Trang chủ » Giáo trình tổng hợp » KHO TÀI LIỆU VÀ PHẦN MỀM NGÀNH CNTT – ĐIỆN TỬ VIỄN THÔNG-TỰ HỌC MẠNG

KHO TÀI LIỆU VÀ PHẦN MỀM NGÀNH CNTT – ĐIỆN TỬ VIỄN THÔNG-TỰ HỌC MẠNG

5939 Lượt xem

Kho sách chuyên ngành Điện tử viễn thông (tiếng Anh)

Link folder chứa từng ebook:
http://www.fshare.vn/folder/TWMHCDJ8QT

Link file rar chứa tất cả:
http://www.fshare.vn/file/TWZK34FHNT

Kho sách chuyên ngành CNTT (tiếng Anh)

Link folder chứa từng ebook:
http://www.fshare.vn/folder/T9ZB3G7SBT

Link file rar chứa tất cả:
http://www.fshare.vn/file/TXP88Y76MT

Kho sách chuyên về bảo mật và các vấn đề liên quan của HVAOnline (Tiếng Việt + tiếng Anh)

Link folder chứa từng ebook:
http://www.fshare.vn/folder/TAXHRDQGTT

Link file rar chứa tất cả:
http://www.fshare.vn/file/TWJ4DVJ4TT

Kho phần mềm phục vụ CNTT và Điện tử viễn thông

Quatus 8.0 Windows
Matlab 2013a (8.01) Windows x86/x64
Matlab 2009
Microsoft Visual Studio Professional 2012
Optiwave OptiSystem 12 x86
Optiwave OptiSystem 10 x86
Orcad 10.5
Oxford Advanced Learners Dictionary 8th Edition + Crack
Windows Sever 2003
Windows Sever 2008
Ansoft HFSS v13
Driver Pack Solution 14R410 Driver Packs 14.03
CST STUDIO SUITE 2011
CST STUDIO SUITE 2010
CST MICROWAVE STUDIO 15 Disk 1 + 2 Full Win32bit
4tech_AWR
BEST SOFT FOR TOEIC (Matery)
English Study Pro 2012 Full
Mathworks Matlab R2010a
Driver Pack Solution 14 R410 Driver Packs 14.03
Proteus 7.10 SP 02
Mathworks Matlab R2010a
Từ điển Prodic
Từ điển Lingoes
VirtualBox 4.3.0_RC1-89687-Win
XilinX 14.6
Microsoft Exchange Server 2007

Kho tài liệu tổng hợp TELECOM – NETWORK – IT – PROGRAMER – DATABASE (tiếng Anh)

http://www.fshare.vn/folder/T8G504V08T

Kho chuyên tài liệu về Web – MCITP – QTM – SQLServer – PhoToShop

http://www.fshare.vn/folder/T174S3T1VT

Học JAVA từ cơ bản tới nâng cao (Slide bài giảng + Code + Clip)

http://www.fshare.vn/file/TV3VJ5D2MT
http://www.fshare.vn/file/T5RY7WZCJT

Tài liệu học CCNA của VNPRO – Long Bao (Clip bài giảng + Lab)

http://www.fshare.vn/file/T5RW2M1W1T
http://www.fshare.vn/file/TFJPXGDW4T

SQL – Cấu trúc dữ liệu – Phân tích thiết kế hệ thống

http://www.fshare.vn/file/TA5CVR37RT

Sưu tầm tài liệu HACKING – dạy làm hacker từ newbei tới pro

http://www.fshare.vn/file/TASVYZVQMT
http://www.fshare.vn/file/TWTSSZV6PT
http://www.fshare.vn/file/T9D3A0A7DT

Tự luyện thi TOEIC (TOEIC 900A + 900B)

http://www.fshare.vn/file/TXVRH5379T

Quản trị Mạng Windows Server

http://www.fshare.vn/file/TKG6CGDJTT

Tài liệu Full tự học MCSA

http://www.fshare.vn/file/TAB04RSFRT

Đồ án Mạng – An ninh mạng

http://www.fshare.vn/file/TA7DM9M8MT

Tổng hợp tài liệu học, ôn tập và đề thi CCNA mới nhất + Làm quen, cấu hình, quản trị LINUX từ cơ bản đến nâng cao

http://www.fshare.vn/file/TXQ33BM6XT

Kho ebook cho người lập trình bao gồm C, C#, C++, Java, Game, Web … 1 chút về Web, Photoshop, CSDL và những khái niệm cơ bản cho người lập trình

http://www.fshare.vn/file/TWGC63784T

Kho Giáo trình của KS Dương Trung Hiếu PHOTOSHOP 32 VCD + 2 DVD CS4 & CS5 và đồ cổ Sổ tay PTS 2006, 2007, 2008, 2009

http://www.fshare.vn/folder/T2T5HM1KAT

CLIP hướng dẫn sử dụng và mô phỏng phần mềm CST STUDIO SUITE

http://www.fshare.vn/file/TWNKD40QXT

Trọn bộ Mbook của Trung Tâm Tin Học Đại Học Khoa Học Tự Nhiên

TIN HỌC VĂN PHÒNG
Ôn thi chứng chỉ A ==>> http://www.fshare.vn/file/TWCQD5HMPT
Ôn Thi Chứng Chỉ B ==>> http://www.fshare.vn/file/TDTH0HJAWT
Chứng chỉ B Corel ==>> http://www.fshare.vn/file/T88VB3QGFT
Chứng Chỉ B photoshop ==>> http://www.fshare.vn/file/T30390ZA0T
Tin Học Văn Phòng B ==>> http://www.fshare.vn/file/TQQYCPV61T

ĐỒ HỌA :
Mỹ Thuật Cơ Bản ==>> http://www.fshare.vn/file/TKNBZ0ZF9T
Thiết Kế Mẫu Với Corel Draw ==>> http://www.fshare.vn/file/TBHS7M378T
Xử Lý Ảnh Với PS ==>> http://www.fshare.vn/file/TVJ5FKMABT
Ý Tưởng Thiết Kế ==>> http://www.fshare.vn/file/TDYTSCH7CT
Mỹ Thuật Ứng Dụng ==>> http://www.fshare.vn/file/TA0ZR3K05T
Xử Lý Ảnh Với PS nâng cao ==>> http://www.fshare.vn/file/T5Y0FVZT9T
Hoạt Hình 3D ==>> http://www.fshare.vn/file/TVQAP72NVT
Kỹ Thuật In ==>> http://www.fshare.vn/file/T7Y0TQ0P0T

