Biology books

Chemistry Books

Computer Books

Physics Books

Boost C++ Application Development Cookbook (PDF)

Boost C++ Application Development Cookbook
Antony Polukhin
Release at: 2013
Pages: 348
1st Edition
File Size: 4 MB
File Type: pdf
Language: English

Description of Boost C++ Application Development Cookbook

Boost C++ application development cookbook written by Antony Polukhin is a great book for C++ programming studies available in (PDF) free download. This Boost C++ Application Development Cookbook book Boost is a collection of C++ libraries. Reviewed each library by professional programmers before being accepted to Boost. Using many compilers, libraries are tested on multiple platforms and the C++ standard library implementations. While using Boost, you can be sure that you are using one of the most portable, fast, and reliable solutions that are distributed under a license suitable for commercial and open-source projects. Many parts of Boost applications have been included in C++ 11, and even more, parts are going to be included in the next standard of C++. You will find C++11-specific notes in each recipe of this Boost C++ Application Development Cookbook book.

Now that we know some of the basic Boost types for applications, the time is known as some data-converting functions. We'll see how to convert user-defined strings and number types to each other, how to safely cast polymorphic types, and how to write small and large parsers right inside the C++ source files.

Content of Boost C++ Application Development Cookbook

Chapter One: Starting to Write Your Application  7
Introduction  7
Getting configuration options  8
Storing any value in a container/variable  13
Storing multiple chosen types in a container/variable  16
Using the safe way to work with a container that stores multiple chosen types 18
Returning a flag or value where there is no value  22
Returning an array from a function  25
Combining multiple values into one  28
Reordering the parameters of function  30
Binding a function parameter value  34
Using the C++11 move emulation  37
Making a non-copyable class  40
Making a non-copyable but movable class  42
Chapter Two: Converting Data  47
Introduction  47
Converting strings to numbers  48
Converting numbers to strings  51
Converting numbers to numbers  53
Converting user-defined types to/from strings  56
Casting polymorphic objects  59
Parsing simple input  61
Parsing input  66
Chapter Three: Managing Resources  71
Introduction  71
Pointers managing to classes that do not leave scope  72
Pointers reference counting to classes used across methods  74
Pointers managing to arrays that do not leave scope  77
Reference counting pointers to arrays used across methods  79
Any functional objects storing in a variable  82
Passing a function pointer is a variable  85
Passing C++ Eleven lambda functions in a variable  86
Containers of pointers  88
Doing something at scope exit  91
Initializing the base class by a member of the derived class  93
Chapter Four: Compile-time Tricks  97
Introduction  97
Checking sizes at compile time  98
Enabling the usage of templated functions for integral types  102
Templated functions disabling usage for real types  106
Creating a type from number  108
Implementing a type trait  111
An optimal operator selecting for a template parameter  113
Getting of expression in C++03 type  116
Chapter Five: Multithreading  121
Introduction  121
Creating an execution thread  122
Syncing access to a common resource  126
Fast access to a common resource using atomics  131
Creating a work_queue class  134
Multiple-readers-single-writer lock  138
Creating variables that are unique per thread  141
Interrupting a thread  144
Manipulating a group of threads  146
Chapter Six: Manipulating Tasks  149
Introduction  149
Registering a task for processing an arbitrary datatype  150
Processing timer and making timers events as tasks  154
Network communication as a task  157
Accepting incoming connections  164
Executing different tasks in parallel  169
Conveyor tasks processing  171
Making a nonblocking barrier  176
Storing a making an exception a task from it  181
The processing system and getting signals as tasks  185
Chapter Seven: Manipulating Strings  189
Introduction  189
Changing cases and case-insensitive comparison  189
Matching strings using regular expressions  192
Replacing and searching strings using regular expressions  196
Formatting strings using safe printf-like functions  199
Replacing and erasing strings  201
Representing a string with two iterators  203
Using a reference to string type  206
Chapter Eight: Metaprogramming  211
Introduction  211
Using type "vector of types"  212
Manipulating a vector of types  217
Getting a function's result type at compile time  222
Making a higher-order metafunction  225
Evaluating metafunctions lazily  227
Converting all the tuple elements to strings  230
Splitting tuples  234
Chapter Nine: Containers  239
Introduction  239
Comparing strings in an ultra-fast manner  240
Using an unordered set and map  244
Making a map, where value is also a key  248
Using multi-index containers  252
Getting the benefits of single-linked list and memory pool  258
Using flat associative containers  263
Chapter Ten: Gathering Platform and Compiler Information  267
Introduction  267
Detecting int128 support  268
Detecting RTTI support  270
Speeding up compilation using C++11 extern templates  272
Writing metafunctions using simpler methods  274
Reducing code size and increasing performance of user-defined
types (UDTs) in C++11  276
The portable way to export and import functions and classes  279
Detecting the Boost version and getting latest features  282
Chapter Eleven: Working with the System  285
Introduction  285
Listing files in a directory  286
Erasing and creating files and directories  288
Passing data quickly from one process to another  291
Syncing interprocess communications  294
Using pointers in shared memory  297
The fastest way to read files  300
Coroutines – saving the state and postponing the execution  302
Chapter Twelve: Scratching the Tip of the Iceberg  307
Introduction  307
Working with graphs  308
Visualizing graphs  312
Using a true random number generator  315
Using portable math functions  317
Writing test cases  319
Combining multiple test cases in one test module  321
Manipulating images  323
Index  329


