Your Ad Here

Monday, August 25, 2008



Peachpit Press; 2nd edition (August 5, 2007)
PDF | 584 pages | English | 37mb(rar)


Real World Adobe Illustrator CS3/by Mordy Golding (Author)
Description
Real World Adobe Illustrator CS3 is the definitive reference to Adobe's industry-standard vector graphics software. With an easy, engaging style, author Mordy Golding takes readers through all of the features of the program, explaining not only how to use the multitude of features but also why and when to use them. This edition has been thoroughly updated for Illustrator CS3, including insightful techniques on using the new Live Color environment and its tools, a new Isolation mode for working on complex artwork, and new tools for drawing, erasing, modifying, and cropping graphic. New integration features with Flash CS3 are also covered in depth; for example, readers learn how symbols can be defined as movie clips for use in Flash.
Now that Illustrator and Flash are both part of several bundled offerings of the Creative Suite, this coverage is a key part of the entire uninterrupted workflow from initial concept to final execution.
Along with tips, sidebars, and expert commentary, there are also numerous illustrations and screen shots included to offer readers the most complete coverage on this extraordinary application. Designers from all fields--illustrators, animators, package designers, graphic designers, web designers, and more--will find Real World Adobe Illustrator CS3 their one-stop guide to creating powerful designs in Illustrator

Download Link:

http://rapidshare.com/files/138785166/ReqL_W0rld.Illustr_3__www.softarchive.net.rar

or

http://w14.easy-share.com/1701307809.html

Modern Coding Theory by Tom Richardson , Ruediger Urbanke


Product Details
* Hardcover: 592 pages
* Publisher: Cambridge University Press (March 17, 2008)
* Language: English
* ISBN: 0521852293

Product Description
Having trouble deciding which coding scheme to employ, how to design a new scheme, or how to improve an existing system? This summary of the state-of-the-art in iterative coding makes this decision more straightforward. With emphasis on the underlying theory, techniques to analyse and design practical iterative coding systems are presented. Using Gallager's original ensemble of LDPC codes, the basic concepts are extended for several general codes, including the practically important class of turbo codes. The simplicity of the binary erasure channel is exploited to develop analytical techniques and intuition, which are then applied to general channel models. A chapter on factor graphs helps to unify the important topics of information theory, coding and communication theory. Covering the most recent advances, this text is ideal for graduate students in electrical engineering and computer science, and practitioners. Additional resources, including instructor's solutions and figures, available online: www.cambridge.org/9780521852296.

Book Description
Deciding which coding scheme to employ, how to design a new scheme, or how to improve an existing system? This summary of modern iterative coding makes the decision more straightforward by presenting the techniques to analyse and design practical iterative coding systems. Resources available online: www.cambridge.org/9780521852296.

About the Author
Tom Richardson is Vice President and Chief Scientist at Flarion Technologies, Inc., New Jersey. He was awarded his Ph.D. in electrical engineering in 1990 from M.I.T., after which he worked for 10 years at the Bell Labs' Mathematical Sciences Research Center. He is the inventor of over 20 patents.

Rüdiger Urbanke is a professor in the School of Computer and Communication Sciences at the Ecole Polytechnique Fédérale de Lausanne, Switzerland (EPFL). He was awarded his Ph.D. in electrical engineering in 1995 from Washington University, after which he worked for Bell Labs until joining the faculty at EPFL in 1999. He is currently on the board for the 'Foundations and Trends in Communications and Information Theory' series for the IEEE.

Download

Introduction to Game Programming with C++ by Alan Thorn

Product Details
* Paperback: 500 pages
* Publisher: Wordware Publishing, Inc. (June 25, 2007)
* Language: English
* ISBN: 1598220322

Product Description
Introduction to Game Programming with C++ is an exciting book for readers with no previous experience in game development. Starting from the basics of C++ and ending with the intracies of real-time 3D graphics, this book explores the interesting world of game making. It explains how to program, explores the meaning of object-oriented programming, and examines game algorithms, 2D and 3D games, sound and music, and how to create game installers. Overall, this book will introduce you to the world of game development and get you started on the right path to making games that sell.

Download

Computer Graphics for Java Programmers by Leen Ammeraal Kang Zhang

Product Details
* Paperback: 386 pages
* Publisher: Wiley; 2 edition (March 9, 2007)
* Language: English
* ISBN: 0470031603

Product Description
A great many varied and interesting visual effects can be achieved with computer graphics, for which a fundamental understanding of the underlying mathematical concepts – and a knowledge of how they can be implemented in a particular programming language – is essential.

Computer Graphics for Java Programmers, 2nd edition covers elementary concepts in creating and manipulating 2D and 3D graphical objects, covering topics from classic graphics algorithms to perspective drawings and hidden-line elimination.

