Ebook Hacker

misc2/ 05-Nov-2007 21:36 -
Makefile 23-Oct-2007 17:46 2.9K
bash.lisp 16-Aug-2007 19:58 9.0K
beta-reduce.lisp 17-Apr-2007 16:45 8.3K
book-thms.lisp 03-Oct-2007 15:15 3.6K
certify.lsp 01-Jan-2001 22:43 254
computed-hint.lisp 14-Nov-2001 23:00 17K
csort.lisp 23-Apr-2004 10:53 17K
defmac.lisp 17-Jul-2006 17:51 2.1K
defopener.lisp 23-Oct-2007 17:26 19K
defp.lisp 15-Oct-2007 17:56 5.5K
defpun.lisp 27-Aug-2007 10:56 19K
dft-ex.acl2 27-Jun-2003 10:02 63
dft-ex.lisp 06-Oct-2001 21:03 4.5K
dft.lisp 06-Oct-2001 21:02 29K
dump-events.lisp 20-May-1998 20:07 5.5K
expander.lisp 04-Jun-2007 10:47 56K
fibonacci.lisp 15-Feb-2007 20:12 5.8K
file-io.lisp 13-Feb-2006 14:35 3.0K
find-lemmas.lisp 06-Aug-2005 20:47 2.9K
goodstein.lisp 18-Jun-2007 10:29 4.5K
grcd.lisp 18-Jan-2004 09:58 19K
hacker.acl2 17-Apr-2007 13:02 1.9K
hacker.lisp 04-Jun-2007 23:39 16K
hanoi.acl2 02-Aug-2005 16:43 182
hanoi.lisp 02-Aug-2005 16:47 12K
hons-help.lisp 12-Oct-2007 14:49 22K
hons-help2.lisp 18-Jul-2007 23:37 1.8K
hons-tests.lisp 16-Oct-2007 16:50 1.6K
how-to-prove-thms.lisp 02-Aug-2005 14:09 23K
int-division.lisp 27-Nov-2001 16:06 8.0K
integer-type-set-tes..> 24-Jun-2007 09:31 1.8K
meta-lemmas.lisp 20-May-1998 20:08 8.1K
mult.lisp 25-Aug-2003 12:44 34K
priorities.lisp 13-Jul-2006 15:24 9.2K
problem13.lisp 22-Aug-2003 11:06 4.6K
process-book-readme...> 24-Feb-2006 11:36 5.7K
qi-correct.lisp 24-Oct-2007 13:12 15K
qi.lisp 16-Oct-2007 16:47 33K
radix.acl2 30-Jul-2005 07:16 183
radix.lisp 30-Jul-2005 07:18 4.8K
records.lisp 23-May-2007 15:09 8.1K
records0.lisp 26-Nov-2001 14:53 11K
rtl-untranslate.lisp 18-Sep-2005 08:23 29K
simplify-defuns.lisp 19-Oct-2006 08:05 43K
simplify-defuns.txt 12-Sep-2002 11:14 18K
sin-cos.lisp 11-May-2001 14:00 11K
sort-symbols.lisp 21-Jul-2006 17:17 5.7K
sticky-disable.lisp 21-Jan-2006 05:57 2.2K
symbol-btree.lisp 08-Jun-2004 13:17 5.8K
total-order.lisp 26-Nov-2001 12:23 696
transfinite.lisp 17-Sep-2007 17:59 3.8K
untranslate-patterns..> 12-Jun-2006 15:36 19K

Download

Posted in Label: | 0 komentar

Ebook Botnets: The Killer Web Applications

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.









Download

Posted in Label: | 0 komentar

Ebook Computer on FTP

addison wesley - a programmer's guide to java certification. second edition.chm
addison wesley - an introduction to parallel computing, second edition.chm
addison wesley - building solutions with the microsoft .net compact framework.chm
addison wesley - code reading. the open source perspective.chm
addison wesley - database design for mere mortals.chm
addison wesley - designing storage area networks. 2nd edition.chm
addison wesley - eclipse modeling framework.chm
addison wesley - hypertransport system architecture.chm
addison wesley - ip storage networking. straight to the core.chm
addison wesley - java development on pda's. building applications for pocket pc and palm devices.chm
addison wesley - managing software requirements, second edition.chm
addison wesley - mda explained. the model driven architecture.chm
addison wesley - moving to linux. kiss the blue screen of death goodbye!.chm
addison wesley - open source web development with lamp.chm
addison wesley - pci express system architecture.chm
addison wesley - perl medic. transforming legacy code.chm
addison wesley - pocket pc network programming.chm
addison wesley - principles of the business rule approach.chm
addison wesley - rational unified process made easy.chm
addison wesley - real 802.11 security. wi-fi protected access and 802.11i.chm
addison wesley - rtp. audio and video for the internet.chm
addison wesley - software architecture in practice, second edition.chm
addison wesley - text processing in python.chm
addison wesley - understanding and deploying ldap directory services, 2nd edition.chm
addison wesley - xml data management. native xml and xml-enabled database.chm
addison-wesley - software engineering and computer games.chm
addison-wesley - wi-foo. the secrets of wireless hacking.chm
Administering Cisco QoS.pdf
a-list publishing - advanced 3ds max 5 modeling and animating.chm
a-list publishing - pc hardware tuning and acceleration.chm
a-list publishing - windows .net server 2003 domains & active directory.chm
a-list publishing - windows server 2003 registry.chm
alm os programming bible.pdf
Apache Server 2 Bible - HUNGRY MINDS.pdf
apress - professional php4.chm
artech house - gprs for mobile internet.chm
and etc

Download

Posted in Label: | 2 komentar