Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Benz
leste
Briefings
coal
Bite
Bruford
Largest
Priority
Jahr
Brouillard
Peripherie
Affects
Hyena
Livermore
Practi
Chirality
CONUS
Nath
ATTENTION
Emblems
Archmodels
Flexibook
Kabuki
大王
Minimalfl
Daniele
parenthesis
Quantative
Lorenz
Loquendo
Cabos
Kits
Massacres
DESTOUCHES
lonely
Gradias
T100
Warburg
Historyczne
Indications
jerry
Sammartini
Pauper
Eyck
ruban
Warcraft
Zilioli
Yevgeny
Flugzeug
aguilera
Technical Security/Hacking ebook
Technical Security/Hacking ebook
Security/Hacking ATM承载IP的调测与排错 |
|
LWP是LibraryforWWWaccessinPerl的缩写,用途说得很清楚,就是一个访问Web服务器的Perl包。利用LWP这个包,我们可以很方便的在我们的perl脚本里面访问外部的Web服务器上面的资源。为什么要用LWP?现在的网站应用越做越复杂,要想简单的写一个Sockettelnet去用 ... Tags : None, Posted on 2010-06-04 | |
Security/Hacking ATM讲座 |
|
1.ATM技术产生的背景2.各种传递方式比较3.ATM技术标准4.ATM基本技术ATM技术产生的背景1.网络技术的发展2.当前的电信网现状3.技术的推动4.网络系统概念的发展5.新业务需求的推动 Tags : 讲座 , Posted on 2010-06-04 | |
Security/Hacking ARP专题学习指导 |
|
互联网是由许多物理网络和一些如路由器和网关的国际互联设备所组成从源主机发出的分组在到达目的主机之前可能要经过许多不同的物理网络在网络级上主机和路由器用它们的逻辑来标识逻辑地址就是一个互联网上的地址它的管辖范围是全局的逻辑地址在全局上是唯一的 ... Tags : 专题 指导 学习 , Posted on 2010-06-04 | |
Security/Hacking 常用网络协议原理大全 |
|
在现代社会中,人们需要传递和处理的信息量越来越大,信息的种类也越来越多,其中对会议电视、高速数据传输、远程教学、VOD等宽带新业务的需求正迅速增长。原来的各种网络都只能传输一种业务,如电话网只能提供电话业务,数据通信网只能提供数据通信业务。这 ... Tags : 网络协议 大全 原理 , Posted on 2010-06-04 | |
Security/Hacking 无线通信中的信息安全 |
|
随着无线通信技术的飞速发展与广泛应用,通过无线接口访问有线电话网络已经变得日益普遍,其业务内容也不再仅仅局限于语音业务,各种数据业务开始占有相当的比重,并且最终将发展成多媒体业务。但是,正当人类日益得益于这一场世界范围的通信技术革命时,对通 ... Tags : 信息安全 无线通信 , Posted on 2010-06-04 | |
Security/Hacking 网络测试管理与分析 |
|
C i s c o路由器中包含许多故障诊断和排除工具,但是本章集中讨论网络不能使用这些工具进行分析的情况,其中包括在广域网中检测物理层的故障以及在局域网中对高层协议和报文的分析。本章将讨论多种不同类型的测试工具。其中包括网络管理工具以及如何使用网络 ... Tags : 网络 管理 , Posted on 2010-06-04 | |
Security/Hacking 接入网技术讲座 |
|
计算机与通信新技术讲座(北邮98页PDF一接入网概述1048713; 接入网的概念1048713; 接入网的功能结构1048713; 接入网的接口1048713; 接入网的物理参考模型1048713; 接入网的特点1048713; 接入网的产生和发展1048713; 接入网的分类1048713; 接入网的技术走向 ... Tags : 接入网 讲座 技术 , Posted on 2010-06-04 | |
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)