Free Ebook Video Training

Saturday, January 17, 2009

Sun Microsystems Advanced Business Component Development With Enterprise JavaBeans Technology WJB 351A

Sun Microsystems Advanced Business Component Development With Enterprise JavaBeans Technology WJB 351A | 220 MB


The Advanced Business Component Development With Enterprise JavaBeans Technology course provides students with the knowledge of how to develop robust back-end functionality using Enterprise JavaBeans (EJB) technology. This course uses an online auction scenario to demonstrate how to leverage container-managed services with entity, session, and message beans to resolve the real-world problems presented by an electronic commerce application. The course emphasizes providing practical EJB technology coding experience, while also covering the designs and best practices used to solve transaction, messaging, security, and legacy integration issues. In addition, this course looks at how EJB technology components can be integrated with web service technologies. This course assumes a basic knowledge of Enterprise JavaBeans components, such as that provided in the course FJ-310: Developing Applications for the J2EE Platform.

http://rapidshare.com/files/53287872/SM.WJB.351A.pm.part1.rar
http://rapidshare.com/files/53299240/SM.WJB.351A.pm.part2.rar
http://rapidshare.com/files/53283495/SM.WJB.351A.pm.part3.rar

Password default : booktraining.net

Security Power Tools




What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that review the best security tools on the planet for both black hat techniques and white hat defense tactics. It's a must-have reference for network administrators, engineers and consultants with tips, tricks, and how-to advice for an assortment of freeware and commercial tools, ranging from intermediate level command-line operations to advanced programming of self-hiding exploits. Security Power Tools details best practices for: Reconnaissance -- including tools for network scanning such as nmap; vulnerability scanning tools for Windows and Linux; LAN reconnaissance; tools to help with wireless reconnaissance; and custom packet generation Penetration -- such as the Metasploit framework for automated penetration of remote computers; tools to find wireless networks; exploitation framework applications; and tricks and tools to manipulate shellcodes Control -- including the configuration of several tools for use as backdoors; and a review of known rootkits for Windows and Linux Defense -- including host-based firewalls; host hardening for Windows and Linux networks; communication security with ssh; email security and anti-malware; anddevice security testing Monitoring -- such as tools to capture, and analyze packets; network monitoring with Honeyd and snort; and host monitoring of production servers for file changes Discovery -- including The Forensic Toolkit, SysInternals and other popular forensic tools; application fuzzer and fuzzing techniques; and the art of binary reverse engineering using tools like Interactive Disassembler and Ollydbg A practical and timely network security ethics chapter written by a Stanford University professor of law completes the suite of topics and makes this book a goldmine of security information. Save yourself a ton of headaches and be prepared for any network security dilemma with Security Power Tools.

Download Here

Password default : booktraining.net

Windows.Presentation.Foundation.Unleashed




Adam Nathan

with Daniel Lehenbauer, Lead Developer Responsible for WPF 3D



Printed entirely in color, with helpful figures and syntax coloring to make code samples appear as they do in Visual Studio.



Windows Presentation Foundation (WPF) is a key component of the .NET Framework 3.0, giving you the power to create richer and more compelling applications than you dreamed possible. Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner. Windows Presentation Foundation Unleashed is the authoritative book that covers it all, in a practical and approachable fashion, authored by .NET guru and Microsoft developer Adam Nathan.



¡¤ Covers everything you need to know about Extensible Application Markup Language (XAML)

¡¤ Examines the WPF feature areas in incredible depth: controls, layout, resources, data binding, styling, graphics, animation, and more

¡¤ Features a chapter on 3D graphics by Daniel Lehenbauer, lead developer responsible for WPF 3D

¡¤ Delves into non-mainstream topics: speech, audio/video, documents, bitmap effects, and more

¡¤ Shows how to create popular UI elements, such as features introduced in the 2007 Microsoft Office System: Galleries, ScreenTips, custom control layouts, and more

¡¤ Demonstrates how to create sophisticated UI mechanisms, such as Visual Studio-like collapsible/dockable panes

¡¤ Explains how to develop and deploy all types of applications, including navigation-based applications, applications hosted in a Web browser, and applications with great-looking non-rectangular windows

¡¤ Explains how to create first-class custom controls for WPF

¡¤ Demonstrates how to create hybrid WPF software that leverages Windows Forms, ActiveX, or other non-WPF technologies

¡¤ Explains how to exploit new Windows Vista features in WPF applications





Register your book at www.samspublishing.com/register for access to download all examples and source code presented in this book.



Category: Windows Programming

Covers: Windows Presentation Foundation (WPF), .NET Framework

Download Here

Password default : booktraining.net

How to Cheat in Photoshop CS3




With his in-depth knowledge of the little-known secrets used by the pros
to produce awardwinning illustrations, Steve is THE go-to guru for
professional designers, graphic artists, illustrators, retouchers and
students of design media and illustration who want to create
photorealistic effects using Photoshop. Updated for Photoshop CS3, this
must-have resource unlocks your creativity and helps you save time in
the software so you can spend more time creatively. The book is also
relevant to any version of Photoshop.
* Create convincing smoke effects and make effective explosions the
simple way
* Take years off someone's appearance
* Turn a photograph of someone looking straight into the camera into a
different perspective with the entire head (not just the eyes)
* Modify a statue so it looks like a living person or paint hair
directly on any surface
* Produce the perfect cutout in the shortest time with Photoshop CS3's
new Quick Selection tool... and more

Download Here

Password default : booktraining.net

Learnkey Security+ Cd's

Learnkey Security+ Cd's

CompTIA Security+™ is a foundation level certification for IT professionals who have day-to-day information security responsibilities. In the Security+ self-paced training course from LearnKey, expert instructor Cameron Hunt demonstrates the skills needed for certification and successful management of information security job tasks. You will find the MasterExam a very useful tool to help you prepare for the real exam. The study guide is a text book that accompanies your training providing in depth explanations of all concepts presented in the training.
CompTIA Security+ Cameron Hunt
Benefits • Increase earning potential with information security credentials.
• Enhance employment opportunities with IT security knowledge.
• Meets all CompTIA® certification objectives for exam SY0-101. Author Expert Cameron Hunt is a technical trainer and author with a diverse background in major computer technologies. When he is not writing about security, lecturing on information technology and business culture, or implementing Linux servers with small businesses, he can be found performing urban archeology in abandoned buildings, tunnels and mines.


http://rapidshare.com/files/185108267/booktraining.net_Security_20.7z.001.tar
http://rapidshare.com/files/185107430/booktraining.net_Security_20.7z.002.tar
http://rapidshare.com/files/185107372/booktraining.net_Security_20.7z.003.tar
http://rapidshare.com/files/185108245/booktraining.net_Security_20.7z.004.tar
http://rapidshare.com/files/185108142/booktraining.net_Security_20.7z.005.tar
http://rapidshare.com/files/185108183/booktraining.net_Security_20.7z.006.tar
http://rapidshare.com/files/185108763/booktraining.net_Security_20.7z.007.tar
http://rapidshare.com/files/185108625/booktraining.net_Security_20.7z.008.tar
http://rapidshare.com/files/185107955/booktraining.net_Security_20.7z.009.tar
http://rapidshare.com/files/185107732/booktraining.net_Security_20.7z.010.tar

Password default : booktraining.net

Certified Ethical Hacker Exam Preparation FULL PACKAGE

Certified Ethical Hacker Exam Preparation FULL PACKAGE

Certified Ethical Hacker Exam Preparation FULL PACKAGE


Specialized Solutions EC-Council Training Videos

Full Info:
http://www.specializedsolutions.com/ceh.htm

The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.

• Introduction to Ethical Hacking
• Footprinting Techniques
• Scanning
• Enumeration
• System Hacking
• Trojans and Backdoors
• Sniffers
• Denial of Service
• Social Engineering
• Session Hijacking
• CEH Hacking Web Servers
• Web Application Vulnerabilities
• Web-based Password Cracking Techniques
• SQL Injection
• Hacking Wireless Networks
• Virus and Worms
• Hacking Novell
• Linux Hacking
• Evading, IDS, Firewalls and Honeypots
• Buffer Overflows
• Cryptography
• Penetration Testing

http://rapidshare.com/users/KSKQ1F

Password default : booktraining.net

Learnkey - Cisco MCNS (Managing Cisco Network Security) 6 CD

Learnkey - Cisco MCNS (Managing Cisco Network Security) 6 CD

http://rapidshare.com/files/51297104/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part15.rar
http://rapidshare.com/files/51296476/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part16.rar
http://rapidshare.com/files/51296273/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part13.rar
http://rapidshare.com/files/51296106/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part14.rar
http://rapidshare.com/files/51295339/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part11.rar
http://rapidshare.com/files/51295138/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part12.rar
http://rapidshare.com/files/51294416/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part10.rar
http://rapidshare.com/files/51293771/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part9.rar
http://rapidshare.com/files/51292835/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part7.rar
http://rapidshare.com/files/51292716/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part8.rar
http://rapidshare.com/files/51291076/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part6.rar
http://rapidshare.com/files/51289325/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part5.rar
http://rapidshare.com/files/51288613/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part4.rar
http://rapidshare.com/files/51288133/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part3.rar
http://rapidshare.com/files/51287662/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part1.rar
http://rapidshare.com/files/51287185/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part2.rar

