tag:blogger.com,1999:blog-28727857136935440812024-03-14T12:26:43.754+07:00Digital Library™Collection All E-Book Free Acces And Downloadwahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.comBlogger68125tag:blogger.com,1999:blog-2872785713693544081.post-49059750462425152782012-06-18T17:07:00.001+07:002012-06-18T17:07:45.517+07:00Mechanical Engineering Design<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://adf.ly/9p4DL" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a>
<br />
<br />
<a name='more'></a><br /><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://dc494.4shared.com/img/0cLjBges/Mechanical_Engineering_Design.pdf" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://dc494.4shared.com/img/0cLjBges/Mechanical_Engineering_Design.pdf" /></a></div>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><br /></a></div>
<br /></div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-76613219790067962972012-03-11T09:20:00.000+07:002012-03-11T09:20:04.488+07:00Hydrophilic Interaction Liquid Chromatography (HILIC) and Advanced Applications<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="background-color: white;">
<span style="color: #0a1414; display: inline ! important; float: none; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">C R C | 2011 | ISBN: 1439807531 | 610 pages | File type: PDF | 12,7MB</span></div>
<div style="background-color: white;">
<span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: #f2f7f7; color: #666666; display: inline !important; float: none; font-family: Arial; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">Author:</span></div>
<div style="background-color: white;">
<span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: #f2f7f7; color: #0a1414; display: inline !important; float: none; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">Perry G. Wang and Weixuan He</span><span style="background-color: #f2f7f7; color: #666666; display: inline ! important; float: none; font-family: Arial; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"> </span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div style="text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<a href="http://adf.ly/6BQ4A" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a name='more'></a><br />
<div style="background-color: white;">
<span style="color: #0a1414; display: inline ! important; float: none; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">Hydrophilic Interaction Liquid Chromatography (HILIC) and Advanced Applications</span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://ebook3000.com/upimg/201105/03/13470635.jpeg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="http://ebook3000.com/upimg/201105/03/13470635.jpeg" width="132" /></a></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<br /></div>
<div style="background-color: white;">
<span style="color: #0a1414; display: inline ! important; float: none; font-family: Arial; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 19px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">This is the first book that comprehensively and systematically describes the new technology of hydrophilic interaction liquid chromatography (HILIC). Hydrophilic interaction chromatography is a separation technique suitable for polar and hydrophilic compounds and orthogonal to reversed phase liquid chromatography. From small organic molecules to proteins, the text explores the many applications of HILIC in the analytical field. Winner of the President's Award for Excellence, the author explains how HILIC can significantly improve analytical throughput by shortening sample preparation procedure, which is one of the bottlenecks for drug discovery and development in the pharmaceutical industry.</span></div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-62876962462087820782012-01-19T17:27:00.000+07:002012-01-19T17:27:42.011+07:00Windows® Command Line Administration Instant Reference<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="background-color: #cfe2f3; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Year : 2010] </span></span><span class="Apple-style-span" style="background-color: #cfe2f3; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Size : 5.02 MB] [Format :</span><span style="color: red;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"> </span></span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">PDF</span></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">] [Pages : 578]</span></span>
<br />
<span class="Apple-style-span" style="background-color: #cfe2f3; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Author</span></span><br />
<span class="Apple-style-span" style="background-color: #cfe2f3; font-size: 15px; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">John Paul Mueller</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4qsQx" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a name='more'></a><b style="background-color: #cfe2f3; font-family: Arial, Helvetica, sans-serif; font-size: 15px; line-height: 18px;">Windows® Command Line Administration Instant Reference</b><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJBnNTdRtzgGzToUpCyHNwdA0dQk8ftUuGG3ey42NUZmDHxzBdRdQ_nKDp0cuXpOUwBBAcPZzZt5SQeri94oWCGkLnyyL6I6rI5_4VnTIGIqDgBHAE6Ec0Kh2bge5HWtZVqpfzndRbFqk/s1600/SFEBC00598+Windows%25C2%25AE+Command+Line+Administration+Instant+Reference.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJBnNTdRtzgGzToUpCyHNwdA0dQk8ftUuGG3ey42NUZmDHxzBdRdQ_nKDp0cuXpOUwBBAcPZzZt5SQeri94oWCGkLnyyL6I6rI5_4VnTIGIqDgBHAE6Ec0Kh2bge5HWtZVqpfzndRbFqk/s1600/SFEBC00598+Windows%25C2%25AE+Command+Line+Administration+Instant+Reference.jpg" /></a></div>
<span class="Apple-style-span" style="background-color: #cfe2f3; font-size: 15px; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span><br />
<span class="Apple-style-span" style="background-color: #cfe2f3; font-size: 15px; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;"><b>Line of Contents</b></span></span><br />
<ul style="text-align: left;">
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 1: Configuring the Local Machine</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 2: Making Remote Connections</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 3: Automating Tasks</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 4: Working with File and Directory Objects</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 5: Administering File and Directory Content</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 6: Managing the Hard Drive</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 7: Securing the Data</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 8: Managing the Network</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 9: Working with TCP/IP</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 10: Creating System Connections</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 11: Configuring Directory Services</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 12: Working with Directory Objects</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 13: Monitoring System Events</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 14: Monitoring System Performance</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 15: Performing Basic Maintenance</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 16: Managing System Users</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 17: Securing the System</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 18: Interacting with the Registry</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 19: Changing the Batch File Environment</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 20: Working at the Command Prompt</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 21: Creating and Testing Batch Files</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;">Chapter 22: Discovering Scripting Basics</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;">Chapter 23: Using the Scripting Objects</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;">Chapter 24: Creating Advanced Scripting Examples</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Appendix A: Alphabetical Command List</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Appendix B: Topical Command List </span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Appendix C: Listing of Best Practices</span></li>
</ul>
<div style="background-color: Transparant; border: 2px solid blue; color: black; font-size: 9pt; height: 300px; overflow: auto; width: 535px;">
<div style="color: black;">
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0077499867&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0123744938&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=032478645X&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0789736136&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>
</div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-17307506438811910832012-01-19T10:40:00.001+07:002012-01-19T11:32:30.501+07:00Wireless Programming with J2ME™<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white;"><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Year : 2002] </span></span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Size : 2.79 MB] [Format :</span><span style="color: red;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"> </span></span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">PDF</span></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">] [Pages : 410]</span></span>
</span><br />
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif;">Authors</span></span><br />
<span class="Apple-style-span" style="background-color: white; font-size: 15px; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Dreamtech Software Team</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4qV8E" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a name='more'></a><b style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 15px; line-height: 18px;">Wireless Programming with J2ME™</b><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvPcnC5moEUWOC5fnleLZV50kXy8E5EpYcgqftm1C6EfRPj5t5PJjzCoRgip8R6oGQD-N2nKw2vIuLnFTzTNvRXfKnWKOPspZyLvmTULjdWoMgl5SHSmxelukbycQDoTG-vKErXOnUNG4/s1600/SFEBC00597+Wireless+Programming+with+J2ME%25E2%2584%25A2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvPcnC5moEUWOC5fnleLZV50kXy8E5EpYcgqftm1C6EfRPj5t5PJjzCoRgip8R6oGQD-N2nKw2vIuLnFTzTNvRXfKnWKOPspZyLvmTULjdWoMgl5SHSmxelukbycQDoTG-vKErXOnUNG4/s1600/SFEBC00597+Wireless+Programming+with+J2ME%25E2%2584%25A2.jpg" /></a></div>
<span class="Apple-style-span" style="background-color: white; font-size: 15px; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span><br />
<span class="Apple-style-span" style="background-color: white; font-size: 15px; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;"><b>Line of Contents</b></span></span><br />
<br />
<ul style="text-align: left;">
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 1: An Overview of J2ME</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 2: Programming Techniques for J2ME</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 3: CLDC API and Reference Implementation</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 4: MIDP-MIDlet Implementation with Case Studies</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 5: Handling and Parsing XML in J2ME</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 6: Project 1: Online Testing Engine</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 7: Project 2: Online Ordering System</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 8: Project 3: MP3 Player for Pocket PC</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 9: Project 4 : Peer-to-Peer Search Application</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 10: Project 5: Mobile Web Services</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 11: Project 6: Target Practice Game</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Chapter 12: Converting J2SE Applications to J2ME</span></span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 15px; line-height: 18px;">Appendix A: About the CD-ROM</span></span></li>
</ul>
<div style="background-color: Transparant; border: 2px solid blue; color: black; font-size: 9pt; height: 300px; overflow: auto; width: 535px;">
<div style="color: black;">
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0077499867&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0123744938&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=032478645X&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0789736136&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>
</div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-45260112447233682002012-01-18T23:20:00.001+07:002012-01-18T23:20:59.869+07:00Botnets The Killer WEB App<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Year : 2005] </span></span><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Size : 3.12 MB] [Format :</span><span style="color: red;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"> </span></span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">PDF</span></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">] [Pages : 412]</span></span></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Authors</span></span></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"></span></span></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Craig A. Schiller<br />
Jim Binkley<br />
David Harley<br />
Gadi Evron<br />
Tony Bradley<br />
Carsten Willems<br />
Michael Cross<br />
</span></span></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4plnN" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a name='more'></a><br />
</span></span></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><b>Botnets The Killer WEB App</b></span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9w2pGM4TiArY1OR53FYgixw5svW_R4sZ-xgWfrR6-ecEvjd9eU5SZCJELXD7msdx_g7nXxInd2B6Qp1Dlwbn2cW8fzPJ2WrQRElcoZ_-8dqDy2e0iCn0W1N4N2RmDNQqbOXuKgJNhisw/s1600/SFEBC00596+Botnets+T+he++K+iller+W+E+B+A+pp.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9w2pGM4TiArY1OR53FYgixw5svW_R4sZ-xgWfrR6-ecEvjd9eU5SZCJELXD7msdx_g7nXxInd2B6Qp1Dlwbn2cW8fzPJ2WrQRElcoZ_-8dqDy2e0iCn0W1N4N2RmDNQqbOXuKgJNhisw/s1600/SFEBC00596+Botnets+T+he++K+iller+W+E+B+A+pp.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><b><br /></b></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><b>Line of Contents</b></span></span><br />
<ul style="text-align: left;">
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 1 Botnets: A Call to Action</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 2 Botnets Overview</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 3 Alternative Botnet C&Cs</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 4 Common Botnets</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 5 Botnet Detection: Tools and Techniques</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 6 Ourmon: Overview and Installation</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 7 Ourmon: Anomaly Detection Tools</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 8 IRC and Botnets</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 9 Advanced Ourmon Techniques</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 10 Using Sandbox Tools for Botnets</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 11 Intelligence Resources</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 12 Responding to Botnets</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Appendix A: FSTC Phishing Solutions Categories</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="line-height: 15px;">Index</span></span></li>
