Rabu, 07 Maret 2012

Cross Racing Championship 2005

Tags

Cross Racing Championship 2005 is a car racing game that includes both on- and off-road tracks. The game features a wide array of options that let you customize your car’s look and performance. There are more than 60 tracks on which to race against either computer opponents or live players. The in-game artificial intelligence changes throughout the race, adding variability and unpredictability to your opponents. An upgraded game engine models real physics and car damage, as well as sports light and texture effects.

SS :





Minimal Req :
1. Windows 2000/XP/vista/7
2. Pentium III 1.0GHz / Celeron 1.2Ghz / Athlon 1.2 GHz or equivalent
3. RAM 256 MB
4. Hardisk  500 MB
5. VGA 128MB
6. Directx 9
7. Windows compatible keyboard

Download :
Part 1 | Part 2 | Part 3 | Part 4 

Any Video Converter Ultimate v.4.3.2

Tags

Any Video Converter merupakan software yang biasa digunakan untuk menkonvert file-file video. Aplikasi ini mendukung banyak file video. Kebetulan tempo hari adik ipar saya meminta tolong untuk dicarikan software untuk mengubah file video dengan ekstensi .MOD menjadi MPEG. Setelah saya test dengan menggunakan software ini, hasilnya cukup memuaskan. Ingin coba??

Download : 

The Web Application Hackers Handbook: Finding and Exploiting Security Flaws


The highly successful security book returns with a new edition, completely updated


Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You’ll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.

  • Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition
  • Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more
  • Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks
  • Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.


Product Details

  • Hardcover: 912 pages
  • Publisher: Wiley; 2 edition (September 27, 2011)
  • Language: English
  • ISBN-10: 1118026470
  • ISBN-13: 978-1118026472
  • Product Dimensions: 9.2 x 7.4 x 2 inches

Download :

CCNP Security Firewall 642-617 Official Cert Guide


CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

CCNP Security FIREWALL 642-617 Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

Download :
CCNP Security Firewall 642-617 Official Cert Guide 

Virus of the Mind


Virus of the Mind: 
"The Revolutionary New Science of the Meme and How It Can Help You"


Description:
-------------
We are surrounded by information in the 21st Century: we are bombarded by advertising, attitudes, celebrities, news, wars, fashion, the latest fads…the sheer amount of information we have access to appears untameable, unworkable, and too much to gain sense from unless we pick and choose very carefully. However, our choices are very often made for us as the result of advertising, media companies, the government and popular culture.

The results of these choices are called memes, and their impact is shaping not just society but us individually, and on a core level, beyond psychology, personal free will, and even genetics. The very first book on the subject of memes, and how they behave just like viruses, this is an incredible study into the power of communication and ‘going along with everyone else’. “Virus of the Mind” explains just how we are ‘infected’ by the deliberate shaping of society’s attitudes and behaviours – and how we can cure ourselves.

Product Details :
==========
Paperback: 272 pages
Publisher: Hay House Publishers (June 4, 2009)
Language: English
ISBN-10: 1848501277
ISBN-13: 978-1848501270

Download :
Virus of the Mind

The Power of Habit: Why We Do What We Do in Life and Business

Tags


Description :
=======
In The Power of Habit, award-winning New York Times business reporter Charles Duhigg takes us to the thrilling edge of scientific discoveries that explain why habits exist and how they can be changed. With penetrating intelligence and an ability to distill vast amounts of information into engrossing narratives, Duhigg brings to life a whole new understanding of human nature and its potential for transformation.

Along the way we learn why some people and companies struggle to change, despite years of trying, while others seem to remake themselves overnight. We visit laboratories where neuroscientists explore how habits work and where, exactly, they reside in our brains. We discover how the right habits were crucial to the success of Olympic swimmer Michael Phelps, Starbucks CEO Howard Schultz, and civil-rights hero Martin Luther King, Jr. We go inside Procter & Gamble, Target superstores, Rick Warren’s Saddleback Church, NFL locker rooms, and the nation’s largest hospitals and see how implementing so-called keystone habits can earn billions and mean the difference between failure and success, life and death.

At its core, The Power of Habit contains an exhilarating argument: The key to exercising regularly, losing weight, raising exceptional children, becoming more productive, building revolutionary companies and social movements, and achieving success is understanding how habits work.

Product Details:
==========
Hardcover: 400 pages
Publisher: Random House (February 28, 2012)
Language: English
ISBN-10: 1400069289
ISBN-13: 978-1400069286

Download :

Implementing SSH: Strategies for Optimizing the Secure Shell



Desc :
Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system’s defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on Unix, Windows, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients.

With the help of numerous architectural examples and case studies, you’ll gain the necessary skills to:
* Explore many remote access solutions, including the theory, setup, and configuration of port forwarding
* Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding
* Use SSH on network devices that are traditionally managed by Telnet
* Utilize SSH as a VPN solution in both a server and client aspect
* Replace insecure protocols such as Rsh, Rlogin, and FTP
* Use SSH to secure Web browsing and as a secure wireless (802.11) solution

Product Details:
===========
Paperback: 402 pages
Publisher: Wiley; 1 edition (October 31, 2003)
Language: English
ISBN-10: 0471458805
ISBN-13: 978-0471458807

Download : 
Implementing SSH: Strategies for Optimizing the Secure Shell

Hackers: Heroes of the Computer Revolution




Desc :

Hackers: Heroes of the Computer Revolution (ISBN 0-385-19195-2) is a book by Steven Levy about hacker culture. It was published in 1984 in Garden City, New York by Nerraw Manijaime/Doubleday. Levy describes the people, the machines, and the events that defined the Hacker Culture and the Hacker Ethic, from the early mainframe hackers at MIT, to the self-made hardware hackers and game hackers. Immediately following is a brief overview of the issues and ideas that are brought forward by Steven Levy's book, as well as a more detailed interpretation of each chapter of the book, mentioning some of the principal characters and events.

The book saw an edition with a new afterword (entitled "Afterword: Ten Years After") by the author in 1994. In 2010, a 25th anniversary edition with updated material was published by O'Reilly.


Download : 
Cooming Soon