Je me perfectionne avec windows 8 1

Titre : Je me perfectionne avec windows 8 1
Auteur : Joël Green
Éditeur : www.informatique-bureautique.com
ISBN-13 : 9782916950334
Libération : 2014-03-31

Télécharger Lire en ligne



Comment gérer les utilisateurs du micro, en ajouter, modifier les caractéristiques du compte… Comment installer une nouvelle imprimante, un disque dur externe, un périphérique usb, une box… Comment configurer Internet, installer une nouvelle application, utiliser la reconnaissance vocale… Comment faire une sauvegarde du système, le protéger des agressions extérieures et le maintenir afin qu'il reste toujours rapide et efficace… Comment partager vos données et votre matériel sur un réseau filaire ou wifi et comment accéder aux ressources partagées par les autres… Comment résoudre les problèmes de fonctionnement du système, de la machine ou du réseau… Ce livre répond à toutes ces questions et bien d'autres encore, de manière simple, illustrée et commentée au point qu'il vous deviendra vite indispensable, posé à côté de votre ordinateur

Je me perfectionne avec Windows seven

Titre : Je me perfectionne avec Windows seven
Auteur : Joël Green
Éditeur : www.informatique-bureautique.com
ISBN-13 : 9782916950204
Libération : 2010-06-30

Télécharger Lire en ligne



Ce livre explique comment configurer Microsoft™ Windows Seven® sur votre ordinateur. Comment installer une nouvelle imprimante, un disque dur externe, un périphérique USB, une box… Comment configurer Internet, installer une nouvelle application, utiliser la reconnaissance vocale, faire une sauvegarde du système, le protéger des agressions extérieures et le maintenir afin qu'il reste toujours rapide et efficace… Comment partager vos données et votre matériel sur un réseau filaire ou WIFI et comment accéder aux ressources partagées par les autres… Comment accéder et comment débuter avec les nombreux outils et accessoires livrés avec le système d'application… Ce cours répond à toutes ces questions et bien d'autres encore, de manière simple, illustrée et commentée au point qu'il vous deviendra vite indispensable

Livres hebdo

Titre : Livres hebdo
Auteur :
Éditeur :
ISBN-13 : IND:30000111205880
Libération : 2006

Télécharger Lire en ligne



A été écrit sous une forme ou une autre pendant la plus grande partie de sa vie. Vous pouvez trouver autant d'inspiration de Livres hebdo Aussi informatif et amusant. Cliquez sur le bouton TÉLÉCHARGER ou Lire en ligne pour obtenir gratuitement le livre de titre $ gratuitement.

Metasploit

Titre : Metasploit
Auteur : Jim O'Gorman
Éditeur : No Starch Press
ISBN-13 : 9781593272883
Libération : 2011

Télécharger Lire en ligne



"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide willteach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--

jQuery Pocket Reference

Titre : jQuery Pocket Reference
Auteur : David Flanagan
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9781449302771
Libération : 2010-12-09

Télécharger Lire en ligne



"As someone who uses jQuery on a regular basis, it was surprising to discover how much of the library I’m not using. This book is indispensable for anyone who is serious about using jQuery for non-trivial applications."-- Raffaele Cecco, longtime developer of video games, including Cybernoid, Exolon, and Stormlord jQuery is the "write less, do more" JavaScript library. Its powerful features and ease of use have made it the most popular client-side JavaScript framework for the Web. Ideal for JavaScript developers at all skill levels, this book is jQuery's trusty companion: the definitive "read less, learn more" guide to the library. jQuery Pocket Reference explains everything you need to know about jQuery, completely and comprehensively. You'll learn how to: Select and manipulate document elements Alter document structure Handle and trigger events Create visual effects and animations Script HTTP with Ajax utilities Use jQuery's selectors and selection methods, utilities, plugins and more The 25-page quick reference summarizes the library, listing all jQuery methods and functions, with signatures and descriptions.

Pro Android C with the NDK

Titre : Pro Android C with the NDK
Auteur : Onur Cinar
Éditeur : Apress
ISBN-13 : 9781430248286
Libération : 2013-02-02

Télécharger Lire en ligne



Android is one of the major players in the mobile phone market. Android is a mobile platform that is built on the top of Linux operating system. The native-code support on Android offers endless opportunities to application developers, not limited the functionality that is provided by Android framework. Pro Android C++ with the NDK is an advanced tutorial and professional reference for today's more sophisticated app developers now porting, developing or employing C++ and other native code to integrate into the Android platform to run sophisticated native apps and better performing apps in general. Using a game app case study, this book explores tools for troubleshooting, debugging, analyzing memory issues, unit testing, unit test code coverage, performance measurement, on native applications, as well as integrating the Android NDK toolchain into existing Autoconf, Makefile, CMake, or JAM based build systems. Pro Android C++ with the NDK also covers the following: · The Android platform, and getting up to speed with the Android NDK, and exploring the APIs that are provided in native space. An overview of Java Native Interface (JNI), and auto-generating JNI code through Simplified Wrapper and Interface Generator (SWIG). An introduction to Bionic API, native networking. native multithreading, and the C++ Standard Template Library (STL) support. Native graphics and sound using JNI Graphics, OpenGL ES, and OpenSL ES. Debugging and troubleshooting native applications using Logging, GNU Debugger (GDB), Eclipse Debugger, Valgrind, strace, and other tools. Profiling native code using GProf to identify performance bottlenecks, and NEON/SIMD optimization from an advanced perspective, with tips and recommendations.

