www.FarhanSoft.Co.CC

href='http://farhansoft.co.cc'/> www.FarhanSoft.Co.CC src='http://54800.com/wp-content/uploads/a1.jpg'/>
Latest Books

Lars Larsson, Rolf Eliasson - Principles of Yacht Design

Posted by Syed Farhan Ahmad on Monday, June 29, 2009 , under | comments (0)



Lars Larsson, Rolf Eliasson - Principles of Yacht Design
International Marine | 2000 | ISBN: 0071353933 | Pages: 352 | PDF | 14.51 MB
Principles of Yacht Design is both comprehensible to amateurs and comprehensive for professionals. It follows the design of a 40-foot cruising sailboat from the first sketch to the final weight, strength, and sail area calculations, with tables, charts, and diagrams to let the reader adapt the process to any design. This edition is revised and expanded to cover powerboats as well as sailboats.

Thanks to original uploader!

DOWNLOAD

Mirror

200 Ways to Revive a Hard Drive (Digital)

Posted by Syed Farhan Ahmad on , under | comments (0)



200 Ways to Revive a Hard Drive (Digital)

200 Ways to Revive a Hard Drive (Digital)

200 Practical tips to recover your damaged Hard Drive.. Hard drive failures may be responsible for the biggest headaches IT professionals experience. Recovering lost or corrupted data from failed disks is a nightmare. Fortunately, you have help. TechRepublic asked its members what recovery methods worked best for them

Download
http://rapidshare.com/files/149049924/200_Ways_to_Revive_a_Hard_Drive.rar

Maximum Security, Fourth Edition

Posted by Syed Farhan Ahmad on , under | comments (0)



Maximum Security, Fourth Edition By Anonymous
Publisher: Sams 2002 | 976 Pages | ISBN: 0672324598 | chm | 2.9 MB
Written by an anonymous hacker, Maximum Security details hundreds of ways in which invaders may be able to penetrate your system and the steps that you can take to stop them. Before he was arrested, the author used his considerable talents to crack ATMs. Drawing on his vast experience, the author takes you on a journey of the tools that crackers have at their disposal, the ways in which they exploit holes in popular operating systems, and what protective measures are available for each.

At nearly 900 pages, this volume is not only an excellent reference source, but also a testimony to the sheer volume of techniques available to those who wish to illicitly gain access to systems. If you’re a system administrator, this book will, quite simply, scare you silly–and it should. It will also help you take preventative steps that will ultimately allow you a well-deserved peace of mind. An included CD-ROM contains a selection of security utilities, such as SAFEsuite, a demo of PORTUS Secure Firewall, and the famous SATAN (Security Administrator Tool for Analyzing Networks), which are all discussed within the book. –This text refers to an out of print or unavailable edition of this title.

From Library Journal
Network administrators need to read this book closely because a lot of aspiring hackers will be reading it closely and will be looking around for somewhere to practice their new skills, e.g., your lan or web server. This book covers in copious detail internet warfare, programming languages, scanners, sniffers, password crackers, trojans, platform security, remote attacks, spoofing, firewalls, and the law. It is a how-to protect book and, by default, a how-to attack book.
Copyright 1997 Reed Business Information, Inc. –This text refers to an out of print or unavailable edition of this title.

Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.

Book Info
A complete guide to hacker-proofing an Internet site and computer network, written by an anonymous computer hacker. Features coverage of all main issues, from Internet warfare to firewalls. The CD-ROM features software and utilities for securing a computer network and Internet site, configured for Windows, Unix, and Mac. Softcover. –This text refers to an out of print or unavailable edition of this title.

From the Publisher
Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their networkand work toward a solution to those problems. - Explores the most commonly used hacking techniques so users can safeguard their system

- Covers all computing platforms

- Includes step-by-step lists and discussions of the vulnerabilities inherent in each operating system on the market –This text refers to an out of print or unavailable edition of this title.

From the Back Cover

Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.

About the Author

Anonymous is an experienced computer hacker who specializes in testing security of various networking platforms. He was convicted of a series of financial crimes in the late 1980s and now works as a writer, trainer, and security consultant.

Billy Barron (billy@metronet.com) is an architect and developer of security products for Avatier Corporation. Previously, he worked as the architect of a storage resource management product,as a Java/OO consultant and as a Unix/VMS system administrator. He founded the Java Metroplex User Group (JavaMUG javamug.org/) and was the first webmaster in the Dallas/Fort Worth area. He has co-authored and tech edited numerous books including Maximum Security, Web Programming Unleashed, Tricks of the Internet Gurus, Maximum Java 1.1, Web Commerce Unleashed, Creating Web Applets with Java, and Internet Unleashed.

Greg Shipley is CTO for Neohapsis, an information security consultancy. He is a contributing editor with Network Computing magazine.

Jonathan Feldman is a contributing editor with Network Computing magazine, where he writes a column and frequently contributes technical workshops.,/P>

Robert Blader works at the Naval Surface Warfare Center, where he performs intrusion detection, security training, and network forensics. He has contributed to SANS GIAC courses and SysAdmin magazine.