THIẾT KẾ WEB :
Dreamweaver ==>> http://www.fshare.vn/file/TAQZJ8AHGT
Macromedia Flash ==>> http://www.fshare.vn/file/TXWB9DQ2TT
Mỹ Thuật Web ==>> http://www.fshare.vn/file/T9Q9YJMJJT
PhotoShop ==>> http://www.fshare.vn/file/TM3MQMHTCT

LẬP TRÌNH
Lập Trình Ứng Dụng Quản Lý : ( 3 CD)
==>> http://www.fshare.vn/file/TM060XDKVT : http://www.fshare.vn/file/T5HNW78S0T : http://www.fshare.vn/file/TCA9WKSHCT
ASP ==>> http://www.fshare.vn/file/TFX3W6819T
ASP.NET và Ajax ==>> http://www.fshare.vn/file/TC9GACFKNT
Đồ Án Thực Tế Phân Tích Hệ Thống ==>> http://www.fshare.vn/file/T8279HS7XT
C# ==>> http://www.fshare.vn/file/T0M9YXAXXT : http://www.fshare.vn/file/TQV1XSG3MT : http://www.fshare.vn/file/TV3Z6V988T
SQL Server ==>> http://www.fshare.vn/file/T0ZGMSFX2T

MẠNG :
Lắp Ráp Cài đặt Máy ==>> http://www.fshare.vn/file/T9TT6RGPJT : http://www.fshare.vn/file/TCX809VC7T
Quản Trị Mạng Linux ==>> http://www.fshare.vn/file/TJGPTQGBVT : http://www.fshare.vn/file/TGYD6BNDGT
Quản Trị Mạng Windows server ==>> http://www.fshare.vn/file/T5AWGPF4AT
Triển Khai Hệ Thống Mạng ==>> http://www.fshare.vn/file/TR1CZHN57T : http://www.fshare.vn/file/TVHX1WVPVT
Quản Trị Dịch vụ mạng ==>> http://www.fshare.vn/file/T2JBHPP2TT
Windows service ==>> http://www.fshare.vn/file/T0X7WA6PKT

LẬP TRÌNH WEB PHP
==>> http://www.fshare.vn/file/T3QXGR2Z8T : http://www.fshare.vn/file/TJ5K48RYST : http://www.fshare.vn/file/T9T7YV7ZTT

hay
Code:
http://www.fshare.vn/folder/TMHJ3SWVYT

Tài liệu SEO toàn tập, nhiều nguồn và có cả SEO Tool, hướng dẫn cài đặt và sử dụng

http://www.fshare.vn/file/THD9Z0V44T
Pass(nếu có) : seohaiphong.net

KHO LAB TRAINING KHỦNG NHẤT VỀ Cisco, Microsoft, CompTIA, Cloud, Linux, Citrix, Security & more

[Train Signal] Windows Server 2012 Configuring Advanced Services (70-412)
CBT Nuggets – Microsoft Windows Server 2012 70-414
CBT Nuggets 70-413 Designing and Implementing a Server Infrastructure
CBT Nuggets 70-640 Active Directory with R2 Updates
CBT Nuggets 70-643 Applications Infrastructure, Configuring with R2 Updates
CBT Nuggets Microsoft 70-642 Network Infrastructure, Configuring wth R2 Updates
CBT.Nuggets.70-647.Enterprise.Administrator
CBT.Nuggets.Microsoft.70-415.MCSE
CBT.Nuggets.VMware.Virtualization.VCP.vSphere.5
Microsoft System Center Configuration Manager SCCM 2012 70-243
Trainsignal – Windows Server 2008 R2 Virtualization [70-659] Trainsignal – Windows Server 2012 Hyper-V Essentials Training
Trainsignal Exchange Server 2013 Core Solutions
Trainsignal Sharepoint Server 2013 Core Solutions 70-331
Trainsignal SQL Server 2012 Administration Essentials
Trainsignal SQL Server 2012 Quering 70-461
Trainsignal XenDesktop 5
TrainSignal.VMware.View.Administration.Training.Additional.Content
TrainSignal__MS.Network Monitoring
TrainSignal-Windows Server 2012 Implementing Secure Remote Access with DirectAccess
TS – VMware vCloud Director 5.1 Essentials
TS- VMware Advanced Features Up Close
TS.VMware.View.Administration.Training
TS__Video hoc nang cao Windows Server 2008 R2
TS__VMware.Site.Recovery.Manager.5
Video hoc Citrix XenApp 6
Windows Server 2012 Hyper-V Essentials Disc
…..còn rất nhiều mà ko thể kể hết

Code:
http://www.fshare.vn/folder/T9HSH3MPXThttp://www.fshare.vn/folder/T42Q2007GT

Hướng dẫn lập trình Android

http://www.fshare.vn/file/TX9ZJP31ST

Bộ giáo trình IT của SSDG

Giáo trình anh văn thiếu nhi SSDG
Anh văn thực dụng của nhóm SSDG
Luyện nghe tiếng anh SSDG
Giáo trình Vocabulary SSDG
Giáo trình luyện thi TOEFL SSDG
Giáo trình luyện thi Toeic SSDG
Chinh phục hệ điều hành SSDG
Giáo trình Autocad 2008 SSDG
Giáo trình 3D Studio Max 7 SSDG
Giáo trình Adobe Premiere SSDG
Giáo trình Corel Draw X3 SSDG
Giáo trình Flash 8 SSDG
Giáo trình Illustrator CS2
Giáo trình Java Sun SSDG
Giáo trình khôi phục dữ liệu và bảo mật dữ liệu SSDG
Giáo trình C SSDG
Giáo trình Linux
Giáo trình MS Access SSDG 2003
Giáo trình MS Excel 2003 SSDG
Giáo trình MS Excel 2007 SSDG
Giáo trình Power Point 2007 SSDG
Giáo trình MS Word 2007 SSDG
Giáo trình Photoshop CS2 SSDG
Giáo trình Photoshop CS3 SSDG
Giáo trình Pro Engineer SSDG
Giáo trình quản trị mạng SSDG
Giáo trình Video Studio SSDG
Giáo trình xử lý âm thanh SSDG
Luyện thi IELTS SSDG
Giáo trình PHP và MY SQL SSDG
Giáo trình ASP.Net SSDG
Giáo trình thiết kế web SSDG
Tự học tiếng Hoa SSDG
Giáo trình C và C++ SSDG

