More About Me...

Ebook For Programmer and IT Support , Free and Free...

Another Tit-Bit...

It's all about IT , Ebook , Tutorial , News ... Try to Share.... Technoly is Never Ending and Knowledge is Free....

NETWORKING

In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.
Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.
Download


Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. . As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Shadow, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book;' companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

About the Authors

Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Recently, Johnny has enjoyed writing stuff, reading stuff, editing stuff and presenting stuff at conferences, which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. Johnny has written or contributed to several books, including Google Hacking for Penetration Testers, InfoSec Career Hacking, Aggressive Network Self-Defense, Stealing the Network: How to Own an Identity, and OS X for Hackers at Heart.

Tim Mullen (aka Thor) began his career in application development and network integration in 1984, and is now CIO and Chief Software Architect for AnchorIS.Com, a developer of secure enterprise-based accounting solutions. Mullen has developed and implemented network and security solutions for institutions such as the U.S. Air Force, Microsoft, the U.S. Federal Court systems, regional power generation facilities, and international banking and financial institutions. He has developed applications ranging from military aircraft statistics interfaces and biological aqua-culture management, to nuclear power-plant effect monitoring for a myriad of private, government, and military entities. Tim is also a columnist for Security Focus' Microsoft section, and a regular contributor of InFocus technical articles. Also known as "Thor," he is the founder of the "Hammer of God" security co-op group. Mullen's writings appear in multiple publications, such as Stealing the Network: How to Own the Box (Syngress, ISBN: 1-931836-87-6) and Hacker's Challenge, technical edits in Windows XP Security, with security tools and techniques features in publications such as the Hacking Exposed series and New Scientist magazine.

Ryan Russell (Blue Boar) has worked in the IT field for over 13 years, focusing on information security for the last seven. He was the lead author of Hack Proofing Your Network, Second Edition (Syngress, ISBN: 1-928994-70-9), contributing author and technical editor of Stealing The Network: How to Own The Box (Syngress, ISBN: 1-931836-87-6), and is a frequent technical editor for the Hack Proofing series of books from Syngress. Ryan was also a technical advisor on Snort 2.0 Intrusion Detection (Syngress, ISBN: 1-931836-74-4). Ryan founded the vuln-dev mailing list, and moderated it for three years under the alias "Blue Boar."
Download


Throughout the next decade, 802 wireless systems will become an integral part of fourth generation (4G) cellular communication systems, where the convergence of wireless and cellular networks will materialize through support of interworking and seamless roaming across dissimilar wireless and cellular radio access technologies. IEEE 802 Wireless Systems clearly describes the leading systems, covering IEEE 802.11 WLAN, IEEE 802.15 WPAN, IEEE 802.16 WMAN systems’ architecture, standards and protocols (including mesh) with an instructive approach allowing individuals unfamiliar with wireless systems to follow and understand these technologies. Ranging from digital radio transmission fundamentals, duplex, multiplexing and switching to medium access control, radio spectrum regulation, coexistence and spectrum sharing, this book also offers new solutions to broadband multi-hop networking for cellular and ad hoc operation. The book
Gives a comprehensive overview and performance evaluation of IEEE 802.11, 802.15 and 802.16
Includes a tutorial like introduction to the basics of wireless communication
Discusses challenges in mesh/multi-hop relaying networks and provides profound solutions for their realization with 802 Wireless Systems
Covers spectrum sharing on different levels and provides solutions for coexistence, cooperation and interworking of 802 Wireless Systems that are following the same or different standards, but share the same spectrum
Includes a detailed overview and introduction on cognitive radio and dynamic spectrum access
Accompanying website contains simulation software and provides slides of the figures and tables from the book ready for course presentation
This book is an essential text for advanced undergraduate students with a basic working knowledge of wireless communication, graduate students and engineers working in the field of wireless communications.
Download


