Your Ad Here

Adobe Integrated Runtime (AIR) for JavaScript Developers Pocket Guide

Adobe Integrated Runtime (AIR) for JavaScript Developers Pocket Guide

Adobe Integrated Runtime (AIR) for JavaScript Developers Pocket Guide

Product Description
Written by members of the Adobe Integrated Runtime (AIR) product team, this is the official guide to the beta release of Adobe’s new cross-platform desktop runtime, previously known by its code name Apollo. This book explains how you can use AIR to build and deploy HTML and JavaScript-based web applications to the desktop, using all of the tools and technologies with which you are already familiar. Everything you need to know about this platform is right here, so you can start building applications with AIR right away.

Topics include: What AIR is, and the problems this runtime aims to solve How to set up your development environment How to create your first app using HTML and JavaScript The HTML and JavaScript environments within AIR How to do common tasks, presented in the easy-to-use O’Reilly Cookbook format Also included is a guide to AIR packages, classes and command line tools. Once you understand the basics of building an HTML- and JavaScript-based AIR applications, this pocket guide makes an ideal reference for tackling specific problems. Welcome to the revolution! Adobe Developer Library is a co-publishing partnership between O’Reilly Media and Adobe Systems, Inc. and is designed to produce the number one information resources for developers who use Adobe technologies. Created in 2006, the Adobe Developer Library is the official source for comprehensive learning solutions to help developers create expressive and interactive web applications that can reach virtually anyone on any platform. With top-notch books and innovative online resources covering the latest in rich Internet application development, the Adobe Developer Library offers expert training and in-depth resources, straight from the source.

Rapidshare

Uploading

C-compiler Reference manual

C-compiler Reference manual

C-compiler Reference manual
Publisher:Custom Computer Services, Inc. | August 2007 | ISBN-10: 0198565389 | 208 pages | PDF | 1,8 MB

PCH, like the other CCS compiler products, is capable of generating highly efficient and extremely tight object code for Microchips 18F family of PIC Microprocessors. While the PCH is a command line compiler it can easily be stitched into Microchips MPLAB IDE for those who want a graphic IDE or if you prefer to use Microchip's development tools for debugging.
If you are looking for a completely integrated PIC development solution checkout the PCW or PCWH version of the CCS compiler. These versions incorporate all the same features and functions as the PCB compiler plus additional PIC controllers, and a Windows IDE that is fully integrated with CCS’s in-circuit debuggers (ICD-u40, ICD-S40, Mach-X).


Download (RapidShare)


Mirror (Uploading):

CCIE: Cisco Certified Internetwork Expert Study Guide (Hardcover)

In a world where most CCIE books are as dense and understandable as a phone book in a language you just started learning last week, the CCIE Cisco Certified Internetwork Expert Study Guide is a breath of fresh air–readable, clear, and admirably concise. Unfortunately, that readability comes at a price, and that price is a lack of depth.

You can’t fault the authors, though–the CCIE is a daunting exam, covering a wide range of topics in a sometimes-terrifying depth. And given that books tend to fall apart under their own weight if they get over twelve hundred pages, any book publisher has to choose between packing friendliness or information into those compressed slices o’ wood pulp. For the CCIE Study Guide, they chose readability, making it perhaps the only beginners’ guide to the most advanced certification available.

But since you’re going to be buying more than one book for this exam anyway, why not get one you’ll enjoy reading? And the CIEE Study Guide functions as a stellar overview, explaining the CCIE topics with deft aplomb and some of the best writing you’re likely to see in this advanced arena, where technical wizardry is often valued more highly than clarity.

The amazing thing about the CCIE Study Guide is the cleanness of the writing: it gets the essentials of large unwieldy concepts across in a few sentences. Which is not to say that you won’t have to reread it a couple of times to understand some of the rough spots, but the amount of rereading is drastically minimized from what it could be. Carefully thought-out diagrams spotlight various routing issues, and definitely help with visualization.

But even considering the clear writing, the detail is fairly sparse. The responses you’ll get to various command lines are sometimes truncated for space, which may cause problems for those who aren’t used to sorting through pages of output to find the critical data. The sections on Ethernet frames contain information, but they’re not comprehensive. In short, there’s a heck of a lot here, but the CCIE will require a bit more in almost every case.

