Saturday, April 18, 2009

Writing Apache Modules with Perl and C

Writing Apache Modules with Perl and C

Writing Apache Modules with Perl and C

Apache is the most popular web server on the Internet because it is free, reliable, and extensible. The availability of the source code and the modular design of Apache makes it possible to extend web server functionality through the Apache API. For the most part, however, the Apache API has only been available to C programmers, and requires rebuilding the Apache server from source. mod_perl, the popular Apache module used primarily for enhanced CGI performance, changed all that by making the Apache API available to Perl programmers. With mod_perl, it becomes simple to develop Apache modules with Perl and install them without having to rebuild the web server. Writing Apache Modules with Perl and C shows how to extend web server capabilities regardless of whether the programming language is Perl or C. The book explains the design of Apache, mod_perl, and the Apache API. It then demonstrates how to use them to perform for tasks like the following:

* Rewriting CGI scripts as Apache modules to vastly improve performance
* Server-side filtering of HTML documents, to embed special markup or code (much like SSI)
* Enhancing server log functionality
* Converting file formats on the fly
* Implementing dynamic navigation bars
* Incorporating database access into CGI scripts
* Customizing access control and authorization to block robots or to use an external database for passwords

The authors are Lincoln Stein and Doug MacEachern. Lincoln is the successful author of How to Set Up and Maintain a World Wide web Site and the developer of the widely used Perl CGI.pm module. Doug is a consultant and the creator of the innovative mod_perl Apache module. –This text refers to the Paperback edition.

Download:
http://uploading.com/files/BVVAS1N7/Writing_Apache_Modules_with_Perl_and_C_Rilwis.tk.rar.html

Code Leader: Using People, Tools, and Processes to Build Successful Software

Code Leader: Using People, Tools, and Processes to Build Successful Software

Code Leader: Using People, Tools, and Processes to Build Successful Software

“Patrick is a pragmatist with a purist’s knowledge. He has a deep understanding of what ’smells’ right, and he knows when and how to find the right balance to get the job done. This philosophy of balanced ‘pure pragmatism’ pervades this book and makes it useful.”

—from the foreword by Scott Hanselman, Author of ComputerZen Blog, www.computerzen.com; Senior Program Manager, Developer Division, Microsoft Corporation
Writing code is rewarding, but writing high-quality code, on time and at the lowest possible cost, is what makes a software project successful. As the role of a professional developer has evolved and taken on additional responsibilities, it is now necessary to work in concert with a team in order to improve both the process and final results of a software project. This unique book introduces a set of concrete best practices and construction techniques that can be applied to the development process and to actual code construction, so that you can confidently solve business problems rather than deal solely with pure coding tasks.
Patrick Cauldwell understands that it is no longer sufficient to just write software that solves a problem; it must also be fast, scalable, reliable, and easy to use. In this reference, he explains how to build software that is of high quality at a lower cost and shares with you the practical steps you must take in order to transition from software engineer to technical lead.
May 21, 2007 | PDF | 5 Mb

Download:
http://uploading.com/files/0YC7VKOD/Code_Leader_Using_People__Tools__and_Processes_to_Build_Successful_Software_Rilw...rar.html

Adapting to Web Standards: CSS and Ajax for Big Sites

Adapting to Web Standards: CSS and Ajax for Big Sites

Adapting to Web Standards: CSS and Ajax for Big Sites

After learning the language of design, how does one effectively use standards-based technologies to create visually strong Web sites? The full-color Professional Web Standards Design and Development gives developers a peek into the process of the best designers in the world through the work of high profile, real-world Web sites that made them famous. The book focuses on deconstructing these top-tier large-scale sites with particular attention given to deconstructing CSS.

288 pages | Mar, 2008 | PDF | 5 Mb

Download:
http://uploading.com/files/B1HIMKRO/Adapting_to_Web_Standards_CSS_and_Ajax_for_Big_Sites_Rilwis.tk.rar.html

Nokia Network Security Solutions Handbook

Nokia Network Security Solutions Handbook

Nokia Network Security Solutions Handbook

The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are covered in detail, as well as installation and configuration of the Check Point firewall on the Nokia system.

Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as well as learning how to use Nokia’s command line interface. Routing configurations and the different protocols involved are covered in detail, finishing off with a comprehensive discussion of the High-availability configuration that is Nokia’s strength. The appendices include coverage of the UNIX basics which lie at the heart of the IPSO operating system and a review of the other packages available for Nokia systems (such as Perl and Bash).

The only book dedicated to coverage of the latest Nokia hardware and software offerings, from the SOHO appliances to the enterprise-class IP700 series, with an emphasis on administering and securing these systems.
Long-term market potential. The operating system referenced will be Nokia IPSO 3.4.1, which has an interface that has been specifically tailored to make upgrading to newer versions of IPSO simple and intuitive. In addition, the underlying interface is UNIX based, which has been a constant for over 30 years.
Up-to-the-Minute Web-based Support. Once they have absorbed the content of the book, readers can receive up-to-the minute links, white papers, and analysis for one year.

560 pages | October 2002 | English | 7.9MB

Download:
http://uploading.com/files/5QEN0PCL/Nokia_Network_Security_Solutions_Handbook_Rilwis.tk.rar.html

CCENT: Cisco Certified Entry Networking Technician

CCENT: Cisco Certified Entry Networking Technician

CCENT: Cisco Certified Entry Networking Technician

Expert exam prep from leading Cisco authority Todd Lammle
Start your preparation here for Cisco’s new CCENT entry-level networking certification, your entry point into Cisco’s popular CCNA certification track. This comprehensive study guide from leading Cisco authority Todd Lammle thoroughly prepares you for the Interconnecting Cisco Networking Devices, Part 1 exam (640-822) and the start of a career, with pages of exam essentials, real-world scenarios, and hands-on exercises.

Topics include the operation of data networks, how to implement both switched and routed networks, and much more.
648 pages | Mar, 2008 | PDF | 10,5 Mb

Download:
http://uploading.com/files/36XUB17Q/CCENT_Cisco_Certified_Entry_Networking_Technician_ICND1_Rilwis.tk.rar.html

Implementing Cisco Unified Communications Manager (CIPT1)

Implementing Cisco Unified Communications Manager (CIPT1)

Implementing Cisco Unified Communications Manager (CIPT1)

Implementing Cisco Unified Communications Manager, Part 1 (CIPT1), is a Cisco®-authorized, self-paced learning tool for CCVP® foundation learning. This book provides the knowledge necessary to install, configure, and deploy a Cisco Unified Communications solution based on Cisco Unified Communications Manager, the call routing and signaling component of the Cisco Unified Communications solution. By reading this book, you will gain an understanding of deploying a Cisco Unified Communications Manager to support single site, centralized, distributed, and hybrid call processing models.