</ul>
<div style="background-color: Transparant; border: 2px solid blue; color: black; font-size: 9pt; height: 300px; overflow: auto; width: 535px;">
<div style="color: black;">
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0077499867&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0123744938&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=032478645X&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0789736136&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>
</div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-91692419695991504172012-01-18T11:07:00.000+07:002012-01-18T11:07:53.127+07:00DATA STRUCTURES AND ALGORITHMS USING VISUAL BASIC.NET<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Year : 2005] </span></span><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Size : 1.69 MB] [Format :</span><span style="color: red;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"> </span></span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">PDF</span></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">] [Pages : 412]</span></span></span></span></div>
<div style="text-align: justify;">
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Author</span></span></span></span></div>
<div style="text-align: justify;">
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">MICHAEL MCMILLAN</span></span></div>
<div class="separator" style="clear: both; text-align: justify;">
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><a href="http://adf.ly/4om8H" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></span></div>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><a name='more'></a></span><br />
<div style="text-align: justify;">
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">DATA STRUCTURES AND ALGORITHMS USING VISUAL BASIC.NET</span></span></div>
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDr2XvcuwZAlAKGSKT_e1aIAjOcoZy0mBwqjoIpywh-2mVOaRLixQCDUbp-wGI7K8betKyFM1OSb6P1BH5o_TEOxnHN3tpqKW_GUL0HOtyE9bigxkHY2fev4MAxbvaLIvL1-7_xPS4RP0/s1600/SFEBC00595+DATA+STRUCTURES+AND+ALGORITHMS+USING+VISUAL+BASIC.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDr2XvcuwZAlAKGSKT_e1aIAjOcoZy0mBwqjoIpywh-2mVOaRLixQCDUbp-wGI7K8betKyFM1OSb6P1BH5o_TEOxnHN3tpqKW_GUL0HOtyE9bigxkHY2fev4MAxbvaLIvL1-7_xPS4RP0/s1600/SFEBC00595+DATA+STRUCTURES+AND+ALGORITHMS+USING+VISUAL+BASIC.jpg" /></span></a></div>
<div style="text-align: justify;">
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div style="text-align: justify;">
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Line of Contents</span></span></div>
<ul style="text-align: left;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;">
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Preface </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Introduction </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 1 Collections </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 2 Arrays and ArrayLists</span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 3 Basic Sorting Algorithms</span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 4 Basic Searching Algorithms</span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 5 Stacks and Queues 99</span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 6 The BitArray Class </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 7 Strings, the String Class, and the StringBuilder Class </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 8 Pattern Matching and Text Processing </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 9 Building Dictionaries: The DictionaryBase Class and the SortedList Class </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 10 Hashing and the HashTable Class </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 11 Linked Lists </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 12 Binary Trees and Binary Search Trees</span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 13 Sets </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 14 Advanced Sorting Algorithms </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 15 Advanced Data Structures and Algorithms for Searching </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 16 Graphs and Graph Algorithms </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Chapter 17 Advanced Algorithms </span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">References</span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;">Index </span></li>
</span></ul>
<div style="background-color: Transparant; border: 2px solid blue; color: black; font-size: 9pt; height: 300px; overflow: auto; width: 535px;">
<div style="color: black;">
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0077499867&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0123744938&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=032478645X&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0789736136&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>
</div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-48978527106613717332012-01-18T02:21:00.001+07:002012-01-18T02:21:17.662+07:00KUMPULAN EBOOK TENTANG PERNIKAHAN<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: center;">
<b>KUMPULAN EBOOK TENTANG PERNIKAHAN</b></div>
<div style="text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibcMKNHzlRWkTjsSA4oUNeRuT403SdtyXV0FXGmbrt1e6-j6cBbRMiNPc0LCn6xJ0YgznXwbZa9qwHbnyIrlol08omTy7rf1zW8Dj4kcYqpkn1m-Jp95_1Vribie_vqhD7tFof8nxPayk/s1600/1-2gb.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="281" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibcMKNHzlRWkTjsSA4oUNeRuT403SdtyXV0FXGmbrt1e6-j6cBbRMiNPc0LCn6xJ0YgznXwbZa9qwHbnyIrlol08omTy7rf1zW8Dj4kcYqpkn1m-Jp95_1Vribie_vqhD7tFof8nxPayk/s320/1-2gb.jpg" width="320" /></a></div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibcMKNHzlRWkTjsSA4oUNeRuT403SdtyXV0FXGmbrt1e6-j6cBbRMiNPc0LCn6xJ0YgznXwbZa9qwHbnyIrlol08omTy7rf1zW8Dj4kcYqpkn1m-Jp95_1Vribie_vqhD7tFof8nxPayk/s1600/1-2gb.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><a name='more'></a></a><br />
<b>Isi Koleksi</b><br />
<br />
<ul style="text-align: left;">
<li>10 Msm Ktb Tentang Nikah</li>
<li>Bid'ah dalam Pernikahan</li>
<li>Cincin Pernikahan Dalam Islam</li>
<li>Fiqih Nikah</li>
<li>Hamil Di Luar Nikah</li>
<li>Mengapa Nikah Di Masjid & Melamar Secara Sunnah</li>
<li>Pendidikan Anak Islami</li>
<li>Pinangan - Adab Pernikahan Islami</li>
</ul>
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4oJRy" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<div>
<br /></div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-17496531426703012652012-01-17T00:36:00.001+07:002012-01-17T07:24:59.777+07:00Hacking The Next Generation<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Year : 2009] </span></span><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Size : 8.61 MB] [Format :</span><span style="color: red;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"> </span></span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">PDF</span></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">] [Pages : 298]</span></span></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Authors</span></span></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Nitesh Dhanjani, Billy Rios, and Brett Hardin</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4mYAK" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a><br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a><br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a><br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a><br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><a name='more'></a></a><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><b>Hacking The Next Generation</b></span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaVQ-jDsjMyLe-P6bhKvVkz2AxYEUlfgjiwVdMn6mLYGO9pH9B31-RaZIuk2s_ccugtFt9sG9O24wb84Uzfx3YD6ZMowOhx6t4SOs66nJnF-AES-__YrfPGLnvfN06wZB5tXpOXhTtiok/s1600/SFEBC00594+Hacking+The+Next+Generation.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaVQ-jDsjMyLe-P6bhKvVkz2AxYEUlfgjiwVdMn6mLYGO9pH9B31-RaZIuk2s_ccugtFt9sG9O24wb84Uzfx3YD6ZMowOhx6t4SOs66nJnF-AES-__YrfPGLnvfN06wZB5tXpOXhTtiok/s1600/SFEBC00594+Hacking+The+Next+Generation.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><b><br /></b></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><b>Line of Contents</b></span></span><br />
<ul style="text-align: left;">
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Intelligence Gathering: Peering Through the Windows to Your Organization</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Inside-Out Attacks: The Attacker Is the Insider</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">The Way It Works: There Is No Patch</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Blended Threats: When Applications Exploit Each Other</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Cloud Insecurity: Sharing the Cloud with Your Enemy</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Abusing Mobile Devices: Targeting Your Mobile Workforce</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Infiltrating the Phishing Underground: Learning from Online Criminals?</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Influencing Your Victims: Do What We Tell You, Please</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Hacking Executives: Can Your CEO Spot a Targeted Attack?</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Case Studies: Different Perspectives</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Chapter 2 Source Code Samples</span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Cache_Snoop.pl</span></span></b></li>
</ul>
<div style="background-color: Transparant; border: 2px solid blue; color: black; font-size: 9pt; height: 275px; overflow: auto; width: 535px;">
<div style="color: black;">
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=B0055D66V4&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=a
mazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=B0045FM6SU&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=a
mazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=B005CQ0RTQ&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=
amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=B004U78J1G&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=a
mazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>
</div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-90496168854318168842012-01-16T15:17:00.001+07:002012-01-17T07:39:52.709+07:00RESPIRATORY PHYSIOLOGY Ninth Edition<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Year : 2012] </span></span><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">[Size : 9.18 MB] [Format :</span><span style="color: red;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"> </span></span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">PDF</span></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">] [Pages : 210]</span></span></span></span><br />
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Author</span></span></span></span><br />
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">John B. West, M.D., Ph.D., D.Sc.</span></span><br />
<br />
<a name='more'></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; line-height: 18px;"><b>RESPIRATORY PHYSIOLOGY Ninth Edition</b></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGNd4vsX_I2JRLNFOqTDpGTaAq1-x_btiXrgIdpkhhb2KqEz5D8XGTbY2dvHiM4nSu38s0H23QEGCEGwkufFiB5jdhyuDC27eU0MB4ae9alVFNNNmLbiuKPDjQx1sfkgLCu_RlfQv4xPw/s1600/SFEBC00593+RESPIRATORY+PHYSIOLOGY+Ninth+Edition.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGNd4vsX_I2JRLNFOqTDpGTaAq1-x_btiXrgIdpkhhb2KqEz5D8XGTbY2dvHiM4nSu38s0H23QEGCEGwkufFiB5jdhyuDC27eU0MB4ae9alVFNNNmLbiuKPDjQx1sfkgLCu_RlfQv4xPw/s1600/SFEBC00593+RESPIRATORY+PHYSIOLOGY+Ninth+Edition.jpg" /></span></a></div>
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span><br />
<span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b>Line of Contents</b></span></span><br />
<ul style="text-align: left;">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">
</span></span>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Chapter 1 Structure and Function—How the Architecture of the Lung Subserves its Function </span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Chapter 2 Ventilation—How Gas Gets to the Alveoli </span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Chapter 3 Diffusion—How Gas Gets Across the Blood-Gas Barrier</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Chapter 4 Blood Flow and Metabolism—How the Pulmonary</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Circulation Removes Gas from the Lung and Alters Some Metabolites</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Chapter 5 Ventilation-Perfusion Relationships—How Matching of Gas and Blood Determines Gas Exchange</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Chapter 6 Gas Transport by the Blood—How Gases are Moved to and from the Peripheral Tissues</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Chapter 7 Mechanics of Breathing—How the Lung is Supported and Moved</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Chapter 8 Control of Ventilation—How Gas Exchange is Regulated</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Chapter 9 Respiratory System Under Stress—How Gas Exchange is Accomplished During Exercise, at Low and High Pressures, and at Birth</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Chapter 10 Tests of Pulmonary Function—How Respiratory Physiology is Applied to Measure Lung Function</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Appendix A—Symbols, Units, and Equations</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Appendix B—Answers</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Figure Credits</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Index<br /><br />Download Link</span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><a href="http://adf.ly/4lpdc" target="_blank"><span class="Apple-style-span" style="color: red;">Oron</span></a><span class="Apple-style-span" style="color: red;"> </span></span></span></li>
<li style="text-align: justify;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="color: red;"><span class="Apple-style-span" style="color: black;"><a href="http://adf.ly/4lqGg" target="_blank"><span class="Apple-style-span" style="color: red;">Hotfile</span></a></span></span></span></span></li>
</span></ul>
<div style="background-color: Transparant; border: 2px solid blue; color: black; font-size: 9pt; height: 300px; overflow: auto; width: 535px;">
<div style="color: black;">
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0071763724&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=1153782804&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0471269115&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=1572225386&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>