There are 20 questions at the end of every chapter, and they’re all right–but they’re definitely a step down from what you can expect to see on the actual CCIE, and they’re all simple multiple-choice questions. No scenario-style questions to be found here, buddy. The answers, sadly, are terse and don’t always explain why the other options are wrong.

In short, backed with some Web research and a couple of other books, this could be the foundation for a real passing grade–but it’s not quite enough. However, if you’ve lost your way during all of the individual exams and need an overview–or want a refresher course that is technically accurate as far as it goes and is comparatively fun to read–then you won’t regret it. This could be the beginning of a beautiful friendship. –William Steinmetz

Product Description
Are you ready to tackle the most challenging computer industry exam? This book provides you with the information you’ll need to know for the Cisco Certified Internetworking Expert qualification exam. All topics included in Cisco’s exam blueprints are covered in-depth. Hands-on exercises and hundreds of challenging review questions will give you the advantage you need as you pursue the holy grail of networking certifications.

Download
Mirror

Introduction To Data Networks, Pdn, Lan, Man, Wan, And Wireless Data, Technologies And Systems

Paperback: 52 pages
Publisher: Althos (September 30, 2003)
Language: English
ISBN-10: 0974278734
ISBN-13: 978-0974278735
Product Dimensions: 11 x 8.3 x 0.2 inches
Shipping Weight: 5.1 ounces (View shipping rates and policies)

Download
Mirror

Cisco Press ACS User Guide

http://www.thetechherald.com/media/images/200909/Cisco_11.jpg
This chapter contains an overview of Cisco Secure Access Control Server Release 4.0 for Windows,
hereafter referred to as ACS.
The following topics are presented:
• Introduction to ACS, page 1-1
• ACS Features, Functions and Concepts, page 1-2
• Managing and Administrating ACS, page 1-15
• ACS Specifications, page 1-19
Introduction to ACS
ACS is a scalable, high-performance Remote Access Dial-In User Service (RADIUS) and Terminal
Access Controller Access Control System (TACACS+) security server. As the centralized control point
for managing enterprise network users, network administrators, and network infrastructure resources,
ACS provides a comprehensive identity-based network-access control solution for Cisco intelligent
information networks.
ACS extends network-access security by combining traditional authentication, authorization, and
accounting (AAA - pronounced “triple A”) with policy control. ACS enforces a uniform network-access
security policy for network administrators and other network users.
ACS supports a broad variety of Cisco and other network-access devices (NADs), also known as AAA
clients, including:
• Wired and wireless LAN switches and access points
• Edge and core routers
• Dialup and broadband terminators
• Content and storage devices
• Voice over IP
• Firewalls
• Virtual private networks (VPNs)
Figure 1-1 on page 1-2 illustrates the role of ACS as a traditional network access control/AAA server.

1-3
User Guide for Cisco Secure Access Control Server for Windows
78-16992-02
Chapter 1 Overview
ACS Features, Functions and Concepts
ACS as the AAA Server
From the perspective of the NAD, ACS functions as the AAA server. You must configure the device,
which functions as a AAA client from the ACS perspective, to direct all end-user host access requests
to ACS, via the TACACS+ or RADIUS protocols.
TACACS+ is traditionally used to provide authorization for network administrative operations on the
network infrastructure itself; RADIUS is universally used to secure the access of end-users to network
resources.
Basically, the NAD serves as the network gatekeeper, and sends an access request to ACS on behalf of
the user. ACS verifies the username, password and possibly other data by using its internal database or
one of the configured external identity directories. ACS ultimately responds to the NAD with an access
denied or an access-accept message with a set of authorization attributes. When ACS is used in the
context of the NAC architecture, additional machine data, known as posture, is validated as well, before
the user is granted access to the network.
AAA Protocols-TACACS+ and RADIUS
ACS can use the TACACS+ and RADIUS AAA protocols.
Table 1-1 compares the two protocols.
TACACS+
ACS conforms to the TACACS+ protocol as defined by Cisco Systems in draft 1.78. For more
information, refer to the Cisco IOS software documentation at http://www.cisco.com.
RADIUS
ACS conforms to the RADIUS protocol as defined in the draft of April 1997 and in the following
Requests for Comments (RFCs):
• RFC 2138, Remote Authentication Dial In User Service
• RFC 2139, RADIUS Accounting
• RFC 2284
Download