For broadband communications, it was frequency division multiplexing. For optical communications, it was wavelength division multiplexing. Then, for all types of networks it was code division. Breakthroughs in transmission speed were made possible by these developments, heralding next-generation networks of increasing capability in each case. The basic idea is the same: more channels equals higher throughput. For wireless communications, it is space-time coding using multiple-input-multiple-output (MIMO) technology. Providing a complete treatment of MIMO under a single cover, MIMO System Technology for Wireless Communications assembles coverage on all aspects of MIMO technology along with up-to-date information on key related issues. Contributors from leading academic and industrial institutions around the world share their expertise and lend the book a global perspective. They lead you gradually from basic to more advanced concepts, from propagation modeling and performance analysis to space-time codes, various systems, implementation options and limitations, practical system development considerations, field trials, and network planning issues. Linking theoretical analysis to practical issues, the book does not limit itself to any specific standardization or research/industrial initiatives. MIMO is the catalyst for the next revolution in wireless systems, and MIMO System Technology for Wireless Communications lays a thorough and complete foundation on which to build the next and future generations of
Download

CISCO

Here's the book you need to prepare for Cisco's CCNA exam, 640-801. This Study Guide was developed to meet the exacting requirements of today's Cisco certification candidates. In addition to the engaging and accessible instructional approach that has earned author Todd Lammle the "Best Study Guide Author" award in CertCities Readers' Choice Awards for two consecutive years, this updated fifth edition provides:
In-depth coverage of every CCNA exam objective
Expanded IP addressing and subnetting coverage
More detailed information on EIGRP and OSPF
Leading-edge exam preparation software
Authoritative coverage of all exam objectives, including:
Network planning & designing
Implementation & operation

LAN and WAN troubleshooting
Communications technology
Download

The Best Damn Cisco Internetworking Book Period shows readerseverything they need to know about all Cisco internetworking topics.The book provides an understanding of Cisco's current VoIP solutionsand the means to put them to work, showing how to configure all ofCisco's core VoIP productsamong them Cisco CallManager software, Cisco7910 series phones, and server-based IP PBXs. It discusses IPv6Protocols, as well as IP Quality of Service (QoS) and how it applies toEnterprise and Internet Service Provider (ISP) environments.
In addition, Cisco wireless technologies are covered in detail. Ciscohas placed a high priority on security and here readers will findcomplete coverage of all the Cisco Security products such as the PIXfirewall suite of products, Network Address Translation (NAT), CiscoVPN Concentrator and IPSec, Cisco Authentication, Authorization, andAccounting (AAA), Content Services Switch (CSS), and the Cisco SecureNetwork Intrusion Detection System.
This book is sure to become a dog eared reference for all Cisco engineers and administrators.
- The one book that covers all major Cisco Internetworking concepts and configurations.
- The only book to cross reference Cisco internetworking topics: VoiceOver IP, Remote Access, Wireless, AVVID, and QoS. In addition, newtechnologies are covered in depth: AVVID, SIP, MGCP, and more.
- A 1-stop reference for Cisco professionals needing coverage of core Cisco exam topics.
Download


Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It’s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You’ll prevent tomorrow’s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you’ll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.

* Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
* Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
* Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
* Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
* Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
* Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
* Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
* Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
Download