</div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-69630205545577601652012-01-16T08:31:00.001+07:002012-01-17T07:32:27.949+07:00CEH Certified Ethical Hacker Study Guide<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 20px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">[Year : 2010] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">[Size : 6.67 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 439]</span></span></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 20px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">Author</span></span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">Kimberly Graves</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">CEH Certified Ethical Hacker Study Guide</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><a name='more'></a></span></span><br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<b>CEH Certified Ethical Hacker Study Guide</b><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH2LD8aFhc9sjvgBk5u0_VZiInxSPdp_W2PZQpda0qVvAK4K07sNQBGiTJ7YkWNYVNBsBt-VM7qk_PzHh_meglGpX1RjJ0WLPgK2qcafackJku-4VKRZuM5fvuNzQ_ssH4H09wMAsSgj4/s1600/SFEBC00592+CEH+Certified+Ethical+Hacker+Study+Guide.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH2LD8aFhc9sjvgBk5u0_VZiInxSPdp_W2PZQpda0qVvAK4K07sNQBGiTJ7YkWNYVNBsBt-VM7qk_PzHh_meglGpX1RjJ0WLPgK2qcafackJku-4VKRZuM5fvuNzQ_ssH4H09wMAsSgj4/s1600/SFEBC00592+CEH+Certified+Ethical+Hacker+Study+Guide.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><br /></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><b>Line of Contents</b></span></span><br />
<ul style="text-align: left;">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;">
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality </span></span></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-weight: normal;">Chapter 2 Gathering Target Information: Reconnaissance,Footprinting, and Social Engineering</span> </span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-weight: normal;">Chapter 3 Gathering Network and Host Information: Scanning and Enumeration</span> </span></span></b></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Chapter 4 System Hacking: Password Cracking, Escalating</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Privileges, and Hiding Files </span></span></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-weight: normal;">Chapter 5 Trojans, Backdoors, Viruses, and Worms</span> </span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-weight: normal;">Chapter 6 Gathering Data from Networks: Sniffers</span> </span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-weight: normal;">Chapter 7 Denial of Service and Session Hijacking</span> </span></span></b></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Chapter 8 Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques </span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Chapter 9 Attacking Applications: SQL Injection and Buffer Overflows</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Chapter 10 Wireless Network Hacking</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Chapter 11 Physical Site Security</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Chapter 12 Hacking Linux Systems</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Chapter 13 Bypassing Network Security: Evading IDSs, Honeypots and Firewalls</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Chapter 14 Cryptography</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Chapter 15 Performing a Penetration Test</span></span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Appendix About the Companion CD </span></span></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-weight: normal;">Glossary</span> </span></span></b></li>
<li><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="font-weight: normal;">Index</span><br /><br />Download Link</span></span></b></li>
<li><a href="http://adf.ly/4lS8z" target="_blank"><span class="Apple-style-span" style="color: red;"><b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: small;">Oron</span></span></b></span></a></li>
</span></ul>
<br />
<br />
<div style="background-color: Transparant; border: 2px solid blue; color: black; font-size: 9pt; height: 275px; overflow: auto; width: 530px;">
<div style="color: black;">
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=B005HRZ3N0&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=B005HRZ29K&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=B002FBQTF2&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=B000EB7WGA&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>
</div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-23555593651995446362012-01-16T07:53:00.001+07:002012-01-17T07:53:11.095+07:00The Hacker’s Handbook The Strategy behind Breaking into and Defending Networks<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">[Year : 2004] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">[Size : 18.0 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 849]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">Authors</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">SUSAN YOUNG AND DAVE AITEL</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><a name='more'></a></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><b>The Hacker’s Handbook The Strategy behind Breaking into and Defending Networks</b></span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEo6HE5DTXPvEoKFXW63etLX2PwnDMgbH5q3iE6J8cCP1h5Zetx5t4iNkUNFtBLaWLaDwjeiWAyvNgfJEBW_UOsS72QU6icDBEkRzFRy7_IH0NC64ZNhrqTfVrd3CqB_93sVr0KgHxBm4/s1600/SFEBC00591+The+Hacker%25E2%2580%2599s+Handbook+The+Strategy+behind+Breaking+into+and+Defending+Networks.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEo6HE5DTXPvEoKFXW63etLX2PwnDMgbH5q3iE6J8cCP1h5Zetx5t4iNkUNFtBLaWLaDwjeiWAyvNgfJEBW_UOsS72QU6icDBEkRzFRy7_IH0NC64ZNhrqTfVrd3CqB_93sVr0KgHxBm4/s1600/SFEBC00591+The+Hacker%25E2%2580%2599s+Handbook+The+Strategy+behind+Breaking+into+and+Defending+Networks.jpg" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><br /></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><b>Line of Contents</b></span></span><br />
<br />
<ul style="text-align: left;">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;">
<li>1 Introduction: The Chess Game</li>
<li>Book Structure</li>
<li>Chapter 2. Case Study in Subversion</li>
<li>Chapter 3. Know Your Opponent</li>
<li>Chapter 4. Anatomy of an Attack</li>
<li>Chapter 5. Your Defensive Arsenal</li>
<li>Chapter 6. Programming</li>
<li>Chapter 7. IP and Layer 2 Protocols</li>
<li>Chapter 8. The Protocols</li>
<li>Chapter 9. Domain Name System (DNS)</li>
<li>Chapter 10. Directory Services</li>
<li>Chapter 11. Simple Mail Transfer Protocol (SMTP)</li>
<li>Chapter 12. Hypertext Transfer Protocol (HTTP)</li>
<li>Chapter 13. Database Hacking</li>
<li>Chapter 14. Malware and Viruses</li>
<li>Chapter 15. Network Hardware</li>
<li>Chapter 16. Consolidating Gains</li>
<li>Chapter 17. After the Fall</li>
<li>Chapter 18. Conclusion</li>
<li>PART I FOUNDATION MATERIAL</li>
<li>2 Case Study in Subversion</li>
<li>Dalmedica</li>
<li>The Dilemma</li>
<li>The Investigation</li>
<li>Notes</li>
<li>3 Know Your Opponent</li>
<li>Terminology</li>
<li>Script Kiddy</li>
<li>Cracker</li>
<li>White Hat Hacker</li>
<li>Black Hat Hacker</li>
<li>Hacktivism</li>
<li>Professional Attackers</li>
<li>History</li>
<li>Computer Industry and Campus</li>
<li>System Administration</li>
<li>Home Computers</li>
<li>Home Computers: Commercial Software</li>
<li>Home Computers: The BBS</li>
<li>Phone Systems</li>
<li>Ethics and Full Disclosure</li>
<li>Opponents Inside</li>
<li>The Hostile Insider</li>
<li>Corporate Politics</li>
<li>Conclusion</li>
<li>Notes</li>
<li>4 Anatomy of an Attack</li>
<li>Overview</li>
<li>Reconnaissance</li>
<li>Social Engineering and Site Reconnaissance</li>
<li>Internet Reconnaissance</li>
<li>Internet Search Engines and Usenet Tools</li>
<li>Financial Search Tools, Directories, Yellow Pages,</li>
<li>and Other Sources</li>
<li>IP and Network Reconnaissance</li>
<li>Registrar and whois Searches</li>
<li>Network Registrar Searches (ARIN)</li>
<li>DNS Reconnaissance</li>
<li>Mapping Targets</li>
<li>War Dialing</li>
<li>Network Mapping (ICMP)</li>
<li>ICMP Queries</li>
<li>TCP Pings: An Alternative to ICMP</li>
<li>Traceroute</li>
<li>Additional Network Mapping Tools</li>
<li>Port Scanning</li>
<li>TCP and UDP Scanning</li>
<li>Banner Grabbing</li>
<li>Packet Fragmentation Options</li>
<li>Decoy Scanning Capabilities</li>
<li>Ident Scanning</li>
<li>FTP Bounce Scanning</li>
<li>Source Port Scanning</li>
<li>Stack Fingerprinting Techniques</li>
<li>Vulnerability Scanning (Network-Based OS</li>
<li>and Application Interrogation)</li>
<li>Researching and Probing Vulnerabilities</li>
<li>System/Network Penetration</li>
<li>Account (Password) Cracking</li>
<li>Application Attacks</li>
<li>Cache Exploits</li>
<li>File System Hacking</li>
<li>Hostile and Self-Replicating Code</li>
<li>Programming Tactics</li>
<li>Process Manipulation</li>
<li>Shell Hacking</li>
<li>Session Hijacking</li>
<li>Spoofing</li>
<li>State-Based Attacks</li>
<li>Traffic Capture (Sniffing)</li>
<li>Trust Relationship Exploitation</li>
<li>Denial-of-Service</li>
<li>Consolidation</li>
<li>Security</li>
<li>Notes</li>
<li>References</li>
<li>Texts</li>
<li>Web References</li>
<li>5 Your Defensive Arsenal</li>
<li>The Defensive Arsenal</li>
<li>Access Controls</li>
<li>Network Access Controls (Firewalls)</li>
<li>State Management Attacks on Firewalls</li>
<li>Firewall Ruleset and Packet Filter Reconnaissance</li>
<li>IP Spoofing to Circumvent Network Access Controls</li>
<li>Denial-of-Service</li>
<li>Packet Fragmentation Attacks</li>
<li>Application Level Attacks</li>
<li>System Access Controls</li>
<li>Host-Based Firewalls</li>
<li>Operating System Access Controls</li>
<li>and Privilege Management</li>
<li>Authentication</li>
<li>IP Authentication</li>
<li>Password Authentication</li>
<li>Account/Password Cracking</li>
<li>Eavesdropping Attacks</li>
<li>Password Guessing Attacks</li>
<li>Token-Based Authentication</li>
<li>Session Authentication</li>
<li>Session Authentication Scheme Cracking</li>
<li>Generation of Counterfeit Session Auth Credentials</li>
<li>Session ID Brute-Forcing</li>
<li>Session Auth Eavesdropping</li>
<li>Session Auth/ID Stealing or “Hijacking”</li>
<li>Client Session/ID Theft</li>
<li>Cryptographic (Key-Based) Authentication</li>
<li>Key Transfer and Key Management Vulnerabilities</li>
<li>Key Transfer Vulnerabilities</li>
<li>Key Management Vulnerabilities</li>
<li>(Public Key Infrastructure)</li>
<li>Key Binding and Impersonation Vulnerabilities</li>
<li>Dictionary and Brute-Force Attacks</li>
<li>against Weak Secrets</li>
<li>Centralized Authentication Servers</li>
<li>RADIUS</li>
<li>TACACS</li>
<li>Kerberos</li>
<li>Human Authentication (Biometrics)</li>
<li>Resource Controls</li>
<li>Nonrepudiation</li>
<li>Digital Signatures (and Digital Certificates)</li>
<li>Privacy</li>
<li>Virtual Private Network (VPN)</li>
<li>Session and Protocol Encryption</li>
<li>Secure Sockets Layer (SSL)</li>
<li>Certificate and Impersonation Attacks (SSL)</li>
<li>Cryptographic Weaknesses (SSL)</li>
<li>Attacks against the Handshake Protocol (SSL)</li>
<li>SSL Man-in-the-Middle Attacks</li>
<li>Man-in-the-Middle Attack Version Rollback (SSL)</li>
<li>Viruses, Worms, and other Application Issues (SSL)</li>
<li>Secure Shell (SSH)</li>
<li>File System Encryption</li>
<li>Intrusion Detection</li>
<li>Network-Based and Host-Based IDS</li>
<li>Anomaly-Based (Behavior-Based) IDS</li>
<li>Signature-Based (Knowledge-Based) IDS</li>
<li>IDS Hacking Exploits</li>
<li>Address Spoofing or Proxying</li>
<li>Attacking the IDS</li>
<li>Denial-of-Service</li>
<li>Instigating Active Events</li>
<li>Nondefault Evasion and Pattern Change Evasion</li>
<li>Packet Fragmentation and “Session Splicing”</li>
<li>Port Scan Evasion</li>
<li>TCP Session Synchronization Attacks</li>
<li>URL Encoding (Unicode and Hex Attacks)</li>
<li>Web Evasion Techniques</li>
<li>File System Integrity Checkers</li>
<li>Security Information Management</li>
<li>Data Integrity</li>
<li>Application Proxies</li>
<li>Content Assurance (Antivirus, Content Scanning)</li>
<li>Notes</li>
<li>References</li>
<li>Texts</li>
<li>Web References</li>
<li>6 Programming</li>
<li>Languages</li>
<li>Speed and Security Trade-Offs</li>
<li>Native Compiled Code: C/C++/Assembly</li>
<li>Bytecode/Just in Time Compiled Code</li>
<li>(“Managed” Code): C#/Java</li>
<li>Interpreted (Usually Compiled into Byte Codes</li>
<li>at Runtime): Perl, Python (Scripting Languages),</li>
<li>PHP, Visual Basic, .ASP, Lisp, JSP (Web Languages)</li>
<li>Language-Specific Flaws and Strategic Ways to Protect</li>
<li>against Them</li>
<li>The Basics of Buffer Overflows and Other Memory</li>
<li>Allocation Errors</li>
<li>History</li>
<li>Basic Stack Overflows</li>
<li>Options for the Hacker after a Stack Overflow</li>
<li>So What Is a Stack Canary?</li>
<li>Heap Overflows</li>
<li>Format String Bugs</li>
<li>Integer Overflows</li>
<li>Signal Races on UNIX</li>
<li>What Is Shellcode?</li>
<li>Interpreter Bugs</li>
<li>File Name Canonicalization</li>
<li>Logic Error War Stories</li>
<li>Platform-Specific Programming Security Issues</li>
<li>Windows NT Compared to UNIX</li>
<li>Types of Applications</li>
<li>Web Applications</li>
<li>Cross-Site Scripting Vulnerabilities</li>
<li>Java J2EE</li>
<li>Traditional ASP Net</li>
<li>LAMP</li>
<li>Remote Procedure Calling</li>
<li>Creating an RPC Program</li>
<li>Special Cases</li>
<li>Setuid Applications on UNIX</li>
<li>DCOM Services</li>
<li>Auditing Techniques</li>
<li>Tools That Aid Source Auditing</li>
<li>Tools That Aid Reverse Engineering</li>
<li>Fuzzing Audit Tools</li>
<li>Web Security Audit Tools</li>
<li>General Security Tools</li>
<li>Encryption and Authentication</li>
<li>Layered Defenses</li>
<li>Platform-Specific Defenses (Security through Security</li>
<li>and Security through Obscurity)</li>
<li>Nonexecutable Stack</li>
<li>Using a Different Platform Than Expected</li>
<li>File System User Access Controls</li>
<li>Process Logging</li>
<li>The Insider Problem, Backdoors, and Logic Bombs</li>
<li>Buying an Application Assessment</li>
<li>Conclusion</li>
<li>References</li>
<li>7 IP and Layer 2 Protocols</li>
<li>Layer 2 Protocols</li>
<li>Address Resolution Protocol (ARP)</li>
<li>Protocol</li>
<li>Hacking Exploits</li>
<li>Security (Mapping ARP Exploits to ARP Defenses)</li>
<li>Static ARP Entries on Internet Gateways</li>
<li>and Firewalls</li>
<li>Network Management</li>
<li>ARP Monitoring</li>
<li>Port-Level Security</li>
<li>Reverse Address Resolution Protocol (RARP)</li>
<li>Protocol</li>
<li>Hacking Exploits</li>
<li>Security (Defenses for RARP-Related Attacks:</li>
<li>DHCP, BOOTP)</li>
<li>Assignment of Static IP Addresses to Clients</li>
<li>Use of DHCP/BOOTP MAC Controls</li>
<li>ARP Monitoring</li>
<li>Port-Level Security</li>
<li>Layer 3 Protocols</li>
<li>IP Protocol</li>
<li>Protocol</li>
<li>Hacking Exploits</li>
<li>IP Eavesdropping (Packet Sniffing)</li>
<li>IP Spoofing</li>
<li>IP Session Hijacking (Man-in-the-Middle Attacks)</li>
<li>IP Packet Fragmentation Attacks</li>
<li>ICMP-Based Fragmentation Attacks</li>
<li>Tiny Fragment Attacks</li>
<li>Overlapping Fragment Attacks</li>
<li>IP Covert Tunneling</li>
