Reversing Secrets of Reverse Engineering

Posted in | 0 komentar

Collection ebook Hacking

A Novice's Guide to Hacking 2004.txt> 28-Oct-2006 12:24 41k
A Short HACKER SPEAK Glossary.txt> 28-Oct-2006 12:24 10k
A simple TCP spoofing attack.txt> 28-Oct-2006 12:24 15k
Accessing microsoft iis configurations remotely.pdf> 28-Oct-2006 09:45 96k
Accessing the bindery files directly.txt> 28-Oct-2006 12:24 4k
Almost Everything You Ever Wanted To Know About Security (but.txt> 28-Oct-2006 12:24 46k
An Architectural Overview of UNIX Network Security.htm> 28-Oct-2006 12:24 53k
An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt> 28-Oct-2006 12:24 40k
An Introduction to Denial of Service.txt> 28-Oct-2006 12:25 45k
An Introduction to the Computer Underground.txt> 28-Oct-2006 12:25 17k
Analyzing 0day Hacker Tools.pdf> 28-Oct-2006 12:26 988k
BBS Crashing Techniques.txt> 28-Oct-2006 12:26 4k
Basic Networking.txt> 28-Oct-2006 12:26 14k
Blind Injection in MySQL Databases.txt> 28-Oct-2006 12:26 8k
Bluetooth Hacking.pdf> 28-Oct-2006 09:45 354k
Cellular Telephone Phreaking Phile Series VOL 1.txt> 28-Oct-2006 12:26 10k
Cisco wireless network security guide.pdf> 28-Oct-2006 09:48 1.6M
kracking the Sam file.txt> 28-Oct-2006 12:26 9k
kracking the Universal Product Code.txt> 28-Oct-2006 12:26 7k
Defeating microsoft windows 2003 stack protection.pdf> 28-Oct-2006 09:48 110k
Demystifying Google Hacks.pdf> 28-Oct-2006 09:48 75k
Drake's Phreaking Tutorial.txt> 28-Oct-2006 12:26 3k
Ebook - Tcpip Network Administration (O'Reilly).pdf> 28-Oct-2006 09:55 5.1M
Fiber Optics Technicians Manual.pdf> 28-Oct-2006 10:00 3.5M
Formulating A Company Policy on Access to and Use and Disclos.txt> 28-Oct-2006 12:26 12k
Free Speech in Cyberspace.txt> 28-Oct-2006 12:27 244k
Gender Issues in Online Communications.txt> 28-Oct-2006 12:27 25k
Google Hacks.pdf> 28-Oct-2006 10:04 2.9M
Government Computer Security Techniques.txt> 28-Oct-2006 12:27 8k
Guide to Hacking with sub7.doc> 28-Oct-2006 12:27 106k
[TXT] HACKDICT.TXT 28-Oct-2006 12:38 267k
HACKING & CRACCKING & PHREAKING.txt> 28-Oct-2006 12:45 3k
Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit
(Wiley-2001).pdf> 28-Oct-2006 12:38 8.1M
Hacker Digest Spring 2002.pdf> 28-Oct-2006 10:04 470k
Hacker Digest Winter 2002.pdf> 28-Oct-2006 10:06 961k
Hacker Test.txt> 28-Oct-2006 12:38 19k
Hackers A-Z.TXT> 28-Oct-2006 12:38 251k
Hackers Beware (NewRiders -2002).pdf> 28-Oct-2006 12:44 4.6M
Hacking Databases.txt> 28-Oct-2006 12:45 12k
Hacking For Newbies.doc> 28-Oct-2006 12:45 54k
Hacking Guide3.1.pdf> 28-Oct-2006 10:07 1.2M
Hacking P2P Users Tutorial.txt> 28-Oct-2006 12:46 9k
Hacking Password Protected Website's.doc> 28-Oct-2006 12:46 3k
Hacking TRW.txt> 28-Oct-2006 12:46 3k
Hacking TYMNET.txt> 28-Oct-2006 12:46 6k
Hacking Unix System V's.txt> 28-Oct-2006 12:46 11k
Hacking VoiceMail Systems.txt> 28-Oct-2006 12:46 26k
Hacking Wal-Mart Computers.txt> 28-Oct-2006 12:46 4k
Hacking Webpages.txt> 28-Oct-2006 12:46 4k
Hacking a Website Or Its Member Section.txt> 28-Oct-2006 12:45 2k
Hacking for Dummies Volume 2.doc> 28-Oct-2006 12:45 147k
Hacking for Dummies.pdf> 28-Oct-2006 10:06 171k
Hacking for Newbies tutorial.txt> 28-Oct-2006 12:45 16k
Hacking the Hacker.pdf> 28-Oct-2006 10:08 212k
How BT phone cards works.txt> 28-Oct-2006 12:46 4k
How Phone Phreaks are Caught.txt> 28-Oct-2006 12:46 12k
How To Display An IP With PHP.txt> 28-Oct-2006 12:46 1k
How To Hack Into PayPal Account!!!.txt> 28-Oct-2006 12:46 10k
