var adfly_protocol = 'https';

mercredi 21 décembre 2016

HTML, CSS & JavaScript Web Publishing in One Hour a Day, Sams Teach Yourself

 Covering HTML5, CSS3, and jQuery (7th Edition)

 

 
 
 
Thoroughly revised and updated with examples rewritten to conform to HTML5, CSS3, and contemporary web development practices, this easy-to-understand, step-by-step tutorial helps you quickly master the basics of HTML and CSS before moving on to more advanced topics such as graphics, video, and interactivity with JavaScript and jQuery. 

In just one hour a day, you’ll learn the skills you need to design, create, and maintain a professional-looking website. 
  • No previous experience required. By following each short, one-hour lesson in this book, anyone can learn the basics of web development.
  • Learn at your own pace. You can work through each lesson sequentially to make sure you thoroughly understand all the concepts and methodologies, or you can focus on specific lessons to learn the techniques that interest you most.
  • Test your knowledge. Each lesson ends with a Workshop section filled with questions, answers, and exercises for further study.
Learn how to...
  • Fully implement the HTML5 and CSS3 standards
  • Work with text and create links
  • Add images and graphics to your page
  • Use CSS to style a site and position elements on a page
  • Structure a page with HTML5 
  • Use responsive web design to make your pages look good on different-sized screens
  • Use JavaScript to add dynamic elements and interactivity on your pages
  • Leverage jQuery to add JavaScript features to your pages
  • Design for the mobile web
  • Get your site online and let people know it’s there
  • Optimize your site for search engines


Download it here :


CLICK HERE


OR


CLICK HERE

mardi 20 décembre 2016

Basic Security Testing with Kali Linux 2







Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do.
In Basic Security Testing with Kali Linux 2, you will learn basic examples of how hackers find out information about your company, find weaknesses in your security and how they gain access to your system.
 
Completely updated for 2016, this step-by-step guide covers:
  • Kali Linux Introduction and Overview
  • Shodan (the “Hacker’s Google”)
  • Metasploit Tutorials
  • Exploiting Windows and Linux Systems
  • Escalating Privileges in Windows
  • Cracking Passwords and Obtaining Clear Text Passwords
  • Wi-Fi Attacks
  • Kali on a Raspberry Pi
  • Securing your Network
  • And Much More!
Though no computer can be completely “Hacker Proof” knowing how an attacker works will help put you on the right track of better securing your network!



Download it here :

CLICK HERE


OR


CLICK HERE

vendredi 9 décembre 2016

Mastering Modern Web Penetration Testing

Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!

 



Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security.
We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book.
We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance.
Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples.
This pragmatic guide will be a great benefit and will help you prepare fully secure applications.

What You Will Learn

  • Get to know the new and less-publicized techniques such PHP Object Injection and XML-based vectors
  • Work with different security tools to automate most of the redundant tasks
  • See different kinds of newly-designed security headers and how they help to provide security
  • Exploit and detect different kinds of XSS vulnerabilities
  • Protect your web application using filtering mechanisms
  • Understand old school and classic web hacking in depth using SQL Injection, XSS, and CSRF
  • Grasp XML-related vulnerabilities and attack vectors such as XXE and DoS techniques
  • Get to know how to test REST APIs to discover security issues in them


Download this new ebook here :



OR




jeudi 24 novembre 2016

PHP and MySQL Web Development, Fifth Edition

The definitive guide to building database-driven Web applications with PHP and MySQL

 


 


PHP and MySQL are popular open-source technologies that are ideal for quickly developing database-driven Web applications. PHP is a powerful scripting language designed to enable developers to create highly featured Web applications quickly, and MySQL is a fast, reliable database that integrates well with PHP and is suited for dynamic Internet-based applications.

PHP and MySQL Web Development shows how to use these tools together to produce effective, interactive Web applications. It clearly describes the basics of the PHP language, explains how to set up and work with a MySQL database, and then shows how to use PHP to interact with the database and the server.

This practical, hands-on book consistently focuses on real-world applications, even in the introductory chapters. The authors cover important aspects of security and authentication as they relate to building a real-world website and show you how to implement these aspects in PHP and MySQL. They also introduce you to the integration of front-end and back-end technologies by using JavaScript in your application development.

The final part of this book describes how to approach real-world projects and takes the reader through the design, planning, and building of several projects, including:
  • User authentication and personalization
  • Web-based email
  • Social media integration
The fifth edition of PHP and MySQL Web Development has been thoroughly updated, revised, and expanded to cover developments in PHP through versions 5.6 and 7, as well as features introduced in recent stable releases of MySQL.


Download it here :


OR
 

mardi 22 novembre 2016

CCNA Security (210-260) Portable Command Guide 2nd Edition






Preparing for the latest CCNA Security exam? Here are all  the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide, is portable enough for you to use whether you’re in the server room or the equipment closet.

Completely updated to reflect the new CCNA Security 210-260 exam, this quick reference summarizes relevant Cisco IOS® Software commands, keywords, command arguments, and associated prompts, and offers tips and examples for applying these commands to real-world security challenges. Configuration examples, throughout, provide an even deeper understanding of how to use IOS to protect networks.