Excel 2013 Avanc

Titre : Excel 2013 Avanc
Auteur : Philippe Moreau
Éditeur : Editions Eyrolles
ISBN-13 : 9782212241273
Libération : 2013-11-26

Télécharger Lire en ligne



Mettre en oeuvre les fonctions avancées d'Excel 2013 dans vos documents professionnels Ce manuel d'autoformation est destiné aux utilisateurs ayant une bonne pratique des fonctions de base d'Excel et souhaitant découvrir et maîtriser les fonctionnalités avancées de la version 2013 du logiciel. La première partie présente sous forme de fiches pratiques les fonctions avancées d'Excel 2013 : calculs et simulations, outils graphiques, analyse des données, import-export de données, etc. La seconde partie propose vingt-deux cas pratiques consistant à réaliser des documents d'entreprise complets intégrant les fonctions avancées étudiées dans la première partie. L'ouvrage décrit comment effectuer les tâches Excel 2013 aussi bien avec la souris qu'à l'aide de l'écran tactile d'un ordinateur ou d'une tablette. Une annexe fournit les équivalences entre les commandes de l'ancienne version Excel 2003 et celles du Ruban d'Excel 2013. Une autre annexe recense les nouveautés, améliorations et modifications d'Excel 2013 par rapport à la version Excel 2010. Les fichiers nécessaires à la réalisation des cas pratiques sont disponibles en téléchargement sur le site Web www.editions-eyrolles.com

Java 5 0 Tiger

Titre : Java 5 0 Tiger
Auteur : Brett McLaughlin
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 0596007388
Libération : 2004

Télécharger Lire en ligne



Java 5.0, code-named "Tiger", promises to be the most significant new version of Java since the introduction of the language. With over a hundred substantial changes to the core language, as well as numerous library and API additions, developers have a variety of new features, facilities, and techniques available. But with so many changes, where do you start? You could read through the lengthy, often boring language specification; you could wait for the latest 500 page tome on concepts and theory; you could even play around with the new JDK, hoping you figure things out--or you can get straight to work with Java 5.0 Tiger: A Developer's Notebook. This no-nonsense, down-and-dirty guide by bestselling Java authors Brett McLaughlin and David Flanagan skips all the boring prose and lecture, and jumps right into Tiger. You'll have a handle on the important new features of the language by the end of the first chapter, and be neck-deep in code before you hit the halfway point. Using the task-oriented format of this new series, you'll get complete practical coverage of generics, learn how boxing and unboxing affects your type conversions, understand the power of varargs, learn how to write enumerated types and annotations, master Java's new formatting methods and the for/in loop, and even get a grip on concurrency in the JVM. Light on theory and long on practical application, Java 5.0 Tiger: A Developer's Notebook allows you to cut to the chase, getting straight to work with Tiger's new features. The new Developer's Notebooks series from O'Reilly covers important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing--you'll get the goods straight from the masters, in an informal and code-intensive style that suits developers. If you've been curious about Tiger, but haven't known where to start, this no-fluff, lab-style guide is the solution.

TimeRiders City of Shadows

Titre : TimeRiders City of Shadows
Auteur : Alex Scarrow
Éditeur : Penguin UK
ISBN-13 : 9780141968612
Libération : 2012-08-02

Télécharger Lire en ligne



Liam O'Connor should have died at sea in 1912. Maddy Carter should have died on a plane in 2010. Sal Vikram should have died in a fire in 2026. But all three have been given a second chance - to work for an agency that no one knows exists. Its purpose: to prevent time travel destroying history . . . Hunted by cyborg assassins from the future, the TimeRiders must abandon New York and go on the run. They escape to Victorian London and the streets where Jack the Ripper roams. But, before they can establish their new base, they make their most shattering discovery yet - and it will change everything . . . ** Book six in the bestselling TimeRiders series by Alex Scarrow. ** Victorian London's Jack the Ripper get a time-travel makeover! ** Perfect for fans of Doctor Who and Sherlock Holmes. ** TimeRiders (Book 1) won the Red House Book Award older readers category, and was Penguin UK's first ever number one on the iBooks Store. ** www.time-riders.co.uk

Google Hacking for Penetration Testers

Titre : Google Hacking for Penetration Testers
Auteur : Johnny Long
Éditeur : Syngress
ISBN-13 : 9780080478050
Libération : 2004-12-17

Télécharger Lire en ligne



Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don’t realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker’s search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.