Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.

Announcement

Collapse
No announcement yet.

Các Ebook hay ...!

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    Windows .NET Server 2003 Registry

    Windows .NET Server 2003 Registry



    Book Description
    Guide to using Windows Server registries. Learn how to plan and implement an appropriate registry backup strategy, and monitor and modify the system registry according to administrative requirements and security policy. For Windows administrators and advanced users. Softcover.

    Book Info
    Guide to using Windows Server registries. Learn how to plan and implement an appropriate registry backup strategy, and monitor and modify the system registry according to administrative requirements and security policy. For Windows administrators and advanced users. Softcover.

    Code:
    http://rapidshare.de/files/24332939/reza.rar

    Comment


    • #17
      MCSD Self-Paced Training Kit Analyzing Requirements and Defining

      MCSD Self-Paced Training Kit Analyzing Requirements and Defining MS.NET
      Posted by admin under IT Certifications






      Book Description
      Get self-paced, from-the-source exam preparation and self-assessment for the skills measured by MCP Exam 70-300—the one exam every MCSD certification candidate must pass.


      Code:
      http://rapidshare.de/files/24333691/MNETSAbymasoud.M.rar

      Comment


      • #18
        Microsoft Windows Server 2003 Delta Guide

        Microsoft Windows Server 2003 Delta Guide





        Book Description
        Why should new versions of mission-critical technologies mean starting from scratch? If you already know how to use Microsoft Windows Server 2000, leverage those skills to quickly become an expert on Microsoft Windows Server 2003. Microsoft Windows Server 2003 Delta Guide skips the basics and moves straight to what’s new and what’s changed. The result? You save time and money while preparing yourself for the next generation of Microsoft’s server operating system!

        Use Your existing Windows Server skills to master Microsoft’s newest operating system!
        Skip the basic concepts and move straight to what’s new and changed.
        Focus on learning advanced new technologies, techniques, and concepts.
        Use topic-focused chapters to quickly upgrade the skills you use the most.
        Access bonus online material covering core concepts you might have missed in the prior version.
        Learn about changes to Active Directory replication, architecture, and maintenance.
        See important security changes that can affect server upgrades.
        Master new techniques for installing, administering, and securing servers.
        Build headless servers using Emergency Management Services.
        Take advantage of powerful new Group Policy capabilities.

        From the Backcover

        Why should new versions of mission-critical technologies mean starting from scratch? If you already know how to use Microsoft Windows Server 2000, leverage those skills to quickly become an expert on Microsoft Windows Server 2003. Microsoft Windows Server 2003 Delta Guide skips the basics and moves straight to what’s new and what’s changed. The result? You save time and money while preparing yourself for the next generation of Microsoft’s server operating system!

        Use Your existing Windows

        Code:
        http://rapidshare.de/files/24339551/Que_-_Microsoft_Windows_Server_2003_Delta_Guide.rar

        Comment


        • #19
          It’s Never Done That Before

          It’s Never Done That Before




          Book Description
          When Windows works properly, it’s relatively easy to ignore; you can concentrate on the work you’re trying to do and forget about the plumbing inside your computer. But when something goes wrong, it often requires an experienced guide to solve the problem and restore the computer to working condition. Everybody who uses Microsoft Windows eventually has to deal with cryptic error messages, frozen screens, and other more or less dramatic problems. Windows troubleshooting is the set of tools and techniques that can identify the source of a problem and find a solution.

          It’s Never Done That Before is a guide to Windows XP troubleshooting for people who don’t spend their lives fixing computer problems. It includes basic troubleshooting techniques, specific instructions for solving the most common problems in Windows XP, and more general information for finding and fixing more obscure ones. It also provides pointers to explanations of BIOS beep codes and blue screen errors, instructions for using the troubleshooting tools supplied with Windows XP such as Safe Mode and the Recovery Console, and advice for dealing with device drivers, the ROM BIOS, and the Windows Registry. Viruses, spyware, and Internet connection problems are all included, along with advice for getting the most out of the Microsoft Knowledge base and other online information resources, and dealing with help desks and technical support centers.

          Code:
          http://rapidshare.de/files/24339337/No.Starch.Press.Its.Never.Done.That.Before.A.Guide.to.Toubleshooting.Windows.XP.May.2006.rar

          Comment


          • #20
            The Best Damn Windows Server 2003 Book Period

            The Best Damn Windows Server 2003 Book Period





            Book Description
            In keeping with past trends, full migration to this latest Microsoft Server Operating System will begin in earnest 12 months after its release, in mid-to-late 2004. This book hits the market just as large enterprises begin the process of moving from Windows 2000 Server to Windows Server 2003. The title says everything you need to know about this book. No other book on the market combines this breadth and depth of coverage with the kind of product expertise and quality standard expected from Syngress. Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations. And unlike its competition, this is a book that was written from the ground up for Windows Server 2003. It doesn’t rely on hackneyed computer geek stereotypes; its tone, coverage and examples reflect the realities of TODAY’S enterprise network professional.