CEH Certification

This module attempts to bridge various aspects of ethical hacking by suggesting an approach for undertaking penetration testing. There are different ways of approaching a penetration test.
This book covers following topics in depth
- Footprinting / Information Gathering phase
- Discovery and Planning / Information Analysis phase
- Detecting a vulnerability / security loophole
- Attack / Penetration / Compromise
- Analysis of security posture / Cover up / Report
- Clean up
Download this book in digital format.
By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50 certification provides a vendor-neutral perspective for security officers, auditors, security professionals, site admistrators, and others concerned with the integrity of network infrastructures. Complete coverage of footprinting, trojans and backdoors, sniffers, viruses and worms, and hacking Novell and Linux exposes common vulnerabilities and reveals the tools and methods used by security professionals when implementing countermeasures.
If you are reading this courseware, it is quite possible that you realize the importance of information systems security. However, we would like to put forth our motive behind compiling a resource such as this one, and what you can gain from this course.
You might find yourself asking, why choose this course, when there are several out there. The truth is that there cannot be any single courseware that can address all the issues in a detailed manner. Moreover, the rate at which exploits/tools/methods are being discovered by the security community makes it difficult for anybody to cover it at one go.
This doesn't mean that this course is inadequate in any way.
We have tried to cover all major domains in such a manner that the reader will be able to appreciate the way security has evolved over time; as well as gain insight into the fundamental workings relevant to each domain. It is a blend of academic and practical wisdom, supplemented with tools that the reader can readily access and obtain a hands-on experience. The emphasis is on gaining the know-how, and this explains the leaning towards free and accessible tools. You will read about some of the most widespread attacks seen; the popular tools used by attackers and how attacks have been carried out from ordinary resources.
You may also want to know "After this course, what?" This courseware is a resource material. Any penetration tester can tell you that there is no one straight methodology or sequence of steps that you can follow while auditing a client site. There is no ONE template that will meet all your needs. Your testing strategy will vary with client, basic information enumeration, firewall penetration or other domains, you will find something in this courseware that you can definitely use.
Finally, this is not the end! This courseware is to be considered as a 'work-in-progress', because we will be adding value to this courseware over time. You may find some aspects detailed, while others may find it brief. The yardstick that we have used in this respect is simple - "does the content help explain the point at hand?" This doesn't mean that we would not love to hear from you regarding your viewpoints and suggestions. Do send us your feedback so that we can make this course a more useful one.
TABLE OF CONTENT:
Module 01 - Introduction to Ethical Hacking
Module 02 - Footprinting
Module 03 - Scanning
Module 04 - Enumeration
Module 05 - System Hacking
Module 06 - Trojans and Backdoors
Module 07 - Sniffers
Module 08 - Denial of Service
Module 09 - Social Engineering
Module 10 - Session Hijacking
Module 11 - Hacking Web Servers
Module 12 - Web Application Vulnerabilities
Module 13 - Web Based Password Cracking Techniques
Module 14 - SQL Injection
Module 15 - Hacking Wireless Networks
Module 16 - Viruses
Module 17 - Novell Hacking
Module 18 - Linux Hacking
Module 19 - Evading IDS, Firewalls and Honeypots
Module 20 - Buffer Overflows
Module 21 - Cryptography
Download


The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam.
Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores
Download




Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you'll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.

The Certified Ethical Hacker (CEH) exam was developed by the International Council of E-Commerce Consultants (EC-Council) to provide an industry-wide means of certifying the competency of security professionals. The CEH certification is granted to those who have attained the level of knowledge and troubleshooting skills needed to provide capable support in the field of computer and network security.
CEH: Official Certified Ethical Hacker Review Guide is designed to be a succinct, portable exam review guide that can be used either in conjunction with a more complete study program, computer-based training courseware, or classroom/lab environment, or as an exam review tool for those want to brush up before taking the exam.
Download the digital version of this book.

* The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications.
* This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks.
* Written industry expert Kimberly Graves, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review.
* The CD-ROM features two bonus exams, 150 flashcard questions, a searchable glossary of key terms, and hacking tools used in the EC-Council's CEH training.
Download

Javascript

In just a short time, you can learn how to use Ajax, JavaScript, and PHP to create interactive interfaces to your web applications by combining these powerful technologies.
No previous Ajax programming experience is required. Using a straightforward, step-by-step approach, each lesson in this book builds on the previous ones, enabling you to learn the essentials of Ajax programming with JavaScript, PHP, and related technologies from the ground up.
Regardless of whether you run Linux, Windows, or Mac OS X, the enclosed CD includes a complete Ajax programming starter kit that gives you all the programming tools, reference information, JavaScript libraries, and server software you need to set up a stable environment for learning, testing, and production.
Learn how to…
* Build better, more interactive interfaces for your web applications
* Make JavaScript, HTML, XML, and PHP work together to create Ajax effects
* Compile an Ajax application
* Create and consume web services with SOAP and REST
* Avoid common errors and troubleshoot programs
* Use popular Ajax libraries to speed up and improve common programming tasks
* XAMPP for Windows, Mac OS X, and Linux–an easy-to-install package to set up a PHP- and MySQL-enabled Apache server on your computer
* The jEdit programming editor for Windows, Mac, and Linux
* Prototype, Scriptaculous, Rico, and XOAD–popular JavaScript libraries for creating Ajax applications and effects
* A complete Ajax, HTML, XML, and PHP tutorial reference library in searchable PDF format
* Source code for the examples in the book
Phil Ballard is a software engineering consultant and developer specializing in website and intranet design and development for an international portfolio of clients. He has an honors degree from the University of Leeds, England, and has worked for several years in commercial and managerial roles in the high technology sector.
Michael Moncur is a freelance webmaster and author. He runs a network of websites and has written several bestselling books about web development, networking, certification programs, and databases.
Category: Web Development
Covers: Ajax, JavaScript and PHP
User Level: Beginning—Intermediate
Download