This book focuses on Cisco Unified Communications Manager Release 6.x. You will learn how to install and configure Cisco Unified Communications Manager, power over Ethernet switches, and gateways using MGCP. You will also learn how to build a scalable dial plan for on-net and off-net calls. The dial plan chapters of the book cover call routing, call coverage, digit manipulation, class of service, and call coverage components. This book will teach you how to implement media resources, LDAP directory integration, and various endpoints including Skinny Client Control Protocol (SCCP) and Session Initiation Protocol (SIP).

Cisco Unified Video Advantag endpoint configuration is covered, in addition to, Cisco Unity® voice mail integration and basic voice mail box creation. Various user features are discussed including Presence.
656 pages | Jun, 2008 | PDF | 13 Mb


Download:
http://uploading.com/files/LPSROV1A/Implementing_Cisco_Unified_Communications_Manager__CIPT1__Rilwis.tk.rar.html

Swing Extreme Testing

Swing Extreme Testing

Swing Extreme Testing

Thorough testing is the basis of good software. Whether we use an agile development methodology such as Extreme Programming, or a more traditional approach, we must test our software at the unit level and application level. The tests must run automatically and cover all aspects of the software.

In this book, the authors draw on more than 20 years of experience to show how automated testing can be applied to a real commercial product.

This book will teach you how to automatically test user interfaces (Swing GUIs), the help system, internationalization, log files, spreadsheets, email, and web services, how to perform tests involving multiple JVMs, and a host of other things. These tests are applied at the module level (unit tests) and at the application level (function tests).
565 pages | May 30, 2008 | PDF | 4 Mb

Download:
http://uploading.com/files/OHHM3X18/Swing_Extreme_Testing_Rilwis.tk.rar.html

Eclipse Cookbook

Eclipse Cookbook

Eclipse Cookbook

You’ve probably heard the buzz about Eclipse, the powerful open source platform that gives Java developers a new way to approach development projects. It’s like a shiny new car–no longer content to just admire Eclipse, you’re now itching to get in and drive.

Eclipse is to Java developers what Visual Studio is to .NET developers–it’s an integrated development environment (IDE) that combines a code editor, compiler, debugger, text editor, graphical user interface (GUI) builder, and other components into a single, user-friendly application. It provides a solid foundation that enables Java developers to construct and run integrated software-development tools for web development, application design, modeling, performance, testing, and much more.

As with any extensive programming tool, however, there’s a lot to learn. And there s no better guy than well-known Java expert Steve Holzner to teach you. An award-winning and best-selling author who has been writing about Java topics since the language first appeared, Holzner delivers just the kind of targeted, practical, everyday knowledge you need to hone your mastery of Eclipse.

Perfect as a companion to an Eclipse programming tutorial (such as Holzner’s own Eclipse, O’Reilly, April 2004) or an ideal stand-alone for all those developers who either don’t want or don’t need the tutorial approach, the “Eclipse Cookbook” contains task-oriented recipes for more than 800 situations you may encounter while using this new Java platform–from deploying a web application automatically to reverse engineering compiled code, from re-naming all references to a class across multiple packages to initializing the SWT JNI libraries.

Each recipein the ever-popular and utterly practical problem-solution-discussion format for O’Reilly cookbooks contains a clear and thorough description of the problem, a brief but complete discussion of a solution, and in-action examples illustrating that solution. The “Eclipse Cookbook” will satiate Java programmers at all levels who are ready to go beyond tutorials–far beyond writing plug-ins and extensions–and actually use the powerful and convenient Eclipse day to day.

About the Author
Steve Holzner is an award-winning author who has been writing about Java topics since Java first appeared. He’s a former PC Magazine contributing editor, and his many books have been translated into 18 languages around the world. His books sold more than 1.5 million copies, and many of his bestsellers have been on Java. Steve graduated from MIT and got his PhD at Cornell; he’s been a very popular member of the faculty at both MIT and Cornell, teaching thousands of students over the years and earning an average student evaluation over 4.9 out of 5.0. He also runs his own software company and teaches week-long classes to corporate programmers on Java around the country.

Download:
http://uploading.com/files/PESFSBJH/Eclipse_Cookbook_Rilwis.tk.rar.html

OpenSSH: A Survival Guide for Secure Shell Handling

OpenSSH: A Survival Guide for Secure Shell Handling

OpenSSH: A Survival Guide for Secure Shell Handling

The OpenSSH suite of tools provides replacements for some of the common administrative tools used today such as telnet, FTP and the r-utilities; yet, these tools, considered insecure because they use clear-text communication over the network, are in still in common use. OpenSSH provides an encrypted channel between computers and remote servers to ensure against a malicious attacker intercepting and reading information in transit.

Download:
http://uploading.com/files/D3FWX188/Institute.OpenSSH.A.Survival.Guide.for.Secure.Shell.Handling_Rilwis.tk.rar.html

Securing & Optimizing Linux: A Hands on Guide for Linux Professionals

Securing & Optimizing Linux: A Hands on Guide for Linux Professionals

Securing & Optimizing Linux: A Hands on Guide for Linux Professionals


As an NT Administrator I have read many Linux books trying to bridge my NT knowledge to the Linux and Unix world, this book is by far the best.

Most of the Linux books I have read before tell you what to do to administer a Linux server, but they assume that you know how to do it. Gerhard Mourani tells you in detail what to do, how to do it, and why to do it. I have learned a great deal not only about Linux server applications, but about the Linux operating system itself.

If you want to take advantage of Linux’s versatility as a server operating system, and do it in the most secure and efficient manner, you can find no better book than this one. In addition to operating system configuration there are many chapters individually dedicated to installing and configuring specific Linux server applications such as Sendmail, SQL server, Apache, BIND, and many more.

One disclaimer: If you are looking for information on how to build a Linux workstation or cool Gnome desktop, this is not the book for you. It is focus is exclusively building Linux application servers.

Download:
http://uploading.com/files/O40HMDHK/Securing___Optimizing_Linux_Rilwis.tk.rar.html

Securing Linux: A Survival Guide for Linux Security

Securing Linux: A Survival Guide for Linux Security

Securing Linux: A Survival Guide for Linux Security

As the Linux operating system has matured and grown in popularity, security risks have increased. SANS is pleased to announce publication of Securing Linux, a collaborative effort from many authorities who work with and secure Linux on a daily basis. This new addition to the Security Step-by-Step guides is not just an update to the previous Linux Step-by-Step from SANS. The book is a complete rewrite from the ground up, showing the latest in best practices for securing a Linux system. Check it out: the 104-page definitive guide is not only for security experts. The novice experimenting with Linux at home or in the workplace will benefit from this guide, which covers both workstations and many server setups. By using example scripts and the accompanying text that explains why a task should be carried out, you can increase the security of your Linux system.

Download:
http://uploading.com/files/KI0A3TR6/Securing_Linux_A_Survival_Guide_for_Linux_Security_Rilwis.tk.rar.html

Unix Shell Programming 3rd Edition

Unix Shell Programming 3rd Edition

Unix Shell Programming 3rd Edition

Unix Shell Programming is a tutorial aimed at helping Unix and Linux users get optimal performance out of their operating out of their operating system. It shows them how to take control of their systems and work efficiently by harnessing the power of the shell to solve common problems. The reader learns everything he or she needs to know to customize the way a Unix system responds.