How To Read News Groups Semi-An.txt> 28-Oct-2006 12:46 4k
How the Traditional Media Clasifications Fail to Protect in t.txt> 28-Oct-2006 12:46 41k
How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt> 28-Oct-2006 12:46 11k
How to Hack UNIX System V.txt> 28-Oct-2006 12:46 11k
How to crash AOL.txt> 28-Oct-2006 12:46 5k
How to dial out of a UNIX System.txt> 28-Oct-2006 12:46 3k
How to find Security Holes.txt> 28-Oct-2006 12:46 16k
How to get a Shell in 24 hours.txt> 28-Oct-2006 12:46 8k
ICQ Trojans.txt> 28-Oct-2006 12:46 8k
IE Javaprxy dll COM Object Vulnerability.txt> 28-Oct-2006 12:47 5k
IRC Basic Commands.txt> 28-Oct-2006 12:47 2k
IRC For The Generally Incompetent.txt> 28-Oct-2006 12:47 9k
Internet Download Manager 4 05 Input URL Stack Overflo.txt> 28-Oct-2006 12:47 7k
KevinMitnick.pdf 28-Oct-2006 10:08 527k
Networking.pdf 28-Oct-2006 10:09 324k
O'Reilly - Information Architecture For The World Wide Web.pdf> 28-Oct-2006 10:13 2.9M
Rapidshare Trick No Waiting.txt> 28-Oct-2006 12:47 1k
Recover Lost Windows Administrator Password.txt> 28-Oct-2006 12:47 1k
Ripping Flash Movies for Passwords.txt> 28-Oct-2006 12:47 2k
Self Deleting Batch.txt> 28-Oct-2006 12:47 1k
[TXT] ShellCode.txt 28-Oct-2006 12:47 13k
Stealing Files From Sites.txt> 28-Oct-2006 12:47 2k
Stealing The Network How To Own The Box.pdf> 28-Oct-2006 10:19 4.6M
Sybex - Firewalls 24 Seven.pdf> 28-Oct-2006 10:21 1.6M
The Art of Deception by Kevin Mitnick.pdf> 28-Oct-2006 12:54 5.2M
The Art of Deception.pdf> 28-Oct-2006 10:23 1.5M
The Art of Intrusion.pdf> 28-Oct-2006 12:58 3.1M
The Google Hackers Guide v1.0.pdf> 28-Oct-2006 10:24 634k
The Google filesystem.pdf> 28-Oct-2006 10:24 269k
The Hacker krackdown.pdf> 28-Oct-2006 10:25 633k
The Hacker's Dictionary.txt> 28-Oct-2006 12:58 86k
The National Information Infrastructure-Agenda for Action.txt> 28-Oct-2006 12:58 96k
The Newbies Handbook- ' How to beging in the World of Hacking.txt> 28-Oct-2006 12:59 44k
The Newbies-User's Guide to Hacking.txt> 28-Oct-2006 12:59 47k
The Only True Guide to Learning how to Hack.txt> 28-Oct-2006 12:59 9k
The Pre-History of Cyberspace.txt> 28-Oct-2006 12:59 60k
The Price of Copyright Violation.txt> 28-Oct-2006 12:59 73k
The REAL way to hack RemoteAccess.txt> 28-Oct-2006 12:59 12k
The Secret Service, UUCP,and The Legion of Doom.txt> 28-Oct-2006 12:59 20k
The role of intrusion detection systems.pdf> 28-Oct-2006 10:25 168k
Tracing a Hacker.txt> 28-Oct-2006 12:59 18k
Tricks to avoid detection.txt> 28-Oct-2006 12:59 9k
Tutorial, Adobe.txt> 28-Oct-2006 12:59 12k
Understanding TCPIP.pdf> 28-Oct-2006 10:51 7.7M
Undocumented dos commands.pdf> 28-Oct-2006 10:51 18k
Unlock Satelite Locked Password(Bell Express Vu Only).txt> 28-Oct-2006 12:59 3k
Ural Hack.txt> 28-Oct-2006 12:59 9k
User profiling for intrusion detection.pdf> 28-Oct-2006 10:52 343k
Wargames, Wardialing Wardriving and the Market for Hacker.txt> 28-Oct-2006 12:59 2k
Way to get passed website blocking on school system.txt> 28-Oct-2006 12:59 1k
What is the best C language.txt> 28-Oct-2006 12:59 1k
Windows Server 2003 Security Guide.pdf> 28-Oct-2006 10:54 1.3M
[TXT] digest_f_2.txt 28-Oct-2006 09:48 212k
[TXT] digest_s_1.txt 28-Oct-2006 09:48 120k
hacking and phreaking.doc> 28-Oct-2006 12:45 168k
hacking in telnet ftp.rtf> 28-Oct-2006 12:45 57k
hacking on Telnet explained.doc> 28-Oct-2006 12:45 16k
hacking password protected site.doc> 28-Oct-2006 12:46 27k
Download

Posted in Label: | 0 komentar

Ebook Networking

CISCO Networking Academy : CCNA/CCNP/CCDA/CCDP/CCSP/CCVP/CCIP
CISCO Networking Academy : CCNA/CCNP/CCDA/CCDP/CCSP/CCVP/CCIP e-Courses

1. CISCO Certified Network Associate (CCNA)
• CCNA - Interconnecting CISCO Network Devices (ICND) Express Online Training v2.1
• CCNA - Interconnecting CISCO Network Devices (ICND) Student Guide v2.1
• CCNA - Introduction to CISCO Networking Technologies (INTRO) Student Guide v1.0A
2. CISCO Certified Network Professional (CCNP)
• CCNP - Building Scalable CISCO Internetworks (BSCI) Express Online Training v2
• CCNP - Building Scalable CISCO Internetworks (BSCI) Student Guide Vol. 1&2 v2.2
• CCNP - Building CISCO Multilayer Switching Networks (BCMSN) Express Online Training v2
• CCNP - Building CISCO Multilayer Switching Networks (BCMSN) Student Guide v2.1
• CCNP - Building CISCO Remote Access Networks (BCRAN) Express Online Training v2
• CCNP - Building CISCO Remote Access Networks (BCRAN) Student Guide v2
• CCNP - Building CISCO Remote Access Networks (BCRAN) Student Guide Vol. 1&2 v2.2
• CCNP - CISCO Internetwork Troubleshooting (CIT) Express Online Training v5
• CCNP - CISCO Internetwork Troubleshooting (CIT) Student Guide v5.1
3. CISCO Certified Design Associate (CCDA)
• CCDA - Designing for CISCO Internetwork Solutions (DESGN) Express Online Training v1
• CCDA - Designing for CISCO Internetwork Solutions (DESGN) Student Guide v1.1
4. CISCO Certified Design Professional (CCDP)
• CCDP - Building Scalable CISCO Internetworks (BSCI) Express Online Training v2
• CCDP - Building Scalable CISCO Internetworks (BSCI) Student Guide Vol. 1&2 v2.2
• CCDP - Designing CISCO Network Service Architectures (ARCH) Express Online Training v1.1
• CCDP - Designing CISCO Network Service Architectures (ARCH) Student Guide v1.0
5. CISCO Certified Security Professional (CCSP)
• CCSP - Securing CISCO IOS Networks (SECUR) Express Online Training v1
• CCSP - Securing CISCO IOS Networks (SECUR) Student Guide v1.1
• CCSP - CISCO Secure Intrusion Detection Systems (CSIDS) Express Online Training v4
• CCSP - CISCO Secure Intrusion Detection Systems (CSIDS) Student Guide v4.1
• CCSP - CISCO Secure PIX Firewall Administrator (CSPFA) Express Online Training v3.1
• CCSP - CISCO Secure PIX Firewall Administrator (CSPFA) Student Guide v3.2
• CCSP - CISCO Secure Virtual Private Networks (CSVPN) Express Online Training v3.1
• CCSP - CISCO Secure Virtual Private Networks (CSVPN) Student Guide v3.1
• CCSP - CISCO Secure Virtual Private Networks (CSVPN) Student Guide v4
• CCSP - CISCO SAFE Implementation (CSI) Student Guide v2
6. CISCO Certified Voice Professional (CCVP)
• CCVP - CISCO Voice Over IP (CVOICE) Express Online Training v4.2
• CCVP - CISCO Voice Over IP (CVOICE) Student Guide v4.2
• CCVP - CISCO IP Telephony Troubleshooting (IPTT) Express Online Training v1
• CCVP - CISCO Implementing Quality of Service (QOS) Express Online Training v2
• CCVP - CISCO Implementing Quality of Service (QOS) Student Guide v2
• CCVP - CISCO IP Telephony (CIPT) Express Online Training v3.3
• CCVP - CISCO IP Telephony (CIPT) Student Guide Part 1 v4
• CCVP - CISCO IP Telephony (CIPT) Student Guide Part 2 v4
7. CISCO Certified Internetwork Professional (CCIP)
• CCIP - Building Scalable CISCO Internetworks (BSCI) Express Online Training v2
• CCIP - Building Scalable CISCO Internetworks (BSCI) Student Guide Vol. 1&2 v2.2
• CCIP - CISCO Implementing Quality of Service (QOS) Express Online Training v2
• CCIP - CISCO Implementing Quality of Service (QOS) Student Guide v2
• CCIP - Border Gateway Protocol (BGP) Express Online Training v3
• CCIP - Border Gateway Protocol (BGP) Student Guide v3
• CCIP - CISCO Implementing Multi-Protocol Label Switching (MPLS) Express Online Training v2
• CCIP - CISCO Implementing Multi-Protocol Label Switching (MPLS) Student Guide v2
8. Other CISCO Training Content
• Misc - CISCO CallManager Express (CME) Express Online Training v1
• Misc - Implementing CISCOWorks for Enterprise LAN/WAN Mangement (CWENT) Express Online Training v1.0
• Misc - Implementing CISCOWorks for Enterprise LAN/WAN Mangement (CWENT) Student Guide v1.0
• Misc - CISCO Enhanced Voice over Data Design (EVODD) Express Online Training v3.3
• Misc - CISCO Enhanced Voice over Data Design (EVODD) Student Guide v3.3
• Misc - CISCO Deploying Quality of Service (DQOS) Express Online Training v1
• Misc - CISCO Deploying Quality of Service (DQOS) Student Guide v1
• Misc - CISCO Unified Systems Communication Admin & Engineer (UCSA & UCSE) Express Online Training v1.1
• Misc - CISCO Unified Systems Communication Administrator (UCSA) Student Guide v1.1
• Misc - CISCO Unified Systems Communication Engineer (UCSE) Student Guide v1.1
• Misc - CISCO Catalyst 6500 - Express Online Training v2.1
• Misc - CISCO Catalyst 6500 - Student Guide v1
Download