<li>Security (Mapping IP Exploits to IP Defenses)</li>
<li>Tools and Techniques to Detect Promiscuous</li>
<li>Mode Packet Sniffers</li>
<li>System Audits to Identify NICs</li>
<li>in Promiscuous Mode</li>
<li>System Hardening Procedures</li>
<li>to Inhibit Sniffer Installation</li>
<li>Inspection of Systems for Signs</li>
<li>of Rootkit Compromise</li>
<li>Institution of Switched Network</li>
<li>Institution of ARP Monitoring</li>
<li>Institution of Traffic Encryption</li>
<li>Implementation of Strong Authentication</li>
<li>Institution of Spoof Protection at Firewalls</li>
<li>and Access Control Devices</li>
<li>Patch TCP/IP Implementations</li>
<li>Deny Source Routing at Gateways and Firewalls</li>
<li>Deny ICMP Redirects at Gateways and Firewalls</li>
<li>Deter the Use of IP Addresses for Authentication</li>
<li>or Construction of Trust Relationships</li>
<li>Implement ARP Controls</li>
<li>Monitor Network Traffic Using Network</li>
<li>and Host-based IDS</li>
<li>Restrict ICMP Traffic into and out of</li>
<li>a Protected Network</li>
<li>Patch Firewalls and Intrusion Detection Systems</li>
<li>against Packet Fragmentation Attacks</li>
<li>Notes</li>
<li>References</li>
<li>Texts</li>
<li>Request for Comments (RFCs)</li>
<li>White Papers and Web References</li>
<li>8 The Protocols</li>
<li>Layer 3 Protocols</li>
<li>Internet Control Message Protocol (ICMP)</li>
<li>Protocol</li>
<li>Hacking Exploits</li>
<li>ICMP-Based Denial-of-Service</li>
<li>ICMP Network Reconnaissance</li>
<li>ICMP Time Exceeded</li>
<li>ICMP Access Control Enumeration</li>
<li>ICMP Stack Fingerprinting</li>
<li>ICMP Covert Tunneling</li>
<li>Security</li>
<li>Deny ICMP Broadcasts</li>
<li>Network Controls against ICMP Packet Flooding</li>
<li>IP Spoofing Defenses</li>
<li>Patch TCP/IP Implementations against</li>
<li>ICMP Denial-of-Service and ICMP Typing</li>
<li>Monitor Network Traffic Using Network and</li>
<li>Host-Based Intrusion Detection Systems (IDSs)</li>
<li>Restriction of Specific ICMP Message Types</li>
<li>Monitor ICMP Activity at Firewalls</li>
<li>and Intrusion Detection Systems</li>
<li>Layer 4 Protocols</li>
<li>Transmission Control Protocol (TCP)</li>
<li>Protocol</li>
<li>Hacking Exploits</li>
<li>Covert TCP</li>
<li>TCP Denial-of-Service</li>
<li>TCP Sequence Number Prediction</li>
<li>(TCP Spoofing and Session Hijacking)</li>
<li>TCP Stack Fingerprinting</li>
<li>TCP State-Based Attacks</li>
<li>Security</li>
<li>Network Controls against TCP Packet Flooding</li>
<li>IP Spoofing Defenses</li>
<li>Patch TCP/IP Implementations against TCP</li>
<li>Denial-of-Service, TCP Stack Fingerprinting,</li>
<li>and TCP Sequence Number Prediction</li>
<li>Monitor Network Traffic Using Network</li>
<li>and Host-Based IDS Systems</li>
<li>Activation of SYN Flood Protection on Firewalls</li>
<li>and Perimeter Gateways</li>
<li>Implement Stateful Firewalling</li>
<li>User Datagram Protocol (UDP)</li>
<li>Protocol</li>
<li>Hacking Exploits</li>
<li>Covert UDP</li>
<li>UDP Denial-of-Service</li>
<li>UDP Packet Inspection Vulnerabilities</li>
<li>Security</li>
<li>Disable Unnecessary UDP Services</li>
<li>Network Controls against UDP Packet Flooding</li>
<li>IP Spoofing Defenses</li>
<li>Patch TCP/IP Implementations against UDP</li>
<li>Denial-of-Service</li>
<li>Monitor Network Traffic Using Networkand</li>
<li>Host-Based IDS Systems</li>
<li>Implement Stateful Firewalling</li>
<li>Notes</li>
<li>References</li>
<li>Texts</li>
<li>Request for Comments (RFCs)</li>
<li>White Papers and Web References</li>
<li>PART II SYSTEM AND NETWORK PENETRATION</li>
<li>9 Domain Name System (DNS)</li>
<li>The DNS Protocol</li>
<li>DNS Protocol and Packet Constructs</li>
<li>(Packet Data Hacking)</li>
<li>DNS Vulnerabilities</li>
<li>DNS Exploits and DNS Hacking</li>
<li>Protocol-Based Hacking</li>
<li>Reconnaissance</li>
<li>DNS Registration Information</li>
<li>Name Server Information</li>
<li>IP Address and Network Topology Data</li>
<li>Information on Key Application Servers</li>
<li>Protocol-Based Denial-of-Service</li>
<li>Dynamic DNS (DDNS) Hacking</li>
<li>Application-Based Attacks</li>
<li>Buffer Overflows (Privileged Server Access,</li>
<li>Denial-of-Service)</li>
<li>Exploiting the DNS Trust Model</li>
<li>DNS Registration Attacks</li>
<li>DNS Spoofing</li>
<li>Cache Poisoning</li>
<li>DNS Hijacking</li>
<li>DNS Security and Controls</li>
<li>Mapping Exploits to Defenses</li>
<li>Defensive Strategy</li>
<li>Configuration Audit and Verification Tools</li>
<li>DDNS Security</li>
<li>Name Server Redundancy</li>
<li>DNSSEC: Authentication and Encryption of DNS Data</li>
<li>Name Server Software Upgrade(s)</li>
<li>Network and Name Server Monitoring</li>
<li>and Intrusion Detection</li>
<li>Berkeley Internet Name Daemon (BIND)</li>
<li>Logging Controls</li>
<li>Microsoft Windows 2000 DNS Logging Controls</li>
<li>Patches and Service Packs</li>
<li>Server-Side Access Controls</li>
<li>Split-Level DNS Topologies (and DNS Proxying)</li>
<li>Split-Level DNS Topology</li>
<li>System and Service Hardening</li>
<li>Notes</li>
<li>References</li>
<li>Texts</li>
<li>Request for Comments (RFCs)</li>
<li>Mailing Lists and Newsgroups</li>
<li>Web References</li>
<li>10 Directory Services</li>
<li>What Is a Directory Service?</li>
<li>Components of a Directory</li>
<li>Schema</li>
<li>Leaf Object</li>
<li>Container Object</li>
<li>Namespace</li>
<li>Directory Information Tree</li>
<li>Directory Information Base (DIB)</li>
<li>Directory Features</li>
<li>Directory Security</li>
<li>Single Sign On</li>
<li>Uses for Directory Systems</li>
<li>Directory-Enabled Networking</li>
<li>Linked Provisioning</li>
<li>Global Directory</li>
<li>Public Key Infrastructure</li>
<li>Directory Models</li>
<li>Physical vs. Logical</li>
<li>Flat vs. Hierarchical</li>
<li>X.500 Directory</li>
<li>X.500 Schema</li>
<li>X.500 Partitions</li>
<li>X.500 Objects and Naming</li>
<li>A Word about Aliases</li>
<li>X.500 Back-End Processes</li>
<li>Directory Information Tree</li>
<li>Directory Information Base</li>
<li>Replication</li>
<li>Agents and Protocols</li>
<li>X.500 Directory Access</li>
<li>X.500 Security</li>
<li>Authentication</li>
<li>Simple Authentication</li>
<li>Strong Authentication</li>
<li>Access Control</li>
<li>Rights</li>
<li>Summary</li>
<li>Lightweight Directory Access Protocol (LDAP)</li>
<li>LDAP Schema</li>
<li>LDAP Partitions</li>
<li>LDAP Objects and Naming</li>
<li>LDAP Queries</li>
<li>LDAP Data Interchange Format (LDIF)</li>
<li>LDAP Security</li>
<li>Authentication</li>
<li>Anonymous Access</li>
<li>Simple Authentication</li>
<li>Simple Authentication with Secure Sockets</li>
<li>Layer (SSL)/Transport Layer Security (TLS)</li>
<li>Simple Authentication and Security Layer (SASL)</li>
<li>Access Control</li>
<li>Summary</li>
<li>Active Directory</li>
<li>Windows NT</li>
<li>Windows 2000 Schema</li>
<li>Windows 2000 Partitions</li>
<li>Windows 2000 Objects and Naming</li>
<li>The Domain</li>
<li>The Tree</li>
<li>The Forest</li>
<li>The Forest Root Domain</li>
<li>Naming Standards and Resolution in Windows 2000</li>
<li>Active Directory Back-End Processes</li>
<li>The Directory Information Base (DIB)</li>
<li>Replication</li>
<li>The Global Catalog</li>
<li>Windows 2000 Security</li>
<li>Authentication</li>
<li>Kerberos</li>
<li>NTLM</li>
<li>Access Control</li>
<li>Exploiting LDAP</li>
<li>Sun ONE Directory Server 5.1</li>
<li>Microsoft Active Directory</li>
<li>Summary</li>
<li>Future Directions</li>
<li>Further Reading</li>
<li>11 Simple Mail Transfer Protocol (SMTP)</li>
<li>The SMTP Protocol</li>
<li>SMTP Protocol and Packet Constructs</li>
<li>(Packet Data Hacking)</li>
<li>SMTP Vulnerabilities</li>
<li>SMTP Protocol Commands and Protocol Extensions</li>
<li>Protocol Commands</li>
<li>Protocol Extensions</li>
<li>SMTP Exploits and SMTP Hacking</li>
<li>SMTP Protocol Attacks</li>
<li>Account Cracking</li>
<li>Eavesdropping and Reconnaissance</li>
<li>ESMTP and Command Set Vulnerabilities</li>
<li>Protocol-Based Denial-of-Service</li>
<li>Mail Bombing</li>
<li>Mail Spamming</li>
<li>Man-in-the-Middle Attacks</li>
<li>Application-Based Attacks</li>
<li>Malicious Content (MIME Attacks)</li>
<li>Buffer Overflows (Privileged Server Access)</li>
<li>Worms and Automated Attack Tools</li>
<li>Application-Based Denial-of-Service</li>
<li>Attacks on the Mail Trust Model</li>
<li>Mail Spoofing</li>
<li>Identity Impersonation</li>
<li>Attacks on Data Integrity</li>
<li>Delivery Status Notification Manipulation</li>
<li>SMTP Security and Controls</li>
<li>Mapping Exploits to Defenses</li>
<li>Defensive Strategy</li>
<li>Antispam/Antirelay Controls</li>
<li>Antivirus and Content Scanning</li>
<li>Client-Side Access Controls</li>
<li>Content or Code Signing</li>
<li>Delivery Status Notification Controls</li>
<li>Disable Vulnerable ESMTP and SMTP Commands</li>
<li>Disable Vulnerable MIME Types</li>
<li>Network and SMTP Server Monitoring,</li>
<li>Intrusion Detection</li>
<li>Patches and Service Packs</li>
<li>Separation of SMTP and Intranet Account Databases</li>
<li>Server-Side Access Controls</li>
<li>Server Redundancy</li>
<li>SMTP Header Stripping and Parsing</li>
<li>SMTP Source Routing Controls</li>
<li>Split SMTP Topology</li>
<li>System and Service Hardening</li>
<li>Transport Layer Security, Secure Socket</li>
<li>Layer Security</li>
<li>Notes</li>
<li>References</li>
<li>Texts</li>
<li>Request for Comments (RFCs)</li>
<li>White Papers and Web References</li>
<li>12 Hypertext Transfer Protocol (HTTP)</li>
<li>The HTTP Protocol</li>
<li>HTTP Protocol and Packet Constructs</li>
<li>(Packet Data Hacking)</li>
<li>HTTP Vulnerabilities</li>
<li>HTTP Protocol Methods (and Associated Vulnerabilities)</li>
<li>HTTP Exploits and HTTP Hacking</li>
<li>HTTP Protocol Attacks</li>
<li>Eavesdropping and Reconnaissance</li>
<li>Account Cracking</li>
<li>Basic Access Authentication</li>
<li>Digest Access Authentication</li>
<li>HTTP Method Vulnerabilities</li>
<li>Content Vulnerabilities</li>
<li>Caching Exploits</li>
<li>Cache Poisoning</li>
<li>Man-in-the-Middle Attacks</li>
<li>Unauthorized Retrieval of Cache Data</li>
<li>and Cache Monitoring</li>
<li>Denial-of-Service</li>
<li>Protocol-Based Denial-of-Service</li>
<li>Application-Based Attacks</li>
<li>Buffer Overflows (Privileged Server Access,</li>
<li>Denial-of-Service)</li>
<li>Directory Traversal Attacks</li>
<li>Application-Based Denial-of-Service</li>
<li>Attacks on the HTTP Trust Model</li>
<li>State-Based Attacks (Session ID Hacking)</li>
<li>HTTP Spoofing/HTTP Redirection</li>
<li>Man-in-the-Middle Attacks (Session Hijacking)</li>
<li>HTTP Security and Controls</li>
<li>Mapping Exploits to Defenses</li>
<li>Defensive Strategy</li>
<li>Caching Controls and Cache Redundancy</li>
<li>Disable Vulnerable HTTP Methods</li>
<li>HTTP Header Stripping</li>
<li>Implementation of HTTP Digest</li>
<li>Access Authentication</li>
<li>Load Balancing and Server Redundancy</li>
<li>Network and HTTP Server Monitoring,</li>
<li>Intrusion Detection</li>
<li>Patches and Service Packs</li>
<li>Security for Financial Transactions</li>
<li>Server-Side Access Controls</li>
<li>System and Service Hardening</li>
<li>Transport Layer Security or Secure Socket</li>
<li>Layer Security</li>
<li>Notes</li>
<li>References</li>
<li>Texts</li>
<li>Request for Comments (RFCs)</li>
<li>Web References</li>
<li>13 Database Hacking and Security</li>
<li>Introduction</li>
<li>Enumeration of Weaknesses</li>
<li>SQL Injection</li>
<li>Introduction</li>
<li>Phases of SQL Injection</li>
<li>Hacking Microsoft SQL Server</li>
<li>Overflows in Microsoft SQL Server</li>
<li>You Had Me at Hello</li>
<li>SQL Server Resolver Service Stack Overflow</li>
<li>Microsoft SQL Server Postauth Vulnerabilities</li>
<li>Microsoft SQL Server SQL Injection</li>
<li>A Note on Attacking Cold Fusion Web Applications</li>
<li>Default Accounts and Configurations</li>
<li>Hacking Oracle</li>
<li>Buffer Overflows in Oracle Servers</li>
<li>SQL Injection on Oracle</li>
<li>Default User Accounts</li>
<li>Tools and Services for Oracle Assessments</li>
<li>Other Databases</li>
<li>Connecting Backwards</li>
<li>Demonstration and Examples</li>
<li>Phase 1. Discovery</li>
<li>Phase 2. Reverse Engineering the Vulnerable Application</li>
<li>Phase 3. Getting the Results of Arbitrary Queries</li>
<li>Conclusions</li>
<li>14 Malware and Viruses</li>
<li>Ethics Again</li>
<li>Target Platforms</li>
<li>Script Malware</li>
<li>Learning Script Virus Basics with Anna Kournikova</li>
<li>Binary Viruses</li>
<li>Binary File Viruses</li>
<li>Binary Boot Viruses</li>
<li>Hybrids</li>
<li>Binary Worms</li>
<li>Worst to Come</li>
<li>Adware Infections</li>
<li>Conclusion</li>
<li>Notes</li>
<li>15 Network Hardware</li>
<li>Overview</li>
<li>Network Infrastructure</li>
<li>Routers</li>
<li>Switches</li>
<li>Load-Balancing Devices</li>
<li>Remote Access Devices</li>
<li>Wireless Technologies</li>
<li>Network Infrastructure Exploits and Hacking</li>
<li>Device Policy Attacks</li>
<li>Installation Policy</li>
<li>Acceptable Use Policy</li>
<li>Access Policy</li>
<li>Configuration Storage Policy</li>
<li>Patch or Update Policy</li>
<li>Denial-of-Service</li>
<li>Device Obliteration</li>
<li>Configuration Removal or Modification</li>
<li>Sending Crafted Requests</li>
<li>Physical Device Theft</li>
<li>Environmental Control Modification</li>
<li>Resource Expenditure</li>
<li>Diagnostic Port Attack</li>
<li>Sequence (SYN) Attack</li>
<li>Land Attack</li>
<li>Bandwidth Expenditure</li>
<li>Broadcast (Smurf) Attacks</li>
<li>Other ICMP-Related Attacks</li>
<li>Redirects</li>
<li>ICMP Router Discovery Protocol (IDRP) Attack</li>
<li>Ping O’Death</li>
<li>Squelch</li>
<li>Fragmented ICMP</li>
<li>Network Mapping Exploits</li>
<li>Ping</li>
<li>Traceroute</li>
<li>Broadcast Packets</li>
<li>Information Theft</li>
<li>Network Sniffing</li>
<li>Hijacking Attacks</li>
<li>Spoofing</li>
<li>Address Spoofing</li>
<li>TCP Sequence Attacks</li>
<li>Media Access (MAC) Address Exploits</li>
<li>Password or Configuration Exploits</li>
<li>Default Passwords or Configurations</li>
<li>No Passwords</li>
<li>Weak Passwords</li>
<li>Dictionary Password Attacks</li>
<li>Brute-Force Attacks</li>
<li>Logging Attacks</li>
<li>Log Modification</li>
<li>Log Deletion</li>
<li>Log Rerouting</li>
<li>Spoofed Event Management</li>
<li>Network Ports and Protocols Exploits and Attacks</li>
<li>Telnet</li>
<li>BOOTP</li>
<li>Finger</li>
<li>Small Services</li>
<li>Device Management Attacks</li>
<li>Authentication</li>
<li>Console Access</li>
<li>Modem Access (AUX)</li>
<li>Management Protocols</li>
<li>Web (HTTP[S])</li>
<li>Telnet</li>
<li>SSH (Version 1)</li>
<li>TFTP</li>
<li>SNMP</li>
<li>Device Configuration Security Attacks</li>
<li>Passwords</li>
<li>Remote Loading (Network Loads)</li>
<li>Router-Specific Exploits</li>
<li>Routing Protocol Attacks</li>
<li>Authentication</li>
<li>IRDP Attacks</li>
<li>Cisco Discovery Protocol (CDP)</li>
<li>Classless Routing</li>
<li>Source Routing</li>
<li>Route Table Attacks</li>
<li>Modification</li>
<li>Poisoning</li>
<li>ARP Table Attacks</li>
<li>Modification</li>
<li>Poisoning</li>
<li>Man-in-the-Middle Attack</li>
<li>Access-Control Lists Attacks</li>
<li>Switch-Specific Exploits</li>
<li>ARP Table</li>
<li>Modification</li>
<li>Poisoning</li>
<li>Man-in-the-Middle Attack</li>
<li>Media Access (MAC) Address Exploits</li>
