Computer Weekly – Securing Wireless Communications at the Physical Layer – Playboy – ModSecurity 2.5 – Certified Ethical Hacking Study Guide

Posted: 8 December, 2009 in basic, cyber culture, english, life, new
Tags: , , , , , , , , , , , , ,

Computer Weekly

Computer Weekly - 8-14th December 2009

Download:

http://uploading.com/files/8d89cm49/Computer%2BWeekly%2B-%2B8-14th.rar/

or

http://sharingmatrix.com/file/787301/Computer%20Weekly%20-%208-14th.rar

Securing Wireless Communications at the Physical Layer

Ruoheng Liu, Wade Trappe, "Securing Wireless Communications at the Physical Layer"

The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the physical layer.

The area of physical layer security is an emerging field of research that has seen an explosion of research in the past few years. This trend is only expected to continue as there is a growing need to secure wireless communications without conventional cryptographic network security protocols.

The proposed book will consist of contributions from roughly a dozen of the leading research groups in this emerging area. For the first time, important results will be collected together. Important topics will include the secrecy rate of MIMO wireless systems, practical codes for the dissemination of secrets, and authentication of wireless transmitters using waveform-level properties.

Download:

http://www.megaupload.com/?d=DFPTWXB1

Playboy

Playboy #12 (December/2009/Hungary)

Download:

http://depositfiles.com/files/6ub66fgzf

or

http://uploading.com/files/am5514de/Pboy_Hung12.rar/

ModSecurity 2.5

Magnus Mischel , "ModSecurity 2.5"

Prevent web application hacking with this easy to use guide
Secure your system by knowing exactly how a hacker would break into it
Covers writing rules in-depth and Modsecurity rule language elements such as variables, actions, and request phases
Covers the common attacks in use on the Web, and ways to find the geographical location of an attacker and send alert emails when attacks are discovered
Packed with many real-life examples for better understanding

Download:

http://depositfiles.com/files/zj332huaf

or

http://extabit.com/file/28xhhf9xvirvx

Certified Ethical Hacker

Certified Ethical Hacking Study Guide

The EC-Councils Certified Ethical Hacker has emerged as one of todays most sought-after certifications.
This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks.
Written industry expert Kimberly Graves, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review.
The CD-ROM features two bonus exams, 150 flashcard questions, a searchable glossary of key terms, and hacking tools used in the EC-Councils CEH training.

Download:

http://hotfile.com/dl/19391330/9f5d462/Ethical_Hacking_and_Countermeasures.rar.html

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s