Flowering Plants Free PDF Download

Flowering Plants Free PDF Download

Title: Flowering Plants
Pages: 906
File Size: 6
File Type: PDF
Language: English

Description of Flowering Plants Free PDF eBook

Flowering Plants is a helpful book for the study of all types of Flowering Plants available in (PDF eBook) free download. Topics of all related to Flowering Plants are covered in this book. Flowering Plants book all those teachers and students who are doing research basis work related to Plants flower and its subjects, very useful for them. This Flowering Plants book is also very useful for such students who are currently studding Ph. D. Courses.

In this Flowering Plants book, all the facts of related subjects have been expressed in easy language. The person reading this Flowering Plants book can get complete information on the subject related to it. Information of the subject matter is given below. Before downloading, the user must see its content once. You can ask for permission to download it.

Content of Flowering Plants Free PDF eBook



Phylum Magnoliophyta


Subclass I. Magnoliidae

Subclass II. Ranunculidae

Subclass III. Hamamelididae

Subclass IV. Caryophyllidae

Subclass V. Dilleniidae

Subclass VI. Rosidae

Subclass VII. Asteridae

Subclass VIII. Lamiidae


Subclass I. Alismatidae

Subclass II. Liliidae

Subclass III. Arecidae

Subclass IV. Commelinidae

Ethical Hacking and Countermeasures Attack Phases (PDF)

Ethical Hacking book
Publisher: EC-Council Press
ISBN No: 978-1-4354-8360-6
Release at: 2010
Pages: 354
Volume 1
File Size: 17 MB
File Type: pdf
Language: English

Description of Content of Ethical Hacking and Countermeasures Attack Phases Volume 1

Ethical Hacking and Countermeasures Attack Phases written & print by EC Council is a useful book for Hacking studies to get in (PDF) free download. The EC-Council Press Ethical Hacking and Countermeasures series is intended for those studying to become security officers, site administrators, auditors, security professionals, and anyone who is concerned about or responsible for the integrity of the network infrastructure. The series includes a broad base of topics in offensive network security, ethical hacking, as well as countermeasures and network defense. The content of this series is designed to immerse learners into an interactive environment where they will be shown how to test, hack, scan, and secure information systems. A wide variety of malware, tools, and viruses, is presented in these Ethical Hacking and Countermeasures books, providing a complete understanding of the tools and tactics used by hackers. By gaining a thorough understanding of how hackers operate, ethical hackers are able to set up strong defensive and countermeasures systems to protect their organization’s critical infrastructure and information. The series, when used in its entirety, helps prepare readers to take and succeed on the CEH certification exam from EC-Council.