<li>Changing a Host’s MAC</li>
<li>Duplicate MAC Addresses</li>
<li>Load-Balancing Device — Specific Exploits</li>
<li>Remote Access Device — Specific Exploits</li>
<li>Weak User Authentication</li>
<li>Same Account and Login Multiple Devices</li>
<li>Shared Login Credentials</li>
<li>Home User System Exploitation</li>
<li>Wireless Technology — Specific Exploits</li>
<li>Interception and Monitoring</li>
<li>Jamming</li>
<li>Insertion</li>
<li>Rogue Access Points</li>
<li>Unauthorized Clients</li>
<li>Client-to-Client Attacks</li>
<li>Media Access (MAC) Address</li>
<li>Duplicate IP Address</li>
<li>Improper Access Point Configuration</li>
<li>Service Set Identifier (SSID)</li>
<li>Default SSID</li>
<li>SSID Broadcasting</li>
<li>Wired Equivalent Privacy (WEP) Exploits</li>
<li>Network Infrastructure Security and Controls</li>
<li>Defensive Strategy</li>
<li>Routing Protocol Security Options</li>
<li>Management Security Options</li>
<li>Operating System Hardening Options</li>
<li>Protecting Running Services</li>
<li>Hardening of the Box</li>
<li>Explicitly Shut Down All Unused Interfaces</li>
<li>Limit or Disable In-Band Access (via Telnet,</li>
<li>SSH, SNMP, Etc.)</li>
<li>Reset All Default Passwords</li>
<li>Use Encrypted Passwords</li>
<li>Use Remote AAA Authentication</li>
<li>Use Access Lists to Protect Terminal, SNMP,</li>
<li>TFTP Ports</li>
<li>Remote Login (Telnet) Service</li>
<li>SNMP Service</li>
<li>Routing Services</li>
<li>Limit Use of SNMP</li>
<li>Limit Use of Internal Web Servers Used</li>
<li>for Configuration</li>
<li>Disable Cisco Discovery Protocol (CDP)</li>
<li>on Cisco Gear Outside of the Firewall</li>
<li>Do Not Leak Info in Banners</li>
<li>Keep Up-to-Date on Security Fixes for</li>
<li>Your Network Infrastructure Devices</li>
<li>DoS and Packet Flooding Controls</li>
<li>Use IP Address Spoofing Controls</li>
<li>Watch for Traffic Where the Source</li>
<li>and Destination Addresses Are the Same</li>
<li>Enforce Minimum Fragment Size to Protect</li>
<li>against Tiny Fragment Attack, Overlapping</li>
<li>Fragment Attack, and Teardrop Attack</li>
<li>Disable IP Unreachables on External Interfaces</li>
<li>Disable ICMP Redirects on External Interfaces</li>
<li>Disable Proxy ARP</li>
<li>Disable IP Directed Broadcasts (SMURF Attacks)</li>
<li>Disable Small Services (No Service Small-Servers</li>
<li>UDP and No Service Small-Servers TCP)</li>
<li>Disable IP Source Routing (No IP Source-Route)</li>
<li>Use Traffic Shaping (Committed Access Rate)</li>
<li>Tools</li>
<li>Configuration Audit and Verification Tools</li>
<li>Wireless Network Controls</li>
<li>Notes</li>
<li>References</li>
<li>Tools</li>
<li>Request for Comments (RFCs)</li>
<li>White Paper</li>
<li>Web References</li>
<li>PART III CONSOLIDATION</li>
<li>16 Consolidating Gains</li>
<li>Overview</li>
<li>Consolidation (OS and Network Facilities)</li>
<li>Account and Privilege Management Facilities</li>
<li>Account Cracking</li>
<li>SMBCapture</li>
<li>Active Directory Privilege Reconnaissance</li>
<li>and Hacking</li>
<li>Built-In/Default Accounts, Groups,</li>
<li>and Associated Privileges</li>
<li>Finger Service Reconnaissance</li>
<li>Kerberos Hacking and Account Appropriation</li>
<li>Keystroke Logging</li>
<li>LDAP Hacking and LDAP Reconnaissance</li>
<li>Polling the Account Database</li>
<li>Social Engineering</li>
<li>Trojanized Login Programs</li>
<li>File System and I/O Resources</li>
<li>File System and Object Privilege Identification</li>
<li>File System (Operating System) Hacking</li>
<li>File Sharing Exploits</li>
<li>NFS (IP) Spoofing</li>
<li>SMBRelay</li>
<li>File Handle/File Descriptor Hacking</li>
<li>File System Device and I/O Hacking</li>
<li>File System Exploitation through</li>
<li>Application Vulnerabilities</li>
<li>Application-Based File System Hacking</li>
<li>Extended File System Functionality</li>
<li>and File System Hacking</li>
<li>Service and Process Management Facilities</li>
<li>Processes, Services, and Privilege Identification</li>
<li>Starting/Stopping Services and Executing</li>
<li>with Specific Privileges</li>
<li>API, Operating System, and Application</li>
<li>Vulnerabilities</li>
<li>Buffer Overflows, Format String,</li>
<li>and Other Application Attacks</li>
<li>Debugging Processes and Memory Manipulation</li>
<li>Inter-Process Communication (IPC), Named Pipe,</li>
<li>and Named Socket Hacking</li>
<li>Devices and Device Management Facilities</li>
<li>Devices and Device Management Hacking</li>
<li>Keystroke Logging</li>
<li>Packet Sniffing</li>
<li>Libraries and Shared Libraries</li>
<li>Library (and Shared Library) Hacking</li>
<li>Shell Access and Command Line Facilities</li>
<li>Shell Hacking</li>
<li>Registry Facilities (NT/2000)</li>
<li>Registry Hacking</li>
<li>Client Software</li>
<li>Client Software Appropriation</li>
<li>Listeners and Network Services</li>
<li>Account/Privilege Appropriation via</li>
<li>a Vulnerable Network Service</li>
<li>NetBIOS/SMB Reconnaissance</li>
<li>Network Information Service (NIS) Reconnaissance</li>
<li>NIS Hacking</li>
<li>SNMP Reconnaissance</li>
<li>Network Trust Relationships</li>
<li>Account Cracking</li>
<li>IP Spoofing</li>
<li>Token Capture and Impersonation</li>
<li>Application/Executable Environment</li>
<li>Consolidation (Foreign Code)</li>
<li>Trojans</li>
<li>Backdoors (and Trojan Backdoors)</li>
<li>Backdoor Listeners</li>
<li>Backdoor Applications</li>
<li>Rootkits</li>
<li>Kernel-Level Rootkits</li>
<li>Security</li>
<li>Mapping Exploits to Defenses</li>
<li>Notes</li>
<li>References and System Hardening References</li>
<li>Texts</li>
<li>Web References</li>
<li>System Hardening References</li>
<li>Windows NT/2000</li>
<li>UNIX Platforms</li>
<li>17 After the Fall</li>
<li>Logging, Auditing, and IDS Evasion</li>
<li>Logging and Auditing Evasion</li>
<li>Windows NT/2000 Logging/Auditing Evasion</li>
<li>IP Spoofing</li>
<li>Account Masquerading</li>
<li>Deletion/Modification of Log File Entries</li>
<li>Deletion of Log Files</li>
<li>Disabling Logging</li>
<li>Controlling What Is Logged</li>
<li>Manipulation of Audit Options</li>
<li>Deletion or Update of Audit Files</li>
<li>UNIX Platforms</li>
<li>UNIX Logging/Auditing Evasion</li>
<li>IP Spoofing</li>
<li>Account Masquerading</li>
<li>Deletion/Modification of Log File Entries</li>
<li>Deletion of Log Files</li>
<li>Disabling Log Files</li>
<li>Controlling What Is Logged</li>
<li>Manipulation of Audit and Accounting Options</li>
<li>Deletion or Update of Audit Files</li>
<li>Routers (Cisco)</li>
<li>AAA Protocols (RADIUS, TACACS)</li>
<li>Centralized Logging Solutions (Syslog)</li>
<li>IP Spoofing</li>
<li>Account Masquerading</li>
<li>Deletion/Modification of Log File Entries</li>
<li>Deletion of Log Files</li>
<li>Disabling Log Files</li>
<li>Controlling What Is Logged</li>
<li>IDS Evasion</li>
<li>Forensics Evasion</li>
<li>Environment Sanitization</li>
<li>Sanitizing History Files</li>
<li>Sanitizing Cache Files</li>
<li>File Hiding and File System Manipulation</li>
<li>Operating System File Hiding Techniques</li>
<li>Alternate Data Streams (NT/2000/XP)</li>
<li>Steganography</li>
<li>Cryptography</li>
<li>Covert Network Activities</li>
<li>Covert TCP</li>
<li>“Normalizing” Traffic (Covert Shells)</li>
<li>ICMP Covert Tunneling</li>
<li>Investigative, Forensics, and Security Controls</li>
<li>Mapping Exploits to Defenses</li>
<li>Centralized Logging and Archival of Log File Data</li>
<li>Centralized Reporting and Data Correlation</li>
<li>Encryption of Local Log File Data</li>
<li>Establishment of Appropriate Access Controls</li>
<li>for Log Files</li>
<li>Implementation of Tools for Remote Monitoring</li>
<li>of Log Files</li>
<li>Patches and Software Updates</li>
<li>Process Monitoring for Logging Services</li>
<li>Regular File System Audits</li>
<li>Strict Management of Audit and</li>
<li>Accounting-Related Privileges</li>
<li>Traffic Encryption for Syslog Packet Data</li>
<li>Notes</li>
<li>References</li>
<li>Texts</li>
<li>Web References</li>
<li>18 Conclusion</li>
<li>Conclusion: Case Study in Subversion</li>
<li>Dalmedica’s Perspective</li>
<li>Access Points</li>
<li>Bastion Hosts</li>
<li>Reconnaissance Activity</li>
<li>Target Systems</li>
<li>Conclusion (Final Thoughts)</li>
<li>References</li>
<li>Areas of Focus</li>
<li>General Hacking and Security Resources</li>
<li>Authentication Technologies</li>
<li>Cryptography</li>
<li>DNS and Directory Services</li>
<li>Network Management</li>
<li>Route/Switch Infrastructures</li>
<li>Storage Networking</li>
<li>Voice over IP</li>
<li>Wireless Networks</li>
<li>Notes<br /><br /><br />Downlod Link</li>
<li><a href="http://adf.ly/4lR8Y" target="_blank"><span class="Apple-style-span" style="color: red;">Oron</span></a></li>
</span></ul>
<br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><br /></span></span><br />
<div style="background-color: Transparant; border: 2px solid blue; color: black; font-size: 9pt; height: 300px; overflow: auto; width: 535px;">
<div style="color: black;">
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0077499867&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0123744938&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=032478645X&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0789736136&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>
</div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com1tag:blogger.com,1999:blog-2872785713693544081.post-22582490525907610652012-01-16T01:16:00.003+07:002012-01-17T08:02:19.480+07:00Essentials Of Pharmacy Law<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">[Year : 2003] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">[Size : 1.48 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 137]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 15px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">Author</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;">DOUGLAS J. PISANO</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><a name='more'></a></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 15px; line-height: 18px;"><b>Essentials Of Pharmacy Law</b></span></div>
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAtX-9OsHsB2t1op3iR_GG9N_AlnWdzvzWKb2lb3JFeyQVHULizVLr1-Kxc7FMFMjB01LtT2qh6xE54yh92je-l8PM0BXYtxo-TcIc4VRwgwnah6nMukljXDwPFycNsFK-SdGHSaOEVLk/s1600/SFEBC00415+Essentials+Of+Pharmacy+Law.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAtX-9OsHsB2t1op3iR_GG9N_AlnWdzvzWKb2lb3JFeyQVHULizVLr1-Kxc7FMFMjB01LtT2qh6xE54yh92je-l8PM0BXYtxo-TcIc4VRwgwnah6nMukljXDwPFycNsFK-SdGHSaOEVLk/s1600/SFEBC00415+Essentials+Of+Pharmacy+Law.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: medium;"><span class="Apple-style-span" style="font-size: 15px; line-height: 18px;"><br /><b>Line of Contents</b></span></span><br />
<br />
<ul style="text-align: left;">
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 15px;">The evolution of pharmacy practice</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 15px;">U.S. drug regulation</span></span></li>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;">
<li>Federal laws and regulations governing pharmacy, pharmacists, and prescriptions</li>
<li>DEA registration</li>
<li>A pharmacist’s liability and the legal issues of OBRA ’90 and patient counseling</li>
<li>Pharmaceutical care: Our legal and professional strategic plan</li>
<li>Case studies</li>
<li>Study questions</li>
<li>DEA forms</li>
<li>Index<br /><br /><br />Link Download</li>
<li><a href="http://adf.ly/4l6yx" target="_blank"><span class="Apple-style-span" style="color: red;">Oron</span></a></li>
<li><a href="http://adf.ly/4l6wt" target="_blank"><span class="Apple-style-span" style="color: red;">Depositfiles</span></a></li>
</span></ul>
<div style="background-color: Transparant; border: 2px solid blue; color: black; font-size: 9pt; height: 300px; overflow: auto; width: 535px;">
<div style="color: black;">
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0071486356&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0781765986&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=1418032212&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0195308123&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>
</div>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-12404924284582209882012-01-16T00:56:00.000+07:002012-01-16T00:56:00.633+07:00Hospital Pharmacy<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">[Year : 2011] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; line-height: 18px;">[Size : 1.90 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 349]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Editor</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Martin Stephens BPharm, MSc, MRPharmS, MCPP</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><a name='more'></a></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;"><b>Hospital Pharmacy</b></span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSTqzskQbvoxT61G8B97UB6-fubT5YhMDDshFrDM-24A1XgONdWabutnxxrNxmFPVpqiO0_biSDjTK7HILbKOIPPRJJP66aX9_XJDP8vF06KFI0QVnIZqnJGWk13GTXLk3eK7OcInfnko/s1600/SFEBC00426+Hospital+Pharmacy.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSTqzskQbvoxT61G8B97UB6-fubT5YhMDDshFrDM-24A1XgONdWabutnxxrNxmFPVpqiO0_biSDjTK7HILbKOIPPRJJP66aX9_XJDP8vF06KFI0QVnIZqnJGWk13GTXLk3eK7OcInfnko/s1600/SFEBC00426+Hospital+Pharmacy.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;"><br /></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;"><b>Line of Contents</b></span></span><br />
<br />
<ul style="text-align: left;">
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Hospital pharmacy within the National Health Service</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Pharmacy in the acute independent sector</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Purchasing medicines</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Medicines supply and automation</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Controlled drugs in hospital pharmacy</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Technical services</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Quality assurance</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Medicines information</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Clinical pharmacy</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Pharmacist prescribing</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Strategic medicines management</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 18px;">Risks with medicines</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 12px;">Mental health pharmacy</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 12px;">Community health services</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 12px;">Information technology</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 12px;">Research and development</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 12px;">Workforce development</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 12px;">Consultant pharmacists</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 12px;">Managing services<br /><br /><br /><span class="Apple-style-span" style="color: red;"><b>Link Download</b></span></span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 12px;"><a href="http://adf.ly/4l5bm" target="_blank"><span class="Apple-style-span" style="color: orange;"><b>Depositfile</b></span></a><span class="Apple-style-span" style="color: orange;"><b> </b></span></span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif;"><span class="Apple-style-span" style="line-height: 12px;"><a href="http://adf.ly/4l5gN" target="_blank"><span class="Apple-style-span" style="color: orange;"><b>Oron</b></span></a></span></span></li>
