Sunday 22 December 2013

Digital logic and computer design Ebook

Solution Manual of Digital Logic & Computer Design 4th Edition by M.Morris Mano
Solution Manual of Digital Logic & Computer Design 4th Edition by M.Morris Mano




File Size: 1.9 MB

Numerical Methods Ebook

Numerical Methods for Engineers 5th edition by C. Chapra

 
Numerical Methods for Engineers 5th edition by C Chapra

 Book Description:

Instructors love Numerical Methods for Engineers because
 it makes teaching easy! Students love it because it is
 written for them with clear explanations and examples throughout.













File Size: 86.9 MB

Thursday 12 December 2013

Digital Signal Processing by S. Salivahanan Ebook

Digital Signal Processing by S. Salivahanan



Monday 2 December 2013

Ethical Hacking Videos - Train signal2

  1. Ethical Hacking - How Buffer Overflow Attacks Work

    by TrainSignal 2,287 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  2. 41

    Ethical Hacking - Examples of Buffer Overflow Attacks

    by TrainSignal 2,929 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  3. 42

    Ethical Hacking - Distributed DOS Attacks

    by TrainSignal 699 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  4. 43

    Ethical Hacking - Creating a DoS Attack

    by TrainSignal 4,230 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  5. 44

    Ethical Hacking - Commonly Used Network Sniffing Software Tools

    by TrainSignal 1,570 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  6. 45

    Ethical Hacking - Whether a DoS Attack Will Succeed

    by TrainSignal 822 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  7. 46

    Ethical Hacking - Attacking the Client Server

    by TrainSignal 684 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  8. 47

    Ethical Hacking - Demystifying the Data Center Side of Web Servers

    by TrainSignal 536 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  9. 48

    Ethical Hacking - Benefits of Web Based Attacks

    by TrainSignal 1,529 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  10. 49

    Ethical Hacking - Directory Traversal Attacks

    by TrainSignal 3,226 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  11. 50

    Ethical Hacking - Identifying and Exploiting Vulnerabilities in Web Applications Servers

    by TrainSignal 1,217 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  12. 51

    Ethical Hacking - Benefits of SQL Injection Attacks

    by TrainSignal 919 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  13. 52

    Ethical Hacking - Changing SQL Code to Obscure Your Attack

    by TrainSignal 549 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  14. 53

    Ethical Hacking - Conducting a SQL Injection Attack

    by TrainSignal 773 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  15. 54

    Ethical Hacking - Explanation of a SQL Injection Attack

    by TrainSignal 845 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  16. 55

    Ethical Hacking - Defining Wireless Network Security Importance

    by TrainSignal 864 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  17. 56

    Ethical Hacking - Expanding Exploitation of Wireless Networking

    by TrainSignal 580 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  18. 57

    Ethical Hacking - What Hackers Should Look For

    by TrainSignal 1,042 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  19. 58

    Ethical Hacking - Hardware and Software Tools of the Trade

    by TrainSignal 1,515 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  20. 59

    Ethical Hacking - How Wireless Security Attacks Work

    by TrainSignal 777 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  21. 60

    Ethical Hacking - Manufacturer Specific Wireless Security

    by TrainSignal 462 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  22. 61

    Ethical Hacking - Wireless Network Security Standards

    by TrainSignal 831 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  23. 62

    Ethical Hacking - Avoiding Intrusion Detection Systems

    by TrainSignal 1,191 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  24. 63

    Ethical Hacking - Erasing Evidence on Attacked Systems

    by TrainSignal 549 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  25. 64

    Ethical Hacking - Techniques to Preserve Evidence of an Attack

    by TrainSignal 581 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  26. 65

    Ethical Hacking - Why Hackers Cover Their Tracks

    by TrainSignal 563 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  27. 66

    Ethical Hacking - Social Engineering

    by TrainSignal 1,208 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  28. 67

    Ethical Hacking - Comprehensive Physical Security Controls

    by TrainSignal 459 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  29. 68

    Ethical Hacking - Definition of Physical Security

    by TrainSignal 422 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  30. 69

    Ethical Hacking - Depth Protection Detection Vulnerabilities

    by TrainSignal 407 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  31. 70

    Ethical Hacking - Exploiting Physical Security to Compromise Systems

    by TrainSignal 756 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  32. 71

    Ethical Hacking - Perimeter Protection Detection Recording Vulnerability

    by TrainSignal 488 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  33. 72

    Ethical Hacking - Implementing a Security Assessment Process

    by TrainSignal 582 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  34. 73

    Ethical Hacking - Completing and Delivering a Security Assessment

    by TrainSignal 661 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  35. 74

    Ethical Hacking - Conducting Penetration Tests and Types of Penetration Tests

    by TrainSignal 1,001 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  36. 75