Code:
http://www.fshare.vn/folder/TR0N9HAG2T

DVD HỌC PHOTOSHOP TRƯỜNG NGUYỄN TẤT THÀNH

http://www.fshare.vn/folder/THA3VFF8YT
tài liệu số cho sinh viên khoa mạng của uit
năm 1: http://www.mediafire.com/download/uluclds4cesb7uy/Nam+Nhat.rar
năm 2:http://www.mediafire.com/?k37zom0vd1t2w
năm 3: http://www.mediafire.com/?i58a3syc45d8z
năm 4: http://www.mediafire.com/?58benbe18ssyp
TÀI LIỆU LẬP TRÌNH ANDROItài liệu tiếng việt cơ bản về androihttp://www.mediafire.com/download/66o29f1iep75tur/Tai_Lieu_Android_Tieng_Viet.rar
Giáo trình giảng dạy android + bài tập – Download tại đây  http://adf.ly/ZJWqE
– Đều cần thiết trong lập trình android – Download tại đây http://adf.ly/WtilK
– Bắt đầu học lập trình với android (Apress) – Download tại đây http://adf.ly/Wtjxj
– Phát triển Web trên SmartPhone – Download tại đây http://adf.ly/Wtkms
– Tiết lộ bí quyết trong lập trình Android – Download tại đây http://adf.ly/Wtn3p
– Xin chào Android 1 (2008) – Download tại đây http://adf.ly/WtnCh
– Xin chào Android 2 (2009) – Download tại đây http://adf.ly/WtnL0
– Xây dựng ứng dụng với thư viện Android SDK – Download tại đây http://adf.ly/WtnqP
– Bắt đầu phát triển ứng dụng trên android – Download tại đây http://adf.ly/WtobK
– Action trong Android – Download tại đây http://adf.ly/WtpmI
– Học lập trình Android (2011) – Download tại đây http://adf.ly/WtruL
– Hướng dẫn phát triển ứng dụng 1 (2011) – Download tại đây http://adf.ly/Wtspy
– Hướng dẫn phát triển ứng dụng 2 (2011) – Download tại đây http://adf.ly/Wtt6z
– Công việc trong Android – Download tại đây http://adf.ly/WttCS
– Hướng dẫn xử lý SQLite – Download tại đây http://adf.ly/WttnB
– Phát triển ứng dụng android với Adobe – Download tại đây http://adf.ly/WttwD
– Flash Mobile cho Android và iOS – Download tại đây http://adf.ly/WtubS
– Hướng dẫn xử lý code trong lập trình Android – Download tại đây http://adf.ly/Wu9qr
– Bắt đầu phát triển ứng dụng Android – Download tại đây http://adf.ly/WuCdy
– Xây dựng ứng dụng android với HTML CSS và JavaScript – Download tại đây http://adf.ly/WuCoP
– Bước đầu phát triển ứng dụng Android – Download tại đây http://adf.ly/WuDZG
– Bắt đầu học lập trình Android 2012 – Download tại đây http://adf.ly/WuEDC
– Android Pro – Download tại đây http://adf.ly/WuEMb
– Lập trình Android phiên bản 2 – Download tại đây http://adf.ly/WuF6n
Tài liệu android nâng cao:
– WebService trên Android – Download tại đây http://adf.ly/Wtivr
– Phát triển ứng dụng android chuyên nghiệp – Download tại đây http://adf.ly/WtneI
– Lập trình Android Pro 2 (Apress) – Download tại đây http://adf.ly/Wtkdb
– Hướng dẫn làm luận án Android Google – Download tại đây http://adf.ly/Wtmv8
– Xử lý Media (đồ họa, âm thanh, video) pro trong Android – Download tại đây http://adf.ly/Wtp8i
– Phát triển ứng dụng ngụy trang trong android – Download tại đây http://adf.ly/WtpeM
– Phát triển ứng dụng kết nối không dây – Download tại đây http://adf.ly/WtsXK
– Dự án thực tế trong Android – Download tại đây http://adf.ly/WttMJ
– Phát triển giao diện người dùng trong Android – Download tại đây http://adf.ly/WuA3z
– Phát triển ứng dụng android Dummies – Download tại đây http://adf.ly/WtpeM
– Action trong Android Phiên Bản 3 (2011) – Download tại đây http://adf.ly/WuAwe
– Nền tản bảo mật ứng dụng trong Android – Download tại đây http://adf.ly/WuBXR
– Tối ưu hóa hiệu xuất phát triển ứng dụng Pro – Download tại đây http://adf.ly/WuDjK
– Pro OpenGL ES cho Android – Download tại đây http://adf.ly/WuE1w
– Thiết kế và phát triển cơ bản giao diện người dùng – Download tại đây http://adf.ly/WuEsH
– Phát triển ứng dụng Android chuyên nghiệp – Download tại đây http://adf.ly/WuFFt
Tài liệu lập trình game:
– Bắt đậu học lập trình game Android – Download tại đây http://adf.ly/Wtrmv
– Bắt đầu làm game trên Android – Download tại đây http://adf.ly/WuCR7
– Làm game thời gian thực trong Android – Download tại đây http://adf.ly/WtqVK
– Lập trình game android pro – Download tại đây http://adf.ly/Wtrf4
– Phát triển game thực tế – Download tại đây http://adf.ly/WuCEm
– Làm Game và giao diện trên Android iOS với OpenGL ES 2.0 – Download tại đây http://adf.ly/WuD1D
– Nâng cao kỹ năng lập trình game trên Android – Download tại đây http://adf.ly/WuDuG
– Hướng dẫn xây dựng hoàn thành một game Android – Download tại đây http://adf.ly/WuEi0
giáo trình công nghệ thông tinMôn Cấu Trúc Dữ Liệu
http://www.mediafire.com/?g83cnqcxigi8aow

http://www.mediafire.com/download/5m2s8mb7wdc11v0/Cau_Truc_Du_Lieu.rar
Môn Hệ Điều Hành
http://www.mediafire.com/download.php?brisb4ye2f4qlsj

http://www.mediafire.com/download/2wgwg72sc1xcq31/He_Dieu_Hanh.rar
Môn Khai Phá Dữ Liệu
http://www.mediafire.com/download.php?4y9rd8jprl3bfcb

http://www.mediafire.com/download/67nbwaji28l0env/Khai_Pha_Du_Lieu.rar
Môn Lập Trình Hướng Đối Tượng
http://www.mediafire.com/download.php?ho6n35lsypey336
http://www.mediafire.com/download/14d2h8k1032rntx/Lap_Trinh_Huong_Doi_Tuong.rar
Môn Lập Trình WEB
http://www.mediafire.com/download.php?03e1y2h60ibcsjb

