lunes, 31 de diciembre de 2007

Penetration Tester's Open Source Toolkit

This is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collectionwhich includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry’s foremost penetration testers including Johnny Long, Chris Hurley, and SensePost.



Edición: Syngress (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Reconnaissance
  2. Enumeration and Scanning
  3. Introduction to Testing Databases
  4. Web Server & Web Application Testing
  5. Wireless Penetration Testing Using Auditor
  6. Network Devices
  7. Writing Open Source Security Tools
  8. Nessus
  9. Coding for Nessus
  10. NASL Extensions and Custom Tests
  11. Understanding the Extended Capabilities of the Nessus Environment
  12. Extending Metasploit I
  13. Extending Metasploit II

Descarga/Download

MPLS and VPN Architectures (CCIP Edition)

MPLS and VPN Architectures, CCIP Edition, is a practical guide to understanding, designing, and deploying MPLS-based VPNs. This book covers MPLS theory and configuration, network design issues, and one major MPLS application: MPLS-based VPNs. The MPLS/VPN architecture and all its mechanisms are explained with configuration examples, suggested design and deployment guidelines, and extensive case studies.


Edición: Cisco Press (2002)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Multiprotocol Label Switching (MPLS) Architecture Overview
  2. Frame-mode MPLS Operation
  3. Cell-mode MPLS Operation
  4. Running Frame-mode MPLS Across Switched WAN Media
  5. Advanced MPLS Topics
  6. MPLS Migration and Configuration Case Study
  7. MPLS Troubleshooting
  8. Virtual Private Network (VPN) Implementation Options
  9. MPLS/VPN Architecture Overview
  10. MPLS/VPN Architecture Operation
  11. Provider Edge (PE) to Customer Edge (CE) Connectivity Options
  12. Advanced MPLS VPN Topologies
  13. Advanced MPLS VPN Topics
  14. Guidelines for Deployment of MPLS VPN
  15. Carrier's Carrier and Inter-provider VPN Solutions
  16. IP Tunneling to MPLS/VPN Migration Case Study
  17. MPLS VPN Troubleshooting

Descarga/Download

Mastering Microsoft Windows Vista Home: Premium and Basic

Configure, run, and troubleshoot Windows Vista Home Premium or Windows Vista Home Basic with the detailed coverage you’ll find in this comprehensive guide. With a task-based approach and clear instructions, this book helps you become an advanced user of Windows Vista—even if you’re just starting out. From administering your computer and surfing the Web securely to advanced maneuvers such as creating your own movies and burning DVDs, you’ll find what you need to master the powerful features of Windows Vista.


Edición: Sybex (2007)
Idioma: Inglés
Formato: PDF


Contenido:

  1. Up and Running with Windows Vista
  2. Administering and Troubleshooting Windows Vista
  3. Using Windows Vista’s Communication Tools
  4. Audio, Video, and Games
  5. Networking Windows Vista Home Edition

Descarga/Download

MCSA MCSE (Exams 70-292 and 70-296) Upgrading Your Certification to Microsoft Windows Server 2003

Upgrade your MCSA or MCSE certification—and your job skills—to Windows Server 2003 with this official Microsoft study guide for Exams 70-292 and 70-296. Work at your own pace through a system of lessons, hands-on exercises, troubleshooting labs, and review questions to maximize your performance on the upgrade exams.