Completely revised and updated throughout, the second edition of this highly popular textbook contains a host of ready-to-run-programs and worked examples, illuminating general principles and geometric techniques. Ideal for classroom use or self-study, it provides a perfect foundation for programming computer graphics using Java.

The publisher, John Wiley & Sons
Reinforcing concepts with useful and simple examples, this book explores both elementary and advance topics--from producing simple graphical objects to using applied geometry to create vectors and polygons and finally to rotating and transforming these graphical objects. It provides both classic graphics algorithms as well as particular effects such as perspective drawings. Ready-to-run programs and worked examples illuminate the principles and techniques for creating 2d and 3d objects. --This text refers to the Paperback edition.

From the Back Cover
A great many varied and interesting visual effects can be achieved with computer graphics, for which a fundamental understanding of the underlying mathematical concepts – and a knowledge of how they can be implemented in a particular programming language – is essential.

Computer Graphics for Java Programmers, 2nd edition covers elementary concepts in creating and manipulating 2D and 3D graphical objects, covering topics from classic graphics algorithms to perspective drawings and hidden-line elimination.

Completely revised and updated throughout, the second edition of this highly popular textbook contains a host of ready-to-run-programs and worked examples, illuminating general principles and geometric techniques. Ideal for classroom use or self-study, it provides a perfect foundation for programming computer graphics using Java.

About the Author
Leen Ammeraal is a retired lecturer of Hogeschool Utrecht, The Netherlands, where he was employed from 1977 to 1998. He has a degree (ir.) in mathematics at University of Technology Delft, The Netherlands. He worked as a programmer and mathematician at Akzo Research and Engineering, Arnhem, The Netherlands, from 1961 to 1972 and did research work on compilers from 1972 to 1977 at Mathematical Centre, Amsterdam. He wrote many books for Wiley (as well as for the Dutch publisher Academic Service). Some of his Wiley books have been translated into other languages (Japanese, Russian, Italian, French, German, Greek, Danish, Portuguese, Bulgarian).

Kang Zhang is a Professor in Computer Science and Director of Visual Computing Lab at the University of Texas at Dallas. He received his B.Eng. in Computer Engineering from the University of Electronic Science and Technology, China, in 1982; and Ph.D. from the University of Brighton, UK, in 1990. He held academic positions in the UK and Australia, prior to joining UTD. Zhang's current research interests are in the areas of visual languages, graphical visualization, and Web engineering; and has published over 130 papers in these areas. He has taught computer graphics and related subjects at both graduate and undergraduate levels for many years. Zhang was also an editor of two books on

Download

Herb Schildt's C++ Programming Cookbook by Herbert Schildt

Product Details
* Paperback: 509 pages
* Publisher: McGraw-Hill Osborne Media; 1 edition (April 28, 2008)
* Language: English
* ISBN: 007148860X

Product Description

Your Ultimate "How-To" Guide to C++ Programming!

Legendary programming author Herb Schildt shares some of his favorite programming techniques in this high-powered C++ "cookbook." Organized for quick reference, each "recipe" shows how to accomplish a practical programming task. A recipe begins with a list of key ingredients (classes, functions, and headers) followed by step-by-step instructions that show how to assemble them into a complete solution. Detailed discussions explain the how and why behind each step, and a full code example puts the recipe into action. Each recipe ends with a list of options and alternatives that suggest ways to adapt the technique to fit a variety of situations. Whether you're a beginner or an experienced pro, you'll find recipes that are sure to satisfy your C++ programming appetite!

Topics include:
String Handling · Standard Template Library (STL) Containers · Algorithms · Function Objects · Binders · Negators · Adaptors · Iterators · I/O · Formatting Data

Learn how to:

*
Tokenize a null-terminated string
*
Create a search and replace function for strings
*
Implement subtraction for string objects
* Use the vector, deque, and list sequence containers
*
Use the container adaptors stack, queue, and priority_queue
* Use the map, multimap, set, and multiset associative containers
*
Reverse, rotate, and shuffle a sequence
*
Create a function object
*
Use binders, negators, and iterator adapters
*
Read and write files
*
Use stream iterators to handle file I/O
*
Use exceptions to handle I/O errors
*
Create custom inserters and extractors
*
Format date, time, and numeric data
* Use facets and the localization library
*
Overload the [ ], ( ), and -> operators
*
Create an explicit constructor
*
And much, much more

Download

Advanced Java 2 Platform How to Program Free Download

Product Details
* Paperback: 1496 pages
* Publisher: Prentice Hall; 1 edition (Sep 28 2001)
* Language: English
* ISBN: 0130895601

Book Description
For intermediate or advanced Java programming courses in Computer Science, CIS, MIS, IT, and Business Departments. Expanding on the worlds best-selling Java textbook, Advanced Java How to Program includes an in-depth discussion of advanced topics, aiding developers in producing significant, scalable Java applications and distributed systems. Advanced Java How to Program integrates such technologies as Swing, multithreading, RMI, JDBC, servlets, Java XML and Enterprise JavaBeans into a complete, rigorous, production-quality system allowing developers to take better advantage of the leverage and platform-independenc