Topics covered include

  • Networking security fundamentals: concepts, policies, strategy
  •  Protecting network infrastructure: network foundations, security management planes/access; data planes (Catalyst switches and IPv6)
  •  Threat control/containment: protecting endpoints and content; configuring ACLs, zone-based firewalls, and Cisco IOS IPS
  •  Secure connectivity: VPNs, cryptology, asymmetric encryption, PKI, IPsec VPNs, and site-to-site VPN configuration
  •  ASA network security: ASA/ASDM concepts; configuring ASA basic settings, advanced settings, and VPNs
 Access all CCNA Security commands: use as a quick, offline resource for research and solutions

  • Logical how-to topic groupings provide one-stop research
  • Great for review before CCNA Security certification exams
  • Compact size makes it easy to carry with you, wherever you go
  •  “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs
  •  “What Do You Want to Do?” chart inside the front cover helps you to quickly reference specific tasks


Download it here :


CLICK HERE


OR


CLICK HERE

vendredi 18 novembre 2016

Hacking, sécurité et tests d'intrusion avec Metasploit ( Version Française )





Le framework Metasploit, qui permet de découvrir et d'exploiter les failles de sécurité, est l’un des outils les plus utilisés par les professionnels de la sécurité informatique. Avec ce livre, les lecteurs débutants apprendront les bases de la sécurité informatique et du test d’intrusion, les conventions du framework Metasploit et la prise en main de son interface. Ils seront également en mesure de moduler, personnaliser et automatiser des attaques simultanées. Les lecteurs plus expérimentés trouveront le détail de toutes les techniques avancées : la reconnaissance réseau et l’énumération, les attaques côté client, les attaques sans fil et l’ingénierie sociale.

Grâce cet ouvrage :
• Découvrez et maîtrisez les fondements de Metasploit.
• Trouvez et exploitez des systèmes non maintenus, mal configurés ou pas à jour.
• Effectuez des reconnaissances et trouvez des informations utiles sur votre cible.
• Contournez les antivirus et les systèmes de contrôle (IDS/IPS).
• Intégrez Nmap, NeXpose, et Nessus dans Metasploit pour automatiser le processus de découverte.
• Maîtrisez les utilitaires Metasploit, les outils tiers et les plug-ins.
• Écrivez vos propres modules Metasploit et scripts de post-exploitation.
• Découvrez les modules pour la recherche de failles «0-day», l’écriture d’un fuzzer, le portage d’exploits existants vers le framework, masquez vos traces.


Télécharger ce livre ici :

CLIQUER ICI


OU BIEN


CLIQUER ICI

Metasploit: The Penetration Tester's Guide 1st Edition (English Version and The Original Edition )

"The best guide to the Metasploit Framework."—HD Moore, Founder of the Metasploit Project





The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.
Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.
Learn how to:
  • Find and exploit unmaintained, misconfigured, and unpatched systems
  • Perform reconnaissance and find valuable information about your target
  • Bypass anti-virus technologies and circumvent security controls
  • Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
  • Use the Meterpreter shell to launch further attacks from inside the network
  • Harness standalone Metasploit utilities, third-party tools, and plug-ins
  • Learn how to write your own Meterpreter post exploitation modules and scripts
You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.


Download this ebook here


CLICK HERE


OR


CLICK HERE

Kali Linux 2 Assuring Security by Penetration Testing - Third Edition






 Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.

Kali Linux 2 is considered as the most significant release of Kali since 2013. You can use it to practice reconnaissance, social engineering, exploitation, and maintain access to your target. You can also document and report verified test results as well as perform a complete Kali Linux testing methodology.

In the third edition of this book, we focus on the use of Kali Linux 2, a free Linux distribution that contains a number of tools related to penetration testing. This book will provide you with the skills needed so you can conduct penetration testing effectively. We’ll start by showing you how to install Kali Linux then walk you through the steps of using Kali Linux to penetration test, and finally guide you through proper reporting.

What you will learn

  • Find out to download and install your own copy of Kali Linux
  • Properly scope and conduct the initial stages of a penetration test
  • Conduct reconnaissance and enumeration of target networks
  • Exploit and gain a foothold on a target system or network
  • Obtain and crack passwords
  • Use the Kali Linux NetHunter install to conduct wireless penetration testing
  • Create proper penetration testing reports

Download this ebook here :

CLICK HERE

OR

CLICK HERE

Murach's SQL Server 2016 for Developer






If you’re an application developer, or you’re training to be one, this 2016 edition of Murach’s classic SQL Server book is made for you.
To start, it presents the SQL statements that you need to retrieve and update the data in a database. These are the SQL statements that you’ll use every day. Then, it shows you how to design a database, how to implement that design, and how to work with database features like views, scripts, stored procedures, functions, triggers, transactions, security, XML data, BLOB data with FILESTREAM storage, and the CLR integration feature.
The result? You’ll be able to create database applications that are thoroughly professional. You’ll be familiar with the DBA-related issues that let you work far more effectively than most of your colleagues. And you’ll have a handy reference at your side to answer questions and handle new challenges as they come up.