The Ethical Hacking and Countermeasures course mission is to educate, demonstrate and introduce hacking tools for penetration testing purposes only. You will not use the newly acquired skills for malicious and illegal attacks and you will not use such tools in an attempt to compromise any computer system, and you shall indemnify its partners and EC-Council from all liability with respect to the use or misuse of these tools, regardless of intent.

Content of Ethical Hacking and Countermeasures Attack Phases Volume 1

CHAPTER 1 Introduction to Ethical Hacking.  1-1
Objectives. 1-1
Key Terms. 1-1
Case Example. 1-2
Introduction to Ethical Hacking.  1-2
Importance of Security.1-2
Threats and Vulnerabilities. 1-3
Attacks. 1-3
Security Breaches.  1-3
Exposure.  1-4
Elements of Security.  1-4
Accountability. 1-4
Reusability. 1-4
The Functionality, Security, and Ease of Use Triangle. 1-4
Phases of an Attack. 1-5
Phase 1—Reconnaissance.  1-7
Phase 2—Scanning.1-7
Phase 3—Gaining Access. 1-8
Phase 4—Maintaining Access. 1-8
Phase 5—Covering Tracks. 1-8
Types of Hacker Attacks. 1-9
Operating System Attacks. 1-9
Application-Level Attacks. 1-9
Shrink-Wrap Code Attacks. 1-9
Misconfiguration Attacks. 1-9
Hacktivism. 1-10
Hacker Classes.1-10
Ethical Hackers. 1-10
What Do Ethical Hackers Do?. 1-10
Can Hacking Be Ethical?.  1-11
Skills of an Ethical Hacker.  1-11
What Is Vulnerability Research?. 1-12
Why Hackers Need Vulnerability Research. 1-12
Vulnerability Research Web Sites. 1-12
Conducting Ethical Hacking.  1-13
How Do They Go About It?. 1-13
Approaches to Ethical Hacking. 1-14
Ethical Hacking Testing.1-14
Ethical Hacking Deliverables. 1-15
Computer Crimes and Implications. 1-15
Case Example Revisited.1-15
Chapter Summary.1-15
Review Questions.1-16
Hands-On Projects. 1-17

CHAPTER 2 Footprinting. 2-1
Objectives. 2-1
Key Terms. 2-1
Case Example. 2-2
Introduction to Footprinting. 2-2
Why Is Footprinting Necessary?.  2-3
Revisiting Reconnaissance. 2-3
Information-Gathering Methodology. 2-4
Unearthing Initial Information. 2-4
What Is an IP Address?.  2-6
Finding a Company’s URL. 2-6
People Searching.  2-7
Footprinting Through Job Sites.  2-10
Information Gathering Stances.  2-10
Footprinting Tools.  2-13
Sensepost Footprint Tools 3.  2-13
Big Brother.2-14
Advanced Administrative Tools. 2-14
Wiktor. 2-15
WHOIS Tools. 2-15
WHOIS.  2-15
SmartWhois. 2-18
ActiveWhois. 2-18
LanWhoIs. 2-19
CountryWhois. 2-19
CallerIP.  2-19
Web Data Extractor. 2-19
DNS Information Tools.  2-21
DNS Enumerator.2-21
SpiderFoot. 2-21
Nslookup. 2-22 2-23
Expired Domains.2-23
DomainKing. 2-23
Domain Inspect.  2-23
MSR Strider URL Tracer. 2-24
Mozzle Domain Name Pro.  2-24
Locating the Network Range. 2-24
ARIN. 2-25
Traceroute. 2-26
3D Traceroute. 2-27
NeoTrace (now McAfee Visual Trace). 2-27
VisualRoute.  2-27
Path Analyzer Pro.2-28
Maltego.  2-28
TouchGraph.  2-29
E-Mail Spiders. 2-30
1st Email Address Spider. 2-30
Power Email Collector.  2-30
Locating Network Activity.   2-30
GEO Spider.  2-30
Google Earth. 2-31
Meta Search Engines.2-31
Dogpile.  2-31
WebFerret. 2-31
robots.txt. 2-31
WTR – Web The Ripper 2. 2-32
Web Site Watcher.2-32
Faking Web Sites Using Man-In-The-Middle Phishing Kit.  2-32
Case Example Revisited.  2-32
Chapter Summary. 2-33
Review Questions. 2-33
Hands-On Projects.  2-34