Password default : booktraining.net

Lynda.com - Final Cut Pro 5 Beyond the Basics

Lynda.com - Final Cut Pro 5 Beyond the Basics


In Final Cut Pro 5 Beyond the Basics, author and professional video editor Larry Jordan expands beyond the material covered in Final Cut Pro 5 Essential Editing and Final Cut Pro 5 Essential Effects by teaching advanced techniques for working with audio, motion effects, filter effects, color and more. Larry begins with tips for working more efficiently with the interface and tools and then moves on to advanced editing, nesting sequences and clip management strategies. Using Color Keying features to remove backgrounds, editing multi-track audio and audio effects, color correction and troubleshooting problems are also covered. Exercise files accompany the training videos, allowing you to follow along and learn at your own pace.


http://rapidshare.com/files/52206485/lnd-fcp5btb.rar.13
http://rapidshare.com/files/52206401/lnd-fcp5btb.rar.20
http://rapidshare.com/files/52206389/lnd-fcp5btb.rar.06
http://rapidshare.com/files/52206381/lnd-fcp5btb.rar.15
http://rapidshare.com/files/52206379/lnd-fcp5btb.rar.07
http://rapidshare.com/files/52206376/lnd-fcp5btb.rar.11
http://rapidshare.com/files/52206372/lnd-fcp5btb.rar.09
http://rapidshare.com/files/52206367/lnd-fcp5btb.rar.14
http://rapidshare.com/files/52206361/lnd-fcp5btb.rar.18
http://rapidshare.com/files/52206356/lnd-fcp5btb.rar.03
http://rapidshare.com/files/52206351/lnd-fcp5btb.rar.01
http://rapidshare.com/files/52206340/lnd-fcp5btb.rar.17
http://rapidshare.com/files/52206336/lnd-fcp5btb.rar.04
http://rapidshare.com/files/52206333/lnd-fcp5btb.rar.08
http://rapidshare.com/files/52206320/lnd-fcp5btb.rar.19
http://rapidshare.com/files/52206210/lnd-fcp5btb.rar.02
http://rapidshare.com/files/52206159/lnd-fcp5btb.rar.10
http://rapidshare.com/files/52206156/lnd-fcp5btb.rar.16
http://rapidshare.com/files/52206150/lnd-fcp5btb.rar.05
http://rapidshare.com/files/52206146/lnd-fcp5btb.rar.12
http://rapidshare.com/files/52206145/lnd-fcp5btb.rar.21
http://rapidshare.com/files/52206082/lnd-fcp5btb.exe

run an exe file to merge all files...

Password default : booktraining.net

Excel Essentials: Using Microsoft Excel for Data Analysis and Decision Making (Video Tutorial)

Excel Essentials: Using Microsoft Excel for Data Analysis and Decision Making (Video Tutorial)

Excel Essentials: Using Microsoft Excel for Data Analysis and Decision Making (Video Tutorials) (CD-ROM) | 340 MB

Publisher: Duxbury Press; 1 ed | CD ROM


You may stop the videos and practice on your own using the included spreadsheets and documents. Exercises and links to Excel and Word docs on the CD make this a complete multimedia experience and an easy way to learn the basics of the most popular spreadsheet tool used in business today. Click ‘open supporting files’ in the navigation box to open the excel or word files that support that particular lesson or video note that all lessons do not have supporting files or docs but most do.
Excel Essentials for Decision Making Video Tutorials include
1. Review of Excel basics
2. Charting tips
3. Using data tables
4. Regression & forecasting
5. Using Solver
6. Using Pivot Tables much more

This CD-ROM covers the essential elements of Excel for the analysis of business problems, with narrated live action screen videos, and supplementary exercises for the students to complete to cement the ideas. Its 9 modules each cover a different aspect of the use of Excel, starting from the ground up. Topics include using the Excel menus, data tables, using the solver, graphing, using spreadsheets for basic statistics, regression, and using pivot tables for complex data sets.


http://rapidshare.com/files/52187916/Excel_Essentials_Using_M._Excel_for_Data_Analysis__Decision_Making__Video_Tutorials_.part01.rar
http://rapidshare.com/files/52187915/Excel_Essentials_Using_M._Excel_for_Data_Analysis__Decision_Making__Video_Tutorials_.part02.rar
http://rapidshare.com/files/52187905/Excel_Essentials_Using_M._Excel_for_Data_Analysis__Decision_Making__Video_Tutorials_.part05.rar
http://rapidshare.com/files/52187902/Excel_Essentials_Using_M._Excel_for_Data_Analysis__Decision_Making__Video_Tutorials_.part03.rar
http://rapidshare.com/files/52187899/Excel_Essentials_Using_M._Excel_for_Data_Analysis__Decision_Making__Video_Tutorials_.part06.rar
http://rapidshare.com/files/52187893/Excel_Essentials_Using_M._Excel_for_Data_Analysis__Decision_Making__Video_Tutorials_.part04.rar
http://rapidshare.com/files/52187844/Excel_Essentials_Using_M._Excel_for_Data_Analysis__Decision_Making__Video_Tutorials_.part07.rar

Mirror
http://rapidshare.com/files/174940719/excl.essen.MS.ex.data.n.decizion.part01.rar
http://rapidshare.com/files/174942176/excl.essen.MS.ex.data.n.decizion.part02.rar
http://rapidshare.com/files/174943633/excl.essen.MS.ex.data.n.decizion.part03.rar
http://rapidshare.com/files/174945044/excl.essen.MS.ex.data.n.decizion.part04.rar
http://rapidshare.com/files/174947054/excl.essen.MS.ex.data.n.decizion.part05.rar
http://rapidshare.com/files/174949549/excl.essen.MS.ex.data.n.decizion.part06.rar
http://rapidshare.com/files/174952696/excl.essen.MS.ex.data.n.decizion.part07.rar
http://rapidshare.com/files/174954055/excl.essen.MS.ex.data.n.decizion.part08.rar


Password default : booktraining.net

Katrin Eismann - Image Restoration, Repair & Enhancementre CS2[reupload]

Katrin Eismann - Image Restoration, Repair & Enhancement CS2



Katrin Eismann - Image Restoration, Repair & Enhancement CS2
DVD-ROM image | Publisher: Software Cinema | Reference: PSCS2KERD | Sessions: 15 | 2.3 Gb

Learn how to restore valuable antique images and enhance your images. This training disc will show you how to transform faded, damaged photographs into beautiful images that are as clear and crisp as the day they were taken - and how to turn casual snapshots into great looking images. This DVD is a comprehensive guide to fixing practically anything wrong with a photo in over 8 hours of interactive training.

Session 01 : General Preferences
Session 02 : Building a Custom Workspace
Session 03 : Image Input, Resolution, and Bit-depth
Session 04 : Correcting Fading and Improving Density
Session 05 : Removing and Repairing Stains
Session 06 : Extreme Color Correction
Session 07 : Rebuilding Color
Session 08 : Removing Dust and Texture
Session 09 : Healing with Patterns
Session 10 : Repair and Replace
Session 11 : Toning and Tinting
Session 12 : Hand Coloring
Session 13 : Noise Reduction and Sharpening Techniques
Session 14 : The Power of Lens Correction
Session 15 : Working with Vanishing Point

Download:
18x95Mb + 53.7Mb = 1,72Gb

http://rapidshare.com/users/D8NONC

Password default : booktraining.net

Katrin Eismann - Working with Adjustment Layers (cd-content)



Katrin Eismann - Working with Adjustment Layers (cd-content)
DVD-rip | PS lessons | Format: MOV | 757 MB


“ Photoshop CS - Adjustment Layers are a fantastic feature to enhance image tone, exposure, color, and contrast. Learn why and when to use Adjustment Layers and how to harness the power of Layer Masks. Katrin will demonstrate Finding Neutral, Digital Darkroom techniques, Exposure and Lighting, and Creative Color. ”

Lessons:
“ Chapter 1 : Introduction and Palette Settings
Lesson 1 : Introduction
Eleven reasons to appreciate Adjustment Layers.
Lesson 2 : Levels and Settings
Explains efficient workspace and palette settings.
Lesson 3 : Saving Files with Adjustment Layers
Addresses saving files in the Photoshop and TIFF file formats.
Lesson 4 : Why Hi-Bit?
Learn the advantages and disadvantages of working with 8-bit and high-bit images.

Chapter 2 : The Value of Neutral
Lesson 5 : Levels Application
Introduction to Layers and correcting exposure and removing color casts.
Lesson 6 : Finding Neutral Part 1
Setting the black and white target values for Levels and Curves.
Lesson 7 : Finding Neutral Part 2
Finding white, black and grey to remove color casts caused by lighting and incorrect camera settings.
Lesson 8 : Finding Neutral Part 3
Taking advantage of memory colors to define neutral.
Lesson 9 : Finding Neutral Part 4
Removing extreme color contamination from antique images.
Lesson 10 : Finding Neutral Part 5
Working with Auto Levels to achieve professional results.
Lesson 11 : Finding Neutral Part 6
The importance of cropping before using Auto Levels.