Edición: Microsoft Press (2004)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introduction to Windows Server 2003
  2. Implementing an Active Directory Infrastructure
  3. Managing and Maintaining an Active Directory Implementation
  4. Managing Users, Groups, and Computers
  5. Planning, Implementing, and Troubleshooting Group Policy
  6. Managing the User Environment with Group Policy
  7. Planning a Host Name Resolution Strategy
  8. Implementing, Managing, and Maintaining Name Resolution
  9. Planning and Implementing Server Roles and Security
  10. Managing and Maintaining a Server Environment
  11. Securing Network Communication
  12. Creating and Managing Digital Certificates
  13. Managing and Implementing Disaster Recovery
  14. Clustering Servers
  15. Exam 70-292—Managing Users, Computers, and Groups (1.0)
  16. Exam 70-292—Managing and Maintaining Access to Resources (2.0)
  17. Exam 70-292—Managing and Maintaining a Server Environment (3.0)
  18. Exam 70-292—Managing and Implementing Disaster Recovery (4.0)
  19. Exam 70-292—Implementing, Managing, and Maintaining Name Resolution (5.0)
  20. Exam 70-292—Implementing, Managing, and Maintaining Network Security (6.0)
  21. Exam 70-296—Planning and Implementing Server Roles and Server Security (1.0)
  22. Exam 70-296—Planning, Implementing, and Maintaining a Network Infrastructure (2.0)
  23. Exam 70-296—Planning, Implementing, and Maintaining Server Availability (3.0)
  24. Exam 70-296—Planning and Maintaining Network Security (4.0)
  25. Exam 70-296—Planning, Implementing, and Maintaining Security Infrastructure (5.0)
  26. Exam 70-296—Planning and Implementing an Active Directory Infrastructure (6.0)
  27. Exam 70-296—Managing and Maintaining an Active Directory Infrastructure (7.0)
  28. Exam 70-296—Planning and Implementing User, Computer, and Group Strategies (8.0)
  29. Exam 70-296—Planning and Implementing Group Policy (9.0)
  30. Exam 70-296—Managing and Maintaining Group Policy (10.0)

Descarga/Download

domingo, 30 de diciembre de 2007

Beginning Database Design: From Novice to Professional

Beginning Database Design: From Novice to Professional provides short, easy-to-read explanations of how to get database design right the first time. This book offers numerous examples to help you avoid the many pitfalls that entrap new and not-so-new database designers. Through the help of use cases and class diagrams modeled in the UML, youll learn how to discover and represent the details and scope of the problem in question.


Edición: Apress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. What Can Go Wrong
  2. Guided Tour of the Development Process
  3. Initial Requirements and Use Cases
  4. Learning from the Data Model
  5. Developing a Data Model
  6. Generalization and Specialization
  7. From Data Model to Relational Schema
  8. Normalization
  9. More on Keys and Constraints
  10. Queries
  11. User Interface
  12. Other Implementations

Descarga/Download

Writing Security Tools and Exploits

Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book.

Edición: Syngress (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Writing Exploits and Security Tools
  2. Assembly and Shellcode
  3. Exploits: Stack
  4. Exploits: Heap
  5. Exploits: Format Strings
  6. Writing Exploits I
  7. Writing Exploits II
  8. Coding for Ethereal
  9. Coding for Nessus
  10. Extending Metasploit I
  11. Extending Metasploit II
  12. Extending Metasploit III
  13. Appendix A: Data Conversion Reference
  14. Appendix B: Syscall Reference
  15. Appendix C: Taps Currently Embedded Within Ethereal
  16. Appendix D: Glossary

Descarga/Download

sábado, 29 de diciembre de 2007

CCVP CVoice Quick Reference Sheets

As a final preparation tool providing a review of CVoice exam topics, the CCVP CVOICE Quick Reference Sheets complement official Cisco curriculum, other books, or other exam preparatory material. This digital Short Cut provides readers with detailed, graphical-based information, highlighting the key topics on the latest CVoice exam in a quick-review format. These fact-filled Quick Reference Sheets allow certification candidates to get all-important information at a glance, helping them to focus their study on areas of weakness and to enhance memory retention of important concepts.

Edición: Cisco Press (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Overview of Legacy and IP Telephony Networks
  2. The Mechanics of Analog and Digital Voice Circuits
  3. Configuring Router Voice Ports
  4. Configuring Router Dial Peers
  5. Voice over IP Design Considerations
  6. Gateway Protocols
  7. Ensuring Voice Quality

Descarga/Download

Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesn’t want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.



Edición: Syngress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Presenting the Business Case for Free Solutions
  2. Protecting Your Perimeter
  3. Protecting Network Resources
  4. Configuring an Intrusion Detection System
  5. Managing Event Logs
  6. Testing and Auditing Your Systems
  7. Network Reporting and Troubleshooting
  8. Security as an Ongoing Process

Descarga/Download

CCA: Citrix MetaFrame XP 1.0 Administration Study Guide

Here's the book you need to prepare for exam 220, Citrix MetaFrame XP 1.0 for Windows Administration. This study guide provides:

In-depth coverage of every exam objective Practical information on administering MetaFrame XP 1.0 for Windows Hundreds of challenging review questions, in the book and on the CD Leading-edge exam preparation software, including a testing engine, and electronic flashcards.