CHAPTER 3 Scanning.3-1
Objectives. 3-1
Key Terms. 3-1
Introduction to Scanning.  3-2
Scanning Defined. 3-2
Objectives of Scanning.3-2
Scanning Methodology.3-3
Step 1: Check for Live Systems. 3-3
Step 2: Check for Open Ports. 3-4
Step 3: Fingerprint the Operating System.3-10
Step 4: Scan for Vulnerabilities.  3-12
Step 5: Probe the Network. 3-13
Surfing Anonymously.  3-15
Scanning Countermeasures.  3-18
Tools.  3-18
Live System Scanning Tools.  3-18
Port Scanning Tools. 3-20
War Dialing Tools.3-39
Banner Grabbing Tools.   3-41
Tools for Active Stack Fingerprinting. 3-43
File Extension Concealment Tools. 3-46
Vulnerability Scanning.   3-47
Network Mapping Tools. 3-55
Proxy Tools.  3-56
Anonymizer Tools.3-62
Spoofing Tools. 3-70
Chapter Summary. 3-71
Review Questions. 3-71
Hands-On Projects.  3-73

CHAPTER 4 Enumeration. 4-1
Objectives. 4-1
Key Terms. 4-1
Introduction to Enumeration. 4-2
Enumeration Defined.4-2
Enumeration Techniques. 4-2
Null Session Enumeration. 4-2
SNMP Enumeration.4-8
UNIX Enumeration. 4-10
LDAP Enumeration. 4-12
NTP Enumeration.4-13
SMTP Enumeration. 4-13
Web Enumeration.4-14
Web Application Directory Enumeration.4-14
Default Password Enumeration.  4-15
Enumeration Procedure. 4-16
Tools.  4-16
Null Session Tools.4-16
User Account Tools. 4-19
Null Session Countermeasure Tools. 4-20
SNMP Enumeration Tools. 4-30
LDAP Enumeration Tools. 4-32
SMTP Enumeration Tools. 4-34
General Enumeration Tools.  4-35
Chapter Summary. 4-41
Review Questions. 4-41
Hands-On Projects.  4-42

CHAPTER 5 System Hacking.5-1
Objectives. 5-1
Key Terms. 5-1
Introduction to System Hacking.  5-2
Cracking Passwords.  5-2
Password Types. 5-2
Four Types of Password Attacks.  5-2
Password Cracking Web Sites. 5-5 5-5 5-6 5-6
Abcom PDF Password Cracker. 5-6
Password Guessing. 5-6
Administrator Password Guessing. 5-6
Manual Password Cracking Algorithm. 5-7
Automatic Password Cracking Algorithm.5-7
Performing Automated Password Guessing.5-8
Tool: NAT. 5-8
Tool: SMB Passive Brute Force Tool(Smbbf). 5-9
Tool: SMBCrack.  5-9
Hacking Tool: L0phtCrack. 5-9
Microsoft Authentication. 5-11
PWdump2 and PWdump3. 5-13
Tool: RainbowCrack.  5-13
Hacking Tool: KerbCrack. 5-14
Hacking Tool: John the Ripper. 5-14
Password Sniffing.5-15
Password Cracking Tools.  5-15
Tool: LCP. 5-15
Tool: ophcrack. 5-15
Tool: Crack. 5-17
Tool: Access PassView.5-17
Tool: Asterisk Logger.5-17
Password Cracking Countermeasures.5-17
Do Not Store Local Area Network Manager Hashes in the SAM Database. 5-18
Disabling LM Hashes.5-18
Syskey Utility. 5-18
AccountAudit. 5-19
Escalating Privileges.5-19
Cracking NT/2000 Passwords. 5-19
Active@ Password Changer.  5-20
Privilege Escalation Tool: X.exe. 5-20
Login Hack: Example.  5-20
Executing Applications. 5-23
Tool: PsExec.  5-23
Tool: Alchemy Remote Executor. 5-23
Tool: Emsa FlexInfo Pro. 5-23
Keyloggers and Spyware.  5-25
Keystroke Loggers.5-25
Tool: SC-KeyLog.5-25
Tool: Revealer Keylogger. 5-26
Tool: Handy Keylogger.   5-26
Tool: Ardamax Keylogger. 5-26
Tool: Powered Keylogger. 5-26
Tool: Elite Keylogger.  5-26
Tool: Quick Keylogger.  5-28
Tool: Spy Keylogger. 5-28
Tool: Perfect Keylogger.   5-30
Tool: Invisible Keylogger. 5-30
Tool: Actual Spy.5-30
Tool: Spytector. 5-30
Tool: Invisible KeyLogger Stealth. 5-32
Tool: Ghost Keylogger.  5-34
Tool: KeyGhost Hardware Keylogger. 5-34
Tool: 007 Spy Software.   5-34
Tool: Spector Pro.5-34
Tool: RemoteSpy.5-36
Tool: Spytech SpyAgent.   5-37
Tool: SpyBuddy.  5-37
Tool: Stealth KeyLogger.  5-37
Tool: AceSpy. 5-39
Tool: Keystroke Spy. 5-39
Tool: Desktop Spy.5-39
Tool: Activity Monitor.  5-39
Tool: Wiretap Professional.  5-41
Tool: eBlaster. 5-42
Tool: Stealth Recorder.  5-42
Tool: Stealth Website Logger. 5-42
Tool: Digi-Watcher Video Surveillance.  5-42
Tool: Phone Spy.  5-45
Tool: Print Monitor Pro.   5-45
Tool: Stealth Email Redirector.  5-45
Tool: FlexiSpy. 5-45
Tool: PC PhoneHome.5-45
Keylogger and Spyware Countermeasures.  5-47
Tool: PrivacyKeyboard. 5-47
Tool: Advanced Anti Keylogger.  5-47
Tool: SpyHunter.  5-49
Tool: Spy Sweeper.5-49
Tool: Spyware Terminator. 5-49
Tool: WinCleaner AntiSpyware.  5-51
Hiding Files. 5-51
Rootkits.  5-52
Why Rootkits?. 5-52
Hacking Tool: NT/2000 Rootkit. 5-52
Rootkit: Fu. 5-54
Rootkit: AFX Rootkit.  5-54
Rootkit: Nuclear.5-54
Rootkit: Vanquish.5-54
Steps for Detecting Rootkits. 5-54
Rootkit Detection Tools. 5-55
Rootkit Countermeasures. 5-55
Creating Alternate Data Streams. 5-56
How to Create NTFS Streams. 5-56
NTFS Stream Manipulation. 5-56
NTFS Stream Countermeasures. 5-57
NTFS Stream Detectors.   5-57
Tool: USBDumper.5-57
Steganography. 5-59
Process of Hiding Information in Image Files.  5-60
Least-Significant-Bit Insertion in Image Files.  5-60
Masking and Filtering in Image Files. 5-60
Algorithms and Transformation. 5-61
Steganography Tools.  5-61
Steganography Detection. 5-77
Steganalysis Tools.5-78
Covering Tracks. 5-80
Disabling Auditing.5-80
Clearing the Event Log.   5-80
Tool: ELSave. 5-81
Tool: WinZapper.5-81
Tool: Evidence Eliminator. 5-82
Tool: Traceless. 5-82
Tool: Tracks Eraser Pro.   5-82
Tool: Armor Tools.5-82
Tool: ZeroTracks.5-82
Chapter Summary. 5-85
Review Questions. 5-86
Hands-On Projects.  5-87

CHAPTER 6 Penetration Testing.  6-1
Objectives. 6-1
Key Terms. 6-1
Introduction to Penetration Testing.  6-2
Security Assessments. 6-2
Types of Penetration Testing.  6-4
Phases of Penetration Testing. 6-5
Best Practices.  6-5
Planning Phase. 6-6
Pre attack Phase. 6-6
Attack Phase.  6-6
Postattack Phase.  6-6
Planning Phase. 6-6
Enumerating Devices. 6-8
Pre attack Phase.  6-10
Attack Phase. 6-13
Postattack Phase.6-14
Tools. 6-16
Choosing Different Types of Pen-Test Tools.  6-16
Penetration-Testing Tools. 6-16
Other Tools Useful in a Pen-Test.   6-27
Chapter Summary. 6-58
Review Questions. 6-59
Hands-On Projects.  6-60