Author: Alexander J. Vincent
Publisher: Sams
Number Of Pages: 1200
PDF: 2.70 MB
ISBN-10 / ASIN: 0672322013
ISBN-13 / EAN: 9780672322013

JavaScript Developer’s Dictionary covers all the essential functions, methods, and objects of JavaScript in an easy-to-find, logical order.
JavaScript, and each different version of JavaScript, interacts very differently with each variety of Web browser, leaving Web developers scrambling to write code that will work in all the major browsers. JavaScript Developer’s Dictionary brings all these variants into one volume, breaking down every object in the JavaScript language and how it applies to each browser.
Wherever possible, the book also provides workarounds for earlier versions of JavaScript and for direct inconsistencies. The emphasis throughout this book is on compatibility across many versions of Netscape and Internet Explorer.
Download

Ruby

This book bridges the gap between what you'll learn from a typical beginner book about Ruby on Rails and what you'll need to know to create a solid, professional, spectacular, complex web application. Professional Ruby on Rails is a guide to taking a beginner web site and making it great. The book covers topics of interest to a web professional who is trying to develop and deploy a complex application. These topics include:
* Using REST to structure your application cleanly
* How to test and deploy your application for maximum automation with minimal headache
* Protecting your site and your user's data
* Using Rails to create the kinds of interactions that web users are coming to expect
The current Rails books are either beginner books, cookbook-style books, or specifically aimed at Ajax development. This book will fill the void for a book that discusses in-depth the information that a developer would need in order to move from a basic site to a fully featured web application.
From the Back Cover
Professional Ruby on Rails
Nothing less than a revolution in the way web applications are constructed,Ruby on Rails (RoR) boasts a straightforward and intuitive nature that avoids programming repetition and makes it infinitely easier to build for the web. Over the years, RoR has undergone numerous internal changes while programming techniques have evolved. This book captures the current best practices to show you the most efficient way to build a spectacular web application with RoR.
Preparing you to build a real, live, and complex web application, this invaluable resource covers all the questions that aren't addressed in introductory material, including how to manage users and security, organize a team of programmers, automate common build tasks, secure your site, and deploy a production server. You'll learn everything you need to know in order to extend Rails so that you can take advantage of the many exciting and wonderful things that are being done by the diligent RoR programming community.
What you will learn from this book
*How to write automated tests for all parts of your Rails application
*Why rake is a handy tool for automating commonly performed actions
*Ways to manage time zones and internationalization
*How to deploy Ruby applications using Capistrano, Mongrel, and Apache
*Techniques for installing and running a Rails application in Java
*Current security techniques, including prevention of cross-site scripting attacks
Who this book is for
This book is for RoR programmers, software and web developers, designers, and architects who are looking to expand their knowledge of the Rails framework.
Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.
See all Editorial Reviews
Product Details
* Paperback: 457 pages
* Publisher: Wrox (February 25, 2008)
* Language: English
* ISBN-10: 047022388X
* ISBN-13: 978-0470223888
Download