    Ethical Hacking - Creating a Security Assessment Plan

    by TrainSignal 2,133 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CE

Ethical Hacking Videos - Train signal1

TrainSignal

Certified Ethical Hacker

  1. 1
    WATCHED

    Ethical Hacking - Course Scenario

    by TrainSignal 5,143 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  2. 2
    WATCHED

    Ethical Hacking - Key Terms

    by TrainSignal 7,187 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  3. 3
    WATCHED

    Ethical Hacking - Hardware and Software Configuration

    by TrainSignal 3,661 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  4. 4

    Ethical Hacking - Benefits of Ethical Hacking

    by TrainSignal 2,546 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  5. 5
    WATCHED

    Ethical Hacking - Concept & Core Rules of Ethical Hacking

    by TrainSignal 2,631 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  6. 6
    WATCHED

    Ethical Hacking - Definition and Purpose of Cryptography

    by TrainSignal 2,229 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  7. 7
    WATCHED

    Ethical Hacking - Symmetric and Asymmetric Cryptography

    by TrainSignal 3,938 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  8. 8
    WATCHED

    Ethical Hacking - Active Footprinting

    by TrainSignal 2,601 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  9. 9
    WATCHED

    Ethical Hacking - Passive vs Active Footprinting

    by TrainSignal 1,542 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  10. 10
    WATCHED

    Ethical Hacking - Goal of Footprinting

    by TrainSignal 1,164 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  11. 11
    WATCHED

    Ethical Hacking - Passive Footprinting

    by TrainSignal 1,694 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  12. 12
    WATCHED

    Ethical Hacking - Active Target Assessment

    by TrainSignal 1,094 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  13. 13
    WATCHED

    Ethical Hacking - Building a Nefarious Network Map

    by TrainSignal 1,326 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  14. 14
    WATCHED

    Ethical Hacking - Narrowing the Search and Identifying Targets

    by TrainSignal 967 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  15. 15
    WATCHED

    Ethical Hacking - Scanning Individual Hosts, Devices and Subnets

    by TrainSignal 1,843 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  16. 16
    WATCHED

    Ethical Hacking - Covering Your Tracks

    by TrainSignal 1,883 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  17. 17
    WATCHED

    Ethical Hacking - Escalating Code

    by TrainSignal 959 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  18. 18
    WATCHED

    Ethical Hacking - Installing and Detecting Rootkits and Spyware

    by TrainSignal 1,288 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  19. 19
    WATCHED

    Ethical Hacking - Overview of Attacking

    by TrainSignal 859 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  20. 20
    WATCHED

    Ethical Hacking - Password Cracking and Guessing

    by TrainSignal 2,971 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  21. 21
    WATCHED

    Ethical Hacking - Password Cracking Demo

    by TrainSignal 3,146 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  22. 22
    WATCHED

    Ethical Hacking - Password Hacking

    by TrainSignal 9,349 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  23. 23
    WATCHED

    Ethical Hacking - Planting Malware to Wreak Havoc

    by TrainSignal 1,111 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  24. 24
    WATCHED

    Ethical Hacking - Types of Malware

    by TrainSignal 1,195 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  25. 25
    WATCHED

    Ethical Hacking - Leveraging the Compromised System

    by TrainSignal 661 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  26. 26

    Ethical Hacking - What is a Backdoor?

    by TrainSignal 1,881 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  27. 27

    Ethical Hacking - What is a Virus?

    by TrainSignal 1,208 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  28. 28

    Ethical Hacking - Types of Session Hijacking Attacks

    by TrainSignal 1,346 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  29. 29

    Ethical Hacking -Types of Network Connections

    by TrainSignal 766 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  30. 30

    Ethical Hacking - What is Session Hijacking

    by TrainSignal 1,015 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  31. 31

    Ethical Hacking - Hijacking a Session with Hacking Tools

    by TrainSignal 2,338 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  32. 32

    Ethical Hacking - Cookie Theft and Session Hijacking

    by TrainSignal 1,220 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  33. 33

    Ethical Hacking Scenario - Big Money Bank

    by TrainSignal 951 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  34. 34

    Ethical Hacking - What is Network Sniffing?

    by TrainSignal 1,162 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  35. 35

    Ethical Hacking - What is a Denial of Service Attack

    by TrainSignal 2,742 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  36. 36

    Ethical Hacking - Uses of Buffer Overflow Attacks in Ethical Hacking

    by TrainSignal 729 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  37. 37

    Ethical Hacking - Types of DoS Attacks

    by TrainSignal 1,030 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  38. 38

    Ethical Hacking - Sniffing as an Attack Technique

    by TrainSignal 977 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH
  39. 39

    Ethical Hacking - Sniffing as a Network Enumeration Data Gathering Technique

    by TrainSignal 890 views
    http://www.trainsignal.com/Certified-Ethical-Hacker.aspx?utm­_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH