Loading....

Friday, November 14, 2008

TEACH.YOURSELF.C++

1 

The Basics

1 Getting Started

2 The Anatomy of a C++ Program

3 Using Variables, Declaring Constants

4 Managing Arrays and Strings

5 Working with Expressions, Statements,

and Operators

6 Organizing Code with Functions

7 Controlling Program Flow

8 Pointers Explained

9 Exploiting References

 

2

Tuesday, November 4, 2008

Introduction to Software Testing

11

                              Release Notes

Extensively class-tested, this textbook takes an innovative approach to software
testing: it defines testing as the process of applying a few well-defined,
general-purpose test criteria to a structure or model of the software. It
incorporates the latest innovations in testing, including techniques to test
modern types of software such as OO, web applications, and embedded software.
The book contains numerous examples throughout. An instructor’s solution manual,
PowerPoint slides, sample syllabi, additional examples and updates, testing
tools for students, and example software programs in Java are available on an
extensive website.

 

Table Of Contents

 

Part I. Overview:
1. Introduction;


Part II. Coverage Criteria:
2. Graph testing;
3. Logic coverage;
4. Input space partitioning;
5. Syntax-based testing;


Part III. Applying Criteria in Practice:
6. Practical considerations;
7. Engineering criteria for technologies;
8. Building testing tools;
9. Challenges in testing software.

 

Hacking Exposed Linux

untitled

                                         Release Notes

Based on the new Linux 2.6 kernel, this edition is written from scratch by a
global team of open source Linux security experts. Hacking Exposed Linux, Third Edition reveals brand-new Linux attacks, countermeasures, and case studies. The book is platform independent, so you will be able to learn how to secure any version of Linux that you are running
.

 

Table Of Contents

 

Pt. I Security and Controls
1 Applying Security 3
2 Applying Interactive Controls 13
3 Applying Process Controls 27
Pt. II Hacking the System
4 Local Access Control 41
5 Data Networks Security 87
6 Unconventional Data Attack Vectors 123
7 Voice over IP 179
8 Wireless Networks 215
9 Input/Output devices 281
10 RFID - Radio Frequency Identification 295
11 Emanation Attacks 321
12 Trusted Computing 331
Pt. III Hacking the Users
13 Web Application Hacking 365
14 Mail Services 429
15 Name Services 469
Pt. IV Care and Maintenance
16 Reliability: Static Analysis of C Code 495
17 Security Tweaks in the Linux Kernel 523

 

Hacking.Windows.Vista.ExtremeTech.2007

1216131770_vista

  • Customizing Your Computer

  • Customizing the Look of the Startup

  • Customizing User Navigation

  • Hacking the Desktop

  • Customizing the Appearance of the Windows Interface

  • Hacking Windows Explorer

  • Customizing IE7

  • Customizing Windows Media
  • Increasing Your System's Performance
  • Analyzing Your System
  • Speeding Up the System Boot
  • Making Your Computer Log On Faster
  • Speeding Up Windows Explorer
  • Optimizing Windows Core Components
  • Speeding Up Your Web Browser and Network Connection
  • Securing Your System
  • Windows Security
  • Internet Security

  • Protecting Your Privacy

download now

Hardcore Windows XP

Untitled

 

The User Interface
Windows XP Applications and Services
E-Mail and the Web
Working Remotely
Safety First: Service Pack 2
Staying in the Game
Get the Most Out of Digital Photos and Multimedia
Networking: Getting (and Staying) Connected
Improving System Performance
Media Performance and Fun
Built-In Utilities and Administrative Tools

 

download now