Your Ad Here

Tuesday, March 31, 2009

Joyce Cox, Joan Preppernau - Microsoft Office PowerPoint 2007 Step by Step


Joyce Cox, Joan Preppernau - Microsoft Office PowerPoint 2007 Step by Step
Microsoft Press | 2007 | ISBN: 0735623015 | Pages: 368 | CHM | 14.11 MB

The smart way to learn Office PowerPoint 2007 one step at a time! Work at your own pace through the easy numbered steps, practice files on CD, helpful hints, and troubleshooting help to master the fundamentals of working with the latest version of PowerPoint, including how to navigate the new, easy-to-use user interface. You will discover how to create presentation outlines, work with slide masters and slide designs, add graphics and drawings, and publish your presentations to the Web. Youll even learn how to add narrations and custom animationsand more! With Step by Step, you can take just the lessons you need or work from cover to cover. Either way, you drive the instruction!





Joyce Cox, Joan Preppernau - Microsoft Office Word 2007 Step by Step


Joyce Cox, Joan Preppernau - Microsoft Office Word 2007 Step by Step
Microsoft Press | 2007 | ISBN: 0735623023 | Pages: 448 | CHM | 20.22 MB

The smart way to learn Office Word 2007 one step at a time! Work at your own pace through the easy numbered steps, practice files on CD, helpful hints, and troubleshooting help to master the fundamentals of working with the latest version of Word, including how to navigate the new user interface. You will discover how to use features in Word to help create, edit, and proofread documents. Youll also learn how to modify the appearance of text, organize information with tables and columns, collaborate with others, and publish documents on the Webplus more. With Step by Step, you can take just the lessons you need or work from cover to cover. Either way, you drive the instruction!

Thiru Thangarathinam - Professional ASP.NET 2.0 Databases


Thiru Thangarathinam - Professional ASP.NET 2.0 Databases
Wrox | 2007 | ISBN: 047004179X | Pages: 504 | PDF | 3.45 MB

Now you can uncover the secrets behind accessing and retrieving data from a wide range of data sources such as SQL Server and XML sources. This book walks you through the array of ADO.NET 2.0 features and clearly shows you how they can be used to develop database-driven web applications in ASP.NET.

You’ll first gain an in-depth understanding of the data source controls that enable data binding in the ASP.NET platform. Next you’ll uncover the advanced features of ASP.NET, including site navigation, implementing sorting and paging, and editing data in templates. You’ll then focus on designing transactions in ADO.NET 2.0, displaying data, and utilizing SQL Server 2005 XML.

Throughout the chapters, you’ll find examples and source code (with ASP.NET examples written in C#) that you can integrate into your applications. This will enable you to leverage ADO.NET and ASP.NET features so you can easily create a scalable N-Tier web site.

Some of the topics covered include:

* ASP.NET 2.0 Data Controls
* Data Binding with the SqlDataSource Control, XML Data, and Objects
* Selecting, Updating, Deleting Records
* Programmatically Creating and Adding Controls
* XSL Transformations with XmlDataSource Control
* Using Generics with the ObjectDataSource Control
* ASP.NET 2.0 Site Navigation including Implementing Breadcrumbs and Binding to Other Controls
* Displaying and Editing Data Using Templates
* GridView Sorting and Paging
* Advanced Data Source and Data-Bound Controls including Master/Detail Display, Displaying Images from a Database, and Using Themes with Data Bound Controls
* Transactions in .NET and Interoperability between System.Transactions and System.EnterpriseServices
* Advanced ADO.NET for ASP.NET Data Display including DataSet Object, ADO.NET 2.0 DataTable, and Provider-Independent Data Access Code
* Accessing Data from SQL Server 2005 including CLR in SQL Server 2005, New XML Features in SQL Server 2005, and Working with XML Data-Typed Columns from ADO.NET
* N-Tier Architecture with ASP.NET 2.0 and SQL Server 2005
* Best Practices for Creating ASP.NET Web Sites including Implementation of CLR Stored Procedures and Implementation of Layers

Steve Holzner, Nancy Holzner, "Google Docs 4 Everyone"


Steve Holzner, Nancy Holzner, "Google Docs 4 Everyone"
Que | 2009-02-19 | ISBN: 0789739364 | 264 pages | PDF | 7,8 MB

Who needs expensive, old-fashioned office software? Now, you can do everything online, free, with Google Docs! Experts Steve and Nancy Holzner offer simple, step-by-step instructions and great insider tips for making the most of Google’s powerful online word processing, spreadsheet, and presentation tools. You’ll get started fast... learn how to create and format professional-quality documents of all kinds... collaborate with colleagues to build better proposals and presentations... use advanced tools like revision history, templates, and charts... discover Google Docs’ latest features and shortcuts... and a whole lot more! No matter what kind of documents you create, this book can help you do the job better, faster, and more efficiently... and you’ll never pay for office software again!
You’ll Learn How To

• Get your free Google account and set up iGoogle for instant access to your documents
• Upload and use the documents you’ve already created with Microsoft Office
• Use Google Spreadsheet to create charts to display spreadsheet data
• Master Google Docs’ easy, powerful document-editing and formatting tools
• Insert images into your documents and presentations
• Share documents securely with your colleagues
• Back up your documents offline and edit them when you don’t have an Internet connection


Uploading

Depositfiles

Bernd Held - Microsoft Excel Functions and Formulas


Bernd Held - Microsoft Excel Functions and Formulas
Wordware Publishing | 2006 | ISBN: 159822011X | Pages: 400 | PDF | 3.80 MB

Easy to use and equipped with a variety of functions, Microsoft Excel is the tool of choice when it comes to crunching numbers, building charts, and analyzing tables. But most users only scratch the surface of the program’s functionality, especially the built-in formulas designed to make everyday operations and real-world tasks more efficient. Microsoft Excel Functions & Formulas demonstrates the secrets of Excel functions through the use of practical and useful examples in a quick reference format.