Download it here :


CLICK HERE


OR


CLICK HERE

C# 6 for Programmers 6th Edition

The professional programmer’s Deitel® guide to C# 6 and object-oriented development for Windows®








Written for programmers with a background in high-level language programming, this book applies the Deitel signature live-code approach to teaching programming and explores Microsoft’s C# 6 and .NET in depth. Concepts are presented in the context of 170+ fully coded and tested apps, complete with syntax shading, code highlighting, code walkthroughs, program outputs and hundreds of savvy software-development tips.

Start with an introduction to C# using an early classes and objects approach, then rapidly move on to more advanced topics, including LINQ, asynchronous programming with async and await and more. You’ll enjoy the treatment of object-oriented programming and an object-oriented design/UML® ATM case study, including a complete C# implementation. When you’ve mastered the book, you’ll be ready to start building industrial-strength, object-oriented C# apps.


Download this ebook (mediafire Links) :
 
 
OR
 
 
 

Mastering Hyper-V 2012 R2 with System Center and Windows Azure





This book will help you understand the capabilities of Microsoft Hyper-V, architect a Hyper-V solution for your datacenter, plan a deployment/migration, and then manage it all using native tools and System Center. Coverage also includes hybrid cloud scenarios specifically with Windows Azure to complete the full virtualization piece of providing data both on premise and off premise.

In addition, you will explore the Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities, how seamless management is possible with PowerShell and System Center, plus how Azure Storage can play a part in a company’s complete solution.

Key topics covered include: virtualization fundamentals, network virtualization, storage configuration, Hyper-V management and maintenance, failover clustering and migration, Hyper-V replica and cloud orchestration, private cloud implementation, Azure IaaS, Azure storage, managing with PowerShell, Hyper-V decoding, and Windows Server 2012 R2 integration.


Download this ebook :

jeudi 17 novembre 2016

MCSA Windows Server 2012 R2 Complete Study Guide: Exams 70-410, 70-411, 70-412, and 70-417

Prepare for the MCSA Windows Server 2012 R2 Exams






Microsoft's new version of the MCSA certification for Windows Server 2012 R2 requires passing three exams (or one Upgrade exam if you have your MCSA or MCITP in Windows Server 2008). This value-priced study guide includes more than 1,000 pages of quality exam-prep content, covering 100% of the objective domains of all three exams (as well as the Upgrade exam, 70-417).
In addition, you get access to an interactive practice test environment with more than 500 questions, electronic flashcards, and videos showing how to perform the more difficult tasks. Both first-time MCSA candidates and those wishing to upgrade from Server 2008 certification will benefit from this complete test-prep guide.
  • Completely updated to cover the Windows Server 2012 R2 Exams
  • Provides a comprehensive study guide for all three MCSA Windows Server 2012 R2 exams: 70-410, 70-411, and 70-412, as well as the Upgrade exam: 70-417
  • Covers installing and configuring Windows Server 2012; deploying and configuring DNS service; administratrice Active Directory; creating and managing Group Policy Objects; and configuring server roles and features, Hyper-V, and core networking services
  • Explains basic networking concepts, DHCP, deploying and maintaining servers, configuring a network policy server infrastructure and high availability in Windows Server 2012, and much more
  • Features real-world scenarios, hands-on exercises, practice exam questions, electronic flashcards, and over an hour of video demonstrations
  • Covers all exam objectives
MCSA Windows Server 2012 R2 Complete Study Guide arms you with all the information you must master to achieve MCSA certification on Windows Server 2012 R2.


Download this ebook ;

CLICK HERE

OR

CLICK HERE

mercredi 16 novembre 2016

SQL pour Oracle

Applications avec Java, PHP et XML : optimisation des requêtes et schémas : avec 50 exercices corrigés

 

 

Cet ouvrage permet d'acquérir les notions essentielles d'Oracle, leader des systèmes de gestion de bases de données. Concis et de difficulté progressive, il est émaillé de nombreux exemples et de 50 exercices corrigés qui illustrent tous les aspects fondamentaux de SQL. Couvrant les versions 9i à 12c d'Oracle, il permet de se familiariser avec ses principales fonctionnalités, ainsi qu'avec les API les plus utilisées (JBDC, PHP et XML). La septième édition de cet ouvrage a été entièrement mise à jour avec la version 12c d'Oracle.


Télécharger ce livre ici :

CLIQUER ICI

 OR

CLIQUER ICI

 

 

 

CCNA 200-125 Workbook - Sikandar Shaik






CCNA Routing and Switching 200-125 Official Cert Guide Library, Academic Edition is a comprehensive textbook and study package that provides you with an introduction to foundational networking concepts and hands-on application. The two books contained in this package, CCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition and CCNA Routing and Switching ICND2 200-105 Official Cert Guide, Academic Edition, present you with a detailed overview of network configuration and troubleshooting. Best-selling author and expert instructor Wendell Odom shares study hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

· A test-preparation routine proven to help you pass the exams

· Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section

· Chapter-ending and part-ending exercises, which help you drill on key concepts you must know thoroughly

· Troubleshooting sections, which help you master the complex scenarios you will face on the exam

· The powerful Pearson IT Certification Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports

· A free copy of the CCNA ICND1 and ICND2 Network Simulator Lite software, complete with meaningful lab exercises that help you hone your hands-on skills with the command-line interface for routers and switches

· Links to a series of hands-on config labs developed by the author

· Online interactive practice exercises that help you hone your knowledge

· More than 2 hours of video mentoring from the author

· A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies

· Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, these official study guides help you master the concepts and techniques that ensure your exam success.