The vast majority of Unix users utilize the Korn shell or some variant of the Bourne shell, such as bash. Three are covered in the third edition of Unix Shell Programming. It begins with a generalized tutorial of Unix and tools and then moves into detailed coverage of shell programming.

Topics covered include: regular expressions, the kernel and the utilities, command files, parameters, manipulating text filters, understanding and debugging shell scripts, creating and utilizing variables, tools, processes, and customizing the shell.

Download:
http://uploading.com/files/M50RZGHB/Unix.Shell.Programming.3rd.Edition_Rilwis.tk.rar.html

UNIX Fault Management: A Guide for System Administrators

UNIX Fault Management: A Guide for System Administrators

UNIX Fault Management: A Guide for System Administrators

Designed to help you maximize system integrity and availability on any Unix system-including clusters, monitor systems, disks, networks applications, and databases, with tips for recovery and prevention. Provides quick reference diagnostics and recovery section for systems operators. Softcover. DLC: UNIX (Computer file).

From the Inside Flap
Preface

This book is intended for system administrators and operators who are responsible for maintaining the integrity and availability of mission-critical UNIX systems. The book provides a description of the fault monitoring tools and techniques available for UNIX servers, including systems that are configured as high availability clusters.

This book can therefore be a handy quick reference for an operator trying to troubleshoot a problem in the customer environment, by pointing out where to find key diagnostic messages and describing how to take recovery actions.

A system administrator responsible for the initial configuration and administration of UNIX systems will also find this book useful because it describes the procedures to follow to set up the appropriate levels of system monitoring. The product descriptions can also help in making purchasing decisions as the customer determines the appropriate amount of event monitoring needed in their environment.

An overview of the tasks performed by an operator is provided, with details on how events are received and processed. The remainder of the book focuses on the types of events that can be received, how they are detected, how operators receive event notifications, and how problems can be investigated and recovery performed. The goal is to introduce the necessary tools, but not to show how every possible problem can be solved.

This book provides numerous descriptions of how fault management tools and products can be used to solve a variety of problems. Many of the chapters are focused on specific computer components, such as disks or databases, to be helpful to operators with specific roles. Here is a description of the individual chapters:

Chapter 1, “Analyzing the Role of System Operators,” describes the tasks performed by a system operator and the evolution of fault management.
Chapter 2, “Enumerating Possible Events,” describes the various types of events that are interesting to monitor on a UNIX system.
Chapter 3, “Using Monitoring Frameworks,” describes monitoring frameworks and the administrative tasks that must be done before they can be used.
Chapter 4, “Monitoring the System,” describes the tools and products used to monitor the UNIX server.
Chapter 5, “Monitoring the Disks,” describes the tools and products used to monitor external disk devices.
Chapter 6, “Monitoring the Network,” provides an overview of the many tools available for detecting problems and events related to the use of the network.
Chapter 7, “Monitoring the Application,” describes methods for monitoring the response times and availability of critical applications.
Chapter 8, “Monitoring the Database,” focuses specifically on tools to detect problems and events related to database usage.
Chapter 9, “Enterprise Management,” discusses the problems with trying to deal with fault management for the large-scale customer enterprise.
Chapter 10, “UNIX Futures,” discusses the future plans of some of the major UNIX system vendors in the area of fault management.
Appendix A, “Standards,” describes fault management standards that have emerged and how you can benefit from them.

The Glossary contains the important terms used in the book, and their definitions.
Although it is assumed that most customers concerned about fault management will implement high availability solutions, this book does not describe how to create highly available computing environments. Readers needing additional information on high availability may check Hewlett-PackardÕs external Web site on high availability (hp/go/ha) or read Clusters for High Availability by Peter Weygant.

In general, this book does not discuss the configuration and installation of the hardware and software components of your UNIX system. You should rely on your vendorsÕ product manuals for this.

Many of the examples used in this book were created on HP-UX servers. Other UNIX platforms behave similarly, and we note when tools are supported only on certain UNIX platforms.

Download:
http://uploading.com/files/U68KX470/UNIX_Fault_Management_Rilwis.tk.rar.html

UNIX User’s Handbook (2nd Edition)

UNIX User’s Handbook (2nd Edition)

UNIX User’s Handbook (2nd Edition)

The in-depth UNIX guide for every end-user: completely updated and full of examples!

* For every key UNIX platform: practical examples, real depth!
* Covers all basic UNIX commands, plus sed, grep, awk, vi, and more
* Complete shell programming coverage—plus NEW programming section covering C/C++, Java(tm), and Internet development
* KornShell, Bash, C Shell, and Shell Programming
* Windows interoperability, in depth: Samba, NFS, Windows 2000 Services for UNIX, and much more

UNIX end-users desperately need an up-to-date reference guide with real depth: one that teaches UNIX commands and doesn’t just list them! In UNIX User’s Handbook, Second Edition, best-selling UNIX author Marty Poniatowski covers every topic UNIX users need to master—with exceptional clarity and practical, real-world examples. Part I brings together thorough coverage of virtually every key aspect of day-to-day UNIX operation and end-user administration. Part II presents an in-depth programming reference. Part III covers every leading option for Windows interoperability. You’ll find fast, easy answers for all this and more:

* Getting started: login, mail, Internet access, and key UNIX file management commands
* All basic UNIX commands and a complete UNIX file system overview (cd, cp, file, ls, mv, pwd, rm, rmdir, cut, paste, split, sort, diff, and more)
* Key UNIX tools—including in-depth coverage of find, vi, find, grep, sed, and awk
* Shells and shell programming: Bash, Korn, and C
* Full programming section—including a NEW user-centered introduction to C/C++ and Java
* End-user administration: processes, startup, shutdown, users/groups, backup, software management, printing, and more
* Networking and Internet protocols
* UNIX/Windows interoperability: Samba, X Window, NFS, Posix, Windows 2000 Services for UNIX, and other alternatives
* Performance and monitoring

This new edition has been updated throughout and redesigned for even faster, easier access to information. Whatever your experience, whatever UNIX version you use, you won’t find a more useful reference!

About the Author

MARTY PONIATOWSKI, a technical consultant for Hewlett-Packard in the New York metropolitan area, has worked with UNIX systems since 1981. His best-selling books include HP-UX 11i System Administration Handbook and Toolkit and HP-UX 11.x System Administration “How To” Book (Prentice Hall PTR).

Download:
http://uploading.com/files/86G4ZBT0/UNIX_User_s_H_ndbook__2nd_Edition__Rilwis.tk.rar.html

Ansi/Iso C++ Professional Programmer’s Handbook (Que Professional Series)

Ansi/Iso C++ Professional Programmer’s Handbook (Que Professional Series)

Ansi/Iso C++ Professional Programmer’s Handbook (Que Professional Series)

The ANSI/ISO C++ Professional Programmers Handbook is a concise professional C++ reference tool that presents all of the changes and addenda to the language specification. It contains tips and guidelines for exerting the full potential of C++ as a multi-purpose object-oriented programming language. The new Standard Briefing component provides coverage of the latest version of the C++ language including additions and modifications to the language, new constructs such as built-in bool type, namespaces, RTTI, new header file conventions, internalization, memory management and new cast notation. Additionally, we’ve included a Manual of Programming Style, a Compatibility Compendium, and Future Directions overview.

About the Author
Danny Kalev is a certified system analyst and software engineer with 10 years of experience, specializing in C++ and object-oriented analysis and design. Danny’s technical interests involve networking, distributed data systems, compiler technology, and embedded systems. He is currently working towards an MA degree in Applied Linguistic at the University of Tel Aviv, Israel and is a contributing columnist for the C/C++ User’s Journal. As a member of the ANSI/ISO C++ committee, Danny has been involved with every aspect of the language, deciding the rationale behind every new feature of the language and the recommended ways of using it. He has taken part in C++ projects in such diverse fields as data processing, networking, real-time programming, virtual machines, GUI, AI, automated speech synthesis and processing, compilers and parsers.

Download:
http://uploading.com/files/9MRNWD67/Ans_Iso_C___Pr0fess_onal_Rilwis.tk.rar.html

Game Programming with Python, Lua, and Ruby (Game Development)

Game Programming with Python, Lua, and Ruby (Game Development)

Game Programming with Python, Lua, and Ruby (Game Development)

Get ready to dive headfirst into the world of programming! “Game Programming with Python, Lua, and Ruby” offers an in-depth look at these three flexible languages as they relate to creating games. No matter what your skill level as a programmer, this book provides the guidance you need. Each language is covered in its own section?you’ll begin with the basics of syntax and style and then move on to more advanced topics. Follow along with each language or jump right to a specific section! Similar features in Python, Lua, and Ruby?including functions, string handling, data types, commenting, and arrays and strings?are examined. Learn how each language is used in popular game engines and projects, and jumpstart your programming expertise as you develop skills you’ll use again and again!

About the Author
Tom Gutschmidt has been a freelance technical writer for the past two years, with articles mainly appearing on Earthweb, Gamelan, and Developer.com. He also worked as an editor for the RPG website GameBanshee for the year 2001. Currently he is the youngest member of a small development team in an encryption and key management company (Widevine Technologies). Gutschmidt has worked on a number of open source game projects, do freelance work currently making web based games, and actively work on mod development.

His current projects include running an online gaming site that focuses on NWN mods and flash game development. The site has a small but regular following. He is wrapping up production on a full length NWN game mod that is in the late stages of beta testing.

Download:
http://uploading.com/files/K4ER64XC/G_me_Pr0gr_mming_with_Pyth0n__Lu___and_Ruby_Rilwis.tk.rar.html

Inside Linux

Inside Linux

Inside Linux

With in-depth complete coverage on the installation process, editing and typesetting, graphical user interfaces, programming system administration, and managing Internet sites, Inside Linux is the only book “smart users” new to Linux will need. Many of the users new to Linux have an understanding of computer technology and will be looking for just the right reference to fit their sophisticated needs. This book guides users to a high level of proficiency with all the flavors of Linux, and help them with crucial system administration chores. Inside Linux is different than other books available because it’s a unique blend of a how-to and a reference guide.

Amazon.com
The author of Inside Linux acknowledges that adequately teaching how to use Linux involves more than communicating a series of recipes. For that reason, he goes to considerable effort to explain what’s going on when the user executes various commands. He uses procedures to expose facts about Linux’s innards, rather than as mere strategies for achieving desired effects. Therefore, his prose–particularly his extended coverage of the bash shell–reads like a scientist’s journal: If we do this, here’s what happens (and by the way, here’s why). The approach is more leisurely than that of many introductory Linux books, and it leads to a deeper understanding of what’s going on under the shell.

The author shows how to configure and use XFree86, the K Desktop Environment (KDE), and GNOME. These are handy skills to have, even if most distributions will more or less automate those processes and some readers may wish instead for information on more obscure aspects of the operating system. Coverage of network configuration, where an intimate knowledge of the command line and configuration files is critical, suits this book’s experiment-and-observe format very well. The reader gets to see lots of important pieces of software in action. There’s nothing about Apache, but the sections on setting up FTP and Unix-to-Unix Copy Protocol (UUCP) services are particularly detailed. –David Wall

Topics covered: Linux for those unfamiliar with the operating system, with particular focus on the Caldera OpenLinux 2.2, Red Hat Linux 6, Slackware Linux 4, and SuSE Linux 6.1 distributions. Installation of XFree86, KDE, and GNOME are covered, as are the mechanics of setting up a TCP/IP network at the command line. Coverage of FTP and UUCP services conclude this book.

Download:
http://uploading.com/files/AU2HNCX0/Ins_de_L_nux_Rilwis.tk.rar.html

Using Samba, Second Edition

Using Samba, Second Edition

Using Samba, Second Edition

Using Samba, Second Edition is a comprehensive guide to Samba administration. It covers all versions of Samba from 2.0 to 2.2, including selected features from an alpha version of 3.0, as well as the SWAT graphical configuration tool. Updated for Windows 2000, ME, and XP, the book also explores Samba’s new role as a primary domain controller and domain member server, its support for the use of Windows NT/2000/XP authentication and filesystem security on the host Unix system, and accessing shared files and printers from Unix clients.

This book, which has been officially adopted by the Samba Team and is under the GNU Free Documentation License (FDL), is a comprehensive guide to Samba administration. The 2nd edition focuses on Samba 2.2 and covers the most important features of 3.0, which was under development as this book went to print. Samba is a cross-platform triumph: it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. Samba is so robust, flexible, fast, and secure that many people are choosing it over Windows NT/2000/XP for their file and print services. Samba is also free software, licensed under the GNU General Public License. This book will help you make file and print sharing as robust, powerful, and efficient as possible. The authors delve into the internals of the Windows activities and protocols to an unprecedented degree, explaining the strengths and weaknesses of each feature in Windows domains and in Samba itself. Using Samba takes you from basic installation and configuration–on both the client and server side, for a wide range of systems–to subtle details of security, cross-platform compatibility, and resource discovery that make the difference between whether a user sees the folder they expect or a cryptic error message. The range of this book knows few bounds. Wondering how to integrate Samba’s authentication with that of a Windows PDC? How to get Samba to serve Microsoft Dfs shares? How to share files on Mac OS X? These and a dozen other issues of interest to system administrators are covered. A whole chapter is dedicated to troubleshooting. Whether you’re playing on one note or a full three-octave range, on your personal computer or an enterprise network, Using Samba will give you an efficient and secure server.

Download:
http://uploading.com/files/MSWYFW20/Using_Samba__Second_Edition_Rilwis.tk.rar.html

Web Database Applications with PHP, and MySQL

Web Database Applications with PHP, and MySQL

Web Database Applications with PHP, and MySQL

Web Database Applications with PHP and MySQL offers web developers a mixture of theoretical and practical information on creating web database applications. Using PHP, and MySQL, two open source technologies the are often combined to develop web applications, the book offers detailed information on designing relational databases and on web application architecture, both of which will be useful to readers who have never dealt with these issues before. The book also introduces Hugh and Dave’s Online Wine Store, a complete (but fictional) online retail site implemented using PHP and MySQL.
What do eBay, Amazon.com and CNN.com have in common? They’re all applications that integrate large databases with the Web. The popularity (and power) of these applications stems from their accessibility and usability: thousands of users can access the same data at the same time without theneed to install any additional software on their computers. Web Database Applications with PHP and MySQL offers web developers a mixture of theoretical and practical information on creating web database applications. Using PHP, and MySQL, two open source technologies that are often combined to develop web applications, the book offers detailed information on designing relational databases and on web application architecture, both of which will be useful to readers who have never dealt with these issues before. The book also introduces Hugh and Dave’s Online Wines, a complete (but fictional) online retail site that allows users to browse, search a database, add items to a shopping cart, manage their membership, and purchase wines. Using this site as an example, the book shows you how to implement searching and browsing, store user data, validate user input, manage transactions, and maintain security. If you want to build small to medium-scale web database applications that can run on modest hardware and process more than a million hits a day from users, this book will show you how.

Download:
http://uploading.com/files/QG3XOXJA/Web_Database_Applications_with_PHP___MySQL_Rilwis.tk.rar.html

Windows Server Hacks

Windows Server Hacks

Windows Server Hacks

One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It’s possible, in fact, to accomplish about 90% of all Windows administration without ever opening a command prompt or running a script! But what about the other ten percent of the time? While it’s true that most common, day-to-day tasks of Windows administration can be performed from the GUI, it’s not always the best way, especially with complex or repetitive tasks Scripts and command-line tools often provide a faster, more flexible approach.

Windows Server Hacks reveals techniques that go well beyond basic management tasks found in most handbooks to help busy system administrators master the more powerful features of Windows Server. Windows Server Hacks focuses on scripts and other tools that will make your life as an administrator much easier. These tools, or hacks–quick and dirty solutions to problems, or clever ways of doing things–were created by other professionals who’ve also had to struggle to find solutions to administering Windows environments. You’ll save valuable time using their scripts, tools, tips, and advice. Plus, you can easily learn to customize the scripts to create even more powerful tools for your own, specific needs. The book includes secrets of the masters in such areas as Active Directory, User Management, Group Policy, DNS and DHCP, File and Print, IIS, performance and security. The hundred, industrial strength hacks in the book range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, and backup and recovery. No matter which Windows server you use–NT, IIS, 2000, or 2003–this book will put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server.

About the Author
Mitch Tulloch is a trainer, consultant, and author living in Winnipeg, in the Canadian province of Manitoba. In addition to his many Nutshell books for O’Reilly (Windows 2000 Administration, Windows Server 2003, Microsoft Exchange Server)

Download:
http://uploading.com/files/FA0OPTL3/Windows_Server_Hacks__Rilwis.tk.rar.html

Windows XP for Power Users: Power Pack

Windows XP for Power Users: Power Pack

Windows XP for Power Users: Power Pack

* Shows power users how to take Windows XP to the next level, focusing on functionality, networking, and overall performance
* Features to-the-point coverage that skips introductory explanations and focuses instead on the real-world tips and tricks power users need to become more productive
* Written in a friendly, approachable style by experienced XP author and power user Curt Simmons
* Topics covered include scripting, managing applications, making the most of digital media, power management, hardware management, the registry and file systems, security, auditing, backup and data storage, system performance, system recovery, Microsoft’s popular download XP Power Toys, networking, and wireless

From the Back Cover
Everything you need to know about

* Using third-party interface and application compatibility tools
* Working with digital media applications
* Managing power, security, hardware, and software
* Auditing files and restoring data
* Setting up wireless, workgroup, and remote networks
* Applying Service Pack 1 for improved security, compatibility, and stability
* Maximizing system performance
* Having fun with Windows XP Power Toys

Learn how you can harness all the power of Windows XP

If you’re ready to use all the features of Windows XP to your best advantage, here’s how to sharpen your skills as a power user. This book enables you to take control of the system, configure operating system services, build and manage networks, handle the interface, expand XP’s capabilities with scripting, enhance security features, experiment with Power Toys, and a whole lot more. Packed with step-by-step instructions and thorough coverage of configuration and performance, it takes you to a new level of Windows expertise.

About the Author
Curt Simmons is a technical trainer and author of more than thirty books on Microsoft® and Internet technologies, including several bestsellers. Considered an expert on Microsoft Office and Windows, he recently penned Windows XP Secrets, Windows XP Headaches, Windows XP Networking Inside Out and How to Do Everything with Windows XP.


Download:
http://uploading.com/files/4PZXRSKT/Windows_XP_for_Power_Users_Power_Pack_Rilwis.tk.rar.html

Marketing Your Consulting Services

A Business of Consulting Resource

Marketing Your Consulting Services

If consultants did not have to market and sell themselves, I am sure
that the number of consultants would at least quadruple. Just the
thought of submitting our work and ourselves to the judgment of others
scares many people away from making a living as an independent
consultant.Marketing and sales helps define the boundary between
those who choose to consult and those who do not.

I’ve been on my own for years, and I am still uneasy about new encounters with potential
clients. The phrase “standing naked before strangers” captures
my worst fears.

Download:
http://uploading.com/files/OO3RWCVX/Marketing_Your_Consulting_Services_Rilwis.tk.rar.html

Making Sense of Data II: A Practical Guide to Data Visualization, Advanced Data Mining Methods, and Applications

 Making Sense of Data II: A Practical Guide to Data Visualization, Advanced Data Mining Methods, and Applications

Making Sense of Data II: A Practical Guide to Data Visualization, Advanced Data Mining Methods, and Applications

The Making Sense of Data series fills a current gap in the market for easy-to-use books for non-specialists that combine advanced data mining methods, the application of these methods to a range of fields, and hands-on tutorials. Making Sense of Data II: A Practical Guide to Data Visualization, Advanced Data Mining Methods, and Applications offers a comprehensive collection of advanced data mining methods coupled with tutorials for applications in a range of fields including business and finance. This book is appropriate for students and professionals in the many different disciplines involving making decisions from data.

Download:
http://rapidshare.com/files/221844923/Making_Sense_of_Data_II.rar

Winning Government Contracts: How Your Small Business Can Find and Secure Federal Government Contracts Up to $100,000

Winning Government Contracts: How Your Small Business Can Find and Secure Federal Government Contracts Up to $100,000

Winning Government Contracts: How Your Small Business Can Find and Secure Federal Government Contracts Up to $100,000

“The United States federal government is the biggest customer in the world. It buys 20% of all the services and products produced in the U.S. But of the 22 million registered U.S. companies, fewer than 2% of them seek out this market. Why? Because small business owners don’t know where and how to get these contracts. Winning Government Contracts will change that. It begins at the beginning, assuming no prior knowledge of the government marketplace and its sometimes complicated terminology.