Plant Pathogen Detection and Disease Diagnosis (PDF)

Plant Pathogen Detection and Disease Diagnosis
P. Narayanasamy
Release at: 2001
Pages: 533
2nd Edition
File Size: 4 MB
File Type: pdf
Language: English

Description of Plant Pathogen Detection and Disease Diagnosis 2nd Edition

Plant Pathogen Detection and Disease Diagnosis written by P. Narayanasamy is a great book for plant pathogen studies to get in (PDF) free download. The 1st edition (1997) of this book was well-received by all concerned with crop disease diagnosis and management. The importance of precise identification of rapid detection of microbial pathogens for achieving effective crop disease management has been increasingly realized, as reflected published by numerous research papers in the past few years. Some microbial phytopathogens have been the phylogenetic relationships of many pathogens and identified, have been established based on new information. 

The biochemical inadequacy characteristics and morphological characteristics alone to establish the identity of microbial pathogens has been demonstrated. Some studies have demonstrated the need to make wider use of modern molecular methods that provide more reliable information for the identification, detection, and differentiation of microbial phytopathogens.

Content of Plant-Pathogen Detection and Disease Diagnosis 2nd Edition

1. Introduction 1
1.1 Nature and Causes of Plant Diseases 1
1.2 Disease Diagnosis and Management Strategies 2
2. Characteristics of Pathogenic Microbes 5
2.1 Light Microscopy 6
2.2 Methods of Isolation of Pathogens 17
2.3 Fungi 22
2.4 Bacteria 25
2.5 Phytoplasmas 26
2.6 Viruses 27
2.7 Viroids 28
Appendix 31
3. Symptoms of Plant Diseases 39
3.1 External Symptoms 39
3.2 Cytopathological Characteristics 69
3.3 Molecular Genetics of Pathogenicity 84
Appendix 100
4. Dissemination of Plant Pathogens 103
4.1 Transmission of Plant Viruses 103
4.2 Transmission of Viroids 123
4.3 Transmission of Bacterial Pathogens 127
4.4 Transmission of Fungal Pathogens 131
5. Cross-Protection 135
6. Chemodiagnostic Methods 139
6.1 Detection of Plant Viruses 139
6.2 Detection of Phytoplasmas 142
6.3 Detection of Fungal Pathogens 145
6.4 Detection of Bacterial Pathogens 151
6.5 Detection of Viroids 161
Appendix 163
7. Electron Microscopy 167
7.1 Preparation of Support Films 171
7.2 Calibration of the Electron Microscope 172
7.3 Techniques for Identification of Plant Viruses 172
7.4 Techniques for Detection of Phytoplasmas 184
7.5 Techniques for Detection of Fungal Pathogens 185
7.6 Techniques for Detection of Bacterial Pathogens 189
7.7 Scanning Electron Microscopy 189
Appendix 191
8. Serodiagnostic Methods 197
8.1 Detection of Plant Viruses 197
8.2 Detection of Phytoplasmas 233
8.3 Detection of Plant Pathogenic Bacteria 237
8.4 Detection of Fungal Pathogens 244
8.5 Detection of Viroids 257
Appendix 258
9. Nucleic Acid-Based Techniques 279
9.1 Hybridization Methods 280
9.2 Detection of Plant Viruses 283
9.3 Detection of Viroids 286
9.4 Polymerase Chain Reaction 290
9.5 Detection of Phytoplasmas 321
9.6 Detection of Fungal Pathogens 332
9.7 Detection of Bacterial Pathogens 355
Appendix 371
10. Detection of Double-Stranded RNAs 387
11. Diagnosis and Plant Diseases Monitoring 391
11.1 Plant Disease Diagnostic Centers 393
11.2 Plant Quarantines 396
References 397
Index 511