</ul>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-23119454703243406242012-01-15T19:25:00.000+07:002012-01-15T19:25:09.457+07:00Pharmacotherapy of Obesity<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 2008] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 1.53 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 126]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Editor</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">John P.H. Wilding</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4kqhP" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a name='more'></a><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><b>Pharmacotherapy of Obesity</b></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaEfVv0R6k0FNNM9sBJiG0-gAMjTFfGefe_yGvLzVCyp2y13kk2ILLj7FK9SNcPSzqPkP3IibIPUN1iJyRkD-qpH5n_eHWqhgcmwAIzF6dHGZEli8JLoWcFc6WMk1V53gJx-pz_8fRbw8/s1600/SFEBC00286+Pharmacotherapy+of+Obesity.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaEfVv0R6k0FNNM9sBJiG0-gAMjTFfGefe_yGvLzVCyp2y13kk2ILLj7FK9SNcPSzqPkP3IibIPUN1iJyRkD-qpH5n_eHWqhgcmwAIzF6dHGZEli8JLoWcFc6WMk1V53gJx-pz_8fRbw8/s1600/SFEBC00286+Pharmacotherapy+of+Obesity.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><br /></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>Line of Contents</b></span></span><br />
<br />
<ul style="text-align: left;">
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Why drugs?</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Some historical aspects of drug treatment for obesity</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"></span></span></li>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;">
<li>Regulation of energy balance – towards rational drug design in obesity</li>
<li>Intestinal lipase inhibitors</li>
<li>Sibutramine</li>
<li>The endocannabinoid system as a target for obesity treatment</li>
<li>Using the body’s natural signals – gut hormones</li>
<li>Influencing energy expenditure and substrate utilisation</li>
<li>Index</li>
</span></ul>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-91909405049572454772012-01-15T06:58:00.004+07:002012-01-15T06:58:52.089+07:00Hacking GPS<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 2005] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 10.3 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 351]</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">Author</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Kathie Kingsley-Hughes</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4k6Gq" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a href="http://adf.ly/4k6Gq" target="_blank"><a name='more'></a></a><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>Hacking GPS</b></span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCZ-8H50x76b0paoSE0rqO4LiLNByA2U2muLsxZaTe46Z6zpOUE8czIGMU3TRKu7gOakFNNW1VURt0gLngKqYy3a117d3mg0NHRbhzFr_ZOHYuQ5mb_lSVXPgltsZA2HKRt0FufFPV9Bk/s1600/SFEBC00589+Hacking+GPS.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCZ-8H50x76b0paoSE0rqO4LiLNByA2U2muLsxZaTe46Z6zpOUE8czIGMU3TRKu7gOakFNNW1VURt0gLngKqYy3a117d3mg0NHRbhzFr_ZOHYuQ5mb_lSVXPgltsZA2HKRt0FufFPV9Bk/s1600/SFEBC00589+Hacking+GPS.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><br /></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>Line of Contents</b></span></span><br />
<br />
<ul>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Hardware Hacks</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Software Hacks</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Data Hacking</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Playtime</span></span></li>
</ul>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-58075311346296795122012-01-13T05:04:00.000+07:002012-01-13T05:23:03.485+07:00LINKS OF FREE PHARMACEUTICAL JOURNAL<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span><br />
<a name='more'></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span><br />
<ul style="text-align: left;">
<li><a href="http://adf.ly/4hbyW" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="color: black;">Indian Journal of Pharmaceutical Sciences</span></span></a></li>
<li><a href="http://adf.ly/4hdSe" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="color: black;">International Journal of Pharmacy and Pharmaceutical Sciences</span></span></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"> </span></li>
<li><a href="http://adf.ly/4hdFY" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="color: black;">International Journal of Pharmaceutical Investigation</span></span></a></li>
<li><a href="http://adf.ly/4hdZV" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="color: black;">International Journal of Pharmaceutical Research and Development</span></span></a></li>
<li><a href="http://adf.ly/4hceo" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="color: black;">Journal of Advanced Pharmaceutical Technology and Research</span></span></a></li>
<li><a href="http://adf.ly/4hcz3" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="color: black;">Journal of Pharmaceutical Negative Results</span></span></a></li>
<li><a href="http://adf.ly/4hcXs" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="color: black;">Pakistan Journal of Pharmaceutical Sciences (PJPS)</span></span></a><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"> </span></li>
<li><span class="Apple-style-span" style="line-height: 18px;"><a href="http://adf.ly/4hc5e" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="color: black;">The AAPS Journal</span></span></a></span></li>
<li><span class="Apple-style-span" style="line-height: 18px;"><a href="http://adf.ly/4hdcQ" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="color: black;">Tropical Journal of Pharmaceutical Research</span></span></a></span></li>
</ul>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-91633828836412574632012-01-13T04:14:00.001+07:002012-01-13T04:14:07.712+07:00Pharmacotherapy Principles and Practice 2008<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 2008] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 43.8 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 1712]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">Editors</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">MARIE A. CHISHOLM-BURNS, PHARMD, FCCP, FASHP</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">BARBARA G.WELLS, PHARMD, FASHP, FCCP, BCPP</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;">TERRY L. SCHWINGHAMMER, PHARMD, FCCP, FASHP, BCPS<br />
PATRICK M. MALONE, PHARMD, FASHP<br />
JILL M. KOLESAR, PHARMD, BCPS, FCCP<br />
JOHN C. ROTSCHAFER, PHARMD, FCCP<br />
JOSEPH T. DIPIRO, PHARMD, FCCP<br />
</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4haC6" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a name='more'></a>
<b>Pharmacotherapy Principles and Practice 2008</b><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZkWo-mbI3jC6J8zpepuQEIfCOSbWZ0UfUfziM49Ocx0QOQbt8GfN-AFYMG8uZI85W5Tvkl94STjPoimG4EB3yGGyWANSr4E8U7FRp57HMpjeXeopfVMXMKUSR8Sz_TTBnaa8vo7AA_N8/s1600/SFEBC00287+Pharmacotherapy+principles+and+practice+2008.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZkWo-mbI3jC6J8zpepuQEIfCOSbWZ0UfUfziM49Ocx0QOQbt8GfN-AFYMG8uZI85W5Tvkl94STjPoimG4EB3yGGyWANSr4E8U7FRp57HMpjeXeopfVMXMKUSR8Sz_TTBnaa8vo7AA_N8/s1600/SFEBC00287+Pharmacotherapy+principles+and+practice+2008.jpg" /></a></div>
<br />
<b>Line of Contents</b><br />
<div style="text-align: justify;">
</div>
<ul>
<li>Section 1. Cardiovascular Disorders</li>
<li>Section 2. Respiratory Disorders</li>
<li>Section 3. Gastrointestinal Disorders</li>
<li>Section 4. Renal Disorders</li>
<li>Section 5. Neurologic Disorders</li>
<li>Section 6. Psychiatric Disorders</li>
<li>Section 7. Endocrinologic Disorders</li>
<li>Section 8. Gynecologic and Obstetric Disorders</li>
<li>Section 9. Urologic Disorders</li>
<li>Section 10. Immunologic Disorders</li>
<li>Section 11. Bone and Joint Disorders</li>
<li>Section 12. Disorders of the Eyes, Ears, Nose, and Throat</li>
<li>Section 13. Dermatologic Disorders</li>
<li>Section 14. Hematologic Disorders</li>
<li>Section 15. Diseases of Infectious Origin</li>
<li>Section 16. Oncologic Disorders</li>
<li>Section 17. Nutrition and Nutritional Disorders</li>
<li>Appendices</li>
</ul>
</span></div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-89307776255791106162012-01-13T03:30:00.000+07:002012-01-13T03:30:34.135+07:00ANTICANCER AGENTS from NATURAL PRODUCTS<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 2005] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 40.2 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 569]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"></span></span></span><br />
Editor<br />
Gordon M. Cragg<br />
David G.I. Kingston<br />
David J. Newman<br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4hWrD" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a href="http://adf.ly/4hWrD" target="_blank"><a name='more'></a></a><br />
<b>ANTICANCER AGENTS from NATURAL PRODUCTS</b><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ96O1UgxSjchIBxl4VIt8vuABZ-xz-AuZmiTnKrUanCqqTbSKTkFRIeC9jIFNvhPuagPwDv6tU6a1GHwH0QD9zk8rwrMHiYJDFasSVQ5UqV4yr5dnAd1-wAr3GmjJwg7OcUy2q8cErPY/s1600/SFEBC00062+ANTICANCER+AGENTS+from+NATURAL+PRODUCTS.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ96O1UgxSjchIBxl4VIt8vuABZ-xz-AuZmiTnKrUanCqqTbSKTkFRIeC9jIFNvhPuagPwDv6tU6a1GHwH0QD9zk8rwrMHiYJDFasSVQ5UqV4yr5dnAd1-wAr3GmjJwg7OcUy2q8cErPY/s1600/SFEBC00062+ANTICANCER+AGENTS+from+NATURAL+PRODUCTS.jpg" /></a></div>
<br />
<b>Line of Contents</b><br />
<br />
<ul style="text-align: left;">
<li></li>
<li style="text-align: justify;">Introduction</li>
<li style="text-align: justify;"></li>
<li style="text-align: justify;">Camptothecin and Its Analogs</li>
<li style="text-align: justify;">The Discovery and Development of the Combretastatins</li>
<li style="text-align: justify;">Homoharringtonine and Related Compounds</li>
<li style="text-align: justify;">Podophyllotoxins and Analogs</li>
<li style="text-align: justify;">Taxol and Its Analogs</li>
<li style="text-align: justify;">The Vinca Alkaloids</li>
<li style="text-align: justify;">The Bryostatins</li>
<li style="text-align: justify;"></li>
<li style="text-align: justify;">The Isolation, Characterization, and Development of a Novel Class of Potent Antimitotic Macrocyclic Depsipeptides: The Cryptophycins</li>
<li style="text-align: justify;"></li>
<li style="text-align: justify;">Chemistry and Biology of the Discodermolides, Potent Mitotic Spindle Poisons</li>
<li style="text-align: justify;"></li>
<li style="text-align: justify;">The Dolastatins: Novel Antitumor Agents from Dolabella auricularia</li>
<li style="text-align: justify;">Ecteinascidin 743 (ET-743; Yondelis™), Aplidin, and Kahalalide F</li>
<li style="text-align: justify;"></li>
<li style="text-align: justify;">Discovery of E7389, a Fully Synthetic Macrocyclic Ketone Analog of Halichondrin B</li>
<li style="text-align: justify;"></li>
<li style="text-align: justify;">HTI-286, A Synthetic Analog of the Antimitotic Natural Product Hemiasterlin</li>
<li style="text-align: justify;">The Actinomycins</li>
<li style="text-align: justify;">Anthracyclines</li>
<li style="text-align: justify;">Ansamitocins (Maytansinoids)</li>
<li style="text-align: justify;">Benzoquinone Ansamycins</li>
<li style="text-align: justify;">Bleomycin Group Antitumor Agents</li>
<li style="text-align: justify;"></li>
<li style="text-align: justify;">Biochemical and Biological Evaluation of (+)-CC-1065 Analogs and Conjugates with Polyamides</li>
<li style="text-align: justify;">Epothilone, a Myxobacterial Metabolite with Promising Antitumor Activity</li>
<li style="text-align: justify;">Enediynes</li>
<li style="text-align: justify;">The Mitomycins</li>
<li style="text-align: justify;"></li>
<li style="text-align: justify;">Staurosporines and Structurally Related Indolocarbazoles as Antitumor Agents</li>
<li style="text-align: justify;">Combinatorial Biosynthesis of Anticancer Natural Products</li>
<li style="text-align: justify;"></li>
<li style="text-align: justify;">Developments and Future Trends in Anticancer Natural Products Drug Discovery</li>
</ul>
<br />
<br /></div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-50503681769888867572012-01-12T18:44:00.000+07:002012-01-12T18:44:07.283+07:00CANCER CYTOGENETICS<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 2009] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 51.2 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 737]</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"></span></span><br />
Editors<br />
Sverre Heim & Felix Mitelman<br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4h2gY" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a name='more'></a><br />
<b>CANCER CYTOGENETICS</b><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Df3HX2FifgLBfHYGmOImcBqsu0MQ8Ll2QulofYw826UDQ_UZKRD_Aro4pSdtMo3ojzF1Wf4ypyxovEoDL9lYSYUPvYOWBlEfwqbBiNd1Rohp3VRdI5_DcWBWqjMMArRK5CRpnYqe7co/s1600/SFEBC00045+CANCER+CYTOGENETICS.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Df3HX2FifgLBfHYGmOImcBqsu0MQ8Ll2QulofYw826UDQ_UZKRD_Aro4pSdtMo3ojzF1Wf4ypyxovEoDL9lYSYUPvYOWBlEfwqbBiNd1Rohp3VRdI5_DcWBWqjMMArRK5CRpnYqe7co/s1600/SFEBC00045+CANCER+CYTOGENETICS.jpg" /></a></div>
<br />
<b>Line of Contents</b><br />
<ul>
<li>A New Approach to an Old Problem</li>
<li>Cytogenetic Methods</li>
<li>Cytogenetic Nomenclature</li>
<li>Nonrandom Chromosome Abnormalities in Cancer-An Overview</li>
<li>Acute Myeloid Leukemia</li>
<li>Myelodysplastic Syndromes</li>
<li>Chronic Myeloid Leukemia</li>
<li>Chronic Myeloproliferative Neoplasms</li>
<li>Acute Lymphoblastic Leukemia</li>
<li>Mature B- and T-cell Neoplasms and Hodgkin Lymphoma</li>
<li>Tumors of the Upper Aerodigestive Tract</li>
<li>Tumors of the Lung</li>
<li>Tumors of the Digestive Tract</li>
<li>Tumors of the Urinary Tract</li>
<li>Tumors of the Breast</li>
<li>Tumors of the Female Genital Organs</li>
<li>Tumors of the Male Genital Organs</li>
<li>Tumors of Endocrine Glands</li>
<li>Tumors of the Nervous System</li>
<li>Tumors of the Eye</li>
<li>Tumors of the Skin</li>
<li>Tumors of Bone</li>
<li>Soft Tissue Tumors</li>
<li>Index</li>
</ul>
