Thursday, September 4, 2008

Batman: Gotham After Midnight


When the full moon rises and casts its eerie glow over the land, the creatures of the night come out to hunt and feast and prey on the innocent citizens of Gotham City, and only one man stands in their way: The Batman.

These are the bizarre and frightening case files of the Dark Knight Detective, featuring grave-robbers, men making monsters, night terrors, and the debut of an all-new moonlight monster known only as Midnight.

Download :
http://rapidshare.com/files/141933016/Batman_-_Gotham_After_Midnight__01.cbr
http://rapidshare.com/files/141933017/Batman_-_Gotham_After_Midnight__02.cbr
http://rapidshare.com/files/141933018/Batman_-_Gotham_After_Midnight__03.cbr
http://rapidshare.com/files/141933019/Batman_-_Gotham_After_Midnight__04.cbr

Read More..

Grant's Atlas of Anatomy


Publisher:Lippincott Williams & Wilkins | Pages:834 | 2008-02-01 | ISBN: 0781796040 | CHM | 609 MB

A cornerstone of gross anatomy since 1943, Grant's Atlas of Anatomy continues to reach students worldwide with its realistic illustrations, detailed surface anatomy photos, clinical relevance, and muscle tables. Renowned for its accuracy, pedagogy, and clinical relevance, the new edition of this classic anatomy atlas features many improvements, including updated artwork, more vital tissue colors, new conceptual diagrams, vibrantly re-colored illustrations, and a more consistent art style. Clinical integration has been greatly enhanced in this edition, with clinical material clearly highlighted for easy identification.

In addition, the organization within each chapter has been updated to provide a clearer and more consistent approach. A companion Website offers student and instructor versions of Grant's Interactive Atlas, including images from the book, video clips from Acland's DVD Atlas of Human Anatomy, USMLE-style questions, image-based drag-and-drop questions, and electronic flash cards from Gould's Clinical Anatomy Flash Cards. Also available is an interactive atlas for faculty, which contains all of the images, select Acland clips, presentations of dissection sequences, an expanded table of contents, and more!Medical and health professions students as well as faculty and practitioners continue to rely on Grant's Atlas for its accuracy and comprehensiveness. They're going to love what this new edition has to offer! "Compared to [other atlases on the market], I find the contents and the images of this book significantly better mainly because of the life-like images and also the [accompanying] brief descriptions...[which] help keep the interest level going strong." 3rd year student

download :
http://rapidshare.com/files/121566251/267_Grant_s_Atlas_of_Anatomy_12th.part1.rar
http://rapidshare.com/files/127195719/267_Grant_s_Atlas_of_Anatomy_12th.part2.rar
http://rapidshare.com/files/132321162/267_Grant_s_Atlas_of_Anatomy_12th.part3.rar
http://rapidshare.com/files/137693211/267_Grant_s_Atlas_of_Anatomy_12th.part4.rar
http://rapidshare.com/files/137884772/267_Grant_s_Atlas_of_Anatomy_12th.part5.rar
http://rapidshare.com/files/137995776/267_Grant_s_Atlas_of_Anatomy_12th.part6.rar
http://rapidshare.com/files/138054549/267_Grant_s_Atlas_of_Anatomy_12th.part7.rar
http://rapidshare.com/files/138476205/267_Grant_s_Atlas_of_Anatomy_12th.part8.rar

Read More..

Tuesday, September 2, 2008

Wi-foo: The Secrets Of Wireless Hacking


* Step-by-step walkthroughs and explanations of typical attacks
* Building wireless hacking/auditing toolkit: detailed recommendations, ranging from discovery tools to chipsets and antennas
* Wardriving: network mapping and site surveying
* Potential weaknesses in current and emerging standards, including 802.11i, PPTP, and IPSec
* Implementing strong, multilayered defenses
* Wireless IDS: why attackers aren't as untraceable as they think
* Wireless hacking and the law: what's legal, what isn't

If you're a hacker or security auditor, this book will get you in. If you're a netadmin, sysadmin, consultant, or home user, it will keep everyone else out.

About the Author
The authors have been active participants in the IT security community for many years and are security testers for leading wireless equipment vendors.

Andrew A. Vladimirov leads the wireless consultancy division at Arhont Ltd, one of the UK's leading security consultants. He was one of the UK's first IT professionals to obtain the coveted CWNA wireless certification.

Konstantin V. Gavrilenko co-founded Arhont Ltd. He has more than 12 years of IT and security experience, and his expertise includes wireless security, fire-walls, cryptography, VPNs, and IDS.

Andrei A. Mikhailovsky has more than a decade of networking and security experience and has contributed extensively to Arhont's security research papers.

# 592 pages
# Publisher: Addison-Wesley Professional (July 8, 2004)
# Language: English
# ISBN-10: 0321202171
# ISBN-13: 978-0321202178

Download :
http://w15.easy-share.com/1701269014.html

Read More..

Monday, September 1, 2008

Pro Web 2.0 Application Development with GWT


The main focus of Pro Web 2.0 Application Development with GWT is a case study of a real Web 2.0 application called ToCollege.net.
What you’ll learn:
- You’ll take a full tour of a modern Web 2.0 startup’s codebase.
That’s 15,000 lines of source code that includes everything from Google Gears integration to Acegi OpenID, Lucene full–text search, and Google Maps, all of it integrated with GWT 1.5.

- Leveraging this book’s available source code, you’ll see the nitty–gritty details of how to merge a modern Web 2.0 application stack including Hibernate, Spring, Spring MVC 2.5, SiteMesh, and Freemarker together.

- You’ll see how to wire GWT into an industry standard Maven build environment, which will help you get up to speed quickly and avoid configuration headaches.

- The great pitfall of many Ajax applications is they’re mostly opaque to search engines. You’ll see the ToCollege.net solution to this thorny problem.

- Protection from XSS and XSRF attacks is beyond the scope of simple GWT tutorials, but they are a real concern for a site like ToCollege.net.

The book will cover the ToCollege.net security architecture in detail.
Who is this book for?
This book is for developers who are ready to move beyond small proof–of–concept sample applications and want to look at the issues surrounding a real deployment of GWT. If you want to see what the guts of a full–fledged GWT application look like, this is the book for you.

GWT 1.5 is a game–changing technology, but it doesn’t exist in a bubble.
Real deployments need to connect to your database, enforce authentication, provide protection from security threats, and allow good search engine optimization. To show you all this, this book looks at the code behind a real live web site called ToCollege.net.

This application
specializes in helping students who are applying to colleges, allowing them to manage their application process and compare the rankings that they give to each school. It’s a slick application that’s ready for you to sign up and use.

The audience for this book either owns another GWT book for the basic tutorials or is comfortable using the online documentation and forums when they’re stuck, which allows this book to move quickly and focus on answering the bigger architecture questions.

Download :
http://www.megaupload.com/?d=TRJSZ2NP

Mirror :
http://w14.easy-share.com/1701013566.html

Read More..

Design by Free blogger template | Edited by Free eBooks