Chapter 3 : Working Efficiently
Lesson 12 : Working with Macbeth
Using a known reference for accurate color correction.
Lesson 13 : Transferring Corrections
Sharing image corrections and using the Luminosity Blending Mode to improve images.

Chapter 4 : Improving Exposure Techniques
Lesson 14 : Correcting a Tintype
Understanding Blending Modes and improving a dark image.
Lesson 15 : Correcting Underexposure
Combining Blending Modes and 'Blend If' to rescue dark images.
Lesson 16 : Correcting Overexposure
Harness the power of Blending Modes to quickly improve over-exposed images.
Lesson 17 : Selective Lightening
Using Selections and Layer Masks to control and refine tonal corrections.

Chapter 5 : The Digital Darkroom
Lesson 18 : Introduction to Dodging
Non-destructive dodging technique to lighten image areas.
Lesson 19 : Introduction to Burning
Two edge burning techniques used to darken image corners.
Lesson 20 : Contrast and Enhancement
Using adjustment layers to enhance tone and contrast to make an image pop.
Lesson 21 : Balancing Exposure and Color
Enhancing daylight and color to balance an image.

Chapter 6 : Creative Color
Lesson 22 : Photo Filter to the Rescue
Removing fluorescent light color casts with a custom Photo Filter.
Lesson 23 : Color Toning
Beautiful mono and split toning techniques.
Lesson 24 : Color and BW Together
Combining color and black and white to create unique images.
Lesson 25 : Hand Coloring
Introduction to hand-coloring antique images


http://rapidshare.com/files/52164610/Kat.E1smann._._Adjustment.Layers.part2.rar
http://rapidshare.com/files/52164605/Kat.E1smann._._Adjustment.Layers.part3.rar
http://rapidshare.com/files/52164596/Kat.E1smann._._Adjustment.Layers.part4.rar
http://rapidshare.com/files/52164571/Kat.E1smann._._Adjustment.Layers.part1.rar
http://rapidshare.com/files/52164506/Kat.E1smann._._Adjustment.Layers.part6.rar
http://rapidshare.com/files/52164501/Kat.E1smann._._Adjustment.Layers.part5.rar

Password default : booktraining.net

Photoshop CS3 for Forensics Professionals




Digital imaging technology has been used in forensics since at least
1992, yet until now there?has been?no practical instruction available to
address the unique issues of image processing in an everyday forensic
environment. Photoshop CS3 for Forensics Professionals serves the
everyday, real-world needs of law enforcement and legal personnel
dealing with digital images (including both photos and video stills).
This book is an excellent tool for:
Law enforcement personnel, from crime scene and arson investigators,
detectives, and patrol officers to forensic photographers, fingerprint
examiners, video analysts, tool mark and footwear examiners, and
criminalists. Security pros in such fields as private investigation,
insurance, fraud detection, and loss prevention. Scientific and
technical users of Photoshop with workflows similar to law enforcement,
such as medical photographers, research imaging experts, engineering and
architecture staff, and industrial photographers. Staff responsible for
maintaining a photo archive or printing images for court. Photoshop CS3
for Forensics Professionals is the only book to provide forensics
professionals with specific answers to their imaging questions. This is
the perfect resource for those who want to move from simple theory to
the essential skills needed to be more effective. This resource is
dividied into three parts:
Part I: The Essentials is about setting up your workflow, archiving your
images, and familiarizing yourself with Adobe Photoshop and Adobe
Bridge, including the setting up of preferences. Also covered are the
best practices in writing reports and providing courtroom testimony.
Part II: The Digital Darkroom teaches how to use Photoshop to accomplish
what traditionally was done in the darkroom, from correcting color casts
to making prints and exhibits for courtroom use. Part III: Image
Analysis & Enhancement covers techniques for clarifying images so that
details can be better viewed and used for analysis or comparison, from
contrast enhancement and pattern removal to even forensic video
analysis.

Download Here

Password default : booktraining.net

PSP Change Custom Themes without flashing

PSP Change Custom Themes without flashing


What do you need?
- PSP with custom firmware
- Theme Switcher
- Custom XMB Plugin
- WinRAR

Step 1
Open the file Themeswitcher: You will see Themeswitcher en Themeswitcher% Copy these maps to Game150

Step 2
Open the CXMB file you will see 2 maps: seplugins en TM
Copy these to your root of your psp.

Step 3
Boot your PSP and go to Recovery Mode then go to plugins -> enable cxmb.prx go to back and exit

Step 4
Go now to Game on your psp and start themeswapper V0.1b and go to
-> Create directories for themes <-
Go back to your psp menu and go to usb mode
you will see now a new map: Themes. In this map you will find 10 maps Theme 1, 2 , 3 etc. There can you place your custom theme Smile


Step 4
You can put your custom theme in map Theme 1, If you have in every map a theme go then to Game Themeswapper and then use a new theme choose slot 1 if you have a theme in map 1. Then choose save theme and DONE! Without any change to brick your psp!

Downloads:
Theme switcher
http://rapidshare.com/files/52164183/13913_Theme_switcher_v.01_beta.rar.html

CXMBv1
http://rapidshare.com/files/52164188/CXMBv1.zip.html

Password default : booktraining.net

SelfTest Assessment Engine ( Cisco Package )

SelfTest Assessment Engine ( Cisco Package )


SelfTest Assessment Engine ( Cisco Package )


Overview :
Practice tests are one of the best ways to prepare for your certification exam. Self Test's realistic exam simulations are the hard-working tools you need to tackle testing. With Learning and Certification Modes and free Flash Cards included with each practice test, Self Test will help you figure out what you know and learn the answers to what you don't. Certification is a challenge but you can handle it - and Self Test guarantees it.

SelfTest Test Engine + Crack (Essential to use the Packages)
http://rapidshare.com/files/52160571/testengine.rar

http://rapidshare.com/files/52160609/TestKing_SelfTest_Cisco_640-821.rar
http://rapidshare.com/files/52160608/TestKing_SelfTest_Cisco_642-611.rar
http://rapidshare.com/files/52160597/TestKing_SelfTest_Cisco_642-891.rar
http://rapidshare.com/files/52160595/TestKing_SelfTest_Cisco_642-871.rar
http://rapidshare.com/files/52160594/TestKing_SelfTest_Cisco_642-811.rar
http://rapidshare.com/files/52160593/TestKing_SelfTest_Cisco_642-821.rar
http://rapidshare.com/files/52160591/TestKing_SelfTest_Cisco_642-661.rar
http://rapidshare.com/files/52160590/TestKing_SelfTest_Cisco_642-831.rar
http://rapidshare.com/files/52160588/TestKing_SelfTest_Cisco_642-642.rar
http://rapidshare.com/files/52160586/TestKing_SelfTest_Cisco_642-541.rar
http://rapidshare.com/files/52160585/TestKing_SelfTest_Cisco_642-801.rar
http://rapidshare.com/files/52160584/TestKing_SelfTest_Cisco_642-582.rar
http://rapidshare.com/files/52160583/TestKing_SelfTest_Cisco_642-577.rar
http://rapidshare.com/files/52160582/TestKing_SelfTest_Cisco_642-521.rar
http://rapidshare.com/files/52160581/TestKing_SelfTest_Cisco_642-511.rar
http://rapidshare.com/files/52160579/TestKing_SelfTest_Cisco_640-801.rar
http://rapidshare.com/files/52160577/TestKing_SelfTest_Cisco_642-531.rar
http://rapidshare.com/files/52160576/TestKing_SelfTest_Cisco_642-432.rar
http://rapidshare.com/files/52160574/TestKing_SelfTest_Cisco_640-861.rar
http://rapidshare.com/files/52160573/TestKing_SelfTest_Cisco_640-811.rar
http://rapidshare.com/files/52160572/TestKing_SelfTest_Cisco_642-501.rar

Password default : booktraining.net

Mastering.Unix.Shell.Scripting





Provides readers with end-to-end shell scripts that can be used to automate repetitive tasks and solve real-world system administration problems
Targets the specific command structure for four popular UNIX systems: Solaris, Linux, AIX, and HP-UX
Illustrates dozens of example tasks, presenting the proper command syntax and analyzing the performance gain or loss using various control structure techniques
Web site includes all the shell scripts used in the book

Download Here


Password default : booktraining.net

Web.Security.Field.Guide




Hands-on techniques for securing Windows(r) servers, browsers, and network communications

Create effective security policies and establish rules for operating in and maintaining a security- conscious environment
Learn how to harden Windows multi-user platforms, including NT, 2000, and XP
Understand secure installation options for Windows web servers and how to enhance security on existing web and FTP server installations
Improve security at the end user's workstation, including web browsers, desktops, and laptops
Evaluate the pros and cons of installing a certificate server and becoming your own Certification Authority
Learn the Cisco PIX Firewall and Cisco IOS Firewall architecture and how to apply Cisco standard and extended access lists
Discover ways to test the current state of security and keep it up to date
Learn to engage end users as part of the overall network security solution
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient levels of security without constraining performance or scalability. The more reliant organizations become on the Internet to perform daily jobs or conduct transactions, the greater the impact a breach of network security has. Just as Cisco Systems has been an innovator in using the Internet to conduct business, so too is it a market leader in the development and sale of products and technologies that protect data traveling across the Internet. Yet a network security solution is only as strong as its weakest link. Network attacks can occur at any point, including the network connection, the firewall, the web server, or the client. Hardening the defenses at all these points is key to creating an effective, all-encompassing network security solution.