Topics include logical, text, date and time, basic statistical, mathematical, financial, database, and lookup and reference functions as well as conditional formatting with formulas, array formulas, and user-defined functions.

This book’s extensive examples make it an excellent tutorial for all Excel users who want to understand, create, and apply formulas. Intermediate and advanced users will find Microsoft Excel Functions & Formulas an excellent reference to many of the program’s advanced formulas and functions.

Bernd Held is one of the leading authorities on Microsoft Office software in Germany, especially Microsoft Excel. The author of more than 40 books and 800 articles and reviews for various publications, he is also a professional consultant specializing in training and customized solutions for a variety of businesses. For the past eight years, Microsoft has recognized him as an MVP (Most Valuable Professional). He lives in Germany with his wife, son, and daughter.

The archive contains a source code for the book.

Uploading

UploadBox

DepositFiles
http://rapidshare.com/files/214860588/BH-MEFAF.rar

Linux Administration Handbook (2nd Edition)


Evi Nemeth, Garth Snyder, Trent R. Hein, "Linux Administration Handbook (2nd Edition)"
Prentice Hall PTR | 2006-11-09 | ISBN: 0131480049 | 1040 pages | PDF | 8,2 MB

“As this book shows, Linux systems are just as functional, secure, and reliable as their proprietary counterparts. Thanks to the ongoing efforts of thousands of Linux developers, Linux is more ready than ever for deployment at the frontlines of the real world. The authors of this book know that terrain well, and I am happy to leave you in their most capable hands.”
—Linus Torvalds“The most successful sysadmin book of all time—because it works!”
—Rik Farrow, editor of ;login:“This book clearly explains current technology with the perspective of decades of experience in large-scale system administration. Unique and highly recommended.”
—Jonathan Corbet, cofounder, LWN.net“Nemeth et al. is the overall winner for Linux administration: it’s intelligent, full of insights, and looks at the implementation of concepts.”
—Peter Salus, editorial director, Matrix.net
Since 2001, Linux Administration Handbook has been the definitive resource for every Linux® system administrator who must efficiently solve technical problems and maximize the reliability and performance of a production environment. Now, the authors have systematically updated this classic guide to address today’s most important Linux distributions and most powerful new administrative tools.

The authors spell out detailed best practices for every facet of system administration, including storage management, network design and administration, web hosting, software configuration management, performance analysis, Windows interoperability, and much more. Sysadmins will especially appreciate the thorough and up-to-date discussions of such difficult topics such as DNS, LDAP, security, and the management of IT service organizations.

Linux® Administration Handbook, Second Edition, reflects the current versions of these leading distributions:

*Red Hat® Enterprise Linux®
*FedoraTM Core
*SUSE® Linux Enterprise
*Debian® GNU/Linux
*Ubuntu® Linux

Sharing their war stories and hard-won insights, the authors capture the behavior of Linux systems in the real world, not just in ideal environments. They explain complex tasks in detail and illustrate these tasks with examples drawn from their extensive hands-on experience.

Uploading

Depositfiles
http://rapidshare.com/files/214796172/Linux_Administration_Handbook.rar.htm

Timothy Zapawa - Excel 2007 Advanced Report Development


Timothy Zapawa - Excel 2007 Advanced Report Development
Wiley | 2007 | ISBN: 0470046449 | Pages: 542 | PDF | 8.93 MB

Create powerful, innovative reporting solutions with Excel 2007

In this new book, significantly updated from his bestselling Excel 2003 version, Timothy Zapawa has provided you with in-depth coverage of Excel 2007's enhanced reporting capabilities. Discover what you can do with PivotTable and Spreadsheet reports, enhanced conditional formatting and filtering functions, improved data access and management tools, and expanded OLAP features. With notes, tips, warnings, real-world examples, and how-to videos in every chapter, you'll soon be an expert on Excel report development!



* Understand and use key features of PivotTable® and Spreadsheet reports
* Access data from SQL and Oracle databases, Web sites, OLAP cubes, and text files
* Build sophisticated SQL queries using the Microsoft Query program
* Link several Excel reports together to develop a larger, automated report solution
* Discover the enhanced Excel 2007 tools for filtering, sorting, and grouping data

Examples, codes for the book from the publisher's site:
http://media.wiley.com/product_ancillary/49/04700464/DOWNLOAD/046449_All_Code.zip

Uploading

UploadBox

RapidShare

Sunday, March 29, 2009

Advanced Photoshop CS3 Trickery & FX

alt
PDF: Advanced Photoshop CS3 Trickery & FX

Thursday, March 26, 2009

I5/OS Diagnostic Tools for System Administrators

Although the System i servers rate over a 99.9% availability factor, there are times when problems occur. Some problems limit the use of a device, program, or application. More severe and pervasive problems limit the use of more components. In either circumstance, the amount of time a component is unavailable relates directly to the actions taken to manage the situation. The ability to resolve problems depends on the tools that are available, the knowledge (and attitude) of the worker, the symptoms and nature of the problem at hand, and other factors.

This book is designed to introduce you to the problem determination aids used in an i5/OS® environment. You can become familiar with the tools that are available and the instructions for how each one works. As proficiency is built with the use of each tool and familiarity with the procedures, efficiency of the system operator and service personnel increases.
Consider this book a “Don’t Panic, Read Me First” guide to help you support System i models. It discusses problem analysis, problem determination, and problem source identification. And it offers you step-by-step instructions that show you how to use the i5/OS problem determination aids to produce detailed problem information…

download

The Database Hacker’s Handbook: Defending Database Servers

The Database Hackers Handbook: Defending Database Servers

The Database Hacker's Handbook: Defending Database Servers

Product Description
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children’s grades and what groceries you buy. Database attacks are potentially crippling-and relentless.