<br />wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-47788842368721124292012-01-11T00:47:00.000+07:002012-01-11T00:47:22.162+07:00Pharmacotherapy- A Pathophysiologic Approach, 7th ed<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 2008] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 43.8 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 2597]</span></span></span><br /><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">Authors</span></span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Joseph T. DiPiro, PharmD, FCCP</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Robert L. Talbert, PharmD, FCCP, BCPS, CLS</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Gary C. Yee, PharmD, FCCP, BCOP</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Gary R. Matzke, PharmD, FCP, FCCP</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Barbara G. Wells, PharmD, FASHP, FCCP, BCPP</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">L. Michael Posey, BSPharm</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4eiMk" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a name='more'></a><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>Pharmacotherapy- A Pathophysiologic Approach, 7th ed</b></span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6W4BmpQokt6mFHbsXafSmAMQk36uK0GyqQHm4oe0HdBSsyw8Mzh7jLT07kH7pfasEj4Q432B3qyt3OOVtpg8XXHGsvBqhMsxy5C0nLl5JLqh6qXRIbzHTmqFTJ8KmXRTaPI8KA9Ym_jo/s1600/SFEBC00280+Pharmacotherapy-+A+Pathophysiologic+Approach%252C+7th+ed.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6W4BmpQokt6mFHbsXafSmAMQk36uK0GyqQHm4oe0HdBSsyw8Mzh7jLT07kH7pfasEj4Q432B3qyt3OOVtpg8XXHGsvBqhMsxy5C0nLl5JLqh6qXRIbzHTmqFTJ8KmXRTaPI8KA9Ym_jo/s1600/SFEBC00280+Pharmacotherapy-+A+Pathophysiologic+Approach%252C+7th+ed.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><br /></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><b>Line of Contents</b></span><br />
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
Foundation Issues</div>
<br />
<br />
<ul style="text-align: left;">
<li style="text-align: justify;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">Pharmacoeconomics: Principles, Methods, and Applications</span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"></span></li>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;">
<li style="font-size: 13px; line-height: 18px; text-align: justify;">Health Outcomes and Quality of Life</li>
<li style="font-size: 13px; line-height: 18px; text-align: justify;">Evidence-Based Medicine</li>
<li style="font-size: 13px; line-height: 18px; text-align: justify;">Documentation of Pharmacy Services</li>
<li style="text-align: justify;">Clinical Pharmacokinetics and Pharmacodynamics</li>
<li style="text-align: justify;">Pharmacogenetics</li>
<li style="text-align: justify;">Pediatrics</li>
<li style="text-align: justify;">Geriatrics</li>
<li style="text-align: justify;">Pharmacoepidemiology</li>
<li style="text-align: justify;">Clinical Toxicology</li>
<li style="text-align: justify;">Emergency Preparedness: Identification and Management of Biological Exposures</li>
<li><div style="text-align: justify;">
Emergency Preparedness: Identification and Management of Chemical and Radiological Exposures</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Cardiovascular Disorders</div>
</li>
<li style="text-align: justify;">Cardiovascular Testing</li>
<li style="text-align: justify;">Cardiopulmonary Arrest</li>
<li style="text-align: justify;">Hypertension</li>
<li style="text-align: justify;">Heart Failure</li>
<li style="text-align: justify;">Ischemic Heart Disease</li>
<li style="text-align: justify;">Acute Coronary Syndromes</li>
<li style="text-align: justify;">The Arrhythmias</li>
<li style="text-align: justify;">Diastolic Heart Failure and the Cardiomyopathies</li>
<li style="text-align: justify;">Venous Thromboembolism</li>
<li style="text-align: justify;">Stroke</li>
<li style="text-align: justify;">Hyperlipidemia</li>
<li style="text-align: justify;">Peripheral Arterial Disease</li>
<li style="text-align: justify;">Use of Vasopressors and Inotropes in the Pharmacotherapy of Shock</li>
<li><div style="text-align: justify;">
Hypovolemic Shock</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Respiratory Disorders</div>
</li>
<li style="text-align: justify;">Introduction to Pulmonary Function Testing</li>
<li style="text-align: justify;">Asthma</li>
<li style="text-align: justify;">Chronic Obstructive Pulmonary Disease</li>
<li style="text-align: justify;">Pulmonary Hypertension</li>
<li style="text-align: justify;">Drug-Induced Pulmonary Diseases</li>
<li style="text-align: justify;">Cystic Fibrosis<br /><br />Gastrointestinal Disorders</li>
<li style="text-align: justify;">Evaluation of the Gastrointestinal Tract</li>
<li style="text-align: justify;">Gastroesophageal Reflux Disease</li>
<li style="text-align: justify;">Peptic Ulcer Disease</li>
<li style="text-align: justify;">Inflammatory Bowel Disease</li>
<li style="text-align: justify;">Nausea and Vomiting</li>
<li style="text-align: justify;">Diarrhea, Constipation, and Irritable Bowel Syndrome</li>
<li style="text-align: justify;">Portal Hypertension and Cirrhosis</li>
<li style="text-align: justify;">Drug-Induced Liver Disease</li>
<li style="text-align: justify;">Pancreatitis</li>
<li style="text-align: justify;">Viral Hepatitis</li>
<li style="text-align: justify;">Drug Therapy Individualization in Patients with Hepatic Disease or Genetic Alterations in Drug Metabolizing Activity<br /><br />Renal Disorders</li>
<li style="text-align: justify;">Quantification of Renal Function</li>
<li style="text-align: justify;">Acute Renal Failure</li>
<li style="text-align: justify;">Chronic Kidney Disease: Progression-Modifying Therapies</li>
<li style="text-align: justify;">Chronic Kidney Disease: Management of Complications</li>
<li style="text-align: justify;">Hemodialysis and Peritoneal Dialysis</li>
<li style="text-align: justify;">Drug-Induced Kidney Disease</li>
<li style="text-align: justify;">Glomerulonephritis</li>
<li style="text-align: justify;">Drug Therapy Individualization for Patients with Renal Insufficiency</li>
<li style="text-align: justify;">Disorders of Sodium and Water Homeostasis</li>
<li style="text-align: justify;">Disorders of Calcium and Phosphorus Homeostasis</li>
<li style="text-align: justify;">Disorders of Potassium and Magnesium Homeostasis</li>
<li style="text-align: justify;">Acid–Base Disorders<br /><br />Neurologic Disorders</li>
<li style="text-align: justify;">Evaluation of Neurologic Illness</li>
<li style="text-align: justify;">Multiple Sclerosis</li>
<li style="text-align: justify;">Epilepsy</li>
<li style="text-align: justify;">Status Epilepticus</li>
<li style="text-align: justify;">Acute Management of the Brain Injury Patient</li>
<li style="text-align: justify;">Parkinson’s Disease</li>
<li style="text-align: justify;">Pain Managemen</li>
<li style="text-align: justify;">Headache Disorders<br /><br />Psychiatric Disorders</li>
<li style="text-align: justify;">Evaluation of Psychiatric Illness</li>
<li style="text-align: justify;">Childhood Disorders</li>
<li style="text-align: justify;">Eating Disorders</li>
<li style="text-align: justify;">Alzheimer’s Disease</li>
<li style="text-align: justify;">Substance-Related Disorders: Overview and Depressants, Stimulants, and Hallucinogens</li>
<li style="text-align: justify;">Substance-Related Disorders: Alcohol, Nicotine, and Caffeine</li>
<li style="text-align: justify;">Schizophrenia</li>
<li style="text-align: justify;">Depressive Disorders</li>
<li style="text-align: justify;">Bipolar Disorder</li>
<li style="text-align: justify;">Anxiety Disorders I: Generalized Anxiety, Panic, and Social Anxiety Disorders</li>
<li style="text-align: justify;">Anxiety Disorders II: Posttraumatic Stress Disorder and Obsessive-Compulsive Disorder</li>
<li style="text-align: justify;">Sleep Disorders</li>
<li style="text-align: justify;">Developmental Disabilities<br /><br />Endocrinologic Disorders</li>
<li style="text-align: justify;">Diabetes Mellitus</li>
<li style="text-align: justify;">Thyroid Disorders</li>
<li style="text-align: justify;">Adrenal Gland Disorders</li>
<li style="text-align: justify;">Pituitary Gland Disorders<br /><br />Gynecologic Disorders</li>
<li style="text-align: justify;">Pregnancy and Lactation: Therapeutic Considerations</li>
<li style="text-align: justify;">Contraception</li>
<li style="text-align: justify;">Menstruation-Related Disorders</li>
<li style="text-align: justify;">Endometriosis</li>
<li style="text-align: justify;">Hormone Therapy in Women<br /><br />Urologic Disorders</li>
<li style="text-align: justify;">Erectile Dysfunction</li>
<li style="text-align: justify;">Management of Benign Prostatic Hyperplasia</li>
<li style="text-align: justify;">Urinary Incontinence<br /><br />Immunologic Disorders</li>
<li style="text-align: justify;">Function and Evaluation of the Immune System</li>
<li style="text-align: justify;">Systemic Lupus Erythematosus and Other Collagen-Vascular Diseases</li>
<li style="text-align: justify;">Allergic and Pseudoallergic Drug Reactions</li>
<li style="text-align: justify;">Solid-Organ Transplantation<br /><br />Rheumatologic Disorders</li>
<li style="text-align: justify;">Osteoporosis and Other Metabolic Bone Diseases</li>
<li style="text-align: justify;">Rheumatoid Arthritis</li>
<li style="text-align: justify;">Osteoarthritis</li>
<li style="text-align: justify;">Gout and Hyperuricemia<br /><br />Ophthalmic and Otolaryngologic Disorders</li>
<li style="text-align: justify;">Glaucoma</li>
<li style="text-align: justify;">Allergic Rhinitis<br /><br />Dermatologic Disorders</li>
<li style="text-align: justify;">Dermatologic Drug Reactions and Self-Treatable Skin Disorders</li>
<li style="text-align: justify;">Acne Vulgaris</li>
<li style="text-align: justify;">Psoriasis</li>
<li style="text-align: justify;">Atopic Dermatitis<br /><br />Hematologic Disorders</li>
<li style="text-align: justify;">Hematopoiesis</li>
<li style="text-align: justify;">Anemias</li>
<li style="text-align: justify;">Coagulation Disorders</li>
<li style="text-align: justify;">Sickle Cell Disease</li>
<li style="text-align: justify;">Drug-Induced Hematologic Disorders<br /><br />Infectious Diseases</li>
<li style="text-align: justify;">Laboratory Tests to Direct Antimicrobial Pharmacotherapy</li>
<li style="text-align: justify;">Antimicrobial Regimen Selection</li>
<li style="text-align: justify;">Central Nervous System Infections</li>
<li style="text-align: justify;">Lower Respiratory Tract Infections</li>
<li style="text-align: justify;">Upper Respiratory Tract Infections</li>
<li style="text-align: justify;">Influenza</li>
<li style="text-align: justify;">Skin and Soft-Tissue Infections</li>
<li style="text-align: justify;">Infective Endocarditis</li>
<li style="text-align: justify;">Tuberculosis</li>
<li style="text-align: justify;">Gastrointestinal Infections and Enterotoxigenic Poisonings</li>
<li style="text-align: justify;">Intraabdominal Infections</li>
<li style="text-align: justify;">Parasitic Diseases</li>
<li style="text-align: justify;">Urinary Tract Infections and Prostatitis</li>
<li style="text-align: justify;">Sexually Transmitted Diseases</li>
<li style="text-align: justify;">Bone and Joint Infections</li>
<li style="text-align: justify;">Sepsis and Septic Shock</li>
<li style="text-align: justify;">Superficial Fungal Infections</li>
<li style="text-align: justify;">Invasive Fungal Infections</li>
<li style="text-align: justify;">Infections in Immunocompromised Patients</li>
<li style="text-align: justify;">Antimicrobial Prophylaxis in Surgery</li>
<li style="text-align: justify;">Vaccines, Toxoids, and Other Immunobiologics</li>
<li style="text-align: justify;">Human Immunodeficiency Virus Infection<br /><br />Oncologic Disorders</li>
<li style="text-align: justify;">Cancer Treatment and Chemotherapy</li>
<li style="text-align: justify;">Breast Cancer</li>
<li style="text-align: justify;">Lung Cancer</li>
<li style="text-align: justify;">Colorectal Cancer</li>
<li style="text-align: justify;">Prostate Cancer</li>
<li style="text-align: justify;">Lymphomas</li>
<li style="text-align: justify;">Ovarian Cancer</li>
<li style="text-align: justify;">Acute Leukemias</li>
<li style="text-align: justify;">Chronic Leukemias</li>
<li style="text-align: justify;">Multiple Myeloma</li>
<li style="text-align: justify;">Myelodysplastic Syndromes</li>
<li style="text-align: justify;">Skin Cancer</li>
<li style="text-align: justify;">Hematopoietic Stem Cell Transplantation<br /><br />Nutrition Disorders</li>
<li style="text-align: justify;">Assessment of Nutrition Status and Nutrition Requirements</li>
<li style="text-align: justify;">Prevalence and Significance of Malnutrition</li>
<li style="text-align: justify;">Parenteral Nutrition</li>
<li style="text-align: justify;">Enteral Nutrition</li>
<li style="text-align: justify;">Nutritional Considerations in Major Organ Failure</li>
<li style="text-align: justify;">Obesity</li>
<li style="text-align: justify;">Glossary</li>
<li style="text-align: justify;">Index</li>
</span></ul>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-48494898805618988202012-01-10T23:14:00.001+07:002012-01-10T23:14:45.677+07:00BNF for Children 2009<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 2009] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 6.84 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 1005]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">Author</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">bnfc.org</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4ecjn" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwK_LbGLvRoXOaV3xY-bPxYopaqZT42ppGHAO3XH7Q8Pc1SMv1ssTfIV4wkbex6sImYi99FaK1e5yI59Ns1_2aM0W69Y32Ck_foX0tZ4ZZLGsvECLAxWHhGKvMJhEXeVzNC60fnjjWOBA/s1600/button+1.gif" /></a></div>
<a href="http://adf.ly/4ecjn" target="_blank"></a><br />
<a href="http://adf.ly/4ecjn" target="_blank"><a name='more'></a></a><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>BNF for Children 2009</b></span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPqEBIJv__ZDvLAx6MWKH9rTI8UV67vxUHwIWesEp51W2SgxNMUc2GPozwgYNyb7oenk-HBU03CDglzwhRsj1iRzij-HY7pejzkBv3Qq1PGvPAlWVdlUKh71tWQ3IfUbrvsCWjzkQqDbs/s1600/SFEBC00275+BNF+for+children.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPqEBIJv__ZDvLAx6MWKH9rTI8UV67vxUHwIWesEp51W2SgxNMUc2GPozwgYNyb7oenk-HBU03CDglzwhRsj1iRzij-HY7pejzkBv3Qq1PGvPAlWVdlUKh71tWQ3IfUbrvsCWjzkQqDbs/s1600/SFEBC00275+BNF+for+children.jpg" /></a></div>
<div style="text-align: justify;">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><br /></span></span></div>
<div style="text-align: justify;">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>Line of Contents</b></span></span></div>
<ul>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;">
<li>Preface</li>
<li>Acknowledgements</li>
<li>Editorial</li>
<li>Paediatric Formulary Committee 2008–2009</li>
<li>How BNF for Children is constructed</li>
<li>How to use BNF for Children</li>
<li>Changes for this edition</li>
<li>Name changes</li>
<li>General guidance</li>
<li>Prescription writing</li>
<li>Supply of medicines</li>
<li>Emergency supply of medicines</li>
<li>Drug treatment in children</li>
<li>Prescribing in hepatic impairment</li>
<li>Prescribing in renal impairment</li>
<li>Prescribing in pregnancy</li>
<li>Prescribing in breast-feeding</li>
<li>Prescribing Controlled Drugs</li>
<li>Adverse reactions to drugs</li>
<li>Prescribing in palliative care</li>
<li>Prescribing in dental practice</li>
<li>Drugs and sport</li>
<li>Emergency treatment of poisoning</li>
<li>Notes on drugs and Preparations</li>
<li>1: Gastro-intestinal system</li>
<li>2: Cardiovascular system</li>
<li>3: Respiratory system</li>
<li>4: Central nervous system</li>
<li>5: Infections</li>
<li>6: Endocrine system</li>
<li>7: Obstetrics, gynaecology, and urinary-tract disorders</li>
<li>8: Malignant disease and immunosuppression</li>
<li>9: Nutrition and blood</li>