Web Security Field Guide provides you with hands-on, proven solutions to help patch the most common vulnerabilities of Windows(r) web servers and browsers within the context of an end-to-end network security architecture. Avoiding conceptual discussions of underlying technologies, the book spends little time discussing how each application works. Using plain language and lots of step-by-step examples, the book instead focuses on helping you secure your web servers and prevent the majority of network attacks. Divided into five parts, the book opens with an overview of essential background information and helps you establish working network security rules and policies. Parts II through IV teach you the techniques for hardening the operating system, the web server, and the browser. Part V of the book addresses overall network security, focusing on preventing and controlling access. Topics such as becoming a Certification Authority, Cisco PIX(r) Firewall, Cisco IOS(r) Firewall, access lists, ongoing security maintenance, and testing are all examined in-depth, providing an overall network security plan that can drastically reduce the risk to your business systems and data.

Full of diagrams, screen captures, and step-by-step instructions for performing simple tasks that can radically improve the security of your Internet business solutions, Web Security Field Guide is a practical tool that can help ensure the integrity and security of your business-critical applications.

Download Here

Password default : booktraining.net

CYA.Securing.IIS.6.0





Coverage includes: Script Source Access, Information Disclosure, Denial of Service, Buffer Overflows, Directory Traversal, Cross-Site Scripting, Preparing the Operating System, Partitioning Hard Drives, Installing the OS, Preparing the File System, Installing IIS, Installing Hotfixes, Locking Down COM and Database Access, Securing Web Services, Running the IIS Lockdown Wizard, Securing IIS Global Settings, Securing the Default and Administration Web Sites, Disabling Internet Printing, Disabling or Securing the FrontPage Server Extensions, Configuring URLScan, Securing Web Sites, Building a Directory Structure, Setting Master WWW Properties, Securing by Content Type, Authenticating Users, Using Anonymous Authentication, Using Basic Authentication, Using Digest Authentication, Using Integrated Windows Authentication, Using Client Certificate Mapping, Publishing Web Content, Staging and Review, Setting File Attributes, Building File Checksums, Moving Content versus Updating Content, Summary, Solutions Fast Track, Frequently Asked Questions.

Download Here

Password default : booktraining.net

Performance.Tuning.for.Linux.Servers




Proven techniques for optimizing web, file, print, database, and application servers Practical introductions to open source performance management tools Easy-to-understand examples based on Red Hat Enterprise Linux and Novell SUSE Linux Enterprise Server An indispensable guide to maximizing Linux system and application performance From Wall Street to Hollywood, Linux runs many of the world s most businesscritical systems. Linux performance now impacts the entire enterprise. In Performance Tuning for Linux Servers, a team of IBM s most-experienced Linux performance specialists shows you how to find bottlenecks, measure performance, and identify effective optimizations. This book doesn t just cover kernel tuning: it shows how to maximize the end-to-end performance of real-world applications and databases running on Linux. Throughout, the authors present realistic examples based on today s most popular enterprise Linux platforms, Intel-based Red Hat Enterprise Linux, and Novell SUSE Linux Enterprise Server. These examples are designed for simplicity, clarity, and easy adaptation to any contemporary Linux environment. You ll discover how to Install and configure Linux for maximum performance from the outset Evaluate and choose the right hardware architecture for your Linux environment Understand Linux kernels 2.4 through 2.6: components, performance issues, and optimization opportunities Master core Linux performance tuning principles and strategies Utilize free, open source tools for measurement, monitoring, system tracing, and benchmarking Interpret performance data to analyze your Linux server s real-world behavior Optimize Linux system schedulers, memory, I/O, file systems, and networking Tune web, file, database, and application servers running commercial workloads Predict the impact of changes in tuning parameters or configurations Tune Linux code: optimize design, timing, sockets, threads, synchronization, and more Architect for maximum performance: SMP scaling, clustering, and topology Integrate kernel and application tuning in end-to-end system optimization projects Whether you re an administrator, developer, integrator, or consultant, Performance Tuning for Linux Serverswill help you maximize the performance and value of every Linux system and application you run. > Copyright Pearson Education. All rights reserved.

DOwnload Here

Password default : booktraining.net

UNIX(R) Shells by Example (4th Edition) (Paperback)





Playing the "shell" game is a lot of fun. This book was written to make your learning experience both fun and profitable. Since the first edition was published, many of you who have been helped by my book have contacted me, telling me that the book made you realize that shell programming doesn't need to be difficult at all! Learning by example makes it easy and fun. In fact, because of such positive feedback, I have been asked by Prentice Hall to produce this fourth edition of UNIX(R) Shells by Example for UNIX and Linux users, programmers, and administrators. Along with updated material throughout, it includes three completely new chapters, with full coverage of the GNU tools for those of you who use Linux. With the meteoric rise of Linux popularity, it seemed like a good time to combine the best of Linux Shells by Example with UNIX(R) Shells by Example and produce a single volume that touches on all the various aspects of the UNIX/Linux shell world. The new chapters include Chapter 2, "Shell Programming QuickStart," an introductory jump-start for programmers who want a quick survey of the shell programming constructs and how they differ; Chapter 15, "Debugging Shell Scripts," which gives you an example of an error message, what caused it, and how to fix it; and Chapter 16, "The System Administrator and the Shell," which demonstrates how the shell is used by system administrators, from system boot-up to shutdown. Writing UNIX(R) Shells by Example was the culmination of 21 years of teaching and developing classes for the various shells and UNIX/Linux utilities most heavily used by shell programmers. The course notes I developed have been used by the University of California, Santa Cruz; the University of California, Davis; Sun Microsystems; Apple Computer; Xilinx; National Semiconductor; LSI Logic; De Anza College; and numerous vendors throughout the world. Depending upon the requirements of my client, I normally teach one shell at a time rather than all of them at once. To accommodate the needs of so many clients, I developed separate materials for each of the respective UNIX/Linux shells and tools. Whether I am teaching "Grep, Sed, and Awk," "Bourne Shell for the System Administrator," "The Interactive Korn Shell," or "Bash Programming," one student always asks, "What book can I get that covers all the shells and the important utilities such as grep, sed, and awk? How does awk differ from gawk? Will this work if I'm using Linux or is this just for Solaris? Should I get the awk book, or should I get a book on grep and sed? Is there one book that really covers it all? I don't want to buy three or four books in order to become a shell programmer." In response, I could recommend a number of excellent books covering these topics separately, and some UNIX and Linux books that attempt to do it all, but the students want one book with everything, and not just a quick survey. They want the tools, regular expressions, all the major shells, quoting rules, a comparison of the shells, exercises, and so forth, all in one book. This is that book . As I wrote it, I thought about how I teach the classes and organized the chapters in the same format. In the shell programming classes, the first topic is always an introduction to what the shell is and how it works. Then we talk about the utilities such as grep , sed , and awk --the most important tools in the shell programmer's toolbox. When learning about the shell, it is presented first as an interactive program where everything can be accomplished at the command line, and then as a programming language where the programming constructs are described and demonstrated in shell scripts. (Since the C and TC shells are almost identical as programming languages, there are separate chapters describing interactive use, but only one chapter discussing programming constructs.) It's one thing to write a script, but yet another to debug it. I have been working with the shells for so long, that I can recognize bugs in a program almost before they happen! But these bugs are hard to find until you get used to the error messages and what they mean. I added a chapter on debugging to help you understand what the often cryptic error messages mean and how to fix them. Since the diagnostics for the shells may differ, each shell is presented with the most common error messages and what caused them. Many students take a shell course as a step toward learning system administration. Susan Barr, a teaching colleague of mine who teaches system administration and shell programming, offered to share her extensive knowledge and write a chapter to describe how the system administrator uses the shell (Chapter 16, "The System Administrator and the Shell"). Having always found that simple examples are easier for quick comprehension, each concept is captured in a small example followed by the output and an explanation of each line of the program. This method has proven to be very popular with those who learned Perl programming from my first book, Perl by Example , or JavaScript from JavaScript(TM) by Example , and with those who learned to write shell programs from UNIX(R) Shells by Example . Another aid to comprehension is that the five shells are discussed in parallel. If, for example, you're working in one shell but want to see how redirection is performed in another shell, you will find a parallel discussion of that topic presented in each of the other shell chapters. It can be a nuisance to shuffle among several books or the man pages when all you want is enough information about a particular command to jog your memory on how a particular command works. To save you time, Appendix A contains a list of useful UNIX and Linux commands, their syntax, and definitions. Examples and explanations are provided for the more robust and often-used commands.The comparison table in Appendix B will help you keep the different shells straight, especially when you port scripts from one shell to another, and serves as a quick syntax check when all you need is a reminder of how the construct works. I think you'll find this book a valuable tutorial and reference. The objective is to explain through example and keep things simple so that you have fun learning and save time. Since the book replicates what I say in my classes, I am confident that you will be a productive shell programmer in a short amount of time. Everything you need is right here at your fingertips. Playing the shell game is fun . . . You'll see!

Download Here


Password default : booktraining.net

Securing.Windows.2000.Step.by.Step




This guide is the joint product of a community of Windows security managers and experts, who have voluntarily shared their experiences in this field so that others may benefit. The guide can be used to substantially improve the security of Windows 2000 computers and networks.

DOwnload Here

Password default : booktraining.net

Mastering.IBM.WebSphere.Portal.Expert.Guidance.to.Build.and.Deploy.Portal.Applications




Maximize on the power of WebSphere Portal to build and deploy portals
If you use, develop, manage, or administer WebSphere applications, you are probably already building or managing Web portals¨Cor well on your way to doing so. With this comprehensive book, you¡¯ll discover how these portals bring together important functions such as integration, presentation, organization, and customizations¨Cfunctions needed in every complex application environment. The unparalleled author team of experts offers you in-depth insight on mastering the complex aspects of WebSphere Portal, walking you through every facet from installing to deployment.

Mastering IBM WebSphere Portal focuses on not only the portal as a server, but also how it interacts with components such as LDAP servers, enterprise applications, mobile devices, and even other portals. The authors begin with an introduction to the WebSphere product family and then explore such topics as:

Installing and customizing the portal, as well as migrating existing environments to version 5
Defining portlets, pages, and user interface properties
Applying personalization, collaboration, search, and document and content management within WebSphere Portal v. 5
Using high availability, security and single sign-on, identity management, Web services, and enterprise applications
Setting up a portal in a high-availability environment and integrating external applications into WebSphere Portal
The companion Web site, www.wiley.com/compbooks/ben-natan, presents all the code in the book as well as links to vendors and sources of information pertaining to WebSphere Portal.

DOwnload Here

Password default : booktraining.net

Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux





Ubuntu Linux--the most popular Linux distribution on the planet--preserves the spirit embodied in the ancient African word ubuntu, which means both "humanity to others" and "I am what I am because of who we all are." Ubuntu won the Linux Journal Reader's Choice Award for best Linux distribution and is consistently the top-ranked Linux variant on DistroWatch.com. The reason this distribution is so widely popular is that Ubuntu is designed to be useful, usable, customizable, and always available for free worldwide.

Ubuntu Hacks is your one-stop source for all of the community knowledge you need to get the most out of Ubuntu: a collection of 100 tips and tools to help new and experienced Linux users install, configure, and customize Ubuntu. With this set of hacks, you can get Ubuntu Linux working exactly the way you need it to. Learn how to:

Install and test-drive Ubuntu Linux.
Keep your system running smoothly
Turn Ubuntu into a multimedia powerhouse: rip and burn discs, watch videos, listen to music, and more
Take Ubuntu on the road with Wi-Fi wireless networking, Bluetooth, etc.
Hook up multiple displays and enable your video card's 3-D acceleration
Run Ubuntu with virtualization technology such as Xen and VMware
Tighten your system's security
Set up an Ubuntu-powered server
Ubuntu Hacks will not only show you how to get everything working just right, you will also have a great time doing it as you explore the powerful features lurking within Ubuntu.

Download Here

Password default : booktraining.net

The.Definitive.Guide.to.Apache.mod.rewrite




Organizing websites is highly dynamic and often chaotic. Thus, it is crucial that host web servers manipulate URLs in order to cope with temporarily or permanently relocated resources, prevent attacks by automated worms, and control resource access.

The Apache mod_rewrite module has long inspired fits of joy because it offers an unparalleled toolset for manipulating URLs. The Definitive Guide to Apache mod_rewrite guides you through configuration and use of the module for a variety of purposes, including basic and conditional rewrites, access control, virtual host maintenance, and proxies.

This book was authored by Rich Bowen, noted Apache expert and Apache Software Foundation member, and draws on his years of experience administering, and regular speaking and writing about, the Apache server.

Download Here

Password default : booktraining.net

Designing.BSD.Rootkits.An.Introduction.to.Kernel.Hacking




Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.
Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.

Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.

Included:


The fundamentals of FreeBSD kernel module programming
Using call hooking to subvert the FreeBSD kernel
Directly manipulating the objects the kernel depends upon for its internal record-keeping
Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running
How to defend against the attacks described
Hack the FreeBSD kernel for yourself!

Download Here


Password default : booktraining.net

Core.JavaServer.Faces.2nd.Edition





JavaServer Faces (JSF) is quickly emerging as the leading solution for rapid user interface development in Java-based server-side applications. Now, Core JavaServer™ Faces¨Cthe #1 guide to JSF¨Chas been thoroughly updated in this second edition, covering the latest feature enhancements, the powerful Ajax development techniques, and open source innovations that make JSF even more valuable.

Authors David Geary and Cay Horstmann delve into all facets of JSF 1.2 development, offering systematic best practices for building robust applications, minimizing handcoding, and maximizing productivity. Drawing on unsurpassed insider knowledge of the Java platform, they present solutions, hints, tips, and ¡°how-tos¡± for writing superior JSF 1.2 production code, even if you¡¯re new to JSF, JavaServer Pages™, or servlets.

The second edition¡¯s extensive new coverage includes: JSF 1.2¡¯s improved alignment with the broader Java EE 5 platform; enhancements to the JSF APIs; controlling Web flow with Shale; and using Facelets to replace JSP with XHTML markup. The authors also introduce Ajax development with JSF¨Cfrom real-time validation and Direct Web Remoting to wrapping Ajax in JSF components and using the popular Ajax4jsf framework.

This book will help you

Automate low-level details and eliminate unnecessary complexity in server-side development
Discover JSF best practices, ranging from effective UI design and style sheets to internationalization
Use JSF with Tiles to build consistent, reusable user interfaces
Leverage external services such as databases, LDAP directories, authentication/authorization, and Web services
Use JBoss Seam to greatly simplify development of database-backed applications
Implement custom components, converters, and validators
Master the JSF 1.2 tag libararies, and extend JSF with additional tag libraries

Download Here


Password default : booktraining.net

CCNP.BCMSN.Portable.Command.Guide





All the BCMSN 642-812 commands in one compact, portable resource



Preparing for the CCNP® certification? Working as a network professional? Here are all the CCNP-level commands for the BCMSN exam you need in one condensed, portable resource. The CCNP BCMSN Portable Command Guide is filled with valuable, easy-to-access information and is portable enough for use whether you¡¯re in the server room or the equipment closet.



This book will help you memorize commands and concepts as you work to pass the CCNP BCMSN exam (642-812). The guide summarizes all CCNP certification-level Cisco IOS® Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Sample configurations throughout the book provide you with a better understanding of how these commands are used in simple network designs.



The topics in this portable command guide cover how to do the following:

Implement VLANs
Conduct the operation of Spanning Tree Protocol and EtherChannel in a hierarchical network
Implement inter-VLAN routing
Implement gateway redundancy technologies
Describe and configure wireless client access
Describe and configure security features in a switched network
Configure support for voice


Scott Empson is currently the assistant program chair of the bachelor of applied information systems technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, teaching Cisco® routing, switching, and network design courses in certificate, diploma, and applied degree programs at the post-secondary level. He is also the program coordinator of the Cisco Networking Academy® Program at NAIT, a Regional Academy covering central and northern Alberta. He has earned three undergraduate degrees and currently holds several industry certifications, including CCNP, CCDA®, CCAI, and Network+.



Access all CCNP BCMSN commands¡Âªuse as a quick offline resource for research and solutions
Logical ¡°how-to¡± topic groupings provide one-stop research
Great for review before taking the CCNP BCMSN certification exam
Compact size makes it easy to carry with you, wherever you go
¡°Create your own journal¡± section with blank, lined pages allows you to personalize the book for your needs


This book is part of the Cisco Press® Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco® certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.

Download Here

Password default : booktraining.net

JavaScript for Developers Part 1 & 2

The JavaScript for Developers training course from LearnKey starts with core concepts and takes you step-by-step through the process of creating richer, more dynamic client-side web pages using JavaScript. Expert instructor Campbell Gunn combines information usually found only in multiple reference sources into this concise course. At the conclusion of this course, you ll understand how to effectively use JavaScript to develop interactive client-side web pages.

Benefits:
Increase your earning potential with technical mastery and proficiency.
Enhance employment opportunities with in-demand web development knowledge.
LearnKey courses let you move along at your own pace and gain new skills in a useful, productive manner.