Download

Hacking Secrets Revealed - Download ebook

Book info:
Hacking Secrets Revealed
by S&C enterprises

THE internet is ever growing and you and I are truly pebbles
in a vast ocean of information. They say what you don’t
know can’t hurt you. When it comes to the Internet
believe quite the opposite. On the Internet there a millions and
millions of computer users logging on and off on a daily basis.
Information is transferred from one point to another in a
heartbeat. Amongst those millions upon millions of users, there’s
you.
As humble a user you may be of the Internet, you are pitted
against the sharks of the information super highway daily.
Problem with that is the stealth by which it happens. Currently
about 30-40% of all users are aware of the happenings on their

computer. The others simply either don’t care or don’t have the
proper “know how” to recognize if their system is under attack
and or being used.
You bought this manual because you are concerned about your
privacy on the Internet. As well you should be. On the Internet
nothing is quite what it appears to be. The uninformed will get
hurt in many ways.

These are just a few of the topics that will be covered in this document:
- How “hackers” get into your system
- What tools they use
- How a hacker can effectively “Bug” your house via your
computer. (Don’t believe me, read on you’ll be very
surprised)
- What information they have access to. And why you
should try to protect yourself. (You might be surprised to
find out what they know.)
- Tips and tricks that hackers use
- How your Antivirus software alone is not enough
- What to look for if you suspect you’re being hacked
- What the greatest flaw to all computers are
And more…

Download

XML For Dummies by Lucinda Dykes, Ed Tittel Free Download

Product Details
* Paperback: 384 pages
* Publisher: For Dummies; 4 edition (May 20, 2005)
* Language: English
* ISBN: 0764588451

Product Description
See how XML works for business needs and RSS feeds
Create consistency on the Web, or tag your data for different purposes
Tag -- XML is it! XML tags let you share your format as well as your data, and this handy guide will show you how. You'll soon be using this markup language to create everything from Web sites to business forms, discovering schemas and DOCTYPES, wandering the Xpath, teaming up XML with Office 2003, and more.

Discover how to
* Make information portable
* Use XML with Word 2003
* Store different types of data
* Convert HTML documents to XHTML
* Add CSS to XML
* Understand and use DTDs

Download Description
# " Offering the most recent XML core and related specifications including XML 1.1 and Microsoft Office 2003, this book is an ideal introductory resource on the basics of XML, the flexible way to create common information formats and share both the format and the data
# With more than 70 percent revised text, the new coverage includes how to use the XML features in Office 2003, a discussion of the many practical business applications for XML, and how to actually implement XML in a business setting
# Takes into account that XML is not exclusively for Web designers any longer and targets newcomers to XML who need to learn how to solve business issues as well as those who need practical XML solutions
# The companion Web site contains programming code, trial software packages, XML tools and parsers, and sample XSLT transforms
"

Book Info
Discover how to understand XML fundamentals, build document type definitions, style pages using XSL, work with XML linking languages, harness the latest XML applications and tools, and more. Softcover. --This text refers to an out of print or unavailable edition of this title.

From the Publisher
An ideal beginner's guide to XML! --This text refers to an out of print or unavailable edition of this title.

From the Back Cover
See how XML works for business needs and RSS feeds

Create consistency on the Web, or tag your data for different purposes
Tag — XML is it! XML tags let you share your format as well as your data, and this handy guide will show you how. You'll soon be using this markup language to create everything from Web sites to business forms, discovering schemas and DOCTYPES, wandering the Xpath, teaming up XML with Office 2003, and more.

Discover how to
* Make information portable
* Use XML with Word 2003
* Store different types of data
* Convert HTML documents to XHTML
* Add CSS to XML
* Understand and use DTDs

Download

OReilly - Windows XP Hacks - Download ebook

Book info:
Windows XP Hacks
By Preston Gralla
O'Reilly Publication
ebook format: CHM
ISBN-10: 0-596-00511-3
Book Description
Windows XP is the latest, most reliable, and best-looking version of the Windows operating system to emerge yet. As the result of the unification of Microsoft's corporate series (Windows NT and 200) with the home series (Windows 95, 98, and Me), Windows XP offers much that is pleasing to its users: rock-solid stability and a fresh new look. But power users who want to take command of their operating systems will find the same old frustrations: it's never been easy to get under the hood of a Windows system and Windows XP is no exception.

Now power users can rejoice! Windows XP Hacks offers tips, tools, and know-how to bend Windows XP to your will. The book delves into XP topics such as controlling the control panel, changing unchangeable icons, removing uninstallable XP components, stopping pop-up ads, taking a bite out of cookies, speeding up file downloads, protecting yourself with firewalls and proxy servers, and more. Users of both Windows XP Home Edition and Windows XP Pro Edition will find smart, timesaving, fun, and useful hacks for virtually every feature in their operating system. Even if you're not a power user yet, this book will have you well on your way.