Use this free and easy programming language for ecommerce sites and blogs
If you need to build Web and database applications quickly but you dont dream in computer code, take heart! Ruby on Rails was created for you, and this book will have you up and running in no time. The Ruby scripting language and the Rails framework let you create fullfeatured Web applications fast. Its even fun!
Discover how to
Install and run Ruby and Rails
Use the RadRails IDE
Create a blog with Ruby
Connect your Web site to a database
Build a shopping cart
Explore Rubys syntax
Synopsis
Quickly create Web sites with this powerful tool. Use this free and easy programming language for e-commerce sites and blogs. If you need to build Web and database applications quickly but you don't dream in computer code, take heart! Ruby on Rails was created for you, and this book will have you up and running in no time. The Ruby scripting language and the Rails framework let you create full-featured Web applications fast. It's even fun! Discover how to: install and run Ruby and Rails; use the RadRails IDE; create a blog with Ruby; connect your Web site to a database; build a shopping cart; and, explore Ruby's syntax.
Download

* Paperback: 664 pages
* Publisher: Apress (March 26, 2007)
* Language: English
* ISBN-10: 1590597664
Ruby is perhaps best known as the engine powering the hugely popular Ruby on Rails web framework. However, it is an extremely powerful and versatile programming language in its own right. It focuses on simplicity and offers a fully object-oriented environment.
Beginning Ruby is a thoroughly contemporary guide for every type of reader wanting to learn Ruby, from novice programmers to web developers to Ruby newcomers. It starts by explaining the principles behind object-oriented programming and within a few chapters builds toward creating a genuine Ruby application.
The book then explains key Ruby principles, such as classes and objects; projects, modules, and libraries; and other aspects of Ruby such as database access. In addition, Ruby on Rails is covered in depth, and the books appendixes provide essential reference information as well as a primer for experienced programmers.
About the Author
Peter Cooper is a highly experienced Ruby developer and trainer. He manages BigBold (www.bigbold.com), a Ruby training and development company, and has produced many commercial web sites using Ruby on Rails, the Ruby-based web framework. In addition, he created Code Snippets, one of the world’s largest public code repositories, and Congress, an online chat client utilizing Ajax and Ruby on Rails. He also created Feed Digest, a feed distribution service that was recently profiled by Business 2.0 magazine.
In addition to development work, Peter has written professionally about various development techniques and tools, producing over 100 articles. He was coeditor of WebDeveloper.com, and worked on iBoost.com and Webpedia.com.
He lives in Lincolnshire, England, with his girlfriend. In his spare time he enjoys hiking, camping, and exploring mountains.
Download

Paperback: 310 pages
Publisher: Pragmatic Bookshelf (January 23, 2007)
Language: English
ISBN-10: 0977616614

Are you a tester who spends more time manually creating complex test data than using it? A business analyst who seemingly went to college all those years so you can spend your days copying data from reports into spreadsheets? A programmer who can’t finish each day’s task without having to scan through version control system output, looking for the file you want?

If so, you’re wasting that computer on your desk. Offload the drudgery to where it belongs, and free yourself to do what you should be doing: thinking. All you need is a scripting language (free!), this book (cheap!), and the dedication to work through the examples and exercises.

Everyday Scripting with Ruby is divided into four parts. In the first, you’ll learn the basics of the Ruby scripting language. In the second, you’ll see how to create scripts in a steady, controlled way using test-driven design. The third part is about finding, understanding, and using the work of others–and about preparing your scripts for others to use. The fourth part, more advanced, is about saving even more time by using application frameworks.

About the Author
Brian Marick graduated in 1981 with one degree in Mathematics and Computer Science and another one in English Literature. In his early career, he continued to be confused about his identity. Sometimes he was a programmer. Sometimes he was a tester. He became better at each because he understood the other. Brian is the author of The Craft of Software Testing, which promotes test design techniques, how testers support the team, and unscripted exploratory manual testing. He was an author of the Manifesto for Agile Software Development and was the second chair of the Agile Alliance board of directors. Because the Agile methods encourage cross-disciplinary work, he’s once again without a fixed identity. When consulting, he sticks his nose into everything
Download