:

http://rapidshare.com/files/51310868/LK-JS-DE.part01.rar
http://rapidshare.com/files/51310912/LK-JS-DE.part02.rar
http://rapidshare.com/files/51310949/LK-JS-DE.part03.rar
http://rapidshare.com/files/51310985/LK-JS-DE.part04.rar
http://rapidshare.com/files/51311013/LK-JS-DE.part05.rar
http://rapidshare.com/files/51311035/LK-JS-DE.part06.rar
http://rapidshare.com/files/51311063/LK-JS-DE.part07.rar
http://rapidshare.com/files/51311093/LK-JS-DE.part08.rar
http://rapidshare.com/files/51311123/LK-JS-DE.part09.rar
http://rapidshare.com/files/51311151/LK-JS-DE.part10.rar
http://rapidshare.com/files/51311187/LK-JS-DE.part11.rar
http://rapidshare.com/files/51311226/LK-JS-DE.part12.rar
http://rapidshare.com/files/51311252/LK-JS-DE.part13.rar
http://rapidshare.com/files/51311278/LK-JS-DE.part14.rar
http://rapidshare.com/files/51311305/LK-JS-DE.part15.rar
http://rapidshare.com/files/51311339/LK-JS-DE.part16.rar
http://rapidshare.com/files/51311360/LK-JS-DE.part17.rar
http://rapidshare.com/files/51311390/LK-JS-DE.part18.rar
http://rapidshare.com/files/51311414/LK-JS-DE.part19.rar
http://rapidshare.com/files/51311447/LK-JS-DE.part20.rar
http://rapidshare.com/files/51311477/LK-JS-DE.part21.rar
http://rapidshare.com/files/51311503/LK-JS-DE.part22.rar
http://rapidshare.com/files/51311543/LK-JS-DE.part23.rar
http://rapidshare.com/files/51311572/LK-JS-DE.part24.rar
http://rapidshare.com/files/51311605/LK-JS-DE.part25.rar
http://rapidshare.com/files/51311633/LK-JS-DE.part26.rar
http://rapidshare.com/files/51311665/LK-JS-DE.part27.rar
http://rapidshare.com/files/51311701/LK-JS-DE.part28.rar
http://rapidshare.com/files/51311726/LK-JS-DE.part29.rar
http://rapidshare.com/files/51311758/LK-JS-DE.part30.rar
http://rapidshare.com/files/51311787/LK-JS-DE.part31.rar
http://rapidshare.com/files/51311806/LK-JS-DE.part32.rar
http://rapidshare.com/files/51311822/LK-JS-DE.part33.rar
http://rapidshare.com/files/51311864/LK-JS-DE.part34.rar
http://rapidshare.com/files/51311917/LK-JS-DE.part35.rar
http://rapidshare.com/files/51311951/LK-JS-DE.part36.rar
http://rapidshare.com/files/51311976/LK-JS-DE.part37.rar
http://rapidshare.com/files/51312011/LK-JS-DE.part38.rar
http://rapidshare.com/files/51312041/LK-JS-DE.part39.rar
http://rapidshare.com/files/51312066/LK-JS-DE.part40.rar
http://rapidshare.com/files/51312087/LK-JS-DE.part41.rar
http://rapidshare.com/files/51310831/LK-JS-DE.part42.rar


Password default : booktraining.net

CBT Nugget MCSE 2003 EXAMP-PACK Complete


MCSE 2003: Exam-Pack 70-290
Managing and Maintaining a Microsoft Windows Server 2003

If you want to learn about Microsoft Windows Server 2003, this is the training you need. Whether you are looking to begin an MCSE 2003 certification track or are just interested in getting familiar with Server 2003, you’ll find these videos an invaluable resource.

The training starts with the basics and covers everything you need to know for managing and maintaining Server 2003. You’ll learn how to manage and troubleshoot User Accounts, back-up and system recovery procedures, remote management and assistance tools and the benefits of Terminal Services.

James Conrad is the instructor for this series and you won’t find anyone more qualified to teach Server 2003. He is great at explaining the concepts in such a way that both beginners and IT pros find helpful. The videos map to Microsoft Exam 70-290 as a core requirement of the MCSE 2003 certification.

There are 25 videos providing more than 13 hours of instruction. A basic understanding of computers and networking such as the A+ and Network+ certification or equivalent knowledge is the prerequisite for this training.

NOTE: The 70-290 Exam has been updated to cover new information on WSUS, replacing the SUS content.

This training has not yet been updated to cover WSUS. This training still maps to all other exam objectives and will help you greatly as you prepare for the 70-290 exam.

http://rapidshare.com/files/103209984/CBT_NUggets-Windows_Server_2003.part01.rar
http://rapidshare.com/files/103213430/CBT_NUggets-Windows_Server_2003.part02.rar
http://rapidshare.com/files/103216949/CBT_NUggets-Windows_Server_2003.part03.rar
http://rapidshare.com/files/103220691/CBT_NUggets-Windows_Server_2003.part04.rar
http://rapidshare.com/files/103224915/CBT_NUggets-Windows_Server_2003.part05.rar
http://rapidshare.com/files/103228928/CBT_NUggets-Windows_Server_2003.part06.rar
http://rapidshare.com/files/103233295/CBT_NUggets-Windows_Server_2003.part07.rar
http://rapidshare.com/files/103237863/CBT_NUggets-Windows_Server_2003.part08.rar
http://rapidshare.com/files/103242695/CBT_NUggets-Windows_Server_2003.part09.rar
http://rapidshare.com/files/103247780/CBT_NUggets-Windows_Server_2003.part10.rar
http://rapidshare.com/files/103253000/CBT_NUggets-Windows_Server_2003.part11.rar
http://rapidshare.com/files/103258941/CBT_NUggets-Windows_Server_2003.part12.rar
http://rapidshare.com/files/103265376/CBT_NUggets-Windows_Server_2003.part13.rar
http://rapidshare.com/files/103271071/CBT_NUggets-Windows_Server_2003.part14.rar
http://rapidshare.com/files/103277335/CBT_NUggets-Windows_Server_2003.part15.rar
http://rapidshare.com/files/103283633/CBT_NUggets-Windows_Server_2003.part16.rar
http://rapidshare.com/files/103290065/CBT_NUggets-Windows_Server_2003.part17.rar
http://rapidshare.com/files/103206518/CBT_NUggets-Windows_Server_2003.part18.rar


Password default : booktraining.net

Microsoft ASP.NET AJAX + Project Files [ Rapidshare - Mediafire ]

Lesson 1: SETTING UP ASP.NET AJAX (15 min)1. What is ASP.NET AJAX?
2. What to Install
3. Our Focus in This Series
4. Looking Ahead at the Final Project

Lesson 2: DATA BINDING WITH ASP.NET AJAX (29 min)
1. Creating an AJAX-Enabled Web Site
2. Setting Up a Theme & Using Skins
3. Creating a Bindable Object Layer with ADO.net
4. Bind an AJAX-Enabled Application to an Object Layer
5. Working with Update Panels & Content Templates
6. Working with Triggers
7. Working with Update Progress Controls

Lesson 3: CLIENT CALLABLE WEB SERVICES (19 min)
1. Build a New Web Service & Add a Web Method
2. Creating a Script-Callable Web Service
3. Adding a Web Form
4. Adding Content to the Web Form Panels
5. Adding Code to Call the Web Service

Lesson 4: AUTHENTICATION & PROFILE SERVICES (23 min)
1. Working with a Custom Profile Provider
2. Writing Code to Store Settings
3. Loading the Profile
4. Creating Login Functionality
5. Creating Functionality to Register a User

Lesson 5: THE AJAX CONTROL TOOLKIT (36 min)
1. What is the AJAX Control Toolkit
2. Working with the AJAX Sample Toolkit
3. Working with the RoundedCornerExtender
4. Adding Interaction with the DragPanelExtender
5. Getting Default Watermark Behavior
6. Working with Animation
7. Creating a Modal Login

Lesson 6: PUTTING IT ALL TOGETHER (6 min)
1. Why AJAX & What You’ve Learned
2. Final Comments & Credits

+ Project files

Rapidshare link ( dead )
Mediafire link :
http://www.mediafire.com/?wlowiqdbwhg
http://www.mediafire.com/?zhcvh9dhdlt

Password unrar : booktraining.net

Cross.Site.Scripting.Attacks.Xss.Exploits.and.Defens





Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers.

*XSS Vulnerabilities exist in 8 out of 10 Web sites
*The authors of this book are the undisputed industry leading authorities
*Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else

Download Here


Password default : booktraining.net

IPv6 Advanced Protocols Implementation





IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking) (Hardcover)

Download Here

Password default : booktraining.net

Network Analysis, Architecture and Design, Second Edition





The landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer's job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and evaluate these parameters in the architecture and design of the system.

Network Analysis, Architecture, and Design, 2e, uses a systems methodology approach to teaching these concepts, which views the network (and the environment it impacts) as part of the larger system, looking at interactions and dependencies between the network and its users, applications, and devices. This approach matches the new business climate where customers drive the development of new services and the book discusses how networks can be architected and designed to provide many different types of services to customers.