These official study guides help you master all the topics on the CCNA exams, including

· Networking fundamentals

· Implementing basic Ethernet LANs

· Ethernet LANs: design, VLANs, and troubleshooting

· IPv4 addressing and subnetting

· Implementing IPv4

· IPv4 design and troubleshooting

· IPv4 services: ACLs, NAT, and QoS

· IPv4 routing protocols and routing

· Wide area networks

· IPv6

· Network management, SDN, and cloud computing



Download this ebook (Google Drive link) :

CLICK HERE


OR (Dropbox link)

CLICK HERE

UML 2 pour les bases de données : Modélisation, normalisation, génération, SQL, outils

Concevoir une base de données grâce à UML 2

 


 


S'adressant aux architectes logiciels, chefs de projet, analystes, développeurs, responsables méthode et étudiants en informatique, cet ouvrage explique comment utiliser à bon escient le diagramme de classes UML pour concevoir une base de données, puis comment traduire correctement ce diagramme en langage SQL. Sa démarche est indépendante de tout éditeur de logiciel et aisément transposable, quel que soit l'outil de conception choisi.
Le livre décrit d'abord la construction d'un diagramme de classes UML à l'aide de règles de validation et de normalisation. Tous les mécanismes de dérivation d'un modèle conceptuel dans un schéma relationnel sont clairement commentés à l'aide d'exemples concrets. Le modèle logique est ensuite optimisé avant l'écriture des scripts SQL. La dernière étape consiste à implémenter les règles métier en programmant des contraintes, déclencheurs ou transactions SQL. Le livre se clôt par une étude comparative des principaux outils de modélisation sur le marché.
Entièrement réécrite, cette deuxième édition est commentée par Frédéric Brouard, expert SQL Server et auteur de nombreux ouvrages et articles sur le langage SQL. Émaillée d'une centaine de schémas et d'illustrations, elle est complétée par 30 exercices inspirés de cas réels.


 Télécharger ce livre ici :

CLIQUER ICI

OU BIEN

CLIQUER ICI



mardi 15 novembre 2016

Linux Pocket Guide: Essential Commands 3rd Edition


 Publisher: O'Reilly Media; 3 edition (June 23, 2016)






If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The third edition features new commands for processing image files and audio files, running and killing programs, reading and modifying the system clipboard, and manipulating PDF files, as well as other commands requested by readers. You’ll also find powerful command-line idioms you might not be familiar with, such as process substitution and piping into bash.
Linux Pocket Guide provides an organized learning path to help you gain mastery of the most useful and important commands. Whether you’re a novice who needs to get up to speed on Linux or an experienced user who wants a concise and functional reference, this guide provides quick answers.
Selected topics include:
  • The filesystem and shell
  • File creation and editing
  • Text manipulation and pipelines
  • Backups and remote storage
  • Viewing and controlling processes
  • User account management
  • Becoming the superuser
  • Network connections
  • Audio and video
  • Installing software
  • Programming with shell scripts


Download this ebook : 

CLICK HERE

OR

CLICK HERE

CCNP Routing and Switching TSHOOT 300-135 Official Cert Guide





CCNP Routing and Switching TSHOOT 300-135 Official Cert Guide from Cisco Press allows you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Expert instructor Raymond Lacoste shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.
This complete, official study package includes
A test-preparation routine proven to help you pass the exam
  • Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section
  • Chapter-ending exercises, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson IT Certification Practice Test software, complete with hundreds of exam-realistic questions, customization options, and detailed performance reports
  • More than 60 minutes of personal video mentoring from the author on important exam strategies
  • A trouble ticket chapter that explores ten additional network failures and the approaches you can take to resolve the issues presented
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organize and optimize your study time
Well-regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.
CCNP Routing and Switching TSHOOT 300-135 Official Cert Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com.
The official study guide helps you master topics on the CCNP Routing and Switching TSHOOT 300-135 exam, including how to troubleshoot:
  •  
  • Device performance
  • VLANs, Trunks, and VTP
  • STP and Layer 2 Etherchannel
  • Inter-VLAN routing and Layer 3 Etherchannel
  • Switch security
  • HSRP, VRRP, GLBP
  • IPv4 and IPv6 addressing
  • IPv4/IPv6 routing and GRE tunnels
  • RIPv2, RIPng, EIGRP, and OSPF
  • Route maps, policy-based routing, and route redistribution
  • BGP
  • Management protocols, tools, and access


Download this ebook :