Download
Mirror1
Mirror2
Mirror3
Mirror4

Cisco Press Advanced MPLS Design and Implementation

http://www.ciscopress.com/ShowCover.asp?isbn=158705020X&type=c

Product Description

An in-depth guide to understanding advanced MPLS implementation, including packet-based VPNs, ATM-based VPNs, traffic engineering, and quality of service

Advanced MPLS Design and Implementation enables you to:

  • Understand MPLS through a detailed analysis of MPLS architecture and operation
  • Design and implement packet-based MPLS Virtual Private Networks (VPNs) using label switching routers (LSRs)
  • Design and implement ATM-based MPLS VPNs using WAN-switched ATM LSRs
  • Implement MPLS traffic engineering on your core network and optimize traffic flows dynamically
  • Implement MPLS QoS and provide hard service guarantees with multiple classes of service
  • Acquire practical design and implementation knowledge of real-world MPLS VPNs, TE, and QoS through case studies and configuration examples

Multiprotocol Label Switching (MPLS) is a highly scalable, high-performance forwarding technology that has multiple applications in the service provider and enterprise environment. This book is intended for internetwork engineers and administrators who are responsible for designing, implementing, and supporting service provider or enterprise MPLS backbone networks. It contains a broad range of technical details on MPLS and its associated protocols, packet-based MPLS, ATM-based MPLS, MPLS traffic engineering, MPLS QoS, MPLS design, and advanced MPLS architectures.

This book contains MPLS theory, design, configuration, and various case studies. Use this book as a reference and guide for designing, implementing, and supporting an MPLS network. Even if you’re not using Cisco(r) equipment, this book can increase your awareness and understanding of MPLS technology as well as provide you with detailed design concepts and rules for building scalable MPLS networks.

Advanced MPLS Design and Implementation is your guide to understanding, designing, and implementing MPLS VPNs, WAN-switched MPLS VPNs, MPLS traffic engineering, and MPLS QoS.
Download
Mirror1
Mirror2
Mirror3
Mirror4

Absolute Beginner’s Guide to Computer Basics (4th Edition)


Absolute Beginner’s Guide to Computer Basics (4th Edition)
What can you do with your new PC? The sky’s the limit! Absolute Beginner’s Guide to Computer Basics will show you how to set up and configure your PC, including how to connect to the Internet. Then you’ll learn how to fix your digital photos, create digital scrapbooks, download digital music to your iPod, burn your own custom CDs, watch DVD movies, write letters and memos, balance your checkbook, and create show-stopping presentations. And if you need more computing horsepower, you’ll even learn how to upgrade your PC and add new peripherals. It’s all easy, thanks to Michael Miller’s step-by-step instructions and helpful advice!

Now updated for both Windows Vistaâ„¢ and Windows® XP, Absolute Beginner’s Guide to Computer Basics will have you using your new PC in no time! Here’s a preview of
what you’ll find inside:

* Learn how to set up and configure your new computer, and install new computer hardware and software
* Get the scoop on how to work with Microsoft Windows XP or Windows Vista, and how to personalize it just for you
* Learn how to use the most popular computer programs—including Microsoft® Word, Microsoft® Works, Microsoft® Money, and Quicken
* Connect to the Internet for web surfing, email, instant messaging, blogging, and podcasts—and create your own MySpace page
* Become a digital media pro—learn to work with digital cameras and photos, download and listen to digital music, and burn your own CDs and DVDs
* Find out how to protect your PC from spam, viruses, spyware, and computer attacks
* Learn how to set up a wireless home network and share your Internet connection with multiple PCs

Introduction

I Getting Started
1 Understanding Desktop PCs
2 Understanding Notebook PCs
3 Setting Up Your New Computer System
II Using Windows
4 Getting to Know Windows Vista

5 Using Windows XP on Older Computers
6 Personalizing Windows
7 Working with Files, Folders, and Disks

III Upgrading and Maintaining Your System

8 Adding New Hardware and Devices to Your System
9 Setting Up a Home Network

10 Performing Routine Maintenance
11 Dealing with Common Problems
12 Protecting Your PC from Viruses, Spam, and Other Online
IV Using Computer Software