In this essential follow-up to The Shellcoder’s Handbook, four of the world’s top security experts teach you to break into and defend the seven most popular database servers. You’ll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM’s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know

download

PHP for the World Wide Web: Visual QuickStart Guide, 3rd Edition

PHP for the World Wide Web: Visual QuickStart Guide, 3rd Edition

PHP for the World Wide Web: Visual QuickStart Guide, 3rd Edition

Product Description
With PHP for the World Wide Web, Third Edition: Visual QuickStart Guide, readers can start from the beginning to get a tour of the programming language, or look up specific tasks to learn just what they need to know. This task-based visual reference guide uses step-by-step instructions and plenty of screenshots to teach beginning and intermediate users this popular open-source scripting language.

Leading technology author Larry Ullman guides readers through the new features in PHP 6, focusing primarily on improved support for handling any language in a Web site. Other addressed changes include removal of outdated and insecure features, plus new functions and more efficient ways to tackle common needs. Both beginning users, who want a thorough introduction to the technology, and more intermediate users, who are looking for a convenient reference, will find what they need here–in straightforward language and thorough readily accessible examples.

About the Author
PHP expert Larry Ullman has written several best-selling books on the topic, including the previous edition of this guide. In addition, he serves as the Director of Digital Media Technology at DMC Insights and teaches numerous classes on PHP.

download

The Complete Idiot’s Guide to Creating a Website

The Complete Idiots Guide to Creating a Website

The Complete Idiot's Guide to Creating a Website

Product Description
The essential guide for getting the internet traffic every smallbusiness owner needs. CD included.

Today’s small-business websites require advanced features that visitors expect: streaming video and audio; e-commerce; custom surveys, forms, and polls; and discussion groups. This book covers all the basics of creating and publicizing a successful webpage.

•Free CD includes JavaScript and numerous templates
•Everything from design and publishing the site to automating and publicizing It
•100 million websites as of 2006—and it keeps on growing
•Simple and easy how-to for small businesses and organizations that can’t afford a professional web designer

About the Author
Paul McFedries has been programming computers since the mid- 1970s. He has written more than 50 computer books that have sold nearly three million copies. He is the author of The Complete Idiot’s Guide® to Windows Vista.

download

Tuesday, March 24, 2009

Programming Microsoft Infopath: A Developer's Guide


Thom Robbins, "Programming Microsoft Infopath: A Developer's Guide"
Charles River Media | 2006 | ISBN: 1584504536 | 400 pages | PDF | 7,9 MB

Create Applications that Gather, Process, and Analyze Information with InfoPath! InfoPath is one of the fastest growing products within the Microsoft Office System. It is a forms-based solution that streamlines the process of gathering, sharing, and using information by enabling teams and organizations to create, share, and work with dynamic forms. Programming Microsoft InfoPath: A Developer's Guide, Second Edition is a completely updated edition of the best-selling book that covers the new features and options of InfoPath with Service Pack 1, that center on east of use for end users and extensibility for developers. The book takes a practical and code-oriented approach to provide the essential skill set needed to develop and implement applications with InfoPath. Updated examples that clearly demonstrate the use of InfoPath with the Service Pack 1 extensions are also included. Programming Microsoft InfoPath: A Developer's Guide, Second Edition is an ideal reference for developers creating distributed applications using InfoPath with Service Pack 1.






The VMWare Workstation 5 Handbook


Steven S. Warren, "The VMWare Workstation 5 Handbook"
Charles River Media | 2005 | ISBN: 1584503939 | 352 pages | PDF | 7,8 MB

Bring the Power of Virtualization Software to Your Next Project!

VMware is the leading virtual machine software available today and it is the foundation for next generation computing as it allows users to run multiple operating systems simultaneously on the same PC. The VMware Workstation 5.0 Handbook teaches users the nuts and bolts of this powerful program, including how to install and upgrade VMware and use its guest operating systems. It gives administrators and developers everything they need to know in order to use VMware Workstation effectively, including how to configure, run, and troubleshoot virtual machines. Step-by-step tutorials allow users to work with the software as they read, and real-world examples and software screenshots reinforce the tutorials and make understanding this powerful new technology easy. With this book, users will learn all the skills necessary to use VMware effectively in corporate IT infrastructures.





KEY FEATURES * Provides the only complete guide to VMware Workstation 5 * Covers essential features such as virtual networking, multiple snapshots, teams, full and linked clones, shared folders, and Windows clustering technologies * Teaches the nuts and bolts of VMware Workstation, including how to install it on a Windows® and Linux® platform, troubleshoot and trace common problems, configure complex virtual networks, move, share, and work with virtual machines and disks, and performance tune virtual machines to fit various needs * Presents the material through step-by-step, real-world tutorials that allow users to work with the software as they work through the projects * Includes a CD-ROM with a demo version of VMware Workstation 5, Leostream 5, VMware documentation, and all the figures from the book

On the CD! * VMWARE WORKSTATION 5 DEMO - Contains a trial version of VMware Workstation 5 for Windows and Linux hosts * DOCUMENTATION - Provides the VMware documentation * LEOSTREAM *DEMO - Contains Leostream 5 virtual controller for centralized management of virtualization software * FIGURES - Includes all the images in the book, in color, by chapter SYSTEM REQUIREMENTS CD-ROM drive; Hard drive; Standard x86- compatible personal computer running Windows or Linux; 400 MHz or faster CPU; 500 MHz recommended; enough memory to run both your host OS and your virtual machines; 256 MB RAM minimum; 512 MB recommended.