CLICK HERE

or

CLICK HERE

CCNP Routing and Switching SWITCH 300-115 Official Cert Guide









CCNP Routing and Switching SWITCH 300-115 Official Cert Guide
CCNP Routing and Switching SWITCH 300-115 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Expert engineer David Hucaby shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.
This complete study package includes
  • A test-preparation routine proven to help you pass the exam
  • “Do I Know This Already?” quizzes, which enable you to decide how much time you need to spend on each section
  • Chapter-ending exercises, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson IT Certification Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
  • More than 60 minutes of personal video mentoring from the author on important exam topics
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organize and optimize your study time
Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with a large healthcare network based on the Cisco product
lines. David holds bachelor’s and master’s degrees in electrical engineering from the University of Kentucky. He is the author of several Cisco Press titles, including CCNA Wireless Cert Guide, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, Cisco Firewall Video Mentor, and Cisco LAN Switching Video Mentor.
The official study guide helps you master topics on the CCNP R&S SWITCH 300-115 exam, including the following:
  • Enterprise campus design
  • Switch operation
  • Switch port configuration
  • VLANs, trunks, and VLAN Trunking Protocol (VTP)
  • Spanning Tree Protocol (STP), RSTP, and MSTP
  • Protecting the STP topology
  • Aggregating switch links
  • Multilayer switching
  • Configuring DHCP
  • Logging switch activity and managing switches with SNMP
  • Monitoring performance and traffic
  • High availability
  • Securing switched networks
     
     
     
    Download this ebook:
     
    OR 
     

lundi 14 novembre 2016

The Hacker Playbook 2:


 Practical Guide To Penetration Testing






Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.
Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.
From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.
This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.
Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.


Download it for free :

CLICK HERE

OR

CLICK HERE

Expert Python Programming - Second Edition

Published  : May 20, 2016

 


Python is a dynamic programming language, used in a wide range of domains by programmers who find it simple, yet powerful. Even if you find writing Python code easy, writing code that is efficient and easy to maintain and reuse is a challenge.
The focus of the book is to familiarize you with common conventions, best practices, useful tools and standards used by python professionals on a daily basis when working with code.
You will begin with knowing new features in Python 3.5 and quick tricks for improving productivity. Next, you will learn advanced and useful python syntax elements brought to this new version. Using advanced object-oriented concepts and mechanisms available in python, you will learn different approaches to implement metaprogramming. You will learn to choose good names, write packages, and create standalone executables easily.
You will also be using some powerful tools such as buildout and vitualenv to release and deploy the code on remote servers for production use. Moving on, you will learn to effectively create Python extensions with C, C++, cython, and pyrex. The important factors while writing code such as code management tools, writing clear documentation, and test-driven development are also covered.
You will now dive deeper to make your code efficient with general rules of optimization, strategies for finding bottlenecks, and selected tools for application optimization.
By the end of the book, you will be an expert in writing efficient and maintainable code.


Download this ebook (PDF,EPUB et MOBI files) :

CLICK HERE

OR

CLICK HERE


Foundations for Analytics with Python

From Non-Programmer to Hacker

 



If you’re like many of Excel’s 750 million users, you want to do more with your data—like repeating similar analyses over hundreds of files, or combining data in many files for analysis at one time. This practical guide shows ambitious non-programmers how to automate and scale the processing and analysis of data in different formats—by using Python.
After author Clinton Brownley takes you through Python basics, you’ll be able to write simple scripts for processing data in spreadsheets as well as databases. You’ll also learn how to use several Python modules for parsing files, grouping data, and producing statistics. No programming experience is necessary.


Download the ebook here :

CLICK HERE

OR

CLICK HERE

dimanche 13 novembre 2016

Red Hat® RHCSA™/RHCE® 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300)






Master every objective on the RHCSA and RHCE exams
  • 4 Practice Exams (2 RHCSA and 2 RHCE)
  • More than 40 interactive hands-on exercises and performance-based CLI simulations
  • 3 Virtual Machines to help you test your skills in a real-world environment
  • More than 30 minutes of unique video examining pre-assessment theoretical exams so you know if you are prepared to take the tests
  • More than 2 hours of video instruction from our best-selling RHCSA and RHCE Complete Video Courses
  • 40 interactive chapter and glossary quizzes
    Download the ebook here : 



    or here :


CCNA Wireless 200-355 Official Cert Guide







CCNA Wireless 200-355 Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

·         Master Cisco CCNA 200-355 exam topics
·         Assess your knowledge with chapter-opening quizzes
·         Review key concepts with exam preparation tasks
·         Practice with realistic exam questions on the DVD

CCNA Wireless 200-355 Official Cert Guide focuses specifically on the objectives for the Cisco CCNA WIFUND 200-355exam. Leading network engineer and best-selling Cisco certification author David Hucaby shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.


Download  this ebook :

CLICK HERE

or

CLICK HERE

CEH Certified Ethical Hacker All-in-One Exam Guide, 2nd Edition






Thoroughly revised for the latest release of the Certified Ethical Hacker (CEH) v8 certification exam
Fully updated for the CEH v8 exam objectives, this comprehensive guide offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the CEH exam. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference.