Assembly

This book is 900+ pages of outstanding material on what is really an art - assembly language programming. The author, a university professor, has done what so many other authors have failed to do: take a complicated subject and break it down into easy-to-digest pieces. More importantly, it's written in clear, understandable language. Although not for the faint hearted - you really have to want to learn assembly language programming - the serious student should have no problems. What's really neat (IMHO) is that the author's proven system - called High Level Assembler (HLA) - is used throughout the book. HLA, although slightly different from 'regular' assembler, is easy to learn and very, very logical. Again, if you want to learn assembly language, this is "the" book you should have in your library!!!
Download


Robert Britton “MIPS Assembly Language Programming”
Prentice Hall | 2003-06-07 | ISBN: 0131420445 | 168 pages | PDF | 1,1 MB
Users of this book will gain an understanding of the fundamental concepts of contemporary computer architecture, starting with a Reduced Instruction Set Computer (RISC). An understanding of computer architecture needs to begin with the basics of modern computer organization. The MIPS architecture embodies the fundamental design principles of all contemporary RISC architectures. This book provides an understanding of how the functional components of modern computers are put together and how a computer works at the machine-language level. Well-written and clearly organized, this book covers the basics of MIPS architecture, including algorithm development, number systems, function calls, reentrant functions, memory-mapped I/O, exceptions and interrupts, and floating-point instructions. For employees in the field of systems, systems development, systems analysis, and systems maintenance.
Download


A comprehensive collection of documents, tutorials, assemblers, compilers, debuggers and many other resources for assembly programming.
Download







Author: Yury Magda
Paperback: 400 pages
Publisher: A-List Publishing; Pap/Cdr edition (May 1, 2004)
Language: English
ISBN-10: 193176932X
ISBN-13: 978-1931769327
Format: chm
Details:
Describing how the Assembly language can be used to develop highly effective C++ applications, this guide covers the development of 32-bit applications for Windows. Areas of focus include optimizing high-level logical structures, creating effective mathematical algorithms, and working with strings and arrays. Code optimization is considered for the Intel platform, taking into account features of the latest models of Intel Pentium processors and how using Assembly code in C++ applications can improve application processing. The use of an assembler to optimize C++ applications is examined in two ways, by developing and compiling Assembly modules that can be linked with the main program written in C++ and using the built-in assembler. Microsoft Visual C++ .Net 2003 is explored as a programming tool, and both the MASM 6.14 and IA-32 assembler compilers, which are used to compile source modules, are considered.
Download

Python

* This tutorial offers readers a thorough introduction to programming in Python 2.4, the portable, interpreted, object-oriented programming language that combines power with clear syntax
* Beginning programmers will quickly learn to develop robust, reliable, and reusable Python applications for Web development, scientific applications, and system tasks for users or administrators
* Discusses the basics of installing Python as well as the new features of Python release 2.4, which make it easier for users to create scientific and Web applications
* Features examples of various operating systems throughout the book, including Linux, Mac OS X/BSD, and Windows XPDownload Description:* This tutorial offers readers a thorough introduction to programming in Python 2.4, the portable, interpreted, object-oriented programming language that combines power with clear syntax
* Beginning programmers will quickly learn to develop robust, reliable, and reusable Python applications for Web development, scientific applications, and system tasks for users or administrators
* Discusses the basics of installing Python as well as the new features of Python release 2.4, which make it easier for users to create scientific and Web applications
* Features examples of various operating systems throughout the book, including Linux, Mac OS X/BSD, and Windows XP”
Download


Beginning Python: From Novice to Professional is the most comprehensive book on the Python ever written. Based on Practical Python, this newly revised book is both an introduction and practical reference for a swath of Python-related programming topics, including addressing language internals, database integration, network programming, and web services. Advanced topics, such as extending Python and packaging/distributing Python applications, are also covered.