Windows to Linux Business Desktop Migration


Mark Hinkle, "Windows to Linux Business Desktop Migration"
Charles River Media | 2006 | ISBN: 1584504226 | 500 pages | PDF | 11,9 MB

Over the last four years, Linux has established itself as the fastest growing server platform for enterprise Information Technology. As the server platform grows the desktop platform is also growing, domestically and abroad. One of the areas most lacking information, however, is in the capability of Linux as a desktop replacement for a Microsoft Windows dominated enterprise. Linux Business Desktop Migration for Windows Users explores the advantages of Linux as a desktop platform as well as the possible pitfalls associated with a Linux migration. The goal is to make the leap with as little disruption as possible and realize tangible benefits in the end. In order to make this possible, the book focuses on four main points:




Teaching the factors involved in a Windows to Linux migration, including how to form an overall IT strategy for a company with an established Windows user base; Explaining data migration and how to move data from a Windows installation (Office documents, address books, etc.) to a Linux desktop; Improving the existing application migration from Windows to Linux; and Providing end user instruction, including tactics to get the most of the Linux desktop with consideration given to users’ existing Windows knowledge. Unlike other books on the topic, Linux Business Desktop Migration for Windows Users discusses both the strategy of why Windows users would use Linux and how to actually use the Linux operating system, providing a complete beginning to end guide for moving your business over to Linux. FEATURES:
* Provides easily implemented methods for successfully moving from Windows to the Linux business desktop
* Focuses on four main areas: strategies and tactics for making a switch, data migration, application migration, and end-user instruction
* Teaches IT administrators and personnel how to form a basic Linux strategy with considerations given to both the benefits and drawbacks of a Linux migration
* Includes companion CD-ROM with the live file system Knoppix, a GNU/Linux distribution that boots and runs completely from the CD-ROM, so that readers can complete the exercises described in the text



Unix/Linux Survival Guide


Erik M. Keller, "Unix/Linux Survival Guide"
Charles River Media | 2005 | ISBN: 1584504331 | 320 pages | PDF | 1,2 MB

The Reference That Every Unix SysAdmin Needs!

All Unix/Linux systems, regardless of manufacturer, have inherent similarities for administrators. The Unix/Linux Survival Guide details these similarities and teaches SysAdmins how to tackle jobs on all systems. Mixing administrator knowledge and best practices, the book walks admins step-by-step through installing, setting up, and configuring a new system. It also teaches them learn how to administer systems they didn’t set up originally. Intended as a quick and dirty reference for administrators to use in their daily work, the book contains numerous hints on where to look and what to look for to get a Unix/Linux system up to speed and running smoothly. Admins will also learn preventive maintenance techniques to extract and evaluate baseline data and create a warning system that allows them to react to problems before users even notice. Daily task checklists are provided, and other key topics such as backup, security, and documentation are covered in detail. This book provides the knowledge, skill set, techniques, and approach needed to quickly administer a wide range of *NIX systems.




Key Features * Provides a quick, easy-to-use reference for Unix/ Linux system administrators * Teaches what system administrators need to know to avoid system breakdowns * Explains a variety of vital administrative tasks, including programming small scripts, user administration, installing and configuring systems, preparing a new system for production, setting up a test system, backup, documentation, preventive maintenance techniques, and data security ON THE CD Scripts * Contains the administration scripts from the book Figures * Includes all of the figures from the book by chapter SYSTEM REQUIREMENTS Unix/Linux operating system; Perl version 5.x or greater; Java Runtime Environment (JRE) 1.3 or newer for the DocBook example.



rapidshare http://rapidshare.com/files/212458739/Linux_SurvivalGuide.rar

Open Source for Windows Administrators


Christian Gross, "Open Source for Windows Administrators"
Charles River Media | 2005 | ISBN: 1584503475 | 674 pages | PDF | 8,5 MB

The Most Comprehensive Reference on Open Source Apps for Windows Users!

This book introduces Microsoft® Windows® administrators to the world of Open Source applications in order to save time and money. It provides readers with information and techniques for using the appropriate Open Source applications in a variety of situations, such as anti-spam, databases, E-mail, Web content, file sharing, word processing, spreadsheets, and more. By using a component approach in which readers can pick and choose their technologies, the book, for example, enables a Windows administrator to use Apache as a Web server, while still electing Microsoft SQL Server as a database. The focus of the product coverage is to help the administrator to perform more efficiently. The discussion of each option includes: quality of documentation available, how to package for installation in a business setting, and solving common tasks using various techniques. Although it offers an Open Source equivalent to many Microsoft applications, it does not attempt to offer replacements! for Windows applications but complements the Windows operational routines.


KEY FEATURES

• Focuses on Open Source software that can be used to simplify common administration tasks on a Microsoft Windows operating system

• Covers numerous Open Source projects, including OpenOffice, OpenSSL, OpenLDAP, MySQL, Python, Xmail server, Apache, Samba, and others

• Uses the appropriate Open Source application in various situations, such as anti-spam, databases, E-mail, Web content, word processing, spreadsheets, shell scripting, file sharing, and more

• Includes a companion DVD with Open Source applications, source code, and figures On the DVD (see the Appendix for details)

This DVD contains numerous Open Source software applications, figures, source code, and extras

SYSTEM REQUIREMENTS The third party software contained on the DVD runs on a variety of platforms and operating systems. Please consult the Appendix for more details, and especially Web site information for specific requirements, updates, etc. Minimum system requirements for all of these software products include: 1 gigabyte of free hard disk space; minimum of an Intel Pentium II processor (or comparable x86), and 128 MB of RAM; the software is intended for a Windows operating system (Windows 98; Windows 2000, Windows XP, or Windows Server 2003); DVD drive to run the disc.



Game Creation For Teens


Helclac, "Game Creation For Teens"
Course Technology PTR | 2008 | ISBN: 159863500X | 297 pages | PDF | 6 MB

Get ready to make fun and exciting computer games, no programming required! Game Creation for Teens shows teens and other beginners how to make their very own awesome games using the Games Factory 2, a simple drag-and-drop game creation system. By the end of the book



, you’ll have made three amazing sample games and have the skills and information you need to make more games on your own. You’ll start by exploring the different game genres and learning how to organize and develop your own game ideas before you begin creating. Then you’ll learn about game creation fundamentals such as graphics settings, methods, and features, as well as how to use and record music and sound in games. Once you have the basics down, the book will introduce you to the Games Factory 2, including how to install it, important program terminology, and a walk-through of the important editors and screens you will use next when you create the three sample games in the book. Creating the games will help you explore and test out the functionality of the Games Factory 2 and build your skill set with the program. You’ll finish up by learning how to add objects, pictures, and animation to your games to make them more interesting and dynamic, and even how to test and debug your games. Game Creation for Teens provides you with the information and techniques you need to make your game ideas a reality!




rapidshare :
http://rapidshare.com/files/212462612/Game_Creation_Teens.rar

Computer Forensics: Computer Crime Scene Investigation (Networking Series


Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Publisher: Charles River Media | 2005-05-27 | ISBN: 1584503890 | PDF | 832 pages | 2.2 MB


The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book’s companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.