Edición: Sybex (2002)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Why Citrix MetaFrame XP?
  2. Underlying Citrix MetaFrame XP Technologies
  3. Planning the Installation of MetaFrame XP
  4. Installing MetaFrame XP
  5. Administration and the Citrix Management Console
  6. Other Administrative Tools
  7. Load Management
  8. Security
  9. Application Support
  10. ICA Client Software
  11. Program Neighborhood
  12. Web Connectivity and NFuse
  13. Printing
  14. Monitoring and Troubleshooting
  15. Appendix: Feature Release 1

Descarga/Download

Red Hat Fedora Core 6 Unleashed

Red Hat® Fedora™ Core 6 Unleashed presents comprehensive coverage of Fedora Core 6, the popular Linux distribution developed by the Red Hat-sponsored Fedora Project.

This book provides detailed information on installing, using, and administering Fedora. You’ll learn how to set up a desktop workstation or a high-powered server, and you’ll find complete details on Yum, Fedora’s easy-to-use desktop and productivity software.


Edición: SAMS (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Installation and Configuration
  2. Desktop Fedora
  3. System Administration
  4. Fedora As a Server
  5. Programming Linux
  6. Fedora Housekeeping

Descarga/Download

viernes, 28 de diciembre de 2007

Internetworking Technologies Handbook (4th Edition)

Internetworking Technologies Handbook, Fourth Edition, is a comprehensive reference that enables networking professionals to understand and implement contemporary internetworking technologies. Master the terms, concepts, technologies, and devices used in today's networking industry. Learn how to incorporate internetworking technologies into a LAN/WAN environment. Complete with new and updated chapters on security, storage, optical networking, scalability, and speed, this book is a complete and up-to-date reference to the topics that are essential to all networking professionals, regardless of expertise.

Edición: Cisco Press (2003)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introduction to Internetworking
  2. LAN Protocols
  3. WAN Technologies
  4. Multiservice Access Technologies
  5. Bridging and Switching
  6. Network Protocols
  7. Routing Protocols
  8. Network Management

Descarga/Download

Hack Proofing Your Web Applications

The Complete Guide to Developing Secure Web Applications

As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security-attempt to break into it by finding some hole that you may have unintentionally left in.

Edición: Syngress (2001)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Hacking Methodology
  2. How to Avoid Becoming a “Code Grinder”
  3. Understanding the Risks Associated with Mobile Code
  4. Vulnerable CGI Scripts
  5. Hacking Techniques and Tools
  6. Code Auditing and Reverse Engineering
  7. Securing Your Java Code
  8. Securing XML
  9. Building Safe ActiveX Internet Controls
  10. Securing ColdFusion
  11. Developing Security-Enabled Applications
  12. Cradle to Grave: Working with a Security Plan
  13. Appendix: Hack Proofing Your Web Applications Fast Track

Descarga/Download

MCSE (Exam 70-293) Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)

Ace your preparation for the skills measured by MCP Exam 70-293?and on the job?with this official Microsoft study guide, now updated for Service Pack 1. Work at your own pace through a system of lessons, hands-on exercises, troubleshooting labs, and review questions.

Edición: Microsoft Press (2006)
Idioma: Inglés
Formato: PDF


Contenido:

  1. Planning a Network Topology
  2. Planning a TCP/IP Network Infrastructure
  3. Planning Internet Connectivity
  4. Planning a Name Resolution Strategy
  5. Using Routing and Remote Access
  6. Maintaining Server Availability
  7. Clustering Servers
  8. Planning a Secure Baseline Installation
  9. Hardening Servers
  10. Deploying Security Configurations
  11. Creating and Managing Digital Certificates
  12. Securing Network Communications Using IPSec
  13. Designing a Security Infrastructure
  14. Planning and Implementing Server Roles and Server Security (1.0)
  15. Planning, Implementing, and Maintaining a Network Infrastructure (2.0)
  16. Planning, Implementing, and Maintaining Routing and Remote Access (3.0)
  17. Planning, Implementing, and Maintaining Server Availability (4.0)
  18. Planning and Maintaining Network Security (5.0)
  19. Planning, Implementing, and Maintaining Security Infrastructure (6.0)