Each Hack in the book can be read easily in a few minutes, saving countless hours of searching for the right answer. Windows XP Hacks provides direct, hands-on solutions that can be applied to the challenges facing both those meeting Windows XP for the first time as well as long-time users who know what they want from their operating system and just wants tips on how to get it.

Windows XP Hacks is the latest in O'Reilly's new Hacks Series which aims to begin reclaiming the term "hacking" for the good guys. In recent years, the term has come to be associated with those nefarious black hats who break into computers to snoop, steal information or disrupt Internet traffic. But the term originally had a more benign meaning, and you'll still hear it used this way whenever developers get together. Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation.

Download

Tuesday, August 12, 2008

Wiley Linux Bible 2008 Edition


Description

The Linux Bible 2008 Edition is the best first Linux book for new or migrating users. By focusing on the building-block nature of Linux, and offering true up-to-date descriptions of Linux technology, the Bible helps the reader learn how to jump headlong into Linux, regardless of the Linux distribution they choose. Descriptions of different Linux distributions helps users choose the Linux distribution that's right for them. Detailed installation instructions, step-by-step descriptions of key desktop and server components, and the actual distributions on CD and DVD, let readers get started using Linux immediately. The Bible will serve a broad range of readers, from those starting with Linux to anyone looking to evaluate different Linux distributions. It also covers broad usage including Linux desktops, servers, and firewall/routers.

New features: Instead of just telling you about how the technology works, new "Bringing Linux In" sections describe how people have implemented Linux in the real world. New sections describe real-life examples, such as how:

* A Small office created an inexpensive Web, print, and file server
* A do-it-yourselfer combined Linux audio and video features to create a home multimedia center
* A school build a computer lab with free educational software
* A large corporation deployed thousands of Linux systems

Download Link:

http://rapidshare.com/files/130867253/Wiley.Linux.Bible.2008.Edition.Feb.2008.pdf.rar

Monday, August 11, 2008

Prentice Hall - Intrusion Detection Systems with Snort - Download ebook

Book info:
Intrusion Detection Systems with Snort
by Rafeeq Ur Rehman
Prentice Hall publications
ebook format: PDF
ISBN-10: 0-13-140733-3

Snort is an open source Network Intrusion Detection System (NIDS) which is
available free of cost. NIDS is the type of Intrusion Detection System (IDS) that is used for scanning data flowing on the network.
The book starts with an introduction to intrusion detection and related terminology.
You will learn installation and management of Snort as well as other products that work with Snort. These products include MySQL database and Analysis Control for Intrusion Database (ACID). Snort has the capability to log data collected (such as alerts and other log messages) to a database. MySQL is used as the database engine where all of this data is stored. Using Apache web server and ACID, you can analyze this data. A combinationof Snort, Apache, MySQL, and ACID makes it possible to log the intrusion.
Download the digital version of this book.

http://rapidshare.com/files/60143740/advancedidstechniqueswithsnort.pdf

OReilly - Practical Unix and Internet Security - Download ebook

Book info:
Practical Unix & Internet Security, 3rd Edition
By Simson Garfinkel, Alan Schwartz, Gene Spafford
O'Reilly Publications
ebook format: CHM
ISBN-10: 0-596-00323-4

This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.
Download the digital version of this book free below.

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. Practical Unix & Internet Security consists of six parts:
Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.

http://rapidshare.com/files/60176158/practical_unix_andinternetsecurity3rded.chm

AList - Hacker Web Exploitation Uncovered - Download ebook

Book info:
Hacker Web Exploitation Uncovered
by Marsel Nizamutdinov
A-LIST Publication
ebook format: CHM
ISBN-10:1931769494
Hacker Web Exploitation UncoveredPublisher: A-List Publishing
Language: english
ISBN: 1931769494
Paperback: 450 pages
Data: June 28, 2005
Format: CHM
Description: A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written from both from the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well as errors such as PHP source code injection, SQL injection, and XSS. The most common vulnerabilities in PHP and Perl scripts and methods of exploiting these weaknesses are described, information on writing intersite scripts and secure systems for the hosted sites, creating secure authorization systems, and bypassing authorization. Uncovered is how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.

This book is about vulnerabilities in Web applications, that is, scripts and programs running on a server and available using Hypertext Transfer Protocol (HTTP). It tries to give you the most comprehensive information about common mistakes made by inexperienced Web programmers. Hackers can exploit these mistakes to obtain access to a system, gain higher privileges in it, or both. It describes common weaknesses in the writing of web pages
This book is written from both the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well as errors such as PHP source code injection, SQL injection, and XSS. The most common vulnerabilities in PHP and Perl scripts and methods of exploiting these weaknesses are described, information on writing inter site scripts and secure systems for the hosted sites, creating secure authorization systems, and bypassing authorization. Uncovered is how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.
Download this digital version of book.

http://rapidshare.com/files/57251633/Hacker_web_exploitation_uncovered.rar

Wiley - Hack Attacks Revealed - Download ebook

ebook info;
Hack Attacks Revealed A Complete Reference with Custom Security Hacking Toolkit
by John Chirillo
Wiley Publications
ebook format: PDF
ISBN-10: 0-471-41624-X

Hack Attacks Revealed Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second EditionProduct Details * Paperback: 960 pages * Publisher: Wiley; 2 edition (August 21, 2002) * Language: English * ISBN-10: 0471232823 * ISBN-13: 978-0471232827 The much-anticipated second edition of the bestselling book that details network security through the hacker’s eye Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material.

Beat hackers at their own game — The world of a hacker revealed by a corporate hack master
Hack Attacks Revealed
Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box® system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.

In this highly provocative work, you’ll discover:
• The hacker’s perspective on networking protocols and communication technologies
• A complete hacker’s technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
• Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
• Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks

http://rapidshare.com/files/60717029/Hack_Attacks_Revealed.rar

CRC press - Information Security management Handbook - Download

Book info:
Information Security Management Handbook, fifth edition, volume 3
by Harold F. Tipton, Micki Krause
Auerbach Publication
ISBN-10: 0-8493-9561-5
ISBN-13: 978-0-8493-9561-1

The landscape of information security has changed. The bad news: It is more nebulous than ever before. No longer can chief information security officers work solely within the confines of their organizations’security policies or their industry-specific regulatory mandates and feel comfortable that the depth and efficacy of their program will not be second guessed. As current events unfold, established institutions such as Bank of America, Lexis-Nexis, and Choicepoint watch as their reputations come into question and their names are plastered on the front pages of the national media. Regardless of the incidental details, be they business process fraud or third-party errors and omissions, all of the events to date have been publicized as “security breaches.” Read about this and more in this book.
Download this book in digital format.

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a must-have book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference.

http://rapidshare.com/files/52525146/CRC.Press.Information.Security.Management.Handbook.Vol.3.Fifth.Edition.rar

MS press - Security+ Certification - Download ebook

Book info:
Security+ Certification Training Kit
by Microsoft Corporation ,Andy Ruth, Kurt Hudson
Microsoft Corporation Press Publications
ebook format: CHM
ISBN-13: 9780735618220
ISBN-10: 0735618224

Description:
Welcome to the Security+ Certification Training Kit. This training kit introduces the basic concepts of computer security. It is designed to prepare you to take the Security+ Certification exam administered by the Computing Technology Industry Association (CompTIA). The Security+ Certification program covers the computer security technologies most commonly used today. Passing the Security+ Certification exam means you are certified as possessing the basic knowledge and skills needed to work in computer security. However, this book is not just about getting you through the exam. The lessons in these chapters also provide you with knowledge you'll use to create a more secure computing environment.

Each chapter in this book is divided into lessons. Most lessons include hands-on procedures that allow you to practice or demonstrate a particular concept or skill. Each lesson ends with a short summary and a set of review questions to test your knowledge of the lesson material.

Welcome to the Security+ Certification Training Kit. This training kit introduces the basic concepts of computer security. It is designed to prepare you to take the Security+ Certification exam administered by the Computing Technology Industry Association (CompTIA). The Security+ Certification program covers the computer security technologies most commonly used today. Passing the Security+ Certification exam means you are certified as possessing the basic knowledge and skills needed to work in computer security. However, this book is not just about getting you through the exam. The lessons in these chapters also provide you with knowledge you'll use to create a more secure computing environment.

http://rapidshare.com/files/60172882/Ms_Press_SY0-101_Securityplus.chm

Wiley - Integarted Auditing of ERP Systems - Download

Book info:
Integrated auditing of ERP systems
by Yusufali F. Musaji.
John Wiley & Sons Inc. Publishing
ISBN 0-471-23518-0

Book Description
Maps out how to conduct an integrated ERP audit.
Contains sample audit control guidelines, case studies, and audit plans to help the reader understand difficult concepts and get started with their own audit.