KEY FEATURES • Comprehensive overview of the subject from information security issues to data recovery techniques to auditing methods to terrorist cyber-attacks • Includes Evidence Identifi cation and Checklist forms, hands-on projects, exercises, and case studies for each chapter • CD includes tools, presentations, and demos of the latest computer forensics software • Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Computer Image Verifi cation; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Networks; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Advanced Encryption & Hacking; Case Studies and Vignettes; Evidence Checklists and Forms

On the CD-ROM (See Appendix G for Details) Includes a collection of forensic tools, demonstrations, docs, product presentations, and figures from the book. Topics and demos include: analysis tools, data recovery, forensic examination checklists, instant messenger issues, litigation, forensic training and certification information, case profiles, and more

SYSTEM REQUIREMENTS The third party software contained on the CD-ROM runs on a variety of platforms and operating systems. Please consult Appendix G for more details, and especially Web site information for specific requirements, updates, etc. Minimum system requirements for all of these software products include Adobe Acrobat 5.0 or higher, Windows 2000, XP; an Internet connection; some also require basic hardware such as Firewire, USB Devices, Zip, Jaz, Floppy Diskettes, or hard disk drives (IDE, EIDE, SCSI, ATA, SATA).

Amazon.com Review:
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer Forensics: Computer Crime Scene Investigation explains how to gather evidence of computer crimes in such a way that it will be more likely to lead to a conviction in a criminal court. It's an interesting legal area--after all, it's almost always you, and not any law enforcement agency doing the surveillance and evidence-gathering on your computer systems--and John Vacca has done a fair bit of research. This book will probably expand your thinking on the subject of information security.


On the other hand, though Vacca gives good general advice (don't lose volatile information by shutting a compromised machine down midattack; do be prepared to translate memory dumps into jury-readable form), he sometimes meanders into generalizations and irrelevancies. The fact that terrorists distribute their plans via public Web sites is certainly scary, but hardly helpful to someone wanting to prosecute the guy who vandalized the corporate Web site. Similarly interesting, but practically irrelevant to most of us, are discussions of high-energy radio frequency (HERF) and electromagnetic pulse (EMP) weapons that can knock out information systems from a distance. More focus on evidence collection in organizational computing environments would make this book useful, rather than just generally informative. --David Wall


Topics covered: How to gather evidence of a hack attack after the fact, and a lot of general-interest information on the state of crime and law enforcement in computer technology. Coverage is almost all general in nature, dealing with how to formulate a strategy and deal with events without getting into details of any operating system or computing environment.


Download
Mirror


Enterprise Web Services Security


Rickland Hollar, Richard Murphy, "Enterprise Web Services Security"
Charles River Media | 2005 | ISBN: 1584504137 | 432 pages | PDF | 1,15 MB

Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security professionals need to build security policies and strategies from the ground up in a Web Services environment. Most security books focus on computer or network security in isolation, relegating the other areas to overview chapters or appendices. A single-system view of security, however, is not adequate to describe a distributed Web Services-based environment as it causes the developer to have to piece together material from several resources in order to create secure Web sites and services. This book takes a holistic approach that mirrors the perspective developers need to take regardless of whether they are planning and implementing the security mechanisms for a Web Service, a Web site, or an enterprise. It details how to secure critical components such as workstations, servers, and networks, the goals behind an enterprise’s security policies, the policies an organization should have in place, and how to communicate those policies using WS-Policy Framework and WS-Security Policy. Various threats and attacks are also covered, as well as the identity management, authentication, authorization, access control, confidentiality, and integrity mechanisms needed to protect messages and transactions. Enterprise Web Services Security is the one book developers need to make all their security mechanisms work successfully to thwart attacks and protect assets.

Key Features! * Teaches developers, application architects, and security professionals how to build security policies and select appropriate security mechanisms and strategies in a Web Services environment * Covers the underlying protocols and technologies that form the Internet (TCP/IP, HTTP) and Web Services (XML, SOAP, WSDL, UDDI), and the major XML and Web Services standards that are the basis of implementing security in a Web Services environment * Teaches how to implement and communicate security mechanisms using WSSecurity, XML Encryption, XML Signature, SAML, and XACML * Explores the importance of auditing at both the server and network level and how to create trust relationships and domains * Explains how to implement security policies and mechanisms in both J2EE and .NET * Includes a companion CD-ROM with all of the references, source code, and figures from the book ON THE CD (see Appendix B for more details) * Code Samples: Contains all of the XML listings from the book * References: Provides hyperlinks for all the reference materials used in the book * Work sheet: Includes a work sheet for deploying a Web Services system as described in the book * Figures: Includes all of the fi gures from the book by chapter SYSTEM REQUIREMENTS: Any Windows, Macintosh, or UNIX system that allows reading this CDROM and has the ability to view and display XML, text, PDF, and Microsoft Office files.