Descarga/Download

jueves, 27 de diciembre de 2007

MCSA MCSE Windows XP Professional Fast Pass


MCSA/MCSE: Windows XP Professional Fast Pass is the streamlined tool you need to hone in on critical XP information at this key stage in the certification process (exam 70-270).


Edición: Sybex (2004)
Idioma: Inglés
Formato: PDF






Contenido:

  1. Installing Windows XP Professional
  2. Implementing and Conducting Administration of Resources
  3. Implementing and Conducting Administration of Resources
  4. Monitoring and Optimizing System Performance and Reliability
  5. Configuring and Troubleshooting the Desktop Environment
  6. Implementing, Managing, and Troubleshooting Network Protocols and Services
  7. Configuring, Managing, and Troubleshooting Security

Descarga/Download

Beginning Apache Struts: From Novice to Professional

Beginning Apache Struts will provide you a working knowledge of Apache Struts 1.2. This book is ideal for you Java programmers who have some JSP familiarity, but little or no prior experience with Servlet technology.

Organized in a condensed tutorial and lab format, the material in this book has been tested in real classroom environments. It takes a step-by-step, hands-on approach to teaching you Struts. The book even previews the next generation of Struts, the Apache Shale. The overall result is that you can quickly apply Struts to your work settings with confidence.

Edición: Apress (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introduction
  2. Servlet and JSP Review
  3. Understanding Scopes
  4. Custom Tags
  5. The MVC Design Pattern
  6. Simple Validation
  7. Processing Business Logic
  8. Basic Struts Tags
  9. Configuring Struts
  10. More Tags
  11. Uploading Files
  12. Internationalization
  13. Review Lab: Editing Contacts in LILLDEP
  14. Tiles
  15. The Validator Framework
  16. Dynamic Forms
  17. Potpourri
  18. Review Lab: The Collection Facility
  19. Developing Plug-ins
  20. JavaServer Faces and Struts Shale
  21. Appendix A: Frameworks for the Model
  22. Appendix B: Commonly Used Classes
  23. Appendix C: Struts Tag Reference
  24. Appendix D: Answers

Descarga/Download

miércoles, 26 de diciembre de 2007

SUSE Linux 10 Bible

Includes new coverage of Novell Linux Desktop and Open Enterprise Server (Novell's traditional environment running on SUSE), with information on YaST management tools and the OpenExchange e-mail serverIntroduces basic Linux methodologies, including partitions, filesystems, filesystem layout, and moreCovers the SUSE system, command line programs, implementing online services, and using SUSE business tools in the enterprise settingFeatures a section devoted to end-user needsAlso covers virtualization, including dosemu, wine, Crossover Office, uml xen and Vmware, expanded coverage of SUSE with sendmail, CUPS, LDAP and moreCompanion DVD includes the SUSE Linux distribution

Edición: Wiley (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. SUSE Linux Basics
  2. The SUSE System
  3. Using the Command Line in SUSE Linux
  4. Implementing Network Services in SUSE Linux
  5. SUSE Linux in the Enterprise

Descarga/Download

Aggressive Network Self-Defense

Aggressive Network Self-Defense (ANSD) is another innovative Syngress book. It leaps beyond the theories of digital self-defense initially proposed by Tim Mullen in 2002. Tim tried to justify using 'neutralizing agents' to disable malicious processes (like Code Red or Nimda) on infected hosts attacking one's enterprise. ANSD does not speak of neutralizing agents in the eight fictional cases the comprise the bulk of the book, but those chapters make for thought-provoking reading.