Môn Oracle
http://www.mediafire.com/download.php?3c2awbkp5b5i4iq

Môn Lập Trình Java
http://www.mediafire.com/?1dugpgbd9dack7g
Ebook Hacker 4.1GB – Computer Security Enthusiast
Link dowload Torent https://www.mediafire.com/?3t4m2i4an8b7dil
http://bitvn.org/details.php?id=5665&hit=1

Link dowload trực tiếp http://www.fshare.vn/file/TZ8AV2MB7T
mục lục sách101 Spy Gadgets for the Evil Genius.pdf
1337 h4x0r h4ndb00k.chm
19 Deadly Sins of Software Security – Programming Flaws & How to Fix Them.chm
22 Radio & Receiver Projects for the Evil Genius.pdf
50 Awesome Auto Projects for the Evil Genius.pdf
51 High-Tech Practical Jokes for the Evil Genius.pdf
802.11 Security.pdf
A Classical Introduction to Cryptography Exercise Book.pdf
A Technical Guide to IPSec Virtual Private Networks.pdf
A , Network , Security Exams in a Nutshell – A Desktop Quick Reference.pdf
AAA & Network Security for Mobile Access – Radius, Diameter, EAP, PKI, & IP Mobility.pdf
Absolute OpenBSD – UNIX for the Practical Paranoid.chm
Access Denied – The Practice & Policy of Global Internet Filtering.pdf
Active Defense – A Comprehensive Guide to Network Security.pdf
Administering & Securing the Apache Server.chm
Advanced CISSP Prep Guide – Exam Q&A.chm
Advances in Elliptic Curve Cryptography.pdf
Advances in Enterprise Information Technology Security.pdf
Advances in Network & Distributed Systems Security.pdf
Aggressive Network Self-Defense.pdf
Ajax Security.pdf
Anti-Hacker Tool Kit, 2nd Ed..chm
Anti-Hacker Tool Kit, 3rd Ed..chm
Apache Security.chm
Applied Cryptanalysis – Breaking Ciphers in the Real World.pdf
Applied Cryptography & Network Security – 2nd International Conference, ACNS 2004.pdf
Applied Cryptography – Protocols, Algorithms, & Source COde in C, 2nd Ed..chm
Applied Security Visualization.pdf
Auditor’s Guide to Information Systems Auditing.pdf
AVIEN Malware Defense Guide for the Enterprise.pdf
Beginning Cryptography with Java.chm
BigNum Math – Implementing Cryptographic Multiple Precision Arithmetic.pdf
Biometrics & Network Security.chm
Black Hat Physical Device Security – Exploiting Hardware & Software.pdf
Blackjacking – Security Threats to BlackBerry Devices, PDAs, & Cell Phones in the Enterprise.pdf
Bluetooth Security.pdf
Botnet Detection – Countering the Largest Security Threat.pdf
Botnets – The Killer Web App.pdf
Brute Force – Cracking the Data Encryption Standard.pdf
Buffer Overflow Attacks – Detect, Exploit, Prevent.pdf
Building an Effective Information Security Policy Architecture.pdf
Building DMZs for Enterprise Networks.pdf
Building Internet Firewalls, 2nd Ed..pdf
Building Secure Servers with Linux.chm
Building Secure Servers with Linux.pdf
Building Secure Wireless Networks with 802.11.pdf
Bulletproof Wireless Security – GSM, UMTS, 802.11, & Ad Hoc Security.pdf
CCNA Security Official Exam Certification Guide [Exam 640-553] .pdf
CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide.pdf
CD & DVD Forensics.pdf
CD Cracking Uncovered – Protection Against Unsanctioned CD Copying.chm
CEH – Official Certified Ethical Hacker Review Guide [Exam 312-50] .pdf
CEH Official Certified Ethical Hacker Review Guide.pdf
Certified Ethical Hacker Exam Prep [Exam 312-50] .chm
Certified Ethical Hacking Official Course Material [Exam 312-50] .chm
Cisco ASA, PIX, & FWSM Firewall Handbook, 2nd Ed..pdf
Cisco IOS Access Lists.pdf
Cisco NAC Appliance – Enforcing Host Security with Clean Access.pdf
Cisco Network Security Little Black Book.pdf
Cisco Router Firewall Security.chm
Cisco Secure Firewall Services Module (FWSM).pdf
Cisco Secure Internet Security Solutions.pdf
Cisco Security Agent.chm
Cisco Security Professional’s Guide to Secure Intrusion Detection Systems.pdf
Cisco Wireless LAN Security.chm
CISSP – Certified Information Systems Security Professional Study Guide, 3rd Ed..pdf
CISSP – Certified Information Systems Security Professional Study Guide, 4th Ed..pdf
CISSP Certification All-in-One Exam Guide, 4th Ed..pdf
CISSP for Dummies, 2nd Ed..chm
Codes & Ciphers – Julius Caesar, the Enigma, & the Internet.pdf
Codes – The Guide to Secrecy from Ancient to Modern Times.pdf
Combating Spyware in the Enterprise.pdf
Complete Guide to CISM Certification.pdf
Complexity & Cryptography – An Introduction.pdf
CompTIA A Exam Prep [Exams A Essentials, 220-602, 220-603, & 220-604] .chm
CompTIA Security Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010] .pdf
Computer & Intrusion Forensics.pdf
Computer Network Security.pdf
Computer Security & Cryptography.pdf
Computer Security Basics, 2nd Ed..chm
Computer Security, Privacy, & Politics – Current Issues, Challenges, & Solutions.pdf
Computer Viruses & Malware.pdf
Computer Viruses – From Theory to Applications.pdf
Computer Viruses for Dummies.pdf
Configuring Juniper Networks NetScreen & SSG Firewalls.pdf
Configuring NetScreen Firewalls.pdf
Configuring SonicWALL Firewalls.pdf
Contemporary Cryptography.pdf
Core Security Patterns – Best Practices & Strategies for J2EE, Web Services, & Identity Management.chm
Covert Java – Techniques for Decompiling, Patching, & Reverse Engineering.pdf
Crackproof Your Software – Protect Your Software Against Crackers.pdf
Crimeware – Understanding New Attacks & Defenses.chm
Critical Incident Management.chm
Cryptography & Network Security, 4th Ed..chm
Cryptography & Security Services – Mechanisms & Applications.pdf