Enterprise Resource Planning (ERP) System implementation is both an art and science that consists of planning, implementation, and ongoing maintenance. This methodology is designed to automate the drudgery of implementation and provide organized approaches to problem solving by listing, diagramming, and documenting all steps. Structured methodologies help to standardize and systemize ERP implementation and maintenance by approaching them as an engineering discipline rather than as whims of individual software developers. It is essential to understand structured methodologies in the implementation of ERP systems.
Download this book in digital format.

http://rapidshare.com/files/51227323/John_Wiley___Sons__1_.Integrated_Auditing_of_ERP_Systems._2002.ISBN0471235180_.pdf

LearnFlash - Building Websites In Flash CS3

Description


LearnFlash - Building Websites In Flash CS3 | Size:1.24 Gb

1- Introduction (Running Time: 1:19)
2 - Project Files (Running Time: 37 seconds)
3 - Building a Simple Website (Running Time: 15:05)
4 - Making it Work (Running Time: 13:43)
5 - Animated Transitions (Running Time: 13:53)
6 - One-Frame Websites (Running Time: 7:45)
7 - Attaching Movie Clips with ActionScript (Running Time: 14:56)
8 - ActionScript Transitions (Running Time: 10:30)
9 - Dynamic Transitions (Running Time: 19:06)
10 - Disabling Buttons (Running Time: 8:49)
11 - Simple Button Animations (Running Time: 9:01)
12 - Movie Clip Button Setup (Running Time: 12:52)
13 - Movie Clip Button Actions (Running Time: 10:47)
14 - Animating Multiple Buttons (Running Time: 7:05)
15 - ActionScript Button Animation (Running Time: 15:27)
16 - Multiple ActionScript Buttons (Running Time: 4:15)
17 - Button Instances (Running Time: 10:39)
18 - Building a Popup Menu (Running Time: 15:28)
19 - Coding the Popup Menu (Running Time: 12:56)
20 - Fixing a Glitch (Running Time: 11:01)
21 - Website Tour (Running Time: 2:44)
22 – Building the Menu (Running Time: 14:16)
23 – Animating the Menu (Running Time: 17:44)
24 – Animating the Highlight (Running Time: 8:20)
25 – Organizing Your FLA (Running Time: 4:33)
26 – Filling Out the Home Page (Running Time: 17:40)
27 – Animating the Home Page (Running Time: 15:31)
28 – Building the Products Page (Running Time: 13:43)
29 – Building Dummy Pages (Running Time: 6:11)
30 – Attaching the Home Page (Running Time: 8:12)
31 – Creating the Page Transitions (Running Time: 11:04)
32 – Building a Slideshow (Running Time: 14:23)
33 – Coding the Slideshow (Running Time: 13:52)
34 – Importing an External SWF (Running Time: 12:31)
35 – Preloading External Content (Running Time: 8:59)
36 – Adding Video (Running Time: 19:25)
37 – Laying Out the Contact Form (Running Time: 11:03)
38 – Contact Form PHP (Running Time: 15:58)
39 – Coding the Form (Running Time: 17:56)
40 – Fixing a Glitch (Running Time: 4:53)
41 – Building the Preloader (Running Time: 9:19)
42 – Coding the Preloader (Running Time: 9:06)
43 – Publishing and Customization (Running Time: 10:28)
44 – Uploading Your Website (Running Time: 3:11)
45 – Conclusion (Running Time: 1:39)



Rapidshare:
http://rapidshare.com/files/135824397/website.building.flashcs3.part01.rar
http://rapidshare.com/files/135845538/website.building.flashcs3.part02.rar
http://rapidshare.com/files/135862277/website.building.flashcs3.part03.rar
http://rapidshare.com/files/135892489/website.building.flashcs3.part04.rar
http://rapidshare.com/files/135912140/website.building.flashcs3.part05.rar
http://rapidshare.com/files/135933433/website.building.flashcs3.part06.rar
http://rapidshare.com/files/135953618/website.building.flashcs3.part07.rar
http://rapidshare.com/files/135965627/website.building.flashcs3.part08.rar
http://rapidshare.com/files/135980337/website.building.flashcs3.part09.rar
http://rapidshare.com/files/135997154/website.building.flashcs3.part10.rar
http://rapidshare.com/files/136011165/website.building.flashcs3.part11.rar
http://rapidshare.com/files/136028613/website.building.flashcs3.part12.rar
http://rapidshare.com/files/136044713/website.building.flashcs3.part13.rar
http://rapidshare.com/files/136052003/website.building.flashcs3.part14.rar

1000 Great Hacking tutorials 2008 - way to hacking

Book cover for share_ebook 1000 Great Hacking tutorials 2008 way to hacking

Description


1000 Great Hacking tutorials 2008 - way to hacking 1000 Great Hacking tutorials 2008 - way to hacking 1000 Great Hacking tutorials 2008 - way to hacking 1000 Great Hacking tutorials 2008 - way to hacking 1000 Great Hacking tutorials 2008 - way to hacking 1000 Great Hacking tutorials 2008 - way to hacking


Download Link:

http://rapidshare.com/files/136200418/1000_hacking_tutorials_-_The_Best_of_2008.rar

Sunday, August 10, 2008

The latest CCNA 640-802 Practice Test

Description



High quality and Value for the 640-802 Exam.
Killtest Practice Exams for Cisco Certified Network Associate 640-802 are written to the highest standards of technical accuracy, using only certified subject matter experts and published authors for development.