Ten different projects illustrate the concepts introduced in the book. You will learn how to create a P2P file-sharing application and a web-based bulletin board, and how to remotely edit web-based documents and create games. Author Magnus Lie Hetland is an authority on Python and previously authored Practical Python. He also authored the popular online guide, Instant Python Hacking, on which both books are based.
Download


Already the industry standard for Python users, “Programming Python” from O’Reilly just got even better. This third edition has been updated to reflect current best practices and the abundance of changes introduced by the latest version of the language, Python 2.5. Whether you’re a novice or an advanced practitioner, you’ll find this refreshed book more than lives up to its reputation. “Programming Python,” 3rd Edition, teaches you the right way to code. It explains Python language syntax and programming techniques in a clear and concise manner, with numerous examples that illustrate both correct usage and common idioms. By reading this comprehensive guide, you’ll learn how to apply Python in real-world problem domains such as: GUI programming Internet scripting Parallel processing Database management Networked applications

“Programming Python,” Third Edition covers each of these target domains gradually, beginning with in-depth discussions of core concepts and then progressing toward complete programs. Large examples do appear, but only after you’ve learned enough to understand their techniques and code.Along the way, you’ll also learn how to use the Python language in realistically scaled programs–concepts such as Object-Oriented Programming (OOP) and code reuse are recurring side themes throughout this text. If you’re interested in Python programming, then this O’Reilly classic needs to be within arm’s reach. The wealth of practical advice, snippets of code, and patterns of program design can all be put into use on a daily basis–making your life easier and more productive.
Download


Every so often a book comes along that makes you ask yourself, “Gee, when was the last time I had my eyes checked?” David M. Beazley’s Python: Essential Reference is just such a book. Condensing thousands of pages of Python online documentation into a compact 319-page softcover, Beazley and his editors used the old-college trick (often performed in reverse) of dickering with the font size to meet a putative page-limit requirement. The result is a truly condensed product fit for the occularly well-adjusted (nota bene).

Beazley’s subject is Python, a full-featured, freely-redistributable, POSIX-compliant (platforms include Linux, Unix, Macintosh, and Windows) scripting language that is based on object-oriented design principles. As advertised, Beazley’s source release (1.5.2) is available from an unfortunately slow server at www.python.org. The installation under Linux (Redhat 5.2) proceeded without incident.Beazley holds true to his catalogic purpose: fully 230 pages are formatted as technical appendices and indices covering the standard litany: built-in function syntax, features, OS-level interfaces, Internet interfaces, and compiling/profiling/debugging. All references are fully annotated and illustrated with example source code that runs from a couple of lines to a couple of pages. In lock step with competing scripting languages, Python is extensible and embeddable in C and C++, and with blitzkrieg efficiency, Beazley summarizes these crucial practical issues in the final 30 pages. Python users who are tired of chasing questions through hyperlinked online documents will benefit from the expansive random-access index.
Download


Portable, powerful, and a breeze to use, Python is the popular open source object-oriented programming language used for both standalone programs and scripting applications. It is now being used by an increasing number of major organizations, including NASA and Google. Updated for Python 2.4, The Python Cookbook, 2nd Edition offers a wealth of useful code for all Python programmers, not just advanced practitioners. Like its predecessor, the new edition provides solutions to problems that Python programmers face everyday. It now includes over 200 recipes that range from simple tasks, such as working with dictionaries and list comprehensions, to complex tasks, such as monitoring a network and building a templating system. This revised version also includes new chapters on topics such as time, money, and metaprogramming. Here's a list of additional topics covered:

  • Manipulating text
  • Searching and sorting
  • Working with files and the filesystem
  • Object-oriented programming
  • Dealing with threads and processes
  • System administration
  • Interacting with databases
  • Creating user interfaces
  • Network and web programming
  • Processing XML
  • Distributed programming
  • Debugging and testing
  • 1) Open it with Winrar.
    2) Password : www.lemonshare.net
    Download

Mobile Python is the introduction of Python programming language to the mobile space. This practical hands-on book teaches readers how to realize their application ideas on the Symbian OS. Programming on the Symbian mobile platform has been difficult and time consuming in the past. This innovative new title will remedy this problem.
Chapters deal with topics that are based on Python S60 features and presented in an order that lets the user learn first the “simple to code” ones and then increasing in complexity.
Download