Download it here :

CLICK HERE

or here :

CLICK HERE

samedi 12 novembre 2016

CCNA Data Center: Introducing Cisco Data Center Technologies Study Guide: Exam 640-916 (2016)

Complete theory and practice for the CCNA Data Center Technologies exam

 
 
 
CCNA Data Center, Introducing Cisco Data Center Technologies Study Guide is your comprehensive study guide for exam 640-916. Authors Todd Lammle and Todd Montgomery, authorities on Cisco networking, guide you through 100% of all exam objectives with expanded coverage of key exam topics, and hands-on labs that help you become confident in dealing with everyday challenges. You'll get access to the free Nexus switch simulator that allows you to try your hand at what you've learned without expensive software, plus bonus study aids, such as electronic flashcards, a practice exam, and a searchable PDF glossary of terms. Coverage includes Data Center networking and virtualization, storage networking, unified fabric, Cisco UCS configuration, Data Center services, and much more, for complete exam preparation.
This is your guide to study for the entire second (and final) exam required for certification
  • Review networking principles, products, and technologies
  • Understand Nexus 1000V and Data Center virtualization
  • Learn the principles and major configurations of Cisco UCS
  • Practice hands-on solutions you'll employ on the job
  • Prepare for using Cisco's Unified Data Center, which unifies computing, storage, networking, and management resources

Download this ebook here :

 CLICK HERE

or

CLICK HERE

Kali Linux Web Penetration Testing Cookbook (2016)

Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2

 




Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform and operating system that provides a huge array of testing tools, many of which can be used specifically to execute web penetration testing.
This book will teach you, in the form step-by-step recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable surfaces so applications are more secure, for you and your users.

Starting from the setup of a testing laboratory, this book will give you the skills you need to cover every stage of a penetration test: from gathering information about the system and the application to identifying vulnerabilities through manual testing and the use of vulnerability scanners to both basic and advanced exploitation techniques that may lead to a full system compromise. Finally, we will put this into the context of OWASP and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of the book, you will have the required skills to identify, exploit, and prevent web application vulnerabilities.

Style and approach

Taking a recipe-based approach to web security, this book has been designed to cover each stage of a penetration test, with descriptions on how tools work and why certain programming or configuration practices can become security vulnerabilities that may put a whole system, or network, at risk. Each topic is presented as a sequence of tasks and contains a proper explanation of why each task is performed and what it accomplishes.


Download this ebook here :

CLICK HERE

OR

CLICK HERE

Linux Programming: Building and Debugging





This book is a practical introduction on how to build and debug programs in Linux.

The book covers the following topics:

* building a program, compilation and linking
* overview of GNU C/C++ compiler
* building programs from multiple modules
* make and makefiles
* static and dynamic libraries in Linux
* debugging programs
* detecting memory leaks

The book is addressed to beginners in Linux programming as well as those who have programmed using other environments and operating systems before (Windows, for example) and who now want to learn how to develop programs in Linux.


Download this ebook here :

CLICK HERE

or

CLICK HERE

vendredi 11 novembre 2016

CCNA Routing and Switching ICND2 200-105 Official Cert Guide (2016)

Published Jul 6, 2016




Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.
CCNA Routing and Switching ICND2 200-105 Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.
CCNA Routing and Switching ICND2 200-105 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco.


Download the ebook here :

CLICK HERE

CCENT/CCNA ICND1 100-105 Official Cert Guide (2016)

 Published Jul 6, 2016






Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.
CCENT/CCNA ICND1 100-105 Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.
CCENT/CCNA ICND1 100-105 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco.
Best-selling author and expert instructor Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills

Download this ebook here :

CLICK HERE

Ruby on Rails 5.0 for Autodidacts

Learn Ruby 2.3 and Rails 5.0 



A step by step guide to learn Ruby on Rails 5.0. It includes a basic tutorial for Ruby 2.3 and is written for programmers who know at least one other programming language and are familiar with HTML. It covers Active Record, Scaffolding, REST, Routing, Bundler, Test Driven Development, Cookies, Sessions, Action Mailer, I18n, Asset Pipeline, JavaScript, Caching, Templates and of course the new 5.0 features Action Cable and Active Job.

Download it here :

CLICK HERE

Photoshop Elements 13 All-in-One For Dummies 1st Edition

Make ordinary photos extraordinary with Photoshop Elements 13






Whether you prefer to snap shots on your smartphone or never leave home without your DSLR, chances are you have way more photos than you ever dreamed possible. With the help of Photoshop Elements 13 All-in-One For Dummies, you can edit those photos and turn them into stunning works of art. The book will help you get to know the key features of Photoshop Elements, including examining the Elements workspace; navigating the tools; viewing images on your computer; setting your preferences; and acquiring, saving, and exporting images. You'll then take your skills to next level and become a pro at working with iOS and Android devices, specifying resolution and changing image sizing, choosing color modes and file formats, working with Camera Raw, using and managing color, painting and drawing with Elements, creating layers, and so much more. Plus, you'll discover how to add pizzazz with styles and effects, apply quick image makeovers, correct lighting, color, and clarity, and composite with Photomerge.
Photoshop Elements is the #1-selling consumer photo editing software, and Adobe continues to add innovative features that allow digital photography enthusiasts to do it all. Going well beyond the basics of how to use Photoshop Elements—and weighing in at more than 672 pages—Photoshop Elements 13 All-in-One For Dummies is the most comprehensive Elements book on the market. Written by Barbara Obermeier and Ted Padova, veteran authors, long-time instructors, and expert speakers who have spent decades specializing in digital imaging, this hands-on, friendly guide is jam-packed with everything you need to create, edit, fix, share, and organize digital images.