Cryptography – A Very Short Introduction.chm
Cryptography for Developers.pdf
Cryptography for Dummies.chm
Cryptography in C & C .chm
Cryptology Unlocked.pdf
Cyber Crime Investigator’s Field Guide.pdf
Cyber Forensics – A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf
Cyber Spying – Tracking Your Family’s (Sometimes) Secret Online Lives.pdf
Cyber Warfare & Cyber Terrorism.pdf
Decrypted Secrets – Methods & Maxims of Cryptology, 4th, Revised & Extended Ed..pdf
Defend I.T. – Security by Example.chm
Defense & Detection Strategies against Internet Worms.pdf
Deploying Secure 802.11 Wireless Networks with Microsoft Windows.chm
Designing BSD Rootkits – An Introduction to Kernel Hacking.pdf
Developer’s Guide to Web Application Security.pdf
Digital Evidence & Computer Crime – Forensic Science, Computers, & the Internet, 2nd Ed..chm
Disassembling Code – IDA Pro & SoftICE.chm
Effective Oracle Database 10g Security by Design.chm
Electronic Gadgets for the Evil Genius – 28 Build-It-Yourself Projects.pdf
EnCase Computer Forensics – The Official EnCE-EnCase Certified Examiner Study Guide, 2nd Ed..pdf
Encyclopedia of Cryptology.chm
End-to-End Network Security – Defense-in-Depth.pdf
Enemy at the Water Cooler – Real-Life Stories of Insider Threats & Enterprise Security Management Countermeasures.pdf
Enterprise Information Systems Assurance & System Security – Managerial & Technical Issues.pdf
Enterprise Java Security – Building Secure J2EE Applications.chm
Essential Computer Security – Everyone’s Guide to Email, Internet, & Wireless Security.pdf
Essential PHP Security.chm
Ethereal Packet Sniffing.chm
Expert Web Services Security in the .NET Platform.chm
Exploiting Software – How to Break Code.pdf
Fast Track to Security.pdf
File System Forensic Analysis.chm
Firewall Fundamentals.chm
Firewall Policies & VPN Configurations.pdf
Firewalls & Internet Security – Repelling the Wily Hacker, 2nd Ed..pdf
Firewalls – Jumpstart for Network & Systems Administrators.pdf
Firewalls for Dummies, 2nd Ed..pdf
Forensic Computer Crime Investigation.pdf
Forensic Computing – A Practitioner’s Guide, 2nd Ed..pdf
Foundations of Computer Security.pdf
Foundations of Cryptography – A Primer.pdf
Foundations of Cryptography – Vol. 1, Basic Tools.pdf
Foundations of Mac OS X Leopard Security.pdf
Foundations of Security – What Every Programmer Needs to Know.pdf
Fundamentals of Cryptology – A Professional Reference & Interactive Tutorial.pdf
Fuzzing – Brute Force Vulnerability Discovery.pdf
Google Hacking for Penetration Testers, Vol. 2.pdf
Google Hacking for Penetration Testers.pdf
Gray Hat Hacking – The Ethical Hacker’s Handbook, 2nd Ed..pdf
Grid Computing Security.pdf
Guide to Elliptic Curve Cryptography.pdf
Hack Attacks Revealed – A Complete Reference with Custom Security Hacking Toolkit.chm
Hack I.T. – Security through Penetration Testing.chm
Hack Proofing ColdFusion – The Only Way to Stop a Hacker Is to Think Like One.pdf
Hack Proofing Linux – Your Guide to Open Source Security.pdf
Hack Proofing Sun Solaris 8 – Protect Your Solaris Network from Attack.pdf
Hack Proofing Windows 2000 Server.pdf
Hack Proofing XML – The Only Way to Stop a Hacker Is to Think Like One.pdf
Hack Proofing Your E-Commerce Site – The Only Way to Stop a Hacker Is to Think Like One.pdf
Hack Proofing Your Identity in the Information Age – Protect Your Family on the Internet!.pdf
Hack Proofing Your Network, 2nd Ed. – The Only Way to Stop a Hacker Is to Think Like One.pdf
Hack Proofing Your Network.pdf
Hack Proofing Your Web Applications – The Only Way to Stop a Hacker Is to Think Like One.pdf
Hack Proofing Your Wireless Network – Protect Your Wireless Network from Attack.pdf
Hack the Stack – Using Snort & Ethereal to Master the 8 Layers of an Insecure Network.pdf
Hacker Debugging Uncovered.chm
Hacker Disassembling Uncovered.chm
Hacker Linux Uncovered.chm
Hacker Web Exploitation Uncovered.chm
Hacker’s Challenge – Test Your Incident Response Skills Using 20 Scenarios.pdf
Hacker’s Delight.chm
Hackers – Heroes of the Computer Revolution.pdf
Hackers Beware – Defending Your Network from the Wiley Hacker.pdf
Hacking – The Art of Exploitation, 2nd Ed..chm
Hacking – The Art of Exploitation.chm
Hacking a Terror Network – The Silent Threat of Covert Channels.pdf
Hacking Exposed, 2nd Ed. – Network Security Secrets & Solutions.pdf
Hacking Exposed-Cisco Networks – Cisco Security Secrets & Solutions.chm
Hacking Exposed-Linux – Linux Security Secrets & Solutions, 3rd Ed..pdf
Hacking Exposed-Linux – Linux Security Secrets & Solutions.pdf
Hacking Exposed-Network Security – Secrets & Solutions, 2nd Ed..pdf
Hacking Exposed-Network Security – Secrets & Solutions, 3rd Ed..pdf
Hacking Exposed-VoIP – Voice Over IP Security Secrets & Solutions.chm
Hacking Exposed-Web 2.0 – Web 2.0 Security Secrets & Solutions.pdf
Hacking Exposed-Web Applications – Web Application Security Secrets & Solutions.pdf
Hacking Exposed-Windows – Windows Security Secrets & Solutions, 3rd Ed..pdf
Hacking Exposed-Wireless – Wireless Security Secrets & Solutions.chm
Hacking for Dummies, 2nd Ed..pdf
Hacking for Dummies.pdf
Hacking the Cable Modem – What Cable Companies Don’t Want You to Know.pdf
Hacking Wireless Networks for Dummies.pdf
HackNotes – Linux & Unix Security Portable Reference.pdf
