least as much value in showing designers what sorts of attacks their software will face (the book could serve as a checklist for part of a pre-release testing regimen). Plus, the clever reverse-engineering strategies that Greg Hoglund and Gary McGraw teach will be useful in many legitimate software projects. Consider this a recipe book for mayhem, or a compendium of lessons learned by others. It depends on your situation.
PHP programmers will take issue with the authors' blanket assessment of their language ("PHP is a study in bad security"), much of which seems based on older versions of the language that had some risky default behaviors--but those programmers will also double-check their servers' register_globals settings. Users of insufficiently patched Microsoft and Oracle products will worry about the detailed attack instructions this book contains. Responsible programmers and administrators will appreciate what amounts to documentation of attackers' rootkits for various operating systems, and will raise their eyebrows at the techniques for writing malicious code to unused EEPROM chips in target systems. --David Wall
Topics covered: How to make software fail, either by doing something it wasn't designed to do, or by denying its use to its rightful users. Techniques--including reverse engineering, buffer overflow, and particularly provision of unexpected input--are covered along with the tools needed to carry them out. A section on hardware viruses is detailed and frightening.
Download
http://rapidshare.de/files/33020473/GHoglund.rar.html
OR
http://www.oxyshare.com/get/13130137745088996532b0/GHoglund.rar.html
OR
http://depositfiles.com/files/257524/GHoglund.rar.html
http://rapidshare.de/files/33020473/GHoglund.rar.html
OR
http://www.oxyshare.com/get/13130137745088996532b0/GHoglund.rar.html
OR
http://depositfiles.com/files/257524/GHoglund.rar.html
Fuzzy Control Systems
Fuzzy Control Systems
Summary:
Fuzzy Control Systems explores one of the most active areas of research involving fuzzy set theory. The contributors address basic issues concerning the analysis, design, and application of fuzzy control systems. Divided into three parts, the book first devotes itself to the general theory of fuzzy control systems. The second part deals with a variety of methodologies and algorithms used in the analysis and design of fuzzy controllers. The various paradigms include fuzzy reasoning models, fuzzy neural networks, fuzzy expert systems, and genetic algorithms. The final part considers current applications of fuzzy control systems. This book should be required reading for researchers, practitioners, and students interested in fuzzy control systems, artificial intelligence, and fuzzy sets and systems.
Download
http://rapidshare.com/files/33144615/Fuzzy.rar
pass: http://www.vngirl.info/
http://rapidshare.com/files/33144615/Fuzzy.rar
pass: http://www.vngirl.info/
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
Hacking Exposed Cisco Networks:
Cisco Security Secrets & Solutions
by Andrew A. Vladimirov, Konstantin V. Gavrilenko, Janis N. Vizulis and Andrei A. Mikhailovsky
Publisher: Mcgraw-Hill Osborne Media; 1 edition (December 15, 2005)
Language: English
ISBN: 0072259175
Pages:400
Format:CHM
Size:9.8 MB
Implement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It’s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You’ll prevent tomorrow’s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you’ll get undocumented Cisco commands, security evaluation templates, and vital security tools.
Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
Download
http://rapidshare.com/files/29567576/hac_exp_net_sec_and_sol.rar
pass: http://girlsvietnam.blogspot.com/
http://rapidshare.com/files/29567576/hac_exp_net_sec_and_sol.rar
pass: http://girlsvietnam.blogspot.com/