100% Guarantee to Pass Your CCNA exam and get your CCNA Certification.
We guarantee your success in the first attempt.

http://www.mcse.cc/down/killtest640-802.pdf

More details about CCNA can be found in http://www.killtest.com/CCNA/

Saturday, August 9, 2008

CCNA Security Official Exam Certification Guide (Exam 640-553)

Description


Book cover for share_ebook CCNA Security Official Exam Certification Guide Exam 640 553

CCNA Security

Official Exam Certification Guide

  • Master the IINS 640-553 exam with this official study guide

  • Assess your knowledge with chapter-opening quizzes

  • Review key concepts with Exam Preparation Tasks

  • Practice with realistic exam questions on the CD-ROM

CCNA Security Official Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the CCNA® Security IINS exam. Senior security instructors Michael Watkins and Kevin Wallace share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

CCNA Security Official Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks sections help drill you on key concepts you must know thoroughly.

The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a topic-by-topic basis, presenting question-by-question remediation to the text and laying out a complete study plan for review.

Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

CCNA Security Official Exam Certification Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

Michael Watkins, CCNA/CCNP®/CCVP®/CCSP®, is a full-time senior technical instructor with SkillSoft Corporation. With 13 years of network management, training, and consulting experience, Michael has worked with organizations such as Kraft Foods, Johnson and Johnson, Raytheon, and the United States Air Force to help them implement and learn the latest network technologies.

Kevin Wallace, CCIE® No. 7945, is a certified Cisco instructor working full time for SkillSoft, where he teaches courses in the Cisco CCSP, CCVP, and CCNP tracks. With 19 years of Cisco networking experience, Kevin has been a network design specialist for the Walt Disney World Resort and a network manager for Eastern Kentucky University. Kevin also is a CCVP, CCSP, CCNP, and CCDP with multiple Cisco security and IP communications specializations.

The official study guide helps you master all the topics on the IINS exam, including

  • Network security threats

  • Security policies

  • Network perimeter defense

  • AAA configuration

  • Router security

  • Switch security

  • Endpoint security

  • SAN security

  • VoIP security

  • IOS firewalls

  • Cisco IOS® IPS

  • Cryptography

  • Digital signatures

  • PKI and asymmetric encryption

  • IPsec VPNs

This volume is part of the Exam Certification Guide Series from Cisco Press®. Books in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco Career Certification candidates identify weaknesses, concentrate their study efforts, and enhance their confidence as exam day nears.

Category: Cisco Press–Cisco Certification

Covers: IINS exam 640-553


CCNA Security 2008

http://rapidshare.com/files/134443625/ccnas2008.rar

Thursday, August 7, 2008

Digital Tutors - Creating Concept Vehicles in Maya



Digital Tutors - Creating Concept Vehicles in Maya | Size:2.4 Gb | .MOV

Software: Maya 2008 and up
Run Time: 6 hrs. 51 min., 4 discs

Learn an artist-oriented workflow to concept development; polygon modeling, lighting, and rendering. Provides nearly 7 hours of project-based training on conceptual vehicle modeling for use in film, games, and design. Perfect for new and experienced artists.


Rapidshare:
http://rapidshare.com/files/134440546/DTConceptVechileMaya.part01.rar
http://rapidshare.com/files/134452820/DTConceptVechileMaya.part02.rar
http://rapidshare.com/files/134463370/DTConceptVechileMaya.part03.rar
http://rapidshare.com/files/134475977/DTConceptVechileMaya.part04.rar
http://rapidshare.com/files/134493289/DTConceptVechileMaya.part05.rar
http://rapidshare.com/files/134512389/DTConceptVechileMaya.part06.rar
http://rapidshare.com/files/134560080/DTConceptVechileMaya.part07.rar
http://rapidshare.com/files/134584760/DTConceptVechileMaya.part08.rar
http://rapidshare.com/files/134604115/DTConceptVechileMaya.part09.rar
http://rapidshare.com/files/134621783/DTConceptVechileMaya.part10.rar
http://rapidshare.com/files/134642266/DTConceptVechileMaya.part11.rar
http://rapidshare.com/files/134660293/DTConceptVechileMaya.part12.rar
http://rapidshare.com/files/134705373/DTConceptVechileMaya.part13.rar
http://rapidshare.com/files/134730074/DTConceptVechileMaya.part14.rar
http://rapidshare.com/files/134755414/DTConceptVechileMaya.part15.rar
http://rapidshare.com/files/134826281/DTConceptVechileMaya.part16.rar
http://rapidshare.com/files/134852690/DTConceptVechileMaya.part17.rar
http://rapidshare.com/files/134892172/DTConceptVechileMaya.part18.rar
http://rapidshare.com/files/134917573/DTConceptVechileMaya.part19.rar
http://rapidshare.com/files/134932056/DTConceptVechileMaya.part20.rar
http://rapidshare.com/files/134942609/DTConceptVechileMaya.part21.rar
http://rapidshare.com/files/134961138/DTConceptVechileMaya.part22.rar
http://rapidshare.com/files/134977468/DTConceptVechileMaya.part23.rar
http://rapidshare.com/files/135064949/DTConceptVechileMaya.part24.rar
http://rapidshare.com/files/135085996/DTConceptVechileMaya.part25.rar

Popular Photography, July 2008

Description


Book cover for share_ebook Popular Photography July 2008

Popular Photography & Imaging, also called simply Popular Photography or simply Pop Photo, is a monthly American consumer magazine founded in 1937 and the world's largest imaging magazine, with an editorial staff twice the size of its nearest competitor.