HackNotes – Network Security Portable Reference.pdf
HackNotes – Web Security Portable Reference.pdf
HackNotes – Windows Security Portable Reference.pdf
Halting the Hacker – A Practical Guide to Computer Security, 2nd Ed..chm
Handbook of Database Security – Applications & Trends.pdf
Handbook of Digital & Multimedia Forensic Evidence.pdf
Handbook of Research on Wireless Security.pdf
Hardening Apache.chm
Hardening Linux.chm
Hardening Linux.pdf
Hardening Network Infrastructure.chm
Hardening Windows Systems.chm
Hardening Windows, 2nd Ed..pdf
Hardening Windows.chm
High-Assurance Design – Architecting Secure & Reliable Enterprise Applications.chm
Home Network Security Simplified.chm
Honeypots – Tracking Hackers.chm
Honeypots for Windows.chm
How to Cheat at Configuring Open Source Security Tools – The Perfect Reference for the Multitasked SysAdmin.pdf
How to Cheat at Deploying & Securing RFID.pdf
How to Cheat at Designing Security for a Windows Server 2003 Network.pdf
How to Cheat at Managing Information Security.pdf
How to Cheat at Securing a Wireless Network.pdf
How to Cheat at Securing Linux – The Perfect Reference for the Multitasked SysAdmin.pdf
How to Cheat at VolP Security.pdf
How to Cheat at Windows System Administration Using Command Line Scripts.pdf
IM Instant Messaging Security.pdf
Implementing Email Security & Tokens – Current Standards, Tools, & Practices.pdf
Implementing NAP & NAC Security Technologies – The Complete Guide to Network Access Control.pdf
Implementing SSH – Strategies for Optimizing the Secure Shell.pdf
Incident Response & Computer Forensics, 2nd Ed..pdf
Incident Response – A Strategic Guide to Handling System & Network Security Breaches.chm
Incident Response – Computer Forensics Toolkit.pdf
Information Security – Principles & Practice.pdf
Information Security Management Handbook, 5th Ed..pdf
Information Security Policies & Actions in Modern Integrated Systems.chm
Information Security Policies & Procedures – A Practitioner’s Reference, 2nd Ed..pdf
Information Technology Security – Advice from Experts.chm
InfoSec Career Hacking – Sell Your Skillz, Not Your Soul.pdf
InfoSecurity 2008 Threat Analysis.pdf
Inside Java 2 Platform Security, 2nd Ed. – Architecture, API Design, & Implementation.chm
Inside Network Perimeter Security, 2nd Ed..chm
Inside the Spam Cartel – Trade Secrets from the Dark Side.chm
Insider Attack & Cyber Security – Beyond the Hacker.pdf
Insider Threat – Protecting the Enterprise from Sabotage, Spying, & Theft.pdf
Internet & Intranet Security Management – Risks & Solutions.pdf
Internet & Intranet Security.chm
Internet Denial of Service – Attack & Defense Mechanisms.chm
Internet Forensics.chm
Internet Security – A Jumpstart for Systems Administrators & IT Managers.chm
Internet Security – Cryptographic Principles, Algorithms, & Protocols.pdf
Introduction to Communication Electronic Warfare Systems.pdf
Introduction to Cryptography – Principles & Applications, 2nd Ed..pdf
Intrusion Detection & Prevention.chm
Intrusion Prevention & Active Response – Deploying Network & Host IPS.pdf
Intrusion Prevention Fundamentals.chm
Investigating Computer-Related Crime – A Handbook for Corporate Investigators.pdf
Investigative Data Mining for Security & Criminal Detection.chm
IPSec – The New Security Standard for the Internet, Intranets, & Virtual Private Networks, 2nd Ed..chm
IPSec VPN Design.chm
IPTV Security – Protecting High-Value Digital Contents.pdf
IT Auditing – Using Controls to Protect Information Assets.chm
IT Security Interviews Exposed – Secrets to Landing Your Next Information Security Job.pdf
J2EE Security for Servlets, EJBs, & Web Services.chm
Jeff Duntemann’s Drive-By Wi-Fi Guide.chm
Juniper Networks Field Guide & Reference.chm
Juniper Networks Secure Access SSL VPN Configuration Guide.pdf
Kismet Hacking.pdf
LAN Switch Security – What Hackers Know About Your Switches.pdf
Linux Firewalls – Attack Detection & Response with iptables, psad, & fwsnort.pdf
Linux Network Security.chm
Linux Security Cookbook.chm
Mac OS X Maximum Security.chm
Mac OS X Security.chm
Mainframe Basics for Security Professionals – Getting Started with RACF.pdf
Malicious Cryptography – Exposing Cryptovirology.pdf
Malware – Fighting Malicious Code.chm
Malware Detection.pdf
Malware Forensics – Investigating & Analyzing Malicious Code.pdf
Managing Cisco Network Security.pdf
Managing Security with Snort & IDS Tools.chm
Mastering FreeBSD & OpenBSD Security.chm
Mastering Network Security.pdf
Mastering Windows Network Forensics & Investigation.chm
Maximum Linux Security, 2nd Ed..pdf
Maximum Security, 4th Ed..chm
Maximum Wireless Security.chm
MCSA-MCSE Implementing & Administering Security in a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-299] .pdf
MCSE Core Elective Exams in a Nutshell – A Desktop Quick Reference.chm
MCSE Designing Security for a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-298] .chm
MCSE Implementing & Administering Security in a Windows 2003 Network Exam Cram 2 [Exam 70-299] .chm
Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research.pdf
Microsoft Encyclopedia of Security.pdf
Microsoft Forefront Security Administration Guide.pdf
Microsoft Log Parser Toolkit.pdf
Microsoft Windows Security Inside Out for Windows XP & Windows 2000.chm
Microsoft Windows Server 2003 PKI & Certificate Security.pdf