Posted in Label: | 0 komentar

Hynose a girl Ebook

Hypnose - How to Hypnotize Your Lover.pdf> 01-Sep-2005 13:10 108k
Hypnose - Hypnosis for Beginners.pdf> 01-Sep-2005 13:11 199k
Hypnose - Seven Success Secrets of Hypnotism Ebook - .pdf> 01-Sep-2005 13:11 48k
Hypnose - hypnosis advanced.pdf> 01-Sep-2005 13:11 285k
LIVRE fr HYPNOSE SUGGESTION.doc> 01-Sep-2005 13:12 646k
Livre En Fran%c3%a7ais - Une Technique D'Auto Hypnose - Hypnose Sophrologie(1).doc> 01-Sep-2005 13:11 37k
MIND CONTROL - How To Hypnotise Humanity -Brainwashing Slave Covert Subvert eBook 2848320 .pdf> 01-Sep-2005 13:17 2.7M
Psychologie - Eggetsberger, Gerhard H. - Hypnose, Die Unheimliche Realit%e4t.pdf> 01-Sep-2005 13:16 1.9M
Psychologie - GTH - Hypnose lernen.pdf> 01-Sep-2005 13:17 111k
auto hypnose.txt> 01-Sep-2005 13:10 4k
Download
Pass : kebo_gila

Posted in | 0 komentar

Ebook Linux,WIndows,Hack and more

Index of Ebook. You can Choose one by one ( No Preview)

