Guests Online: 4
Members Online: 0
Total Members: 21,130
Newest Member: aguspc1
|
|
Test Your IQ 400 Questions to Boost Your Brainpower |

These mental workouts include demanding word games, mathematical bell-ringers, prefix puzzlers, and algebraic twisters guaranteed to rile your brain, and make you feel like a genius when you get the right answer.
The tests are intended as valuable practice for readers who may have to take an IQ test in the future, and they will also help to increase your vocabulary and to develop your powers of calculation and logical reasoning. The questions are challenging, and deliberately so, as this is the only way to boost your performance and increase your brainpower.
The book consists of ten separate tests for you to attempt, each of 40 questions. Each test is of approximately the same degree of difficulty. A time limit of 90 minutes is allowed for each test. The correct answers are given at the end of the book, and you should award yourself one point for each correct answer. |
License: |
O/S: |
Version: |
Added: 20/02/2009 08:14 |
Downloads: 555 |
Download (6 MB) |

McGraw Hill Gray Hat Hacking 2nd Edition |

The goal of this book is to help produce more highly skilled security professional so are dedicated to protecting against malicious hacking activity. It has been proven erand over again thatitis important tounder standone’se nemies, including theirtacs, skills, tools, and motivations.Corporation sandnation shave enemies that are very dicated and talented. We must work together to understand the enemies’ processes d procedures to ensure that we can properly thwart their destructive and malicious havior.
The authors of this book want to provide the readers with something we believe the dustry needs: a holistic review of ethical hacking that is responsible and truly ethical its intentions and material. This is why we are starting this book with a clear defini-n of what ethical hacking is and is not—something society is very confused about.We have updated thematerial from the first edition and have attempted to deliver the ost comprehensive and up-to-date assembly of techniques and procedures. Six new apters are presented and the other chapters have been updated. In Part I of this book we lay down the ground work of the necessary ethicsand expec-ions of a gray hat hacker.
This section:
• Clears up the confusion about white, black, and gray hat definitions and
characteristics
• Reviews the slippery ethical issues that should be understood before carrying
out any type of ethical hacking activities
• Surveys legal issues surrounding hacking and many other types of malicious
activities
• Walks through proper vulnerability discovery processes and current models that
provide direction
|
License: |
O/S: |
Version: |
Added: 20/02/2009 08:12 |
Downloads: 265 |
Download (12 MB) |

Web Hacking Attacks and Defense |

Features include:
Overview of the Web and what hackers go after
Complete Web application security methodologies
Detailed analysis of hack techniques
Countermeasures
What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including:
Cyber graffiti and Web site defacements
e-Shoplifting
Database access and Web applications
Java(TM) application servers; how to harden your Java(TM) Web Server
Impersonation and session hijacking
Buffer overflows, the most wicked of attacks
Automated attack tools and worms
Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques.
Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks.
|
License: |
O/S: |
Version: |
Added: 20/02/2009 08:04 |
Downloads: 475 |
Download (6 MB) |

Building Facebook Applications For Dummies |

Build cool facebook apps and have fun
This friendly guide helps you create applications to reach Facebook's huge audience, so you can enlarge your list of friends, introduce people to your product or service, or network with other business professionals.
You'll find out how to:
- Work with the Facebook API
- Build applications that take advantage of Facebook's News Feed and Wall
- Migrate existing Web applications to Facebook
- Create mobile apps for Facebook
- Use Facebook's markup and query languages
- Get your app noticed by Facebook users |
License: |
O/S: |
Version: |
Added: 16/02/2009 03:54 |
Downloads: 467 |
Download (4.56MB) |
Age Progression - Photoshop Tutorials |

|
License: |
O/S: |
Version: |
Added: 15/02/2009 14:46 |
Downloads: 545 |
Download (1 MB) |
Naruto Official Calender 2009 |

|
License: |
O/S: |
Version: |
Added: 10/02/2009 00:36 |
Downloads: 302 |
Download (4.38 MB) |
Bleach Official Calender 2009 |
 |
License: |
O/S: |
Version: |
Added: 10/02/2009 00:35 |
Downloads: 212 |
Download (5.5 MB) |
Evangelion Official Calender 2009 |
 |
License: |
O/S: |
Version: |
Added: 10/02/2009 00:34 |
Downloads: 152 |
Download (6.77 MB) |
Photoshop Creative Magazine (February 2009) |
 |
License: |
O/S: |
Version: |
Added: 08/02/2009 08:07 |
Downloads: 482 |
Download (16.04MB) |
DigitalArts Magazine (February 2009) |
 |
License: |
O/S: |
Version: |
Added: 06/02/2009 20:51 |
Downloads: 382 |
Download (20MB) |
Naruto Doujinshi : Yondaime Gaiden |