Written in a clear, easy-to-understand language by experienced sales and marketing professionals, this book takes you through the registration and bidding process step-by-step. All the terms used in government contracts are explained in plain English. Winning Government Contracts shows you where to find the sales opportunities on the Internet, then guides you through every step in your quote, whether submitted electronically or on paper–explaining the jargon and outlining the exact information that needs to be entered. You will learn how to download drawings and specifications, understand shipping and packaging requirements, and find out how much the government is currently paying for an item before you submit an offer. The book also highlights areas where beginners need to be particularly careful, such as remembering to include shipping costs when you offer the government your best price! After the offer has been submitted, the book explains how to find the results of the bid–which company was awarded the contract and its price, as well as the names and prices of all the other bidders. Included is the government’s system of inspection, acceptance, invoicing, and payments, as well as the specific requirements for service contracts such as Statements of Work, Wage Determinations, and Technical Proposals. Whatever your business, the federal government is a marketplace you can enter. Winning Government Contracts will you show the way.”

Download:
http://rapidshare.com/files/221844927/Winning_Government_Contracts.zip

Cooperative Wireless Communications

Cooperative Wireless Communications

Cooperative Wireless Communications

Cooperative devices are growing in value with respect to wireless communications and networks. They substantially enhance system performance by decreasing power consumption and packet loss rate, and increasing system capacity and network resilience. This book introduces key cooperative strategies and the vital background information needed for development and implementation of cooperative mechanisms in both infrastructure-based and wireless systems as well as self-organizing, multi-hop networks. Beneficial to academia and industry professionals, this essential reference concentrates on a variety of cooperative mechanisms, the cooperation frameworks in diverse scenarios, and the recent advances in the system performance of wireless networks.

About the Author
Simula Research Laboratory, Lysaker, Norway National Cheng Kung University, Taiwan Western Michigan University, Kalamazoo, USA

Download:
http://rapidshare.com/files/221864742/Cooperative_Wireless.rar

ASP.NET MVC Framework Preview

ASP.NET MVC Framework Preview

ASP.NET MVC Framework Preview

The ASP.NET MVC framework is the latest evolution of Microsoft’s ASP.NET web platform. It introduces a radically new high–productivity programming model, promotes cleaner code architecture, supports test–driven development, and provides powerful extensibility, combined with all the benefits of ASP.NET 3.5.

ASP.NET MVC Framework Preview is a first look at this technology’s main features, designed to give you a head start getting to grips with this powerful new technology.

Download:
http://rapidshare.com/files/221864741/ASP.NET_MVC.rar

Recent Trends in Algebraic Development Techniques: 18th International Workshop, WADT 2006

Recent Trends in Algebraic Development Techniques: 18th International Workshop, WADT 2006

Recent Trends in Algebraic Development Techniques: 18th International Workshop, WADT 2006

This book constitutes the thoroughly refereed postproceedings of the 18th International Workshop on Algebraic Development Techniques, WADT 2006, held in La Roche en Ardenne, Belgium, in June 2006.

The 10 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers focus on the algebraic approach to the specification and development of systems and address topics such as formal methods for system development, specification languages and methods, systems and techniques for reasoning about specifications, specification development systems, methods and techniques for concurrent, distributed and mobile systems, and algebraic and co-algebraic foundations.

Download:
http://rapidshare.com/files/221864748/Recent_Trends_in_Algebraic_Development_Techniques.rar

Formal Theories of Information: From Shannon to Semantic Information Theory and General Concepts of Information

Formal Theories of Information: From Shannon to Semantic Information Theory and General Concepts of Information

Formal Theories of Information: From Shannon to Semantic Information Theory and General Concepts of Information

This book presents the scientific outcome of a joint effort of the computer science departments of the universities of Berne, Fribourg and Neuchâtel.
Within an initiative devoted to “Information and Knowledge”, these research groups collaborated over several years on issues of logic, probability, inference, and deduction. The goal of this volume is to examine whether there is any common ground between the different approaches to the concept of information.

The structure of this book could be represented by a circular model, with an innermost syntactical circle, comprising statistical and algorithmic approaches; a second, larger circle, the semantical one, in which “meaning” enters the stage; and finally an outermost circle, the pragmatic one, casting light on real-life logical reasoning.

These articles are complemented by two philosophical contributions exploring the wide conceptual field as well as taking stock of the articles on the various formal theories of information.

Download:
http://rapidshare.com/files/221864746/Formal_Theories.rar

Foundations of Computer Security

Foundations of Computer Security

Foundations of Computer Security

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader’s knowledge - answers are also provided.

Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.

Download:
http://rapidshare.com/files/221864747/Foundations_of_Computer_Security.rar

Oracle PL/SQL For Dummies

Oracle PL/SQL For Dummies

Oracle PL/SQL For Dummies

The Oracle has spoken—you need to get up to speed on PL/SQL programming, right? We predict it’ll be a breeze with this book! You’ll find out about code structures, best practices, and code naming standards, how to use conditions and loops, where to place PL/SQL code in system projects, ways to manipulate data, and more.

Download:
http://rapidshare.com/files/221864744/For_Dummies_Oracle_PL_SQ_LFor_Dummies_Jun_2006.rar

MCSE Windows XP Professional Exam Cram 2 (Exam 70-270) (2nd Edition)

MCSE Windows XP Professional Exam Cram 2 (Exam 70-270) (2nd Edition)

MCSE Windows XP Professional Exam Cram 2 (Exam 70-270) (2nd Edition)

The MCSE 70-270 Exam Cram 2: Windows XP Professional, Second Edition is an efficient, effective and concise guide that gives you exactly what you need to know to pass one of the most popular exams in the MCSE program. Organized according to the exam objectives, you will be able to quickly and easily assess your understanding of the key exam topics. You will find test-taking strategies and timesaving tips that will help you score better on the test, and the popular Cram Sheet tearcard is include for last-minute review on exam day. Also included are over 200 practice questions with detailed answers and an innovative test-engine on CD from MeasureUp. With all of these great features and proven study methods, MCSE 70-270 Exam Cram 2: Windows XP Professional, Second Edition is your smartest way to get certified.

Download:
http://rapidshare.com/files/221864743/EXAM_CRAM__2_Windows_XP_Professional.rar

Database in Depth: Relational Theory for Practitioners

Database in Depth: Relational Theory for Practitioners

Database in Depth: Relational Theory for Practitioners

This book sheds light on the principles behind the relational model, which is fundamental to all database-backed applications–and, consequently, most of the work that goes on in the computing world today. “Database in Depth: The Relational Model for Practitioners” goes beyond the hype and gets to the heart of how relational databases actually work.