(Ebook PDF) - O'Reilly CGI Programming.pdf> 15-Dec-2006 11:01 1.5M
(e-book) UML Applied.pdf> 15-Dec-2006 10:46 1.1M
(eBook PDF)Linux Security.pdf> 15-Dec-2006 11:07 357k
(eBook) - Computing - Windows XP Tricks.doc> 15-Dec-2006 11:07 33k
(eBook) - Linux Networking HOWTO (1).pdf> 15-Dec-2006 11:07 265k
(eBook) - Web Design Nutshell OReilly .pdf> 15-Dec-2006 11:13 6.3M
(eBook) - World Atlas - PDF.pdf> 15-Dec-2006 11:14 578k
(ebook - PDF) - Networking - Cisco IP Routing Fundamentals.pdf> 15-Dec-2006 10:47 2.2M
(ebook - PDF) Linux From Scratch.pdf> 15-Dec-2006 10:48 992k
(ebook - PDF) Sybex - CCNA 2.0 Study Guide (640-507).pdf> 15-Dec-2006 10:51 5.3M
(ebook - PDF) Thinking in C++ 2ed Vol one.pdf> 15-Dec-2006 10:52 2.9M
(ebook - PDF) Thinking in C++ 2ed Vol two.pdf> 15-Dec-2006 10:53 2.0M
(ebook - pdf) Project Management.pdf> 15-Dec-2006 10:48 2.3M
(ebook PDF) - Linux Newbie Administrator Guide.pdf> 15-Dec-2006 10:58 403k
(ebook computer development pdf)MySQL-PHP.pdf> 15-Dec-2006 10:54 3.5M
(ebook pdf) - Java - EJB Design Patterns.pdf> 15-Dec-2006 10:58 808k
(ebook pdf) - dictionary of networking.pdf> 15-Dec-2006 10:57 8.1M
(ebook pdf) - linux_programming_unleashed.pdf> 15-Dec-2006 11:00 6.3M
(ebook pdf) Illustrated TCPIP.pdf> 15-Dec-2006 11:03 6.1M
(ebook pdf) Teach Yourself Perl in 21 Days (1).pdf> 15-Dec-2006 11:05 3.0M
(ebook pdf) Teach Yourself Shell Programming in 24 Hours.pdf> 15-Dec-2006 11:07 5.2M
(ebook) - Numbers Theory HardyWright.pdf> 15-Dec-2006 11:11 9.9M
(ebook) Microsoft Project 2000 User Manual.zip> 15-Dec-2006 11:16 2.4M
(ebook) PHP - How To.pdf> 15-Dec-2006 11:16 143k
(ebook) Programming Perl.pdf> 15-Dec-2006 11:20 10.4M
(ebook) computer security handbook.pdf> 15-Dec-2006 11:15 2.8M
(ebook-pdf) - Cisco Certified Network Professional - Swi~73D.pdf> 15-Dec-2006 11:24 9.7M
(ebook-pdf) - Hacking Cisco Routers(1).pdf> 15-Dec-2006 11:24 19k
(ebook-pdf) - Mathematics - Linear Algebra.pdf> 15-Dec-2006 11:26 4.2M
(ebook-pdf) - O'Reilly Java Cryptography.pdf> 15-Dec-2006 11:26 1.5M
(ebook-pdf) - Programming - XML By Example.pdf> 15-Dec-2006 11:28 3.4M
(ebook-pdf) - Project Management Practitioner's Handbook (1).pdf> 15-Dec-2006 11:29 2.5M
(ebook-pdf) - The Little Black Book of Project Management.pdf> 15-Dec-2006 11:29 2.2M
(ebook-pdf) - Thinking In Java - Second Edition.pdf> 15-Dec-2006 11:31 4.0M
(ebook-pdf)Sams' Teach Yourself Linux In 24 Hours.pdf> 15-Dec-2006 11:36 13.7M
ASP.NET Web Developer's Guide.pdf> 15-Dec-2006 11:46 7.0M
Advanced Modeling with UML.pdf> 15-Dec-2006 11:37 689k
Advanced Number Theory.pdf> 15-Dec-2006 11:41 11.3M
Analysis and Design with UML.ppt> 15-Dec-2006 11:42 2.9M
Business Modeling with UML.pdf> 15-Dec-2006 11:46 158k
Business Plan Format (1).rtf> 15-Dec-2006 11:46 51k
C%23 Book (C Sharp)-unprotect.pdf> 15-Dec-2006 11:50 9.2M
C%23 Book.pdf> 15-Dec-2006 11:53 9.3M
C++Programming-HOWTO.pdf> 15-Dec-2006 11:53 212k
Complete Idiot's Guide to Linux.pdf> 15-Dec-2006 11:56 4.3M
Computer - Oracle - Introduction to SQL.pdf> 15-Dec-2006 11:56 132k
Conflict Management.ppt> 15-Dec-2006 11:56 109k
E-book - Java - Borland JBuilder - Developing Database A~5A2.pdf> 15-Dec-2006 11:59 8.0M
EJBDesignPatternsAppendixCode.zip> 15-Dec-2006 12:25 31k
Ebook - Codewarrior - Principles of Programming.zip> 15-Dec-2006 12:00 1.5M
Ebook - Linux - PDF - Teach Yourself Unix in 24 Hours.pdf> 15-Dec-2006 12:03 4.0M
Ebook - Windows XP Bible.pdf> 15-Dec-2006 12:11 16.0M
Ebook Oracle DBA Survial Guide.zip> 15-Dec-2006 12:23 18.9M
Ebook- Web Javascript Book.pdf> 15-Dec-2006 12:23 350k
Feynman Lectures on Physics Volume 2.pdf> 15-Dec-2006 12:39 33.2M
Framework Essentials Edt2.pdf> 15-Dec-2006 12:40 3.0M
Group Evaluation.doc> 15-Dec-2006 12:40 26k