RS Link:
http://rapidshare.com/files/212660716/Enterprise_Web_Service_sec.rar

Innovative Cryptography


Nick Moldovyan, Alex Moldovyan, "Innovative Cryptography"
Charles River Media | 2006 | ISBN: 1584504676 | 400 pages | PDF | 5,3 MB

Innovative Cryptography, Second Edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block ciphers, and details the need for fast symmetric ciphers for hardware (DES), software (RC5, Blowfish), and universal (AES, RC6, Twofish, IDEA, GOST) implementations. In addition, the book covers the issues surrounding the development and design of software-oriented ciphers, including ciphers based on the algorithm formed depending on the secret key. Some specific

issues related to the cryptographic strength of ciphers with the flexible algorithm of data transformation are considered, and a combinational probabilistic model is suggested for obtaining minimal evaluations of the software ciphers being considered. A highly promising new command suggested to be used in universal processors is also discussed. This command executes controlled bit permutation, and is expected to sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type. Innovative Cryptography, Second Edition is written for anyone involved in the development of cryptopgraphic tools, including engineers, researches, programmers, and IT security professionals.






http://rapidshare.com/files/212648156/Innovative_Crypt.rar

Creating Content Management Systems in Java


Arron Ferguson, "Creating Content Management Systems in Java"
Charles River Media | 2006 | ISBN: 1584504668 | 512 pages | PDF | 3,5 MB

In today's fast-paced, information-packed world, it's critical for businesses to organize and manipulate the data gathered from customers, sales, and product responses, etc. into usable information. Content Management Systems (CMS) can do this for your business easily and efficiently. There are several commercial systems available, but customizing one for your specific needs is usually necessary based on your data. Creating Content Management Systems in Java teaches you how to develop an open source CMS from scratch using XML as the storage mechanism, XSLT as the presentation layer, and Java and JSPs & Servlets to realize the multi-tiered architecture. The book also covers data modeling in XML and the use of XSLT as a presentation vehicle for custom XML formats. Creating Content Management Systems in Java is written for Web and software developers (specifically Java developers) who wish to learn more about the field of content management. The book provides a practical, applied perspective with complete demonstrations using code to show you how a solution or feature can be implemented.

Throughout the book you will work through the development of a complete, open source, working CMS example, beginning with the conceptual ideas of content management. From there you'll dive into the exploration of practical design solutions, and then move into the final implementations in each tier of the software that becomes the CMS. To benefit the most from this book, you should already know the Java programming language and have a basic understanding of the Web. You do not need to know XML, XSLT, CSS, or XHTML because these topics are covered thoroughly, although a basic understanding will be helpful. So, if you need to learn more about CMS development, this is the book for you.

Introduction to Network Security


Neal Krawetz, "Introduction to Network Security"
Charles River Media | 2006 | ISBN: 1584504641 | 608 pages | PDF | 2,1 MB

In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators who can protect networks is growing. If you are tasked with protecting your networks from these threats, or are studying security, Introduction to Network Security will help you increase your understanding of potential threats, learn how to apply practical mitigation options, and react to attacks quickly. The book teaches you the skills and knowledge you need to design, develop, implement, analyze, and maintain networks and network protocols. It explains how these systems currently operate and the limitations that lead to security weaknesses. All of the fundamental issues needed to understand network security, including the definition of security terms, security ethics, the OSI network model, and cryptography for networks are covered in detail. The book focuses on the seven layers in the OSI network model by describing each overall layer, its security role, common vulnerabilities, and mitigation techniques. The discussion of each layer is followed by explicit examples of common protocols within the layer and their respective security issues. The last part of the book explores the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues. If you are new to network security, a general IT administrator, or a student, this is a must-have a resource to help ensure that you have the skills and knowledge required to protect your networks!

Microprocessors: From Assembly Language to C Using the PICI8FXX2


Robert B. Reese, "Microprocessors: From Assembly Language to C Using the PICI8FXX2"
Charles River Media | 2005 | ISBN: 1584503785 | 652 pages | PDF | 9,25 MB

This book is designed for a first course in microprocessors or it may be used as a reference for practicing engineers. The book is unique in presenting a balanced, integrated topic coverage of assembly language programming, microcontroller programming via the C language, and hardware interfacing. Programming topics are discussed using both assembly language and C, while hardware interfacing examples use C to keep code complexity low and improve clarity. A goal of this book is to prepare students for advanced courses in embedded systems or computer architecture. As such, the topic coverage is wide, with a mixture of software and hardware topics. The assembly language programming topics emphasize the linkage between C language constructs and their assembly language equivalents, so that students clearly understand the impact of C coding choices in terms of execution time and memory requirements. Hardware interface topics included in the textbook cover the fundamentals (parallel, serial, interrupts, A/D, D/A) using devices that do not require an extensive circuits background. Laboratory Projects These provide an extensive off-the-shelf lab experience (13 experiments) for using the PIC18: one experiment on introductory computer architecture topics, four experiments on PIC18 assembly language, and eight hardware experiments. The hardware experiments require the read to breadboard a PIC18F242 system that includes a serial EEPROM, external 8-bit Digital-to-Analog converter, and RS232 interface, and an infrared receiver module. The hardware labs cover all major subsystems on the PIC18: A/D, timers, asynchronous serial interface, and the 12C interface. All hardware labs are programmed in C, using the HI-TECH PICC18 compiler. A supplemental website (www.reesemicro.com) has book C code examples that have been modified to be compatible with both the Microchip MCC18 and HI-TECH PICC18 compilers, as well as lecture notes and sample quizzes.



The Software Vulnerability Guide


Herbert Thompson; Scott Chase, "The Software Vulnerability Guide"
Charles River Media | 2005 | ISBN: 1584503580 | 354 pages | PDF | 5,4 MB

In today’s market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT infrastructures and the Internet. Most of these security bugs (and the viruses, worms, and exploits that derive from them) started out as programmer mistakes. With this easy-to-use guide, professional programmers and testers will learn how to recognize and prevent these vulnerabilities before their software reaches the market. For each of the 30 common software vulnerabilities featured the authors provide a summary, description of how the vulnerability occurs, and famous examples of how it has been used. Tips on how to find and fix the vulnerability in software are also provided along with source code snippets, commentary, tools, and techniques in easy-to-read sidebars. This guide is a must-have for today’s software developers.