            Code:
            http://rapidshare.de/files/24340643/The.Best.Damn.Windows.Server.2003.Book.Period.rar

            Comment


            • #21
              Internet Denial -of- Service: Attacks and Defens

              Internet Denial -of- Service: Attacks and Defense




              It is Monday night and you are still in the office, when you suddenly become aware of the whirring of the disks and network lights blinking on the Web server. It seems like your company’s Web site is quite well visited tonight, which is good because you are in e-business, selling products over the Internet, and more visits mean more earnings. You decide to check it out too, but the Web page will not load. Something is wrong.

              A few minutes later, network operations confirm your worst fears. Your company’s Web site is under a denial-of-service attack. It is receiving so many requests for a Web page that it cannot serve them all–50 times your regular load. Just like you cannot access the Web site, none of your customers can. Your business has come to a halt.

              You all work hard through the night trying to devise filtering rules to weed out bogus Web page requests from the real ones. Unfortunately, the traffic you are receiving is very diverse and you cannot find a common feature that would make the attack packets stand out. You next try to identify the sources that send you a lot of traffic and blacklist them in your firewall. But there seem to be hundreds of thousands of them and they keep changing. You spend the next day bringing up backup servers and watching them overload as your earnings settle around zero. You contact the FBI and they explain that they are willing to help you, but it will take them a few days to get started. They also inform you that many perpetrators of denial-of-service attacks are never caught, since they do not leave enough traces behind them.

              All you are left with are questions: Why are you being attacked? Is it for competitive advantage? Is an ex-employee trying to get back at you? Is this a very upset customer? How long can your business be offline and remain viable? How did you get into this situation, and how will you get out of it? Or is this just a bug in your own Web applications, swamping your servers accidentally?

              This is a book about Denial-of-Service attacks, or DoS for short. These attacks aim at crippling applications, servers, and whole networks, disrupting legitimate users’ communication. They are performed intentionally, easy to perpetrate, and very, very hard to handle. The popular form of these attacks, Distributed Denial-of-Service (DDoS) attacks, employs dozens, hundreds, or even well over 100,000 compromised computers, to perform a coordinated and widely distributed attack. It is immensely hard to defend yourself against a coordinated action by so many machines.

              This book describes DoS and DDoS attacks and helps you understand this new threat. It also teaches you how to prepare for these attacks, preventing them when possible, dealing with them when they do occur, and learning how to live with them, how to quickly recover and how to take legal action against the attackers.

              Code:
              http://rapidshare.de/files/24346344/Internet.DOS.Attack.and_Defense.Mechanisms.rar

              Comment


              • #22
                ISA System Architecture (3rd Edition)

                ISA System Architecture (3rd Edition)



                Describes the hardware architecture of ISA (Industry Standard Architecture), providing a clear, concise explanation of an ISA system in detail. Paper.

                Code:
                http://rapidshare.de/files/24347229/ISA_System_Architecture__3rd_Edition_.rar

                Comment


                • #23
                  Mission-Critical Security Planner: When Hackers Won’t Take No for an Answer

                  Mission-Critical Security Planner: When Hackers Won’t Take No for an Answer




                  This book, especially if used in conjunction with the author’s web site (see ASIN B0000C7RBX), is one of the most valuable additions to the IT security profession that I’ve read. My reasons for making this bold statement include:

                  - The book provides a coherent and focused approach to developing and implementing a security plan. You can find numerous books on writing and implementing policies and procedures, or establishing a security posture, but this is the first book I’ve read that steps you through the process of conceiving, implementing and keeping alive a viable security plan.

                  - By separating the process into three distinct domains (referred to as ’stacks’) you ensure that your plan encompasses and integrates the technology, process and business elements into a coherent strategy.

                  - Artifacts in the form of a complete set of worksheets provide a set of tools that give a framework and speed up the planning process.

                  The planning approach set forth in the book is straightforward and realistic - you’re led through the preliminaries, which includes conceiving a plan that matches your needs, and selling the plan to sponsors (an often overlooked, but essential activity when fighting for budget). The next step is to perform an impact analysis, and this is where the book shines, because the author focuses on business issues instead of technology. This promotes awareness and goes a long way towards getting buy-in and funding, as well as laying a solid foundation for a long-term security plan. Next the author shows how to select the correct security model and avoid common pitfalls. These lead to building organizational consensus - buy-in from all stakeholders. The difference between this step and the preliminary step of selling to a sponsor and obtaining funding, which is vertical, you need to promote the plan horizontally as well. The final steps are to implement and continuously refine the plan.