Mission Critical! Internet Security.pdf
Mobile & Wireless Network Security & Privacy.pdf
Mobility, Data Mining, & Privacy – Geographic Knowledge Discovery.pdf
Modern Cryptography – Theory & Practice.pdf
MORE Electronic Gadgets for the Evil Genius – 40 New Build-It-Yourself Projects.pdf
Multicast & Group Security.pdf
Multimedia Forensics & Security.pdf
Multimedia Security Technologies for Digital Rights Management.pdf
Nessus Network Auditing, 2nd Ed..pdf
Nessus, Snort, & Ethereal Power Tools – Customizing Open Source Security Applications.pdf
Netcat Power Tools.pdf
Network Administrator Street Smarts – A Real World Guide to CompTIA Network Skills.pdf
Network Intrusion Detection, 3rd Ed..pdf
Network Perimeter Security – Building Defense In-Depth.chm
Network Security – Know It All.pdf
Network Security Assessment – From Vulnerability to Patch.pdf
Network Security Assessment – Know Your Network, 2nd Ed..pdf
Network Security Assessment – Know Your Network.chm
Network Security Bible.pdf
Network Security Hacks – 100 Industrial-Strength Tips & Tools.chm
Network Security Hacks – Tips & Tools for Protecting Your Privacy, 2nd Ed..chm
Network Security Illustrated.pdf
Network Security JumpStart.pdf
Network Security Technologies & Solutions.chm
Network Security Tools – Writing, Hacking, & Modifying Security Tools.chm
Network Security with OpenSSL.pdf
Network Warrior.pdf
Networking with Microsoft Windows Vista – Your Guide to Easy & Secure Windows Vista Networking.pdf
Nmap in the Enterprise – Your Guide to Network Scanning.pdf
No Tech Hacking – A Guide to Social Engineering, Dumpster Diving, & Shoulder Surfing.pdf
Official (ISC)2 Guide to the CISSP Exam.pdf
Online Business Security Systems.pdf
Open Source Fuzzing Tools.pdf
Open Source Security Tools – A Practical Guide to Security Applications.chm
Oracle Security.chm
OS X Exploits & Defense.pdf
OS X for Hackers at Heart – The Apple of Every Hacker’s Eye.pdf
OSSEC Host-Based Intrusion Detection Guide.pdf
PCI Compliance – Understand & Implement Effective PCI Data Security Standard Compliance.pdf
Penetration Tester’s Open Source Toolkit, Vol. 2.pdf
Penetration Tester’s Open Source Toolkit.pdf
Penetration Testing & Network Defense.chm
Perfect Passwords – Selection, Protection, Authentication.pdf
Perl Scripting for Windows Security – Live Response, Forensic Analysis, & Monitoring.pdf
PGP & GPG – Email for the Practical Paranoid.pdf
Phishing – Cutting the Identity Theft Line.pdf
Phishing Exposed.pdf
PHP Oracle Web Development – Data processing, Security, Caching, XML, Web Services, & AJAX.pdf
Physical & Logical Security Convergence – Powered By Enterprise Security Management.pdf
Practical Guide for Implementing Secure Intranets & Extranets.chm
Practical Hacking Techniques & Countermeasures.pdf
Practical Oracle Security – Your Unauthorized Guide to Relational Database Security.pdf
Practical Packet Analysis – Using Wireshark to Solve Real-World Network Problems.pdf
Practical Unix & Internet Security, 3rd Ed..chm
Practical VoIP Security.pdf
Preventing Web Attacks with Apache.chm
Privacy Defended – Protecting Yourself Online.chm
Privacy Preserving Data Mining.pdf
Privacy Protection & Computer Forensics, 2nd Ed..pdf
Privacy, Security, & Trust within the Context of Pervasive Computing.pdf
Probabilistic & Statistical Methods in Cryptology – An Introduction by Selected Topics.pdf
Professional Rootkits.chm
Professional Windows Desktop & Server Hardening.chm
Real 802.11 Security – Wi-Fi Protected Access & 802.11i.chm
Reverse Engineering Code with IDA Pro.pdf
Reverse Engineering of Object Oriented Code.pdf
Reversing – Secrets of Reverse Engineering.pdf
RFID Handbook – Applications, Technology, Security, & Privacy.pdf
RFID Security.pdf
Rootkits – Subverting the Windows Kernel.chm
Rootkits for Dummies.pdf
Router Security Strategies – Securing IP Network Traffic Planes.pdf
RSA Security’s Official Guide to Cryptography.pdf
Sarbanes-Oxley IT Compliance Using COBIT & Open Source Tools.chm
Sarbanes-Oxley IT Compliance Using Open Source Tools, 2nd Ed..pdf
Secrets Stolen, Fortunes Lost – Preventing Intellectual Property Theft & Economic Espionage in the 21st Century.pdf
Secure Coding – Principles & Practices.chm
Secure Communicating Systems – Design, Analysis, & Implementation.pdf
Secure Computer & Network Systems – Modeling, Analysis, & Design.pdf
Secure Data Management in Decentralized Systems.pdf
Secure Programming Cookbook for C & C .chm
Secure Programming with Static Analysis.pdf
Securing & Optimizing Linux – The Hacking Solution.pdf
Securing IM & P2P Applications for the Enterprise.pdf
Securing the Information Infrastructure.pdf
Securing VoIP Networks – Threats, Vulnerabilities, & Countermeasures.pdf
Securing Web Services with WS-Security – Demystifying WS-Security, WS-Policy, SAML, XML Signature, & XML Encryption.chm
Securing Windows Server 2003.chm
Securing Windows Server 2008 – Prevent Attacks from Outside & Inside Your Organization.pdf
Securing Your Business with Cisco ASA & PIX Firewalls.chm
Security & Quality of Service in Ad Hoc Wireless Networks.pdf
Security & Usability – Designing Secure Systems that People Can Use.chm
Security for Microsoft Visual Basic .NET.chm
Security for Wireless Ad Hoc Networks.pdf
Security in Computing, 3rd Ed..chm
Security in Computing, 4th Ed..chm