<li>10: Musculoskeletal and joint diseases </li>
<li>11: Eye </li>
<li>12: Ear, nose, and oropharynx </li>
<li>13: Skin</li>
<li>14: Immunological products and vaccines</li>
<li>15: Anaesthesia</li>
<li>Appendixes and indices</li>
<li>Appendix 1: Interactions</li>
<li>Appendix 2: Borderline substances</li>
<li>Appendix 3: Cautionary and advisory labels for dispensed medicines</li>
<li>Appendix 4: Intravenous infusions for neonatal intensive care</li>
<li>Dental Practitioners’ Formulary</li>
<li>Nurse Prescribers’ Formulary</li>
<li>Non-medical prescribing</li>
<li>Index of manufacturers</li>
<li>Index</li>
</span></ul>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-87962470643287552412012-01-10T12:00:00.001+07:002012-01-10T12:01:50.084+07:00The C+ + Programming Language Third Edition<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 1997] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 3.38 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 1022]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">Author</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Bjarne Stroustrup</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4dzrS" target="_blank"><img border="0" src="http://1.bp.blogspot.com/-gEUVggYPgXw/TvmOG_mk2CI/AAAAAAAAAUc/_L9YiAfodII/s1600/button+1.gif" /></a></div>
<a href="http://1.bp.blogspot.com/-gEUVggYPgXw/TvmOG_mk2CI/AAAAAAAAAUc/_L9YiAfodII/s1600/button+1.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a><br />
<a href="http://1.bp.blogspot.com/-gEUVggYPgXw/TvmOG_mk2CI/AAAAAAAAAUc/_L9YiAfodII/s1600/button+1.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><a name='more'></a></a><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>The C+ + Programming Language Third Edition</b></span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyG0PsSjVYLlO64FozsIHor3QWtjKIWMRm-WCQnxeoTuCuIfh30uRDuJ1zntdSARdXhZec1QiqSJxqSNTxdAiZejAyKc8-BCSV7idsm_9vEYdKfTi9n9Ji5HIp1yInOTKuMwv06G97AVI/s1600/SFEBC00507+The+C%252B+%252B+Programming+Language+Third+Edition.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyG0PsSjVYLlO64FozsIHor3QWtjKIWMRm-WCQnxeoTuCuIfh30uRDuJ1zntdSARdXhZec1QiqSJxqSNTxdAiZejAyKc8-BCSV7idsm_9vEYdKfTi9n9Ji5HIp1yInOTKuMwv06G97AVI/s1600/SFEBC00507+The+C%252B+%252B+Programming+Language+Third+Edition.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><br /></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>Line of Contents</b></span></span><br />
<br />
<ul style="text-align: left;">
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Introductory Material</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Part I: Basic Facilities</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Part II: Abstraction Mechanisms</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Part III: The Standard Library</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Part IV: Design Using C++</span></span></li>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;">
<li>Appendices </li>
</span></ul>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-57718497582675670972012-01-10T08:33:00.000+07:002012-01-10T08:33:31.921+07:00Supplementary Cementing Materials<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 2011] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 4.54 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 304]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">Authors</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Rafat Siddique and Mohammad Iqbal Khan</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4dp5P" target="_blank"><img border="0" src="http://1.bp.blogspot.com/-gEUVggYPgXw/TvmOG_mk2CI/AAAAAAAAAUc/_L9YiAfodII/s1600/button+1.gif" /></a></div>
<a href="http://adf.ly/4dp5P" target="_blank"><a name='more'></a></a><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>Supplementary Cementing Material</b>s</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf7dKlSU_M2ddex5dKMKVygC0T2tW2wRfxHAq69eAFGhsAQzQZKsq8-nh1ue9ekQmwVvRzbmPnQ7ylFF6WhhUTU5sjwM98GG58ySvG37UKYyce4jqKPQU4QtcqA1MsJZVqGrd5LTepSqU/s1600/SFEBC00503+Supplementary+Cementing+Materials.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf7dKlSU_M2ddex5dKMKVygC0T2tW2wRfxHAq69eAFGhsAQzQZKsq8-nh1ue9ekQmwVvRzbmPnQ7ylFF6WhhUTU5sjwM98GG58ySvG37UKYyce4jqKPQU4QtcqA1MsJZVqGrd5LTepSqU/s1600/SFEBC00503+Supplementary+Cementing+Materials.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><br /></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Line of Contents</span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"> <b> 1 Fly Ash</b></span></span><br />
<ul style="text-align: left;">
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Introduction</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Properties of Fly Ash</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Classification of Fly Ash</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Reaction Mechanism</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Uses of Fly Ash</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Objectives of Using Fly Ash in Cement/Concrete</span></span></li>
<li><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Benefits of Using Fly Ash in Cement/Concrete</span></span></li>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;">
<li>Effect of Fly Ash on the Fresh Properties of Cement Concrete</li>
<li>Effect of Fly Ash on Properties of Cement Concrete in Hardened State</li>
<li>Durability Properties of Concrete Made with Fly Ash<br /><br /><b>2 Silica Fume</b></li>
<li>Introduction</li>
<li>Properties of Silica Fume</li>
<li>Reaction Mechanism</li>
<li>Heat of Hydration</li>
<li>Silica Fume Efficiency</li>
<li>Advantages of Using Silica Fume</li>
<li>Applications of Silica Fume</li>
<li>Effect of Silica Fume on Fresh Properties of Cement/Mortar/Concrete</li>
<li>Effect of Silica Fume on the Hardened Properties of Cement/Mortar/Concrete</li>
<li>Effect of Silica Fume on the Durability Properties<br /><br /><b>3 Ground Granulated Blast Furnace Slag</b></li>
<li>Introduction</li>
<li>Characteristics of GGBS</li>
<li>Fresh Properties of Mortar/Paste/Concrete Containing GGBS</li>
<li>Properties of Hardened Concrete Containing GGBS</li>
<li>Durability Properties of Concrete Containing GGBS<br /><br /><b>4 Metakaolin</b></li>
<li>Introduction</li>
<li>Properties of Metakaolin</li>
<li>Hydration Reaction</li>
<li>Fresh Properties of Mortar/Concrete Containing Metakaolin</li>
<li>Properties of Hardened Mortar/Concrete Containing Metakaolin</li>
<li>Durability Properties of Concrete Containing Metakaolin<br /><br /><b>5 Rice Husk Ash</b></li>
<li>Introduction</li>
<li>Properties of RHA</li>
<li>Pozzolanic Activity</li>
<li>Fresh Properties of Paste/Concrete Containing RHA</li>
<li>Properties of Hardened Concrete Containing RHA</li>
<li>Durability Properties of Concrete Containing RHA</li>
</span></ul>
</div>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=0495082538&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com0tag:blogger.com,1999:blog-2872785713693544081.post-10576748596199283012012-01-08T14:50:00.001+07:002012-01-08T14:50:14.199+07:00Steve Jobs<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 2011] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 4.44 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 382]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">Author</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;">Walter Isaacson</span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4bvex" target="_blank"><img border="0" src="http://1.bp.blogspot.com/-gEUVggYPgXw/TvmOG_mk2CI/AAAAAAAAAUc/_L9YiAfodII/s1600/button+1.gif" /></a></div>
<a href="http://adf.ly/4bvex" target="_blank"></a><br />
<a href="http://adf.ly/4bvex" target="_blank"></a><br />
<a href="http://adf.ly/4bvex" target="_blank"><a name='more'></a></a><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>Steve Jobs</b></span></span><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivtwmXpNUIZ-15T45_zTlhBQIhgPbigcFvFH2fl3rcmuciVppoeY64CPizkHLF3Vgc5RiQfAx2BhEycyOfLJav_j1O8wYDRmD3CNMHQJDo56zbNVoDsOG3ocsxqXq5oMXKDt3G65MO0_Y/s1600/SFEBC00506+Steve+Jobs.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivtwmXpNUIZ-15T45_zTlhBQIhgPbigcFvFH2fl3rcmuciVppoeY64CPizkHLF3Vgc5RiQfAx2BhEycyOfLJav_j1O8wYDRmD3CNMHQJDo56zbNVoDsOG3ocsxqXq5oMXKDt3G65MO0_Y/s1600/SFEBC00506+Steve+Jobs.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><br /></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; line-height: 18px;"><b>Line of Contents</b></span></span><br />
<ul style="text-align: left;">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: small;">
<li>CHAPTER ONE Childhood: Abandoned and Chosen</li>
<li>CHAPTER TWO Odd Couple: The Two Steves</li>
<li>CHAPTER THREE The Dropout: Turn On, Tune In . . .</li>
<li>CHAPTER FOUR Atari and India: Zen and the Art of Game Design</li>
<li>CHAPTER FIVE The Apple I: Turn On, Boot Up, Jack In . . .</li>
<li>CHAPTER SIX The Apple II: Dawn of a New Age</li>
<li>CHAPTER SEVEN Chrisann and Lisa: He Who Is Abandoned . . .</li>
<li>CHAPTER EIGHT Xerox and Lisa: Graphical User Interfaces</li>
<li>CHAPTER NINE Going Public: A Man of Wealth and Fame</li>
<li>CHAPTER TEN The Mac Is Born: You Say You Want a Revolution</li>
<li>CHAPTER ELEVEN The Reality Distortion Field: Playing by His Own Set of Rules</li>
<li>CHAPTER TWELVE The Design: Real Artists Simplify</li>
<li>CHAPTER THIRTEEN Building the Mac: The Journey Is the Reward</li>
<li>CHAPTER FOURTEEN Enter Sculley: The Pepsi Challenge</li>
<li>CHAPTER FIFTEEN The Launch: A Dent in the Universe</li>
<li>CHAPTER SIXTEEN Gates and Jobs: When Orbits Intersect</li>
<li>CHAPTER SEVENTEEN Icarus: What Goes Up . . .</li>
<li>CHAPTER EIGHTEEN NeXT: Prometheus Unbound</li>
<li>CHAPTER NINETEEN Pixar: Technology Meets Art</li>
<li>CHAPTER TWENTY A Regular Guy: Love Is Just a Four-Letter Word</li>
<li>CHAPTER TWENTY-ONE Family Man: At Home with the Jobs Clan</li>
<li>CHAPTER TWENTY-TWO Toy Story: Buzz and Woody to the Rescue</li>
<li>CHAPTER TWENTY-THREE The Second Coming: What Rough Beast, Its Hour Come Round at Last . . .</li>
<li>CHAPTER TWENTY-FOUR The Restoration: The Loser Now Will Be Later to Win</li>
<li>CHAPTER TWENTY-FIVE Think Different: Jobs as iCEO</li>
<li>CHAPTER TWENTY-SIX Design Principles: The Studio of Jobs and Ive</li>
<li>CHAPTER TWENTY-SEVEN The iMac: Hello (Again)</li>
<li>CHAPTER TWENTY-EIGHT CEO: Still Crazy after All These Years</li>
<li>CHAPTER TWENTY-NINE Apple Stores: Genius Bars and Siena Sandstone</li>
<li>CHAPTER THIRTY The Digital Hub: From iTunes to the iPod</li>
<li>CHAPTER THIRTY-ONE The iTunes Store: I’m the Pied Piper</li>
<li>CHAPTER THIRTY-TWO Music Man: The Sound Track of His Life</li>
<li>CHAPTER THIRTY-THREE Pixar’s Friends: . . . and Foes</li>
<li>CHAPTER THIRTY-FOUR Twenty-first-century Macs: Setting Apple Apart</li>
<li>CHAPTER THIRTY-FIVE Round One: Memento Mori</li>
<li>CHAPTER THIRTY-SIX The iPhone: Three Revolutionary Products in One</li>
<li>CHAPTER THIRTY-SEVEN Round Two: The Cancer Recurs</li>
<li>CHAPTER THIRTY-EIGHT The iPad: Into the Post-PC Era</li>
<li>CHAPTER THIRTY-NINE New Battles: And Echoes of Old Ones</li>
<li>CHAPTER FORTY To Infinity: The Cloud, the Spaceship, and Beyond</li>
<li>CHAPTER FORTY-ONE Round Three: The Twilight Struggle</li>
<li>CHAPTER FORTY-TWO Legacy: The Brightest Heaven of Invention</li>
</span></ul>
</div>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=B005CWIVYI&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
<br />
<br /></div>
<iframe frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=wwwsitosoft88-20&o=1&p=8&l=as1&asins=B001FA1O18&ref=tf_til&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="height: 240px; width: 120px;"></iframe>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com1tag:blogger.com,1999:blog-2872785713693544081.post-90481407238947494282012-01-08T10:34:00.000+07:002012-01-08T10:58:06.715+07:00Gray Hat Hacking The Ethical Hacker’s Handbook Third Edition<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Year : 2011] </span><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">[Size : 12.2 MB] [Format :<span style="color: red;"> </span><a href="http://sitosoft-88.blogspot.com/2011/11/adobe-reader.html" style="color: red; text-decoration: none;" target="_blank">PDF</a>] [Pages : 721]</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;">Authors</span></span></span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, sans-serif; font-size: 13px; line-height: 18px;"></span></span></span><br />
Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, and Terron Williams<br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="http://adf.ly/4bl5d" target="_blank"><img border="0" src="http://1.bp.blogspot.com/-gEUVggYPgXw/TvmOG_mk2CI/AAAAAAAAAUc/_L9YiAfodII/s1600/button+1.gif" /></a></div>
<a href="http://adf.ly/4bl5d" target="_blank"><a name='more'></a></a><br />
<b>Gray Hat Hacking The Ethical Hacker’s Handbook Third Edition</b><br />
<div class="separator" style="clear: both; text-align: justify;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf2k7GO-RtLrD74p16SGDVSeIR7lCLyq1WBwxQP1VYE-cgLIeQnKKO20qLJ-YF1U_RASvKqjD33kFU0IYFfOWQVMwESP4R7SEAd7gKZ_YfZmGN3P4mOAvfY43Y4MwBLTI1QlhXGwRyvWc/s1600/SFEBC00504+Gray+Hat+Hacking+The+Ethical+Hacker%25E2%2580%2599s+Handbook+Third+Edition.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf2k7GO-RtLrD74p16SGDVSeIR7lCLyq1WBwxQP1VYE-cgLIeQnKKO20qLJ-YF1U_RASvKqjD33kFU0IYFfOWQVMwESP4R7SEAd7gKZ_YfZmGN3P4mOAvfY43Y4MwBLTI1QlhXGwRyvWc/s1600/SFEBC00504+Gray+Hat+Hacking+The+Ethical+Hacker%25E2%2580%2599s+Handbook+Third+Edition.jpg" /></a></div>
<b>Line of Contents</b><br />
<br />
<ul style="text-align: left;">
<li></li>
<li>Part I Introduction to Ethical Disclosure</li>
<li>Chapter 1 Ethics of Ethical Hacking</li>
<li>Chapter 2 Ethical Hacking and the Legal System</li>
<li>Chapter 3 Proper and Ethical Disclosure </li>
<li>Part II Penetration Testing and Tools</li>
<li>Chapter 4 Social Engineering Attacks</li>
<li>Chapter 5 Physical Penetration Attacks</li>
<li>Chapter 6 Insider Attacks</li>
<li>Chapter 7 Using the BackTrack Linux Distribution</li>
<li>Chapter 8 Using Metasploit</li>
<li>Chapter 9 Managing a Penetration Test</li>
<li>Part III Exploiting </li>
<li>Chapter 10 Programming Survival Skills</li>
<li>Chapter 11 Basic Linux Exploits</li>
<li>Chapter 12 Advanced Linux Exploits</li>
<li>Chapter 13 Shellcode Strategies</li>
<li>Chapter 14 Writing Linux Shellcode</li>
<li>Chapter 15 Windows Exploits</li>
<li>Chapter 16 Understanding and Detecting Content-Type Attacks </li>
<li>Chapter 17 Web Application Security Vulnerabilities</li>
<li>Chapter 18 VoIP Attacks</li>
<li>Chapter 19 SCADA Attacks</li>
<li></li>
<li>Part IV Vulnerability Analysis</li>
<li>Chapter 20 Passive Analysis</li>
<li>Chapter 21 Advanced Static Analysis with IDA Pro</li>
<li>Chapter 22 Advanced Reverse Engineering</li>
<li>Chapter 23 Client-Side Browser Exploits</li>
<li>Chapter 24 Exploiting the Windows Access Control Model</li>
<li>Chapter 25 Intelligent Fuzzing with Sulley</li>
<li>Chapter 26 From Vulnerability to Exploit</li>
<li>Chapter 27 Closing the Holes: Mitigation</li>
<li>Part V Malware Analysis</li>
<li>Chapter 28 Collecting Malware and Initial Analysis</li>
<li>Chapter 29 Hacking Malware</li>
<li>Index</li>
</ul>
</div>wahyuhttp://www.blogger.com/profile/00577143003321917927noreply@blogger.com1