Chad Cook has worked for ten years in security, with emphasis on secure product architecture, network and operating system security, and new security technologies.

David Harley maintains a number of virus and security related information resources and writes regularly for Virus Bulletin.

Joe Jenkins is a system administrator/security consultant with NoWalls, Inc. and writes for magazines such as SecurityFocus.

L.J. Locher is a network adminstrator, programmer, and security consultant who has written articles for Windows 2000 Magazine.

Toby Miller is a security engineer for Advanced Systems Development and is the author of several papers published for SecurityFocus and the SANS Institute.

Brooke Paul works as an information technology and security consultant.

Nicholas Raba is a well-known expert on Macintosh security.

Gregory White is Vice President of profession services at SecureLogix, and is a former professor of computer science at the US Air Force Academy.


Uploading.com

Uploadbox.com

DepositFiles.com

Adobe InDesign CS4 Styles: How to Create Better, Faster Text and Layouts [Rough Cuts version]

Posted by Syed Farhan Ahmad on , under | comments (0)



Adobe InDesign CS4 Styles: How to Create Better, Faster Text and layouts [Rough Cuts version]
Adobe Press | ISBN: 032160606X | 2009 | PDF | 256 pages | 33.9 MB
Tap into the far-reaching potential of InDesign styles—from simple drop cap formatting to cross-media export to XHTML. Styles have the power to transform how design and production professionals approach and accomplish any project. Adopting a style-centric workflow can reduce tasks that would normally take days to mere hours, and tasks that would take hours to minutes or even seconds. Less time spent on repetitive tasks means more time for creating your best work.

Download from RapidShare

Download from DepositFiles

Download from Uploading.COM

Download from HotFile

Java & XML, 2nd Edition: Solutions to Real-World Problems

Posted by Syed Farhan Ahmad on , under | comments (0)



Java & XML, 2nd Edition: Solutions to Real-World Problems

English | 5.23 MB | PDF | ISBN: 0596001975 | O’Reilly Media, Inc.; 2 edition (September 2001)

While the XML “buzz” still dominates talk among Internet developers, the critical need is for information that cuts through the hype and lets Java programmers put XML to work. Java & XML shows how to use the APIs, tools, and tricks of XML to build real-world applications, with the end result that both the data and the code are portable. This second edition of Java & XML adds chapters on Advanced SAX and Advanced DOM, new chapters on SOAP and data binding, and new examples throughout. A concise chapter on XML basics introduces concepts, and the rest of the book focuses on using XML from your Java applications. Java developers who need to work with XML, or think that they will in the future

Download Link :
http://rapidshare.com/files/171185272/Java.rar

Teach Yourself Ajax, JavaScript, and PHP All in One

Posted by Syed Farhan Ahmad on , under , | comments (0)





Phil Ballard, Michael Moncur, “Teach Yourself Ajax, JavaScript, and PHP All in One”
Sams | ISBN-10: 0672329654 | July 12, 2008 | 384 pages | PDF | 3.2MB
In just a short time, you can learn how to use Ajax, JavaScript, and PHP to create interactive interfaces to your web applications by combining these powerful technologies. No previous Ajax programming experience is required. Using a straightforward, step-by-step approach, each lesson in this book builds on the previous ones, enabling you to learn the essentials of Ajax programming with JavaScript, PHP, and related technologies from the ground up. Regardless of whether you run Linux, Windows, or Mac OS X, the enclosed CD includes a complete Ajax programming starter kit that gives you all the programming tools, reference information, JavaScript libraries, and server software you need to set up a stable environment for learning, testing, and production.

Download from RapidShare

Download from Depositfiles

Download from FileFactory

Grundlegende Algorithmen mit Java

Posted by Syed Farhan Ahmad on , under | comments (1)



Using Visual J++ 6.0

Using Visual J++ 6.0
782 pages | Que; 1st edition (July 1998) | ISBN-10: 0789714000 | zip`d html | 13 Mb
Using Visual J++ 6.0 is a task-based reference that uses clear organization, step-by-step tasks, abundant code samples, and new cross-indexing techniques to teach Visual J++. This book covers all aspects of using Visual J++ to build a wide range of Java applets and applications, ActiveX objects, COM/DCOM objects, and more. The book also covers some of the more advanced features of the Java 1.2 language. Using Visual J++ 6.0 accomplishes these goals by anticipating the needs of the user, providing strong navigation and accessibility to the content. This book provides a powerful price/content value proposition versus other books in the marketplace.

-This thorough and easy-to-use, task-based reference helps inexperienced readers quickly learn Visual J++
-Hands-on practical approach and well-documented code examples ensure that readers understand and learn Java programming techniques
-Strong content and organization, a leading author, new packaging, and 700 pages of material for $29.99 makes Using Visual J++ X an excellent value

Download - (13 Mb)

Free fast downloads

Mirror