Ideal for experienced database developers and designers, this concise guide gives you a clear view of the technology–a view that’s not influenced by any vendor or product. Featuring an extensive set of exercises, it will help you:

understand why and how the relational model is still directly relevant to modern database technology (and will remain so for the foreseeable future)

see why and how the SQL standard is seriously deficient

use the best current theoretical knowledge in the design of their databases and database applications

make informed decisions in their daily database professional activities

“Database in Depth” will appeal not only to database developers and designers, but also to a diverse field of professionals and academics, including database administrators (DBAs), information modelers, database consultants, and more. Virtually everyone who deals with relational databases should have at least a passing understanding of the fundamentals of working with relational models.

Author C.J. Date has been involved with the relational model from its earliest days. An exceptionally clear-thinking writer, Date lays out principle and theory in a manner that is easily understood. Few others can speak as authoritatively the topic of relational databases as Date can.

Download:
http://rapidshare.com/files/222310697/Database_in_Depth.rar

Data Compression: The Complete Reference

Data Compression: The Complete Reference

Data Compression: The Complete Reference

Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD ROMs, and from coding theory to image analysis, many facets of modern computing rely upon data compression.

Data Compression provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions on the use and comparative benefits of methods and description of “how to” use them. The presentation is organized into the main branches of the field of data compression: run length encoding, statistical methods, dictionary-based methods, image compression, audio compression, and video compression. Detailed descriptions and explanations of the most well-known and frequently used compression methods are covered in a self-contained fashion, with an accessible style and technical level for specialists and nonspecialists. Topics and features: coverage of video compression, including MPEG-1 and H.261; thorough coverage of wavelets methods, including CWT, DWT, EZW and the new Lifting Scheme technique; complete audio compression; QM coder used in JPEG and JBIG, including new JPEG 200 standard; image transformations and detailed coverage of discrete cosine transform and Haar transform; coverage of EIDAC method for compressing simple images; prefix image compression; ACB and FHM curve compression; geometric compression and edgebreaker technique.
Data Compression provides an invaluable reference and guide for all computer scientists, computer engineers, electrical engineers, signal/image processing engineers and other scientists needing a comprehensive compilation for a broad range of compression methods.

Download:
http://rapidshare.com/files/222310696/Data_Compression_-_The_Complete_Reference.rar

Game Design Workshop: Designing, Prototyping, and Playtesting Games (Gama Network Series)

Game Design Workshop: Designing, Prototyping, and Playtesting Games (Gama Network Series)

Game Design Workshop: Designing, Prototyping, and Playtesting Games (Gama Network Series)

Master the craft of game design so you can create that elusive combination of challenge, competition, and interaction that players seek. This design workshop begins with an examination of the fundamental elements of game design; then puts you to work in prototyping, playtesting, and redesigning your own games with exercises that teach essential design skills. Workshop exercises require no background in programming or artwork, releasing you from the intricacies of electronic game production, so you can develop a working understanding of the essentials of game design.

The ideas and exercises in this Game Design Workshop answer the questions asked by every aspiring game designer: How do I learn to design games? What skills do I need to become a professional game designer? Game design is demystified with a clear, accessible analysis of the formal and dramatic systems of game design. Examples, illustrations, and exercises strengthen your understanding of what makes game systems function; and teach you the skills and tools that you need to create a compelling game.

Refined over a number of years, this workshop curriculum has provided the foundation for hundreds of careers in all areas of the game industry including game design, producing, programming, visual design, quality assurance, and marketing. This guide to the language and business of game design will help anyone pursuing a career in the industry.

Download:
http://rapidshare.com/files/222310694/CMP_Books_-_Game_Design_Workshop.rar

Stream Data Processing: A Quality of Service Perspective: Modeling, Scheduling, Load Shedding, and Complex Event Processing

Stream Data Processing: A Quality of Service Perspective: Modeling, Scheduling, Load Shedding, and Complex Event Processing

Stream Data Processing: A Quality of Service Perspective: Modeling, Scheduling, Load Shedding, and Complex Event Processing

Traditional database management systems, widely used today, are not well-suited for a class of emerging applications, such as computer network management, homeland security, sensor computing, and environmental monitoring. These applications need to continuously process large amounts of data coming in the form of a stream, and meet stringent response time requirements. Support for handling QoS metrics, such as response time, memory usage, and throughput, is central to any system proposed for the above applications.

Stream Data Processing: A Quality of Service Perspective (Modeling, Scheduling, Load Shedding, and Complex Event Processing), presents a new paradigm suitable for stream and complex event processing. This book covers a broad range of topics in stream data processing and includes detailed technical discussions of a number of proposed techniques.

This volume is intended as a textbook for graduate courses and as a reference book for researchers, advanced-level students in CS, and IT practitioners.

Download:
http://rapidshare.com/files/222310702/Stream_Data_Processing.rar

Beginning Java EE 5: From Novice to Professional

Beginning Java EE 5: From Novice to Professional

Beginning Java EE 5: From Novice to Professional

Sun’s new lightweight Java Enterprise Edition (EE) 5 is an extremely powerful platform for developing enterprise-level Java-based applications, primarily for the server. This book shows you how to harness that power, examining how the pieces of the new Java EE 5 platform fit together, including the newly redesigned annotations-driven EJB 3 spec as well as JavaServer Faces (JSF), integrated into the platform for the first time.This book surpasses explaining how to code a JSP or an EJB: It explains when and where to use these APIs, what their strengths and weaknesses are, and perhaps most importantly, how to employ the best practices for using them
.Hands-on tutorials are also included, along with clear explanations and working code examples. You will grow to take the next step, from writing client-side desktop applications to writing enterprise applications. You will also learn how to use the individual APIs and tools in the J2EE platform, and how to merge these to create your own enterprise applications.

About the Author
Kevin Mukhar is a software developer in Colorado Springs, Colorado. For the past 7 years, he has worked on various software systems using different Java Enterprise technologies. He has coauthored several other books, including Beginning Java Databases, and The Ultimate Palm Robot. In addition to developing software during the day, he is working on a master’s degree in computer science.Chris Zelenak is a programmer at Learning Assistant Technologies, where he helps in the development of server-side Cocoon and Rails applications, Java and .NET client applications, and rampant devil’s advocacy. He recently graduated from the Computer Science department of Indiana Wesleyan University.

James L. Weaver is the chief scientist at Learning Assistant Technologies, a company that specializes in developing learner-centric tools. He is also the president of JMentor, a Java mentoring, training, and consulting practice.

Jim Crume is a Java architect at Fusion Alliance, an Indianapolis, Indiana-based consulting company that specializes in web application development. Jim has spent many years as a consultant, and specializes in architecting and developing web-based systems, but he particularly enjoys Java.

Download:
http://rapidshare.com/files/222310693/Apress_Beginning_Java_EE_5_From_Novice_to_Professional_2005.rar

Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics

Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics

Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics

This book constitutes the refereed proceedings of the 6th European Conference on Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, EvoBIO 2008, held in Naples, Italy, in March 2008 colocated with the Evo* 2008 events.