Edición: Syngress (2005)
Idioma: Inglés
Formato: PDF

Contenido:

  1. PDA Perils: Revenge from the Palm of Your Hand
  2. The Case of a WLAN Attacker: In the Booth
  3. MD5: Exploiting the Generous
  4. A VPN Victim´s Story: Jack´s Smirking Revenge
  5. Network Protection: Cyber-Attacks Meet Physical Response
  6. Network Insecurity: Taking Patch Management to the Masses
  7. The Fight for the Primulus Network: Yaseen vs Nathan
  8. Undermining the Network: A Breach of Trust
  9. ADAM: Active Defense Algorithm and Model
  10. Defending Your Right to Defend
  11. MD5 to Be Considered Harmful Someday
  12. When the Tables Turn: Passive Strike-Back

Descarga/Download

CCVP CIPT Quick Reference Sheets

As a final preparation tool providing a review of CIPT exam topics, the CCVP CIPT Quick Reference Sheets complement official Cisco curriculum, other books, or other exam preparatory material. This digital Short Cut provides readers with detailed, graphical-based information, highlighting the key topics on the latest CIPT exam in a quick-review format. These fact-filled Quick Reference Sheets allow certification candidates to get all-important information at a glance, helping them to focus their study on areas of weakness and to enhance memory retention of important concepts.

Edición: Cisco Press (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. The Cisco CallManager
  2. IP Telephony Components
  3. Dial Plans
  4. IP Telephony Options
  5. IP Telephony Applications
  6. Administrative Utilities
  7. Cisco CallManager 4.x Enhancements

Descarga/Download

martes, 25 de diciembre de 2007

How to Cheat at Configuring Open Source Security Tools

This book is designed to teach readers about the many common vulnerabilities and the ways in which attackers exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers to identify and defend against these attacks using the most commonly deployed open source security tools including Wireshark (sniffer), Snort (IDS), Nessus (Vulnerability Assessment), and Kismet (wireless sniffer). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. The companion Web site for the book contains dozens of working scripts and tools from the book.

Edición: Syngress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Testing and Auditing Your Systems
  2. Protecting Your Perimeter
  3. Protecting Network Resources
  4. Introducing Snort
  5. Installing Snort 2.6
  6. Configuring Snort and Add-Ons
  7. Introducing Wireshark: Network Protocol Analyzer
  8. Getting and Installing Wireshark
  9. Using Wireshark
  10. Network Reporting and Troubleshooting with other Tools
  11. Wireless Monitoring and Intrusion Detection

Descarga/Download

Beginning Ajax with PHP: From Novice to Professional

Ajax breathes new life into web applications by transparently communicating and manipulating data in conjunction with a server-based technology. Of all the server-based technologies capable of working in conjunction with Ajax, perhaps none are more suitable than PHP, the world's most popular scripting language.

Beginning Ajax with PHP: From Novice to Professional is the first book to introduce how these two popular technologies can work together to create next-generation applications. Author Lee Babin covers what you commonly encounter in daily web application development tasks, and shows you how to build PHP/AJAX-enabled solutions for forms validation, file upload monitoring, database-driven information display and manipulation, web services, Google Maps integration, and more.

Edición: Apress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introducing Ajax
  2. Ajax Basics
  3. PHP and Ajax
  4. Database-Driven Ajax
  5. Forms
  6. Images
  7. A Real-World Ajax Application
  8. Ergonomic Display
  9. Web Services
  10. Spatially Enabled Web Applications
  11. Cross-Browser Issues
  12. Security
  13. Testing and Debugging
  14. The DOM

Descarga/Download

lunes, 24 de diciembre de 2007

Mission Critical, Internet Security

The best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This book begins with general advice about how to set up a comprehensive system of defenses (comprising a firewall, an intrusion detection system, authentication and cryptography schemes, and protocols like IPsec). It concludes with information (this is the bulk of the authors' work) on the specifics of configuring several products.