13 Installing New Software
14 The Suite Spot: Working with Microsoft Works and Microsoft
15 Letters, Memos, and More: Working with Microsoft Word

16 Crunching Numbers: Working with Microsoft Excel
17 Presenting Yourself: Working with Microsoft PowerPoint
18 Banking and Beyond: Working with Microsoft Money and Quicken
19 Connecting to the Internet—At Home and on the Road

V Using the Internet
20 Sending and Receiving Email
21 Surfing the Web with Internet Explorer
22 Searching the Web

23 Shopping Online
24 Buying and Selling in eBay Online Auctions

25 Exploring Blogs and Podcasts

26 Social Networking with MySpace

27 Creating Your Own Web Page
28 Exploring Other Cool and Useful Websites
29 Sending and Receiving Instant Messages

VI Exploring the Digital Lifestyle

30 Using Your PC with a Digital Camera
31 Organizing and Editing Your Digital Photos

32 Sharing Your Digital Photos Online
33 Playing, Ripping, and Burning CDs
34 Downloading and Playing Digital Music

35 Using Your PC with an iPod or MP3 Player

36 Playing DVDs and Videos on Your PC
37 Downloading and Playing Videos from the Web
38 Making Your Own Digital Home Movies
Index

Michael Miller is the best-selling author of more than 75 how-to books, covering topics such as Windows XP and eBay online auctions. Michael has helped more than a million readers be productive with their PCs and has earned a reputation for practical advice, technical accuracy, and making difficult topics easy to understand.
Category: Computers & Internet
Covers: General Computing
User Level: Beginning
$21.99 USA / $26.99 CAN / £15.99 Net UK

Download
Easy-share
Uploading
ebook_ebook.Absolute_Beginners
Rapidshare

MacDirectory – Spring/Summer 2009

MacDirectory – Spring/Summer 2009

MacDirectory – Spring/Summer 2009

MacDirectory – Spring/Summer 2009
PDF | English | 163 pages | ~ 30 MB

download

SQL Hacks

SQL Hacks

SQL Hacks

Product Description
Whether you’re running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. The book offers 100 hacks — unique tips and tools — that bring you the knowledge of experts who apply what they know in the real world to help you take full advantage of the expressive power of SQL. You’ll find practical techniques to address complex data manipulation problems. Learn how to:

  • Wrangle data in the most efficient way possible
  • Aggregate and organize your data for meaningful and accurate reporting
  • Make the most of subqueries, joins, and unions
  • Stay on top of the performance of your queries and the server that runs them
  • Avoid common SQL security pitfalls, including the dreaded SQL injection attack

Let SQL Hacks serve as your toolbox for digging up and manipulating data. If you love to tinker and optimize, SQL is the perfect technology and SQL Hacks is the must-have book for you.

download

Computer Security Basics

Rick Lehtinen, G.T. Gangemi, “Computer Security Basics”
O’Reilly Media, Inc.; 2 ed | 2006 | ISBN: 0596006691 | 310 pages | CHM | 1,6 MB

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.

This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.
Topics include:
Computer security concepts
Security breaches, such as viruses and other malicious programs
Access controls
Security policy
Web attacks
Communications and network security
Encryption
Physical security and biometrics
Wireless network security
Computer security and requirements of the Orange Book
OSI Model and TEMPEST

Download
Uploading
Rapidshare

Simple Computer Security: Disinfect Your PC

CA, Jim Geier, Eric Geier, “Simple Computer Security: Disinfect Your PC”
Wiley | 2007 | ISBN: 047006854X | 332 pages | PDF | 7,8 MB

Hands-on guide to the CA Internet Security Suite, which includes Parental Controls (blocks offensive Web sites, controls program use, and monitors Internet activity); Anti-Spyware (sweeps PCs of malicious software like spyware and adware); Anti-Spam (ensures that computer users get messages from people they know, while redirecting messages from people they don’t);

Anti-Virus (detects and removes computer viruses); and Personal Firewall (prevents hackers from attacking a PC)
CA will include a special version of their $70 suite free with this book, which contains separate applications for Parental Controls, Anti-Spyware, Anti-Spam, Anti-Virus, and a Personal Firewall (good for 6 months)

Download
Uploading
Rapidshare