Hacking into computer systems - a beginners guide.doc> 15-Dec-2006 12:40 835k
Handbook of Applied Cryptography (1997).pdf> 15-Dec-2006 12:42 4.6M
J.K. Rowling -4- Harry Potter and the Goblet of Fire.pdf> 15-Dec-2006 12:43 1.8M
J2EE Developer's Guide (1).pdf> 15-Dec-2006 12:44 2.5M
J2EE-WebServices-DevGuide.pdf> 15-Dec-2006 12:46 3.4M
Java 2 Network Security (1).pdf> 15-Dec-2006 12:48 5.6M
Java OReilly Books.pdf> 15-Dec-2006 13:03 37.1M
MS Project 2000 Full CD Serial%23.txt> 15-Dec-2006 13:09 1k
Manual do Linux.pdf> 15-Dec-2006 13:06 93k
Mastering Enterprise Java Beans (Roman, 2002).pdf> 15-Dec-2006 13:07 2.2M
Math Calculus Bible.pdf> 15-Dec-2006 13:08 1.2M
Maximum Security.pdf> 15-Dec-2006 13:09 2.6M
Modeling Web Application Archetectures with UML.pdf> 15-Dec-2006 13:09 297k
Network Programming with Perl.pdf> 15-Dec-2006 13:13 301k
O'Reilly Perl Cookbook.pdf> 15-Dec-2006 13:17 9.2M
OReilly Advanced Perl Programming.pdf> 15-Dec-2006 13:19 5.1M
Photo Shop 6 Guide (1).pdf> 15-Dec-2006 13:21 6.0M
Photo Shop 7 Quick Reference Guide.pdf> 15-Dec-2006 13:21 271k
Photoshop 6 Bible (eBook).pdf> 15-Dec-2006 13:27 14.8M
Programming Perl.pdf> 15-Dec-2006 13:31 10.4M
Project_Management_Guide.pdf> 15-Dec-2006 13:31 239k
Questionnaire Sandra Clark.doc> 15-Dec-2006 13:31 68k
Recipes - Cook Book - PDF format.pdf> 15-Dec-2006 13:32 1.9M
ResumeCoverLetterSecrets (1).doc> 15-Dec-2006 13:32 374k
Sam's - A Programmer%92s Introduction to VB.NET.pdf> 15-Dec-2006 13:35 4.1M
Science, Nature & History - A Complete Handbook of Natur~227.pdf> 15-Dec-2006 13:35 1.3M
Sybex Ebook - Oracle_DBA_Cert_Kit - SQL_and_PLSQL_guide.pdf> 15-Dec-2006 13:37 4.1M
The UML and Data Modeling.pdf> 15-Dec-2006 13:37 481k
UML - Applying The Unified Modeling Language UML.pdf> 15-Dec-2006 13:37 14k
UML - For the impatient.pdf> 15-Dec-2006 13:37 523k
UML - Understanding The UML.pdf> 15-Dec-2006 13:37 17k
UML -- The Foundation Of The UML.pdf> 15-Dec-2006 13:37 16k
UML Semantics.PDF> 15-Dec-2006 13:37 124k
UML Tutorial.pdf> 15-Dec-2006 13:38 378k
UML_Business_Process_Model.pdf> 15-Dec-2006 13:38 44k
UML_tutorial_business_process.pdf> 15-Dec-2006 13:38 47k
Uml Collaboration Diagrams.pdf> 15-Dec-2006 13:37 28k
Unix For Intermediate Users.pdf> 15-Dec-2006 13:38 235k
Using Linux as a Router.zip> 15-Dec-2006 13:38 28k
WIDEMAN Principles of Project Management.doc> 15-Dec-2006 13:39 53k
Web page design in 7 days%5d.pdf> 15-Dec-2006 13:39 236k
%5bE-Book%5d Linux C++ Programming HOWTO.pdf> 15-Dec-2006 13:40 233k
%5bE-Books%5d OReilly - Building Wireless Community Networks.pdf> 15-Dec-2006 13:40 1.0M
AddisonWesley - Design Patterns Java.PDF> 15-Dec-2006 13:41 2.2M
eBook - Gabrick - J2EE and XML Development (2002, Java, ~AD2.pdf> 15-Dec-2006 12:01 4.3M
eBook - List of Port Numbers and What They're For - (TXT).zip> 15-Dec-2006 12:03 8k
eBook - Mastering Enterprise Java Beans (Roman, 2002) (1).pdf> 15-Dec-2006 12:04 2.2M
eBook - OReilly - Learning the UNIX Operating System (1).pdf> 15-Dec-2006 12:04 1.1M
ebook - SBS - The Business Plan Roadmap to Success.pdf> 15-Dec-2006 12:04 131k
ebook - Teach Yourself UML in 24 hours.zip> 15-Dec-2006 12:04 46k
ebook Basic UNIX Tutorial.pdf> 15-Dec-2006 12:11 270k
ebook O'Reilly ASP Nutshell (1).pdf> 15-Dec-2006 12:13 3.8M
ebook O'Reilly ASP Nutshell.pdf> 15-Dec-2006 12:14 3.8M
ebook O'Reilly Java Servlet Programming.pdf> 15-Dec-2006 12:16 4.3M
ebook-pdf-Computer-MCSE-Training Guide-Networking Essent~80C.pdf> 15-Dec-2006 12:25 5.1M
linux_programming_unleashed.pdf> 15-Dec-2006 13:06 6.3M
mumlrr22 MastreringUMLwithRatioanlRose.pdf> 15-Dec-2006 13:13 9.2M
rational rose key.txt> 15-Dec-2006 13:31 1k
uml tutorial complex transitions.pdf> 15-Dec-2006 13:37 23k
xml_programming_in_java.pdf> 15-Dec-2006 13:39 531k
Download