This second edition contains an entirely new focus on network architecture, which completes the process from analysis to design. Network architecture takes the input from network analysis and provides a high-level view of the network, focusing on the relationships between major functions of the network, such as security, network management, performance and addressing and routing. A reference architecture, outlining how these functions are to be addressed within the network, serves as the foundation for the network design.

With a number of examples, analogies, instructor tips, and exercises, this book works through the processes of analysis, architecture, and design step by step, giving network designers a solid resource for making good design decisions

* Substantial revision of the very popular first edition--Practical Computer Network Analysis and Design--by a seasoned network architect who has led numerous design projects in government, commercial, and academic spaces.
* Effective examples, case studies, worksheets, and end-of-chapter exercises provide professionals and students with the necessary tools for learning important design issues.
* Shows how to architect and design a network to provide the desired services and performance levels, and to choose the appropriate network technologies and interconnection strategies to meet architectural and design goals.
*Instructors can download the solutions to the exercises in the book by clicking on the "Instructors" resource link in the upper right corner of the screen and searching for author "McCabe."

Download Here
Password default : booktraining.net

Professional Xen Virtualization (Paperback)





- With typical Wrox thoroughness, this book covers every aspect of
virtualization on the Linux platform for administrators seeking to
optimize the use of enterprise hardware, create virtual environments
geared toward specific tasks, or establish a testing environment
- Provides a complete foundation in virtualization, XEN, and competing
approaches with in-depth discussions of installing, configuring, and
using XEN, including detailed examples of XEN configuration files,
system configuration files, and system-level configuration information
- Offers details that help system administrator adopt XEN and justify
its selection
- Covers optimizing XEN, XEN hosts, and guest operating systems for
maximum performance and reliability; using XEN in enterprise data
centers; procedures and considerations for building custom guest
operating systems to run as virtual machines on a XEN host; and much
more


http://rapidshare.com/files/183136973/Wrox.Professional.Xen.Virtualization.Jan.2008.pdf
Password default : booktraining.net

Tagging: People-powered Metadata for the Social Web (Paperback)






Tagging is fast becoming one of the primary ways people organize and
manage digital information. Tagging complements traditional
organizational tools like folders and search on users desktops as well
as on the web. These developments mean that tagging has broad
implications for information management, information architecture and
interface design. And its reach extends beyond these technical domains
to our culture at large. We can imagine, for example, the scrapbookers
of the future curating their digital photos, emails, ticket stubs and
other mementos with tags. This book explains the value of tagging,
explores why people tag, how tagging works and when it can be used to
improve the user experience. It exposes tagging's superficial simplicity
to reveal interesting issues related to usability, information
architecture, online community and collective intelligence.



http://rapidshare.com/files/183137164/New.Riders.Press.Stylin.with.CSS.A.Designers.Guide.2nd.Edition.Dec.2007.pdf

Password default : booktraining.net

Beginning VB 2008: From Novice to Professional





This book is for anyone who wants to write good Visual Basic 2008 code – even if you have never programmed before.

Writing good code can be a challenge, there are so many options, especially in a language like Visual Basic. If you want to really get the best from a programming language you need to know which features work best in which situations and understand their strengths and weaknesses. It is this understanding that makes the difference between coding and coding well.

Beginning VB 2008 has been written to teach you how to use the Visual Basic programming language to solve problems. From the earliest chapters, and from the first introductory concepts, you'll be looking at real-world programming challenges and learning how Visual Basic can be used to overcome them. As you progress through the book the problems become more involved and interesting while the solutions become correspondingly more complex and powerful as Visual Basic features interact to achieve the results that you want.

By the time you've finished reading this book and worked through the sample exercises, you'll be a confident and very competent Visual Basic programmer. You will still have many explorations of the .NET Framework API to look forward to in your future career, but you will have a firm foundation to build from and you will know exactly where to go to find the things that you need to progress confidently in your projects.

Christian Gross is dedicated to helping his readers understand every detail of Beginning VB 2008 and so you can contact him via SKYPE (christianhgross) if you have bought this book and have a question about something Christian discusses. If Christian is available when you contact him, he will even try to answer you right away!
What you’ll learn

* Become skilled in the Visual Basic 2008 programming language.
* Learn everything you need to begin building your own applications in a solid, well–considered way: this book will teach you .NET coding from the ground up.
* Use the Visual Studio IDE to create, debug, and deploy your applications.
* Understand the mysteries of database access and the many ways that it can be accomplished from VB.
* Delve deeply into the huge range of supporting technologies that the .NET Framework offers: LINQ, ASP.NET AJAX, ADO.NET 3.0, WPF, WCF, and Windows Workflow are all introduced and explained in a straightforward and easy-to-follow way.

Who is this book for?

This book is for anyone who’s just starting out to learn about Visual Basic 2008. It doesn’t assume any prior knowledge of object–oriented programming, of the .NET Framework, or of coding in general. It simply assumes that you’re an intelligent person who wants to learn and starts the journey from there.

http://rapidshare.com/files/183134707/Apress.Beginning.VB.2008.From.Novice.to.Professional.Feb.2008.pdf
Password default : booktraining.net

Head First Design Patterns (Head First)

Head First Design Patterns (Head First)

Product Description
You’re not alone.

At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don’t want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns–the lessons learned by those who’ve faced the same problems. With Design Patterns, you get to take advantage of the best practices and experience of others, so that you can spend your time on…something else. Something more challenging. Something more complex. Something more fun.

You want to learn about the patterns that matter–why to use them, when to use them, how to use them (and when NOT to use them). But you don’t just want to see how patterns look in a book, you want to know how they look “in the wild”. In their native environment. In other words, in real world applications. You also want to learn how patterns are used in the Java API, and how to exploit Java’s built-in pattern support in your own code.

You want to learn the real OO design principles and why everything your boss told you about inheritance might be wrong (and what to do instead). You want to learn how those principles will help the next time you’re up a creek without a design pattern.

Most importantly, you want to learn the “secret language” of Design Patterns so that you can hold your own with your co-worker (and impress cocktail party guests) when he casually mentions his stunningly clever use of Command, Facade, Proxy, and Factory in between sips of a martini. You’ll easily counter with your deep understanding of why Singleton isn’t as simple as it sounds, how the Factory is so often misunderstood, or on the real relationship between Decorator, Facade and Adapter.

With Head First Design Patterns, you’ll avoid the embarrassment of thinking Decorator is something from the “Trading Spaces” show. Best of all, in a way that won’t put you to sleep! We think your time is too important (and too short) to spend it struggling with academic texts.

If you’ve read a Head First book, you know what to expect–a visually rich format designed for the way your brain works. Using the latest research in neurobiology, cognitive science, and learning theory, Head First Design Patterns will load patterns into your brain in a way that sticks. In a way that lets you put them to work immediately. In a way that makes you better at solving software design problems, and better at speaking the language of patterns with others on your team.

About the Author
Eric Freeman the director of engineering of new technologies at the Walt Disney Internet Group, focusing most recently on Digital Rights Management, content standards, new media formats, and video on demand over the Internet. Elisabeth Freeman researches new technologies at the Walt Disney Internet Group, focusing most recently on Digital Rights Management, content standards, new media formats, and video on demand over the Internet. In her free time, she is learning XSLT and Objective-C/Cocoa on her Macintosh iBook.

http://rapidshare.com/files/183137801/O_Reilly_2004_Head_First_Design_Patterns.pdf
Password default : booktraining.net

Wicked Cool PHP: Real-World Scripts That Solve Difficult Problems







PHP is an easy-to-use scripting language perfect for quickly creating
the Web features you need. Once you know the basics of how the language
works, wouldn't it be great to have a collection of useful scripts that
solve those tricky problems and add interesting functionality to your
site? We thought so, too. Instead of starting at "Hello World," Wicked
Cool PHP assumes that you're familiar with the language and jumps right
into the good stuff. After you learn the FAQs of life-the most commonly
wished for PHP scripts-you'll work your way through smart configuration
options and the art of forms, all the way through to complex
database-backed scripts. Wicked Cool PHP contains a wide variety of
scripts to process credit cards, check the validity of email addresses,
template HTML, and serve dynamic images and text. The 76 easily
implemented scripts will also teach you how to:

- Send and receive email notifications
- Track your visitors' behavior with cookies and sessions
- Override PHP's default settings
- Manipulate dates, images, and text on the fly
- Harness SOAP and other web services
- Create an online poll, ecard delivery system, and blog But it's not
all fun and games: Security is a big concern when programming any web
application. So you'll learn how to encrypt your confidential data,
safeguard your passwords, and prevent common cross-site-scripting
attacks. And you'll learn how to customize all of the scripts to fit
your own needs. Dynamic Web content doesn't have to be difficult. Learn
the secrets of the craft from two experienced PHP developers with Wicked
Cool PHP.


http://rapidshare.com/files/183137063/No_Starch_Press_Wicked_Cool_PHP_Feb_2008.chm
Password default : booktraining.net

Beginning Game Development with Python and Pygame: From Novice, to Professional (Paperback)






Like music and movies, video games are rapidly becoming an integral part
of our lives. Over the years, you've yearned for every new gaming
console, mastered each blockbuster within weeks after its release, and
have even won a local gaming competition or two. But lately you've been
spending a lot of time thinking about a game idea of your own, or are
exploring the possibility of making a career of this vibrant and growing
industry. But where should you begin?