KEY FEATURES
* Includes coding examples in a variety of languages, including C, C++, Java, VB, .NET, scripting languages, and more
* Provides tips for uncovering vulnerabilities in a diverse array of systems, including what it may look like in code, and how the offending code can be fixed
* Covers vulnerabilities such as permitting default or weak passwords, cookie poisoning, exchanging sensitive data in plain text, leaving things in memory, and format string attacks
* Includes a CD-ROM with all of the source code, as well as many freeware/shareware tools discussed in the book




RS Link:
http://rapidshare.com/files/212649374/Software_Vulnerability_Guide.rar

Visual Basic 2005 By Practice


Mike Mostafavi, "Visual Basic 2005 By Practice"
Charles River Media | 2007 | ISBN: 1584504412 | 528 pages | PDF | 2 MB

Learning an object oriented programming language like Visual Basic can be a challenging and often frustrating task. Many Visual Basic books are intimidating for the beginning programmer because they are mostly theory, making the material difficult to apply. Visual Basic 2005 by Practice cuts through the jargon and provides a better understanding of the language by teaching concepts through step-by-step, clear, and concise examples. These examples provide an easy-to-follow and simple approach to learning the concepts and tools involved with Visual Basic 2005, including the new language features and controls needed to complete beginning and intermediate projects. The examples cover a vast array of language features, including flow charts, radio buttons, detailed message boxes, loading images dynamically, calculations, constants, variables, image lists, creating sub procedures, printing, adding forms to a project, data grids, and string functions. The book also covers important topics such as interactive programming, database features, debugging, and Web controls. The source code for all the examples in the book is provided on the companion CD-ROM, which allows you to see the programs in action and examine their features. The book is written for entry- and intermediate-level Visual basic programmers as well as those experienced with other programming languages, such as those experienced with other programming languages, such as C++, Java and BASIC, and the .NET Framework - Visual Basic's development environment - is explained to the degree needed to learn programming. The user-friendly style, sequence of topical coverage, ample examples, and simple approach of this book make it a must-have for any beginning programmer eager to learn Visual Basic 2005.



http://rapidshare.com/files/212649687/Visual_Basic_2005_Practice.rar

Upgrading & Fixing PCs For Dummies, 7th Edition


Andy Rathbone, "Upgrading & Fixing PCs For Dummies, 7th Edition"
For Dummies | 2007-05-07 | ISBN: 0470121025 | 408 pages | PDF | 14 MB

Covers upgrades for gaming, digital video, and entertainment!

Transform your PC into a glitch-free, turbocharged, multimedia machine

Want to add punch to your PC? This handy reference helps add power to your old computer. Easy steps show you how to add memory, update your virus protection, get your PC ready for Windows Vista or rev it up as a cool entertainment center capable of recording TV shows or hearing DVDs in surround sound.

* Move files from an old PC to a new one
* Upgrade to Windows Vista
* Get rid of computer viruses
* Configure a wireless network
* Add a TV tuner and DVD burner


Monday, March 23, 2009

Java 2 Complete Referenc

Java 2 Complete Reference

Java 2 Complete Reference | PDF | 5,07MB

Description:

This book is most famous and useful book of Java.

Name of the book - Java 2 Complete Reference
Author - Herbert Schildt
Edition - Fifth
Format - PDF
Pages - 1184

Download Links:

Download From Rapidshare

or

Download From Easy-Share

Upgrading & Repairing PC - Scott Mueller

Upgrading & Repairing PC - Scott Mueller

Upgrading & Repairing PC - Scott Mueller | PDF | 1604 Pages | 45,56MB

This book is very informative & easily understandable. It includes :-
1.Development of PC
2.PC components, features and system design
3.Microprocessor types and specifications
4.Motherboards and buses
5.BIOS
6.Memory
7.ATA/IDE interface
8.The SCSI interface
9.Magnetic storage principles
10.Hard disk storage
11.Floppy disk storage
12.High-Capacity removable storage
13.Optical storage
14.Physical drive installation and configuration
15.Video hardware
16.Audio hardware
17.I/O interfaces from serial and parallel to IEEE-1394 and USB
18.Input devices
19.Internet connectivity
20.Local area networking
21.Power supply and chassis/case
22.Building or upgrading systems
23.PC diagonistics, testing and maintenance

24.File systems and data recovery


Download Links:

Download From Rapidshare

or

Download From Easy-Share

Windows Vista Plain & Simple

Windows Vista Plain & Simple

Windows Vista Plain & Simple

Get the fast answersing full colorthat make learning the new Windows Vista operating system plain and simple! Windows Vista helps you more effectively use your PCwith simple ways to find and use your information, enjoy your digital media, and connect to technologies and people.

This no-nonsense guide helps you learn the easy way to navigate this new operating system with numbered steps and concise, straightforward language that show the most expedient ways to learn a new skill or solve a problem. Youll discover how to perform everyday tasks and answer your own questions quicklylearning the essentials for customizing your desktop, setting up a home network, managing digital media, publishing files to the Web, and more. With Plain & Simple, you dont have to wade through superfluous details.
download

Saturday, March 21, 2009

Handbook of Network and System Administration

Handbook of Network and System Administration
Product Description
System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.
This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.



This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.

- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments

About the Author
Jan Bergstra is a professor of computer science at the University of Amsterdam, a part time professor of applied logic at Utrecht University (both NL) and he is a honorary visiting professor with the University of Swansea (UK). His main resarch interest has been computability theory, process algebra and abstract data types, but he worked in many other aspects of computer science as well, including in particular decidability problems that arise in the theory of computer virusses. He is a member of the Academia Europaea. He is currently managing editor of ‘Science of Computer Programming’ and the ‘Journal of Logic and Algebraic Programming’.

download

Google Blogger For Dummies

Google Blogger For Dummies

Google Blogger For Dummies

Product Description
Are you bemused by blogs? Eager to become a blogger? Google Blogger For Dummies can help you start blogging sooner than you think.