Posted in Label: | 0 komentar

Office Word 2007

Product Details

* Paperback: 380 pages
* Publisher: Microsoft Press; Pap/Cdr edition (January 31, 2007)
* Language: English
* ISBN-10: 0735623023
* ISBN-13: 978-0735623026

Download

Posted in Label: | 0 komentar

Ebook Education

Micosoft Student Graphing Calculator 2006

Microsoft Student 2006 is a homework helper for students ages 8 to 18 comprising of dozens of study tools for just about every subject, including math, science, writing, and foreign languages. Student 2006 adds student-oriented tools to Microsoft Office programs (Office XP or Office 2003) and comes with Microsoft Encarta Premium 2006 encyclopedia and limited-time access to Encarta online.

Microsoft Student 2006 also comes with Encarta Dictionary and Thesaurus and a Microsoft Student Graphing Calculator 2006 software that helps students visualize difficult problems in trigonometry, calculus, chemistry, and physics classes (though a little difficult to master). The World Atlas contains an interactive map of the Earth while the Book Summaries contain guides that explain themes, characters and settings of classic literature

Despite all the publicity, Microsoft Office Student has failed to impress many. Business Week says Do Your Homework, Microsoft. Student 2006 package seems like a hodgepodge. Parents would do better to spend the $100 on some books.

And even the graphing calculator may not be of much help for US students. Most U.S. high schools base much of their math curriculum on the use TI-83 Plus or 84 Plus calculatore. If students do their homework on Microsoft's on-screen calculator, they not only will have to translate TI-specific instructions from school materials but also will not develop proficiency on the calculator they'll have to use when it's time to take the test.

Microsoft's Student Misses the Grade according to the WP which sees Student a fine way to get future customers hooked on Microsoft's products at an impressionable age. Student's role as a gateway to Microsoft Office involves a lot of toggling between Student and Office, thanks to the way Student offers shortcuts, templates and tutorials for Microsoft's productivity suite.