Download it here :

CLICK HERE

SQL For Dummies 8th Edition






Uncover the secrets of SQL and start building better relational databases today!
This fun and friendly guide will help you demystify database management systems so you can create more powerful databases and access information with ease. Updated for the latest SQL functionality, SQL For Dummies, 8th Edition covers the core SQL language and shows you how to use SQL to structure a DBMS, implement a database design, secure your data, and retrieve information when you need it.

Download it here :

CLICK HERE

PHP, MySQL, JavaScript & HTML5 All-in-One For Dummies




PHP, JavaScript, and HTML5 are essential programming languages for creating dynamic websites that work with the MySQL database. PHP and MySQL provide a robust, easy-to-learn, open-source solution for creating superb e-commerce sites and content management. JavaScript and HTML5 add support for the most current multimedia effects. This one-stop guide gives you what you need to know about all four! Seven self-contained minibooks cover web technologies, HTML5 and CSS3, PHP programming, MySQL databases, JavaScript, PHP with templates, and web applications.
With seven books in one, PHP, MySQL, JavaScript & HTML5 All-in-One For Dummies will turn your website into the center of attention in no time at all.

Download this ebook here :

CLICK HERE

An Introduction to Programming with C++ 8th Edition






Discover the importance of learning C++ with Diane Zak's popular AN INTRODUCTION TO PROGRAMMING WITH C++, 8E. This book's distinctive emphasis clarifies how mastering C++ programming skills will benefit you now and throughout your career. This unique text incorporates a student-focused approach that continually highlights the importance and relevance of the programming concepts you are learning. Memorable new examples portray concepts in action, while abundant new hands-on exercises, including mini-quizzes, Labs, and "Try This" features, guide you in absorbing, practicing, and applying concepts as you progress. Trust AN INTRODUCTION TO PROGRAMMING WITH C++, 8E to keep you enthusiastic about learning as you master the skills of C++.


Download the ebook here :

CLICK HERE

mardi 8 novembre 2016

CEH v9: Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam.

 

 



The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material.
The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material.

Download this ebook here :

CLICK HERE

Le Livre De Java Premier Langage : Avec 109 Exercices Corrigés ( Edition n° 10 )





Apprendre Java en douceur Vous avez décidé de vous initier à la programmation et souhaitez opter pour un langage largement utilisé dans le monde professionnel ? Java se révèle un choix idéal comme vous le constaterez dans ce livre conçu pour les vrais débutants en programmation. Vous apprendrez d'abord, à travers des exemples simples en Java, à maîtriser les notions communes à tous les langages : variables, types de données, boucles et instructions conditionnelles, etc. Vous franchirez un nouveau pas en découvrant par la pratique les concepts de la programmation orientée objet (classes, objets, héritage), puis le fonctionnement des librairies graphiques AWT et Swing (fenêtres, gestion de la souris, tracé de graphiques). Cet ouvrage vous expliquera aussi comment réaliser des applications java dotées d'interfaces graphiques conviviales grâce au logiciel libre NetBeans. Enfin, vous vous initierez au développement d'applications pour téléphones mobiles Android. Chaque chapitre est accompagné de deux types de travaux pratiques : des exercices, dont le corrigé est fourni sur site web, et un projet développé au fil de l'ouvrage, qui vous montrera comment combiner toutes les techniques de programmation étudiées pour construire une véritable application Java. À qui s'adresse ce livre ? Aux étudiants de 1er cycle universitaire (IUT, licence...) ou d'écoles d'ingénieurs Aux vrais débutants en programmation : passionnés d'informatique et programmeurs autodidactes, concepteurs de sites web souhaitant aller au-delà de HTML et JavaScript, etc. Aux enseignants et formateurs recherchant une méthode pédagogique et un support de cours pour enseigner Java à des débutants

Télécharger ce livre ici :

CLIQUER ICI

Sur le site :

CLIQUER ICI

Consultez les corrigés du projet et des exercices Téléchargez le code source de tous les exemples du livre Dialoguez avec l'auteur

Le livre de Java premier langage





Vous avez décidé de vous initier à la programmation et souhaitez opter pour un langage largement utilisé dans le monde professionnel ? Java se révèle un choix idéal comme vous le découvrirez dans ce livre conçu pour les vrais débutants en programmation. Vous apprendrez d'abord, à travers des exemples simples en Java, à maîtriser les notions communes à tous les langages : variables, types de données, boucles et instructions conditionnelles, etc. Vous franchirez un nouveau pas en découvrant par la pratique les concepts de la programmation orientée objet (classes, objets, héritage), puis le fonctionnement des librairies graphiques AWT et Swing (fenêtres, gestion de la souris, tracé de graphiques). Vous découvrirez enfin comment réaliser des applications Java dotées d'interfaces graphiques conviviales grâce au logiciel libre NetBeans. Chaque chapitre est accompagné de deux types de travaux pratiques : des exercices, dont le corrigé est fourni sur le CD-Rom d'accompagnement, et un projet développé au fil de l'ouvrage, qui vous montrera comment combiner toutes les techniques de programmation étudiées pour construire une véritable application Java.

