Posts Tagged ‘networks’

Computer Weekly

Computer Weekly - 8-14th December 2009

Download:

http://uploading.com/files/8d89cm49/Computer%2BWeekly%2B-%2B8-14th.rar/

or

http://sharingmatrix.com/file/787301/Computer%20Weekly%20-%208-14th.rar

Securing Wireless Communications at the Physical Layer

Ruoheng Liu, Wade Trappe, "Securing Wireless Communications at the Physical Layer"

The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the physical layer.

The area of physical layer security is an emerging field of research that has seen an explosion of research in the past few years. This trend is only expected to continue as there is a growing need to secure wireless communications without conventional cryptographic network security protocols.

The proposed book will consist of contributions from roughly a dozen of the leading research groups in this emerging area. For the first time, important results will be collected together. Important topics will include the secrecy rate of MIMO wireless systems, practical codes for the dissemination of secrets, and authentication of wireless transmitters using waveform-level properties.

Download:

http://www.megaupload.com/?d=DFPTWXB1

Playboy

Playboy #12 (December/2009/Hungary)

Download:

http://depositfiles.com/files/6ub66fgzf

or

http://uploading.com/files/am5514de/Pboy_Hung12.rar/

ModSecurity 2.5

Magnus Mischel , "ModSecurity 2.5"

Prevent web application hacking with this easy to use guide
Secure your system by knowing exactly how a hacker would break into it
Covers writing rules in-depth and Modsecurity rule language elements such as variables, actions, and request phases
Covers the common attacks in use on the Web, and ways to find the geographical location of an attacker and send alert emails when attacks are discovered
Packed with many real-life examples for better understanding

Download:

http://depositfiles.com/files/zj332huaf

or

http://extabit.com/file/28xhhf9xvirvx

Certified Ethical Hacker

Certified Ethical Hacking Study Guide

The EC-Councils Certified Ethical Hacker has emerged as one of todays most sought-after certifications.
This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks.
Written industry expert Kimberly Graves, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review.
The CD-ROM features two bonus exams, 150 flashcard questions, a searchable glossary of key terms, and hacking tools used in the EC-Councils CEH training.

Download:

http://hotfile.com/dl/19391330/9f5d462/Ethical_Hacking_and_Countermeasures.rar.html

Advertisements

Cisco Packet Tracer 4.1

Packet Tracer 4.1 is a standalone, medium-fidelity, simulation-based learning environment for networking novices to design, configure, and troubleshoot computer networks at a CCNA-level of complexity. Packet Tracer supports student and instructor creation of simulations, visualizations, and animations of networking phenomena. Like any simulation, Packet Tracer 4.1 relies on a simplified model of networking devices and protocols. However, real computer networks remain the benchmark for understanding network behavior. Packet Tracer was created to help address the “digital divide” in networking education, where many students and teachers lack access to equipment, bandwidth, and interactive modes of learning networking.

http://rapidshare.com/files/66565829/Packet_Tracer_4.1.part1.rar
http://rapidshare.com/files/66566390/Packet_Tracer_4.1.part2.rar