Microsoft Office Student and Teacher edition 2003 is not to be confused with Microsoft Student. Microsoft Student is sold separately from Microsoft Office and Microsoft Office applications. Microsoft Office Student and Teacher Edition includes Microsoft Office applications (for example, Word, Excel, Outlook and PowerPoint) at a low price for approved students and teachers in grades K-12 or higher education institutions. Some of the tools in Microsoft Student work in conjunction with Microsoft Office 2003 and Microsoft Office XP to provide a student-friendly interface for Office.
Download
Pass : www.kamyabonline.com

Posted in Label: | 0 komentar

Ebook education

Mathematica 5.2
You probably know Mathematica by name. Or you may be one of nearly two million users. But do you really know the breadth of capabilities Mathematica can offer you? Whatever you're working on--calculating, programming, learning, documenting or developing--Mathematica is equipped to help.

Mathematica seamlessly integrates a numeric and symbolic computational engine, graphics system, programming language, documentation system, and advanced connectivity to other applications. It is this range of capabilities--many world-leading in their own right--that makes Mathematica uniquely capable as a "one-stop shop" for you or your organization's technical work.
Wide Range of Uses

* Handling complex symbolic calculations that often involve hundreds of thousands or millions of terms
* Loading, analyzing, and visualizing data
* Solving equations, differential equations, and minimization problems numerically or symbolically
* Doing numerical modeling and simulations, ranging from simple control systems to galaxy collisions, financial derivatives, complex biological systems, chemical reactions, environmental impact studies, and magnetic fields in particle accelerators
* Facilitating rapid application development (RAD) for engineering companies and financial institutions
* Producing professional-quality, interactive technical reports or papers for electronic or print distribution
* Illustrating mathematical or scientific concepts for students from K-12 to postgraduate levels
* Typesetting technical information--for example, for U.S. patents
Giving technical presentations and seminars
Download

Posted in Label: | 0 komentar

Networking/Wifi

WiFi Hopper v1.2.2007.063014 Newest

WiFi Hopper v1.2.2007.063014

WiFi Hopper v 1.2 is a Wireless Device Management Utility, Wireless Network Analyzer, Wireless Network Scanner

WiFi Hopper can
- List networks detected by wireless networking devices.
- List detailed information including Ssid, MAC Address, signal, network mode, encryption status (WEP, WPA), frequency, channel, physical layer and beacon interval.
- Connect to open and WEP protected networks.

WiFi Hopper is better than similar software because:
- Unlike traditional WLAN analyzing software, WiFi Hopper supports connecting to open and WEP protected networks.
- WiFi Hopper includes a protocol driver to talk directly to wireless devices. This means that WiFi Hopper is always up-to-date and the information presented by
- WiFi Hopper is the most recent.
- WiFi Hopper is low-priced, feature rich and has a simple uncluttered user
interface.
- WiFi Hopper uses standard Windows NDIS interfaces and can therefore support almost all wireless networking devices
Download
Pass : Dragon.free.0nlin3


Posted in Label: | 0 komentar

Internet/Networking

Anonymity Gateway 2.7 Incl Keymaker

Anonymity Gateway Features
Anonymity Gateway masks the real IP of a user, allowing him to browse all kind of pages without ever worrying that the ISPs or any other marketing tool is monitoring your surfing habits or spammers are attacking your computer. The simplest way to do this is to have traffic redirected through anonymous proxies. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. As a result, the websites see the IP address of the proxy server instead of your own IP address. This tool has a comprehensive proxy list, containing proxies from various countries so that you can choose one from a specific one.
Anonymity: Stay Invisible Online
Anonymity Gateway uses anonymous proxies routing all your Internet traffic through them. These proxies allow you to:
# browse anonymously, check mails, participate in newsgroups using proxies form different countries at your choice, having the identity well hidden
# interact with websites anonymously: using proxies that allow you to post messages, game, cast votes, post on forum, use IP – based trials
Online Privacy
When surfing, web pages leave traces on your computer traces that may harm or use inadvertently information on your computer. Anonymity Gateway helps you clean effectively all online traces, such as:
# Clear Internet History
# Clear Typed URL
# Clear Temporary Internet Files
# Clear Cookies
# Clear Auto Complete Forms History
# Clear Auto complete Password History
# Clear Internet Favorites
Block Invasive Code
Anonymity Gateway provides protection for computer from the action of invasive codes:
# Blocks ActiveX - ActiveX controls add interest to sites through multimedia but the controls can also harbor malicious code such as viruses. Most sites will function properly with ActiveX controls disabled.
# Blocks JavaScript - This code may be used in harmful way such as to information on your
computer.
For more information and advices on privacy, consult the Privacy Tips and Privacy Test on this website.
Download

Posted in Label: | 0 komentar