Обратная связь В избранное
Как скачать книги бесплатно Если вы нашли ошибки, сообщите нам.

Поиск по сайту

По Вашему запросу найдено 6 ответов (Результаты запроса 1 - 6) :

#1: USB Complete бесплатно

АвторАвтор: lbooks  Опубликовано: 12-02-2009, 13:00  Комментариев: 0
The Universal Serial Bus (USB) is a fast and flexible interface for connecting devices to computers. Every new PC has at least a couple of USB ports. The interface is versatile enough to use with standard peripherals like keyboards and disk drives as well as more specialized devices, including one-of-a-kind designs. USB is designed from the ground up to be easy for end users, with no user configuring required in hardware or software...

#2: War of Another Kind бесплатно

АвторАвтор: dim_boss  Опубликовано: 9-04-2011, 10:44  Комментариев: 0
In this book Durrill describes in graphic detail the disintegration, during the Civil War, of Southern plantation society in a North Carolina coastal county. He details struggles among planters, slaves, yeoman farmers, and landless white laborers, as well as a guerrilla war and a clash between two armies that, in the end, destroyed all that remained of the county's social structure.

#3: The Gun Digest Book of Cowboy Action Shooting: Guns Gear Tactics бесплатно

АвторАвтор: dim_boss  Опубликовано: 14-03-2011, 21:10  Комментариев: 0
Fantasy gunfighting has never enjoyed as much popularity as it does today. This one-of-a-kind guide offers complete coverage of the sport from the top experts and personalities in the field. Well-known Single-Action Shooting Society (SASS) member Judge Roy Bean provides background information on Cowboy Action Shooting in "The Spirit of the Game," and chapters from other experts, including "Getting Started" and "Dressing the Part & Choosing Your Alias" provide help for beginners.

#4: Kursk: The German View бесплатно

АвторАвтор: lbooks  Опубликовано: 22-01-2009, 18:26  Комментариев: 0
Firsthand accounts of the German commanders who planned and executed the largest tank battle in history.
The battle of Kursk, fought in the summer of 1943, involved six thousand German and Soviet armored vehicles, making it the biggest tank battle of all time and possibly the largest battle of any kind. Students of military history have long recognized the importance of Kursk, also known as "Operation Citadel," and there have been several serious studies of the battle. Yet, the German view of the battle has been largely ignored.

#5: WWII Weapons. Balance of the National Freedom Museum Collection (Sale 152) бесплатно

АвторАвтор: dim_boss  Опубликовано: 10-01-2011, 07:11  Комментариев: 0
This catalog contains some of the most historically important items from WW II that has ever come onto the market anywhere- worldwide. Yamashita's presentation sword signed not only by the sword maker who made it, but also with a patriotic engraved presentation from the very Emperor of Japan urging him to destroy MacArthur's Allied Forces in the Pacific/Philippines. And Sherman Tanks that won the war, these 1st Model Sherman's are irreplaceable in this kind of original condition with painted tank division markings, they have been spared by time untouched and unrestored as a testament to their decisive factor during the war. And D- Day - nothing can compare in rarity and historical importance to the Sherman Duplex Propeller Driven Tank excavated from the bottom of the ocean off Omaha Beach in Normandy, France.

#6: The Web Application Hacker’s Handbook: Discovering бесплатно

АвторАвтор: lbooks  Опубликовано: 10-11-2008, 16:04  Комментариев: 1
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.
The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

Навигация по сайту

Опрос пользователей

Как вам новый дизайн [?]

Супер
Хорошо
Неплохо
Было лучше
Плохо
Ужасно

Лучшее за неделю

Новинки