More than 14 million people are promoting a business, connecting with family and friends, and sharing opinions with Google Blogger. This book helps you start a Blogger account, create content, build an audience, make money from your blog, and more, all without learning to program. You’ll be able to:

  • Learn the parts of a blog, what Blogger does, and how to choose goals and blog topics
  • Choose a domain name, learn to use the dashboard, pick a template, and configure settings
  • Dress up your blog with themes and find out where to get plenty of free ones
  • Learn blogging etiquette and some secrets for long-term success
  • Make money from your blog with Google Adsense, contextual and text link ads, and merchandising with CafePress
  • Set up multi-user blogs or branch into mobile blogging, podcasting, or video blogging
  • Take advantage of social networking sites and learn simple search engine optimization techniques
  • Maintain your blog with tools like Blog This! and Quick Edit
  • Moderate comments effectively, track your stats, and more

Google Blogger is a great choice for beginning bloggers, and Google Blogger For Dummies gives you the know-how to venture confidently into the blogosphere.

download

Friday, March 20, 2009

PC-World-Magazine-April-2009

PC-World-Magazine-April-2009

PC-World-Magazine-April-2009

Thursday, March 19, 2009

Final Cut Pro Workflows: The Independent Studio Handbook


Jason Osder, Robbie Carman, "Final Cut Pro Workflows: The Independent Studio Handbook"
Focal Press | 2007 | ISBN: 0240810058 | 256 pages | PDF | 4,7 MB

TReview
"...with an easy style and great depth, Final Cut Pro Workflows: The Independent Studio Handbook is an enjoyable and important read. Osder and Carman offer a diverse background and extensive experience with Final Cut Pro."
- Richard Harrington, President, RHED Pixel; author, Photoshop for Video, 3rd Edition, Final Cut Studio on the Spot, 3rd Edition

"Builds the theory and practice of using FCP around a variety of real-world project scenarios. Final Cut Pro Workflows combines an encyclopedia of detailed information on technical specs for shooting and editing with surprisingly readable stories about applying the tools to actual projects. Not just how to use a hammer...how to build the house."
-- Blaine Graboyes, Media Architect, Worldwide Biggies, NYC

"...what makes Final Cut Pro Workflows: The Independent Studio Handbook a standout in a crowded field of books on the 'how to' of digital editing is the recognition that it's not just about learning the technology, but about how you think, organize, and manage a project to bring it to successful conclusion. Osder and Carman have written a unique book that brings together the critical marriage of technology and the real world circumstances that confront nascent Final Cut Pro editors. Indispensable!"
- Nina Gilden Seavey, Emmy Award-winning Filmmaker; Director, The Documentary Center, George Washington University




http://rapidshare.com/files/210420712/Final_Cut_Pro_Workflows.pdf

Networks - Design and Management, Second Edition


Karris, Steven T, "Networks - Design and Management, Second Edition"
Orchard Publications | ISBN: 1934404160 | 01-06-2009 | 522 pages | PDF | 5.7MB

Networks are growing in size and complexity and this trend has created a rapid increase for networking engineers to provide practical and efficient solutions. Networking needs vary from one network to another; there is no such thing as "one size fits all." Also, a properly designed network must allow for expansion. The management of a small company may feel that this advanced technology is of no use to them since their monetary budget is limited. However, with proper planning, small companies can start with an affordable and versatile network and later expand on the next level of affordability. It is the scope of this text to provide a thorough treatment on networking and address the concerns cited above. On the title of this book "design" implies the purchasing and proper installation of the essential hardware and software that one must collect to assemble an effective computer network. Basically, it means the building of a network. By "management" we mean the duties and responsibilities of the network administrator. This book is primarily intended for those student and working professionals who have the desire to become network administrators. However, all practicing engineers will find it to be a very valuable source of information on this fascinating subject.





Download from RapidShare

Download from DepositFiles

Download from Uploading.COM


http://rapidshare.com/files/210104928/Orchard.Publications.Networks.Design.and.Management.2nd.Edition.Jan.2009.eBook-DDU.pdf

Power Plant Engineering


A.K. Raja, Amit Prakash Srivastava, Manish Dwivedi, “Power Plant Engineering”
New Age International | 2006 | ISBN: 8122418317, 8122423337 | 491 pages | PDF | 3 MB

Preface
There have been significant developments and advances in the field of power plant engineering,
computer applications on energy audit and management, environmental audit and management, human
development and environment. The authors have been encouraged to write this pioneer book for the
benefit of students of engineering and researchers due to their contribution in power generation covering
the syllabi of conventional power plants i.e., Power Plant Engineering, at the international level in
general as text cum reference book.




This book being pilot project of the authors specially in the area of conventional power plant will
satisfy the engineering scholars as well as researchers in the field of direct energy conversion devices.
In the present book the syllabi enclosed has been covered in the most lucid manner from
power plant point of view to avoid the unnecessary bulkiness and to reduce the cost of the price for
the benefit of our beloved students of engineering in particular and others in general.
We have written this pioneering book on the basis of syllabi in the most lucid and compact
manner for the benefit of the students and the readers.
The authors are greatly indebted to Ch. Sunil Singh, Chairman, SITM Lucknow, Mr. K.C. Mishra
Suptt. Engineer, Saudia Electric Co. Saudi Arabia, for their great encouragement in writing this book.
Without their support and help we would not have been able to accomplish this tough and challenging
work.
In the end the authors will feel obliged for critical and useful suggestions since this pioneer book
covers the syllabi in the most useful area of Mechanical Engineering in particular and is applicable for
all branches of technology and engg. for all major Indian Universities, as well as at international level.



 
Disclaimer:
This site does not store any files on its server.We only index and link to content provided by other sites and also if you feel any copyrighted material is seen in this blog ..
please feel to write us.. gnbcreation@yahoo.com