                  Of course, the overview above only describes the approach contained within the book. There is much more to commend it, such as clear writing, superb page design that portrays information in graphs, illustrations and tables, and the details the author provides. There is not a single statement or recommendation that is unsupported, and the material is both sensible and accurate.


                  Code:
                  http://rapidshare.de/files/24347360/Mission-Critical_Security_Planner.rar

                  Comment


                  • #24
                    Computer Security Handbook

                    Computer Security Handbook



                    This is the most comprehensive book on computer security on the market, with 23 chapters and 29 Appendices covering virtually all aspects of computer security.
                    * Chapters are contributed by recognized experts in the industry.
                    * This title has come to be known as “Big Blue” in industry circles and has a reputation for being the reference for computer security issues.

                    Code:
                    http://rapidshare.de/files/24348086/John_Wiley___Sons_-_Computer_Security_Handbook.rar

                    Comment


                    • #25
                      Windows Server Cookbook for Windows Server 2003 and Windows 2000

                      Windows Server Cookbook for Windows Server 2003 and Windows 2000





                      This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft’s latest and greatest server. Through concise, on-the-job solutions to common problems, Windows Server Cookbook for Windows Server 2003 & Windows 2000 is certain to save you hours of time searching for answers. Now, instead of dredging reams of Microsoft documentation or browsing its unstructured knowledge base to figure out a particular issue–such as how to compare registry values between two hosts–you can simply reference the index of Windows Server Cookbook for Windows Server 2003 & Windows 2000. From there, you’ll be directed to the exact trouble-shooting recipe they need. As the newest title in O’Reilly’s popular Cookbook series, this book covers a wide range of issues that you are likely to face in your daily management of the Windows Server operating system. This includes how to deal with:[*]files[*]event logs[*]DNS[*]DHCP[*]security[*]the registry[*]backup/restore
                      One of the book’s key benefits is the presentation of solutions in three different recipe formats. Depending on preference, you can solve most problems with the graphical user interface, the command line, or by using scripts. Where appropriate, all three solutions are presented for each recipe in this book. Each recipe also includes a detailed discussion that explains how and why it works. Windows Server Cookbook for Windows Server 2003 & Windows 2000 is written for all levels of system administrators on Windows servers. If you’re a relatively new user with only a rudimentary understanding of the job, the book can open your eyes to the many possibilities that await. And if you’re an advanced user, it can serve as a useful reference and memory-jogger.

                      Code:
                      http://rapidshare.de/files/24426642/Oreilly.Windows.Server.Cookbook.for.Windows.Server.2003.and.Windows.2000.eBook-LiB.rar

                      Comment


                      • #26
                        Microsoft Windows XP Step by Step

                        Microsoft Windows XP Step by Step




                        Whenever a new Operating system from Microsoft comes along I like to make sure that I understand the basics to ensure that I can support the end user community when the transition takes place. Microsoft Press step by step series is a great way to work with the application and learn what it takes to support it at the same time.

                        The book begins right at the very beginning with the login process to both the Professional and Home versions of the software. The book has you working with the desktop and the user profiles. I found that the coverage of both versions is good but there could have to separate books produced.

                        Setting up user accounts, the taskbar, shortcuts are the next areas you will work with. From there you move to the hardware section, working with local and network printers, scanner and cameras to name a few of the hardware components.

                        Files management is given serious coverage and well as folders and the personalization of the XP environment. Working with the communication section you’ll be able to link up to others, the internet and a network.

                        Games, Music, Photos and troubleshooting round out this very complete book. With the practice files on cdrom included and the ability to learn at your pace maybe the new trend in the learning process.


                        Code:
                        http://rapidshare.de/files/24427394/Windows_XP_Step_by_Step.rar

                        Comment


                        • #27
                          Delivering Utility Computing : Business-driven IT Optimization

                          Delivering Utility Computing : Business-driven IT Optimization (Hardcover)



                          Book Description
                          Learn how to design and deploy utility computing systems to save costs and improve the value that IT delivers.

                          The economic downturn that occurred after the .com boom and bust has put the cost of IT in the spotlight. By following the principles of utility computing, also known as on-demand computing, real-time infrastructure, or adaptive enterprise, businesses can improve the IT services they offer, whilst reducing costs and improving agility. Delivering Utility Computing proposes and documents a methodology for delivering utility computing, and provides detailed advice on its principles and benefits. The authors describe a complete and step-by-step process for adapting to a utility computing system, based on proven methodology.

                          Delivering Utility Computing:

                          * Provides a comprehensive description of the utility model, offering guidance on design, deployment and maintenance issues, and a strong section on service level agreements (SLAs).
                          * Explains in detail how to improve efficiencies and achieve cost reduction in the IT department.
                          * Adopts a thorough approach, taking into account current baselines, phasing, task involved, success factors and best practice principles.
                          * Presents a method rooted in theory, yet broad-based and practical, illustrated throughout with examples and real-world case studies.