Edición: Syngress (2001)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Securing Your Internetwork
  2. Internetwork Security Concepts
  3. IPSec
  4. Internet Security Applications
  5. Attacks That Await Your Network
  6. Microsoft RAS and VPN for Windows 2000
  7. Securing Your Network with Microsoft Proxy Server 2.0
  8. Traffic Filtering on Cisco IOS
  9. Configuring and Securing the Cisco PIX Firewall
  10. Axent Technologies Raptor Firewall 6.5
  11. Check Point Software’s Check Point FireWall-1

Descarga/Download

Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services

Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services will help you understand SS7 from several perspectives. It examines the framework and architecture of SS7, as well as how it is used to provide today's telecommunications services. It also examines each level of the SS7 protocol-all the way down to the bit level of messages. In addition, the SIGTRAN standards are discussed in detail, showing the migration from SS7 to IP and explaining how SS7 information is transported over IP.

Edición: Cisco Press (2004)
Idioma: Inglés
Formato: PDF

Contenido:

  1. The Evolution of Signaling
  2. Standards
  3. The Role of SS7
  4. SS7 Network Architecture and Protocols Introduction
  5. The Public Switched Telephone Network (PSTN)
  6. Message Transfer Part 2 (MTP2)
  7. Message Transfer Part 3 (MTP3)
  8. ISDN User Part (ISUP)
  9. Signaling Connection Control Part (SCCP)
  10. Transaction Capabilities Application Part (TCAP)
  11. Intelligent Networks (IN)
  12. Cellular Networks
  13. GSM and ANSI-41 Mobile Application Part (MAP)
  14. SS7 in the Converged World
  15. SS7 Security and Monitoring
  16. SS7 Testing
  17. Appendix A. MTP Messages (ANSI/ETSI/ITU)
  18. Appendix B. ISUP Messages (ANSI/UK/ETSI/ITU-T)
  19. Appendix C. SCCP Messages (ANSI/ETSI/ITU-T)
  20. Appendix D. TCAP Messages and Components
  21. Appendix E. ITU-T Q.931 Messages
  22. Appendix F. GSM and ANSI MAP Operations
  23. Appendix G. MTP Timers in ITU-T/ETSI/ANSI Applications
  24. Appendix H. ISUP Timers for ANSI/ETSI/ITU-T Applications
  25. Appendix I. GSM Mobile Country Codes (MCC) and Mobile Network Codes (MNC)
  26. Appendix J. ITU and ANSI Protocol Comparison
  27. Appendix K. SS7 Standards
  28. Appendix L. Tektronix Supporting Traffic
  29. Appendix M. Cause Values

Descarga/Download

domingo, 23 de diciembre de 2007

OCP: Oracle 10g New Features for Administrators Study Guide

Here's the book you need to prepare for Oracle's 10g upgrade exam, Oracle Database 10g: New Features for Administrators (1Z0-040). This Study Guide was developed to meet the exacting requirements of today's Oracle certification candidates.

Edición: Sybex (2004)
Idioma: Inglés
Formato: PDF




Contenido:

  1. Installing and Upgrading to Oracle
  2. Moving Data and Managing the Scheduler
  3. Automating Management
  4. General Storage Management
  5. Automated Storage Management
  6. Performance and Application Tuning
  7. Backup, Recovery, and High Availability
  8. Security and SQL Enhancements
  9. Appendix A: SQL*Plus Enhancements
  10. Appendix B: New and Obsolete Initialization Parameters
  11. Appendix C: PL/SQL Enhancements and New Packages

Descarga/Download

Beginning CSS Web Development: From Novice to Professional

There are many books out there on CSS, but Beginning CSS Web Development is different—it doesnt waste time discussing theory, and it delves straight into the practical matter. It provides you with what you need to know, faster. It is also completely up to date, covering the most modern CSS standards and design techniques.

In addition to the essential CSS basics, this book covers advanced techniques like accessibility, hacks, and filters. The book concludes with a case study, and features a CSS reference section that allows you to look up required syntax as quickly as possible.

Edición: Apress (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Getting Started
  2. Core Concepts of CSS
  3. CSS Building Blocks
  4. Text
  5. Color, Backgrounds, and Images
  6. Lists
  7. Links
  8. Tables and Definition Lists
  9. Forms
  10. Layout Basics
  11. Classic Layouts
  12. Layout Manipulation
  13. The Journey from Layout to Template
  14. Usability and Accessibility Enhancements
  15. Tips, Tricks, and Troubles
  16. Case Study: The Dead Goods
  17. Appendix: CSS Reference

Descarga/Download