Security in Distributed, Grid, Mobile, & Pervasive Computing.pdf
Security in Wireless LANs & MANs.pdf
Security Log Management – Identifying Patterns in the Chaos.pdf
Security Power Tools.pdf
Security Technologies for the World Wide Web, 2nd Ed..pdf
Security Warrior.chm
Security Study Guide, 2nd Ed. [SYO-101] .pdf
Security, Privacy, & Trust in Modern Data Management.pdf
Self-Defending Networks – The Next Generation of Network Security.pdf
SELinux – NSA’s Open Source Security Enhanced Linux.chm
SELinux by Example – Using Security Enhanced Linux.chm
Shellcoder’s Programming Uncovered.chm
Simple Computer Security – Disinfect Your PC.pdf
Snort 2.1 Intrusion Detection, 2nd Ed..pdf
Snort Cookbook.chm
Snort IDS & IPS Toolkit.pdf
Sockets, Shellcode, Porting, & Coding – Reverse Engineering Exploits & Tool Coding for Security Professionals.pdf
Software Piracy Exposed.pdf
Special Ops – Host & Network Security for Microsoft, UNIX, & Oracle.pdf
SSH, The Secure Shell – The Definitive Guide.pdf
SSL & TLS Essentials – Securing the Web.pdf
SSL Remote Access VPNs.pdf
Static & Dynamic Reverse Engineering Techniques for Java Software Systems.pdf
Static & Dynamic Reverse Engineering Techniques for Java Software Sytems.pdf
Steal This Computer Book 3 – What They Won’t Tell You About the Internet.chm
Stealing the Network – How to Own a Continent.chm
Stealing the Network – How to Own a Shadow.pdf
Stealing the Network – How to Own an Identity.pdf
Stealing the Network – How to Own the Box.pdf
Strategic Information Security.chm
Surveillance & Security – Technological Politics & Power in Everyday Life.pdf
Syngress Force Emerging Threat Analysis – From Mischief to Malicious.pdf
Tangled Web – Tales of Digital Crime from the Shadows of Cyberspace.pdf
The Apache Modules Book – Application Development with Apache.pdf
The Art of Computer Virus Research & Defense.chm
The Art of Deception – Controlling the Human Element of Security.pdf
The Art of Intrusion – The Real Stories Behind the Exploits of Hackers, Intruders, & Deceivers.pdf
The Art of Software Security Assessment – Identifying & Preventing Software Vulnerabilities.chm
The Best Damn Firewall Book Period, 2nd Ed..pdf
The Best Damn Firewall Book Period.pdf
The Best Damn IT Security Management Book Period.pdf
The Book of PF – A No-Nonsense Guide to the OpenBSD Firewall.pdf
The Business Case for Network Security – Advocacy, Governance, & ROI.chm
The CISSP & CAP Prep Guide – Platinum Ed..chm
The CISSP Prep Guide – Gold Ed..pdf
The CISSP Prep Guide – Mastering the Ten Domains of Computer Security.pdf
The Complete Idiot’s Guide to Protecting Yourself Online.pdf
The Craft of System Security.chm
The Database Hacker’s Handbook – Defending Database Servers.chm
The Ethical Hack – A Framework for Business Value Penetration Testing.pdf
The Giant Black Book of Computer Viruses.pdf
The International Handbook of Computer Security.pdf
The IT Regulatory & Standards Compliance Handbook – How to Survive an Information Systems Audit & Assessments.pdf
The Naked Employee – How Technology Is Compromising Workplace Privacy.chm
The Official CHFI Study Guide for Computer Hacking Forensics Investigators [Exam 312-49] .pdf
The Oracle Hacker’s Handbook – Hacking & Defending Oracle.chm
The Shellcoder’s Handbook – Discovering & Exploiting Security Holes.chm
The Tao of Network Security Monitoring – Beyond Intrusion Detection.chm
The Web Application Hacker’s Handbook – Discovering & Exploiting Security Flaws.pdf
Understanding Forensic Digital Imaging.pdf
UNIX & Linux Forensic Analysis DVD Toolkit.pdf
Virtual Honeypots – From Botnet Tracking to Intrusion Detection.chm
WAP, Bluetooth, & 3G Programming – Cracking the Code.pdf
Wardriving & Wireless Penetration Testing.pdf
WarDriving-Drive, Detect, Defend – A Guide to Wireless Security.chm
Web Application Vulnerabilities – Detect, Exploit, Prevent.pdf
Web Hacking – Attacks & Defense.chm
Web Security & Commerce.pdf
Web Security, Privacy, & Commerce, 2nd Ed..chm
Web Services Security & E-Business.pdf
Web Services Security.chm
Webster’s New World Hacker Dictionary.pdf
Wi-Foo – The Secrets of Wireless Hacking.chm
Windows Forensic Analysis.pdf
Windows Forensics & Incident Recovery.chm
Windows Server 2003 Security Guide.pdf
Windows Server 2008 Networking & Network Access Protection (NAP).pdf
Windows Server 2008 Security Resource Kit.pdf
Windows Vista Security – Securing Vista Against Malicious Attacks.chm
Windows XP Hacks & Mods For Dummies.pdf
Wireless Network Hacks & Mods for Dummies.pdf
Wireless Operational Security.chm
Wireless Personal Area Networks – Performance, Interconnection, & Security with IEEE 802.15.4.pdf
Wireless Security Handbook.pdf
Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf
Writing Secure Code for Windows Vista.chm
Writing Secure Code, 2nd Ed..chm
Writing Secure Code.pdf
Writing Security Tools & Exploits.pdf
XSS Attacks – Cross Site Scripting Exploits & Defense.pdf
Zero-Day Exploit – Countdown to Darkness.pdf
Giáo trình học thiết kế website SSDG
http://up.4share.vn/f/5765606766626263/Giao Trinh Thiet Ke Web SSDG.iso.file
1 Số Ebook Về Lập TrìnhDownload :

1 . http://www.mediafire.com/download.php?76gl52i4bncsxee
2 . http://www.mediafire.com/download.php?b89d689wapxc33b
Dùng Soft Này Để Nối Lại :

http://www.freebytesoftware.com/download/hjsplit.zip
loading update