                          This invaluable text provides CIOs, CFOs, system administrators, IT policy makers and professionals looking to develop utility computing practices in their organizations, as well as researchers in computer science, statisticians, engineers, and graduate students, with an in-depth understanding of the concepts and practicalities of utility computing.

                          Download Description
                          Learn how to design and deploy utility computing systems to save costs and improve the value that IT delivers. The economic downturn that occurred after the .com boom and bust has put the cost of IT in the spotlight. By following the principles of utility computing, also known as on-demand computing, real-time infrastructure, or adaptive enterprise, businesses can improve the IT services they offer, whilst reducing costs and improving agility.Delivering Utility Computing proposes and documents a methodology for delivering utility computing, and provides detailed advice on its principles and benefits.The authors describe a complete and step-by-step process for adapting to a utility computing system, based on proven methodology. Delivering Utility Computing: Provides a comprehensive description of the utility model, offering guidance on design, deployment and maintenance issues, and a strong section on service level agreements (SLAs). Explains in detail how to improve efficiencies and achieve cost reduction in the IT department. Adopts a thorough approach, taking into account current baselines, phasing, task involved, success factors and best practice principles. Presents a method rooted in theory, yet broad-based and practical, illustrated throughout with examples and real-world case studies. This invaluable text provides CIOs, CFOs, system administrators, IT policy makers and professionals looking to develop utility computing practices in their organizations, as well as researchers in computer science, statisticians, engineers, and graduate students, with an in-depth understanding of the concepts and practicalities of utility computing. --This text refers to the Digital edition.

                          [code]http://rapidshare.de/files/24427849/John.Wiley.and.Sons.Delivering.Utility.Computing.F eb.2006.rar[code]

                          Comment


                          • #28
                            Computer Security Basics

                            Computer Security Basics



                            Book Description
                            This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

                            The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.

                            This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.
                            Topics include:
                            Computer security concepts
                            Security breaches, such as viruses and other malicious programs
                            Access controls
                            Security policy
                            Web attacks
                            Communications and network security
                            Encryption
                            Physical security and biometrics
                            Wireless network security
                            Computer security and requirements of the Orange Book
                            OSI Model and TEMPEST

                            Code:
                            http://rapidshare.de/files/24428321/OReilly.Computer.Security.Basics.2nd.Edition.Jun.2006.eBook-BBL.rar

                            Comment


                            • #29
                              Feedback Control of Computing Systems (Hardcover)

                              Feedback Control of Computing Systems (Hardcover)



                              A pioneering reference on control theory designed specifically for computer professionals

                              In today’s computerized economy, the profitability and availability of many businesses rely on a clear understanding of the dynamics of their computing systems, especially how they relate to changes in workloads and configuration. Frequent, dramatic changes in these areas can degrade programs and even cause failures, as often demonstrated on a company’s eCommerce site.

                              In the first book ever to address this vital issue, Feedback Control of Computing Systems offers program designers and computer scientists a hands-on resource that distills the essentials of control theory needed to effectively address these issues. Primarily intended for professionals engaged in the analysis and design of computing systems, who often lack the conceptual tools to address the dynamics of resource management, the text provides a host of valuable features:


                              * MATLAB code for the solution of problems and case studies
                              * Numerous IT examples, such as tuning the Apache HTTP server and the IBM Lotus Domino Server
                              * Examples carefully chosen to illustrate key concepts and provide the basis for modeling real-world systems
                              * Several appendices for handy reference



                              A flexible "road map" approach helps different practitioners use the text in highly targeted ways, depending on their particular focus, making Feedback Control of Computing Systems an invaluable resource for systems designers, IT managers, computer scientists, as well as other researchers in the field.

                              Code:
                              http://rapidshare.de/files/24428633/Feedback_Control_of_Computing_Systems.rar

                              Comment


                              • #30
                                Malicious Mobile Code: Virus Protection for Windows

                                Malicious Mobile Code: Virus Protection for Windows




                                Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy.

                                The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today’s viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can’t do, what today’s biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one’s entire computer system into an open book?

                                Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers:

                                The current state of the malicious code writing and cracker community
                                How malicious code works, what types there are, and what it can and cannot do
                                Common anti-virus defenses, including anti-virus software
                                How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it
                                Macro viruses affecting MS Word, MS Excel, and VBScript
                                Java applets and ActiveX controls
                                Enterprise-wide malicious code protection
                                Hoaxes
                                The future of malicious mobile code and how to combat such code

                                These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever. Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.

                                Code:
                                http://rapidshare.de/files/24431159/OReilly-Malicious.Mobile.Code.Virus.Protection.for.Windows.rar

                                Comment

                                Working...
                                X