The 18 revised full papers were carefully reviewed and selected from 63 submissions. EvoBio is the premiere European event for experts in computer science meeting with experts in bioinformatics and the biological sciences, all interested in the interface between evolutionary computation, machine learning, data mining, bioinformatics, and computational biology. Topics addressed by the papers include biomarker discovery, cell simulation and modeling, ecological modeling, uxomics, gene networks, biotechnology, metabolomics, microarray analysis, phylogenetics, protein interactions, proteomics, sequence analysis and alignment, as well as systems biology.

Download:
http://rapidshare.com/files/222310698/Evolutionary_Computation.rar

Intelligent and Evolutionary Systems (Studies in Computational Intelligence)

Intelligent and Evolutionary Systems (Studies in Computational Intelligence)

Intelligent and Evolutionary Systems (Studies in Computational Intelligence)

Artificial evolutionary systems are computer systems, inspired by ideas from natural evolution and related phenomena. The field has a long history, dating back to the earliest days of computer science, but it has only become an established scientific and engineering discipline since the 1990s, with packages for the commonest form, genetic algorithms, now widely available.

Researchers in the Asia-Pacific region have participated strongly in the development of evolutionary systems, with a particular emphasis on the evolution of intelligent solutions to highly complex problems. The Asia-Pacific Symposia on Intelligent and Evolutionary Systems have been an important contributor to this growth in impact, since 1997 providing an annual forum for exchange and dissemination of ideas. Participants come primarily from East Asia and the Western Pacific, but contributions are welcomed from around the World.

This volume features a selection of fourteen of the best papers from recent APSIES. They illustrate the breadth of research in the region, with applications ranging from business to medicine, from network optimization to the promotion of innovation.

Download:
http://rapidshare.com/files/222310699/Intelligent_and_Evolutionary_Systems.rar

Ruby for Rails: Ruby Techniques for Rails Developers

Ruby for Rails: Ruby Techniques for Rails Developers

Ruby for Rails: Ruby Techniques for Rails Developers

Product Description
-The word is out: with Ruby on Rails you can build powerful Web applications easily and quickly! And just like the Rails framework itself, Rails applications are Ruby programs. That means you can’t tap into the full power of Rails unless you master the Ruby language.
Ruby for Rails, written by Ruby expert David Black (with a forward by David Heinemeier Hansson), helps Rails developers achieve Ruby mastery. Each chapter deepens your Ruby knowledge and shows you how it connects to Rails. You’ll gain confidence working with objects and classes and learn how to leverage Ruby’s elegant, expressive syntax for Rails application power. And you’ll become a better Rails developer through a deep understanding of the design of Rails itself and how to take advantage of it.

Newcomers to Ruby will find a Rails-oriented Ruby introduction that’s easy to read and that includes dynamic programming techniques, an exploration of Ruby objects, classes, and data structures, and many neat examples of Ruby and Rails code in action. Ruby for Rails: the Ruby guide for Rails developers!

What’s Inside
# Classes, modules, and objects
# Collection handling and filtering
# String and regular expression manipulation
# Exploration of the Rails source code
# Ruby dynamics
# Many more programming concepts and techniques!

About the Author
A Ruby community leader, David A. Black is a director of Ruby Central, the parent organization of the annual International Ruby Conference (RubyConf) and the International Rails Conference. David is a Ruby core contributor and the creator and maintainer of the Rails-based Ruby Change Request Archive (RCRchive). He lives and works as a consultant in New Jersey.

Download:
http://rapidshare.com/files/222310700/Ruby_for_Rails__Manning__2006_.rar

Friday, April 17, 2009

Blog Marketing

Blog Marketing

Blog Marketing

Download:
http://uploading.com/files/AUOCRS2L/blog%20marketing.pdf.html



Do It Yourself PC Repair


Do It Yourself PC Repair - eBook
Do It Yourself PC Repair

Download:
http://uploaded.to/?id=9d5uv5
Or
http://rapidshare.com/files/216040451/Doit_Yourself_PC_Repair.rar

Thursday, April 16, 2009

Special Edition Using Microsoft Expression Web 2/2008

Special Edition Using Microsoft Expression Web 2/2008

Special Edition Using Microsoft Expression Web 2/2008

The successor to the best-selling book on the first release of Microsoft Expression Web, this book provides comprehensive coverage of Microsoft Expression Web 2. You’ll learn the basics of Web design and Expression Web 2 and gain valuable insight into Expression Web 2’s advanced features, such as ASP.NET and PHP development. If you’re interested in learning how to design standards-compliant Web sites using Expression Web 2, this is the only book you need.
• Create standards-compliant Web sites with Expression Web 2 that work consistently in all browsers.

• Become proficient in the use of CSS by learning how to use the powerful CSS tools in Expression Web 2.

• Learn how to take advantage of ASP.NET and ASP.NET AJAX without writing any code.

• Learn how to use the new PHP features available in Expression Web 2.

• Add dynamic, interactive content with Behaviors and Layers.

• Design your Web site for accessibility using both Section 508 and WCAG compliance.

“Expression Web was built to help web authors create standards-based and standards-compliant web sites. Jim Cheshire has a broad understanding of those standards and a deep appreciation of Expression Web. Put the two together and you’ve got a guide that helps you understand and build sites that meet the challenges of modern Web design.”

—Steven Guttman,

Product Unit Manager,

Expression Web

Jim Cheshire is the owner of Jimco Software, a freeware software company and technology review site, and is the author of several books on Web development and ASP.NET. Jim has been heavily involved in Web development for more than a decade and has operated and designed many Web sites during that time. He’s been featured in numerous publications, including MSDN Magazine and PC Magazine. Jim previously worked on the FrontPage team at Microsoft and currently is an escalation engineer on the ASP.NET and IIS teams.
Category: Web Development

Covers Microsoft Expression Web 2

User Level Beginning—Advanced



On the CD-ROM

• Sample files from the author

• FREE! full version of Logo Creator (retail value of $39.95)

• FREE! full version of DHTML Menu Builder Lite (retail value of $25)

• Electronic version of this book in Adobe’s Portable Document Format (PDF)


About the Author

Jim Cheshire is the owner of Jimco Software and Books and is the author of several Web design books. In his real job, Jim works as an escalation engineer at Microsoft on the ASP.NET and IIS teams. He has worked on the FrontPage, Visual Basic, ASP, IIS, and ASP.NET teams at Microsoft over the past 10 years.



You can reach Jim by visiting one of his web sites, www.jimcobooks.com or www.jimcosoftware. com. You can also email him at jcheshire@jimcobooks.com.
Product Details

* Paperback: 792 pages
* Publisher: Que; 1 edition (April 10, 2008)
* Language: English
* ISBN-10: 0789737841
* ISBN-13: 978-0789737847

Download:
http://rapidshare.com/files/107156541/Special_Ed_Web2.pdf