Download Link:

http://rapidshare.com/files/134904290/Popular_Photography_Magazine_July_2008.rar

Description

Book cover for share_ebook PC World July 2008 Issue


PC World is a global computer magazine published monthly by IDG. It offers advice on various aspects of PCs and related items, the Internet, and other personal-technology products and services. In each publication, PC world reviews and tests hardware and software products from a variety of manufacturers, as well as other technology related devices such as still and video cameras, audio devices and televisions.


Download Link:

http://rapidshare.com/files/134904045/PC_WORLD_MAGAZINE_July_2008.rar

Mac World, July 2008 Issue

Description


Book cover for share_ebook Mac World July 2008 Issue

  • Publisher: IDG (June 20, 2008)
  • ASIN: B001AYC31



Download link:

http://rapidshare.com/files/134904040/Mac_World_-_IT_MAGAZINE_-_July_2008.rar

Hacking Windows Vista: ExtremeTech

Description


Book cover for share_ebook Hacking Windows Vista ExtremeTech

Vista is the most radical revamping of Windows since 1995. However, along with all the fantastic improvements, there are a couple of things that likely drive you up the wall. Don’t worry, though—just join forces with author Steve Sinchak and you’ll end up feeling as though Microsoft designed Vista just for you! He shows you how to tweak logon screen settings, build custom Sidebar gadgets, personalize Aero Glass with themes and visual styles, turn your PC into an HDTV media center, fine-tune your firewall, and more.


Download Link:-


http://rapidshare.com/files/134904030/Hacking.Windows.Vista.EBOOK.rar

Introduction to Java Programming-Comprehensive

Description




Prentice Hall; 6 edition (July 22, 2006)
CHM | 1328 pages | 33mb(rar)


Introduction to Java Programming-Comprehensive/by Y Daniel Liang (Author)
Description
Now integrating Java 5 throughout, this reference introduces Java programming fundamentals ?including problem-solving, object-oriented programming, GUI programming, data structures, networking, internationalization, advanced GUI programming, and Web programming. Includes many new illustrations. Enhances examples throughout, using small, simple, and stimulating examples to demonstrate concepts and techniques. Offers anearlier introduction to writing programs than the previous edition. Features a new chapter on recursion, expanding treatment from earlier editions. A useful reference for anyone interested in learning more about programming.

download link:
Code:
http://w13.easy-share.com/1701107949.html

or:

http://depositfiles.com/files/7002560

Optical Switching Networks

Description




Cambridge University Press; 1 edition (February 11, 2008)
PDF | 244 pages | 1.4mb(rar)


Optical Switching Networks
Description
Optical Switching Networks describes all the major switching paradigms developed for modern optical networks, discussing their operation, advantages, disadvantages and implementation. Following a review of the evolution of optical WDM networks, an overview of the future trends out. The latest developments in optical access, local, metropolitan, and wide area networks are covered, including detailed technical descriptions of generalized multiprotocol label switching, waveband switching, photonic slot routing, optical flow, burst and packet switching. The convergence of optical and wireless access networks is also discussed, as are the IEEE 802.17 Resilient Packet Ring and IEEE 802.3ah Ethernet passive optical network standards and their WDM upgraded derivatives. The feasibility, challenges and potential of next-generation optical networks are described in a survey of state-of-the-art optical networking testbeds. Animations showing how the key optical switching techniques work are available via the web, as are lecture slides.

download link:
Code:
http://w14.easy-share.com/1701107147.html

or:

http://depositfiles.com/files/7001407

Paint Shop Pro XI for Photographers

Description




Focal Press (February 5, 2007)
PDF | 320 pages | 8mb(rar)

Paint Shop Pro XI for Photographers/by Ken McMahon (Author)
Review
"This is the best book on Paint Shop Pro - period."
Dave Huss, photographer, contributing editor for Photoshop User magazine, author of Paint Shop Pro books.
Book Description
How to get professional results from Paint Shop Pro Photo XI and gain all the skills you need to create outstanding images!

download link;
Code:
http://w14.easy-share.com/1701106636.html

or:

http://depositfiles.com/files/7001366
 
Disclaimer:
This site does not store any files on its server.We only index and link to content provided by other sites and also if you feel any copyrighted material is seen in this blog ..
please feel to write us.. gnbcreation@yahoo.com