Télécharger le livre ici :

CLIQUER ICI

OCaml from the Very Beginning





In OCaml from the Very Beginning John Whitington takes a no-prerequisites approach to teaching a modern general-purpose programming language. Each small, self-contained chapter introduces a new topic, building until the reader can write quite substantial programs. There are plenty of questions and, crucially, worked answers and hints.
OCaml from the Very Beginning will appeal both to new programmers, and experienced programmers eager to explore functional languages such as OCaml. It is suitable both for formal use within an undergraduate or graduate curriculum, and for the interested amateur.


Download it here (EPUB file) :

CLICK HERE

Travaux pratiques avec Excel 2016






Saisie et mise en forme, formules et exploitation des données, courbes et graphiques...
Cet ouvrage tout en couleurs est un recueil de travaux pratiques pour découvrir et maîtriser Excel 2016, de sa prise en main à la mise en œuvre de ses fonctions avancées :
  • Découverte de l’interface, création et gestion d’un classeur, navigation dans une feuille de calcul, importation des données…
  • Utilisation des formules, des fonctions et des opérateurs, référencement d’une cellule ou d’une plage de cellules…
  • Mise en forme d’une feuille de calcul, emploi des styles et personnalisation, insertion d’objets…
  • Création et modification d’un graphique, tri de données, utilisation des filtres, mise en œuvre des tableaux et des graphiques croisés dynamiques, partage de segments…

Télécharger ce livre ici :

CLIQUER ICI


OR

CLIQUER ICI
 

lundi 7 novembre 2016

Sécurité Du Périmètre Réseau: Bases de la sécurité réseau





Une politique de sécurité réseau ou PSN, est un document générique qui décrit les règles d'accès au réseau informatique, détermine la façon dont les politiques sont appliquées et expose une partie de l'architecture de base de l'environnement de sécurité sécurité de l'entreprise / réseau. Le document lui-même est généralement plusieurs pages longues et écrites par un comité. Une politique de sécurité va bien au-delà de la simple idée de "garder les mauvais gars". Il est un document très complexe, destiné à régir l'accès aux données, les habitudes de navigation sur le Web, l'utilisation de mots de passe et le cryptage, les pièces jointes et plus. Il précise ces règles pour les individus ou groupes d'individus dans toute l'entreprise.
La politique de sécurité devrait garder les utilisateurs malveillants sur et exercent également un contrôle sur les utilisateurs potentiels à risque au sein de votre organisation. La première étape dans la création d'une politique est de comprendre ce que l'information et les services sont disponibles (et à quels utilisateurs), quel est le potentiel pour les dommages et si une protection est déjà en place pour éviter les abus.
En outre, la politique de sécurité devrait dicter une hiérarchie des autorisations d'accès; qui est, accordent aux utilisateurs d'accéder uniquement à ce qui est nécessaire à l'accomplissement de leur travail.
Pendant la rédaction du document de sécurité peut être une entreprise majeure, un bon départ peut être obtenu en utilisant un modèle. Institut national des normes et de la technologie fournit une ligne directrice politique de sécurité.

Télécharger ce livre ici :

CLIQUER ICI

Administration système réseaux: bases de l'administration





Les savoir-faire en administration des systèmes incluent la connaissance des systèmes d'information et de la manière dont les gens les utilisent dans une organisation. Ceci comprend à la fois une certaine connaissance des systèmes d'exploitation et des logiciels applicatifs, ainsi que le dépannage matériel et logiciel.
Toutefois, la compétence la plus importante pour un administrateur de système est la résolution des incidents. On fait souvent appel à un administrateur quand un système d'information ne fonctionne plus ou mal, celui-ci doit être capable de faire un diagnostic exact et rapide du dysfonctionnement, puis de trouver le meilleur moyen d'y remédier.
Les administrateurs système ne sont pas des architectes logiciels ni des développeurs. En général, on ne leur donne pas de missions de conception et d'implémentation de nouvelles applications. Néanmoins, ils doivent comprendre le comportement des logiciels afin de les déployer et de régler différents problèmes les touchant. La connaissance de différents langages de programmation de scripts et d'automatisation de routines (Powershell, Bash et Perl ou Python) leur est souvent nécessaire.
Dans le cas des systèmes connectés à Internet ou des systèmes métier fortement critiques, un administrateur doit être compétent en sécurité informatique. Ceci inclut non seulement le déploiement de correctifs, mais aussi prévenir les pannes et autres problèmes de sécurité. Dans certaines organisations, il existe un administrateur système spécialisé en sécurité qui s'occupe des pare-feu et des systèmes de détection d'intrusion mais les administrateurs sont généralement responsables de la sécurité dans leur service.

Télécharger ce livre ici :

CLIQUER ICI

OR

CLIQUER ICI