Chapternya Hokage 4 "Namikaze Minato"
Doujinshi atau bisa dibilang juga Fanart adalah sebuah bentuk karya/apresiasi yang dibikin oleh seorang fans.
Chapter ini ini dibuat oleh Kunoichi-San |
License: |
O/S: |
Version: |
Added: 17/01/2009 11:43 |
Downloads: 928 |
Download (8.45MB) |

O'Reilly Nokia Smartphone Hacks |

Nokia's smartphones pack a powerful computer into a very small space. Unlike your desktop or laptop, your smallest computer can be connected to the Internet all the time, and can interact with the world around it through its camera, voice recognition, and its traditional phone keypad. Nokia smartphones combine these features with impressive storage options and a host of networking protocols that make this smallest computer the only thing a road warrior truly needs.
If you're still cracking open your laptop or pining for your desktop while you're on the road, you haven't begun to unlock your Nokia's full potential. Nokia Smartphone Hacks is dedicated to tricking out your smartphone and finding all the capabilities lurking under the surface.
Learn how to:
* Unlock your phone so that you can use it with any carrier
* Avoid and recover from malicious mobile software
* Watch DVD movies on the phone
* Use the phone as a remote control
* Use the phone as a data modem for your notebook
* Check your email and browse the web
* Post to your weblog from your phone
* Record phone conversations
* Choose mobile service plans
* Transfer files between the phone and your computer
Whether you want to use your smartphone as your lifeline while you're on the road, or you're just looking for a way to make the most of the time you spend waiting in lines, you'll find all the user-friendly tips, tools, and tricks you need to become massively productive with your Nokia smartphone. With Nokia Smartphone Hacks, you'll unleash the full power of that computer that's sitting in your pocket, purse, or backpack.
|
License: |
O/S: |
Version: |
Added: 14/01/2009 22:42 |
Downloads: 326 |
Download (11 MB) |

Visual Basic 6 Black book |

Book Description
Completely explains the crucial Visual Basic tool set in detail. Covers the best Visual Basic programming practices, from design tools to flowcharts. Contains 1,000 pages of everything Visual Basic 6, from radio buttons and checkboxes to XOR drawings, OLE automation, DHTML page design, and Internet Explorer 4 support.
Book Info
Provides insight, programming tips & techniques, & real-world solutions you can put to work today. Designed to help you save hours of time & perfect your programming skills. Covers everything from graphics & image processing, ActiveX controls, database development & data-bound controls. Paper. with source code included
|
License: |
O/S: |
Version: |
Added: 14/01/2009 22:35 |
Downloads: 608 |
Download (2 MB) |
Pemrograman Flash Game Bahasa Indonesia |

Pemrograman Flash Game Bahasa Indonesia by Wandah W
|
License: |
O/S: |
Version: |
Added: 13/01/2009 01:08 |
Downloads: 439 |
Download (6.51MB) |

Hacker Attack, Shield your computer from internet crime |

Hacker Attack, Shield your computer from internet crime Sybex Inc; (September 22, 2000) | English
Hacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You’ll be fascinated as you read about hackers, crackers and whackers–people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or send email.
Best of all, this book provides simple but powerful solutions to all these security needs. It’s all on the book’s CD. Protect yourself right now with firewalls, anonymisers, and virus-guards. This is without doubt the most readable and interesting book about computer security ever written. You’ll enjoy reading it, and you’ll be safe after you’ve followed its advice. |
License: |
O/S: |
Version: |
Added: 12/01/2009 01:39 |
Downloads: 281 |
Download (2.32MB) |
|
|
|