Beginning Game Development with Python and Pygame is written with the
budding game developer in mind, introducing games development through
the Python programming language and the popular Pygame games development
library. Authored by industry veteran and Python expert Will McGugan,
who most recently worked on the MotorStorm game for Play Station 3,
you'll be privy to insights that will not only help you to exploit
PyGame to its maximum potential, but also make you a more creative and
knowledgeable games developer all round.

- Learn how to create advanced games by taking advantage of the
popular open source Python programming language and Pygame games
development library.
- Learn about coding gaming preferences, sound, visual effects, and
joystick/keyboard interaction.
- Discover the concepts that are crucial to success in todays gaming
industry, such as support for multiple platforms, and granting users the
ability to extend and customize your games.
What you'll learn
- Take advantage of Python and the Pygame library to build compelling
cross-platform games.
- Learn to best use these technologies to turn your dream game into
reality.
- Create professional games by accounting for sound, special effects,
and user interaction through the joystick and keyboard.
- Build both two- and three-dimensional games, and learn more about
the factors that contribute to choosing one approach over the other.
- Provide users with the means for extending your games through level
creation and custom modifications as a means to build a vibrant
community around your product.
- Package your games in a manner that allows even novice computer
users to install, use, and update your games with ease.

http://rapidshare.com/files/183134636/Apress.Beginning.Game.Development.with.Python.and.Pygame.Oct.2007.pdf

Password default : booktraining.net

Oracle Database 11g: New Features for DBAs and Developers, (Expert's Voice in Oracle) (Paperback)



Oracle Database 11g: New Features for DBAs and Developers is a
comprehensive, example-laden review of the most significant new features
and improvements offered by the latest release of Oracle Corporation's
flagship database product.

- Learn what's new in Oracle that really counts.
- See actual examples and test run output.
- Make sound decisions on new feature adoption. Sift the gold from the
silt and discover which new features of the latest release of Oracle's
flagship database product are really worth adopting. Years of database
administration experience from authors Sam Alapati and Charles Kim are
combined with sound, step-by-step testing and a heart-felt emphasis on
what matters in the real-world to help you get the most out of Oracle
Database 11g.

What you'll learn:

- Which new features really can make your day-to-day work easier
- How to automate more of your DBA work than ever before

Who is this book for?

Oracle Database 11g: New Features for DBAs and Developers is for
developers, DBAs, project managers, consultants, and other technically
minded users of the Oracle database. The book will be of use to any
professional in the field who wants to quickly review the new features
offered by the Oracle Database 11g release.



http://uploading.com/files/BN0SA41V/Apress.Oracle.Database.11g.New.Features....pdf.html
http://hotfile.com/dl/7446875/9cf92bd/Apress.Oracle.Database.11g.New.Features.for.DBAs.and.Developers.Nov.2007.pdf.html
http://rapidshare.com/files/247704513/Apress.Oracle.Database.11g.New.Features.for.DBAs.and.Developers.Nov.2007.pdf
http://rapidshare.com/files/183134732/Apress.Oracle.Database.11g.New.Features.for.DBAs.and.Developers.Nov.2007.pdf

Programming Microsoft Dynamics NAV (Paperback)






Fast-paced, to-the-point, and created to enable experienced programmers
with no previous knowledge of NAV development to quickly learn to
create, modify or maintain NAV applications, this book covers the
important topics of Microsoft Dynamics NAV 5.0 with clear explanations
and practical example code. NAV (formerly known as Navision) is a
complex Enterprise Resource Planning (ERP) application with a unique
design structure and a challenging learning curve that sometimes
overwhelms developers learning to modify or enhance it for vital
business purposes. Like an experienced mentor, this book covers the
topics working developers need to know to become productive as quickly
as possible: basic NAV terminology and concepts; object construction;
tools, including the Table, Form, and Report Designers; using NAV's
tools to effectively navigate through the features of objects, including
properties, triggers, and C/AL code; developing and testing in the
unique NAV C/SIDE development environment.


http://rapidshare.com/files/183137235/Packt.Publishing.Programming.Microsoft.Dynamics.NAV.Oct.2007.pdf

Password default : booktraining.net

Learnkey CCNA 640 - 801 Full course Video Tutorials

Learnkey CCNA 640 - 801 Full course Video Tutorials

Learnkey CCNA 640 - 801 Full course Video Tutorials

9 CDs | ISO , Bin | 2.5 GB |English


This is the Complete collection Of Learnkey CCNA 640-801 tutorials by Michael Storm , it contains 9 CDs , 2.5 GB , all the sessions , 30 hours of interactive Training , please note that if you are running for INTRO (exam 640-821) , Just pick CDs 1 , 2 , 3 & if you are running for ICND (exam 640-811) pick CDs 4 ,5 ,6 ,7 ,8 , 9 AND if you are running for CCNA (exam 640-801) pick all of them. All CDs are in ISO , (Bin.cue) i.e CD Images Format , they Must be burned to a CD to run cause the software asks you to run it from the CD , or you can run from the the image directly using a CD emulator software like Virtual CD or Original CD Emulator v2.3 , i recommend the later one cause it's easy to use & has small size compared to virtual CD software . you can download \" Original CD emulator v2.3 full from here ( 2.6 MB) :

http://rapidshare.com/files/49722400/OCDE_V2.3_MAZ.zip

Make sure to Visit the following Page for MOre Info :

http://www.learnkey.com/elearning/Cisco_Certification/

download file:
http://rapidshare.com/files/52124125/ICND2.1_s1_MAZ.part1.tar
http://rapidshare.com/files/52123997/ICND2.1_s1_MAZ.part2.tar
http://rapidshare.com/files/52123988/ICND2.1_s1_MAZ.part3.tar
http://rapidshare.com/files/52124878/ICND2.1_s2_MAZ.part1.tar
http://rapidshare.com/files/52124804/ICND2.1_s2_MAZ.part2.tar
http://rapidshare.com/files/52124856/ICND2.1_s2_MAZ.part3.tar
http://rapidshare.com/files/52125746/ICND2.1_s3_MAZ.part1.tar
http://rapidshare.com/files/52125688/ICND2.1_s3_MAZ.part2.tar
http://rapidshare.com/files/52125838/ICND2.1_s3_MAZ.part3.tar
http://rapidshare.com/files/52126831/ICND2.1_s4_MAZ.part1.tar
http://rapidshare.com/files/52126779/ICND2.1_s4_MAZ.part2.tar
http://rapidshare.com/files/52126708/ICND2.1_s4_MAZ.part3.tar
http://rapidshare.com/files/52126658/ICND2.1_s5_MAZ.part1.tar
http://rapidshare.com/files/52126670/ICND2.1_s5_MAZ.part2.tar
http://rapidshare.com/files/52126787/ICND2.1_s5_MAZ.part3.tar
http://rapidshare.com/files/52128209/ICND2.1_s6_MAZ.part1.tar
http://rapidshare.com/files/52128135/ICND2.1_s6_MAZ.part2.tar
http://rapidshare.com/files/52128129/ICND2.1_s6_MAZ.part3.tar
http://rapidshare.com/files/52129307/INTRO_s1_MAZ.part1.tar
http://rapidshare.com/files/52129495/INTRO_s1_MAZ.part2.tar
http://rapidshare.com/files/52129399/INTRO_s1_MAZ.part3.tar
http://rapidshare.com/files/52129483/INTRO_s2_MAZ.part1.tar
http://rapidshare.com/files/52129304/INTRO_s2_MAZ.part2.tar
http://rapidshare.com/files/52129343/INTRO_s2_MAZ.part3.tar
http://rapidshare.com/files/52134184/INTRO_s3_MAZ.part1.tar
http://rapidshare.com/files/52134072/INTRO_s3_MAZ.part2.tar
http://rapidshare.com/files/52134070/INTRO_s3_MAZ.part3.tar
http://rapidshare.com/files/52134083/INTRO_s3_MAZ.part4.tar
http://rapidshare.com/files/52134114/INTRO_s3_MAZ.part5.tar
http://rapidshare.com/files/52133962/OCDE_V2.3_MAZ.zip
http://rapidshare.com/files/52133959/LEARNKEY_PASSWORD.txt

Password default : booktraining.net

Secrets of Network Cartography

A Comprehensive Guide to n*map Second Edition CD

Secrets of Network Cartography


previous post about n*map complete tutorial:
http://www.warungplus.com/2007/08/16/n*map_secrets_training_course.html

Here are just a few of the n*map secrets contained in this 230-page ebook:

- Introductory information steps through the basics of IP networking and the methods that n*map uses to communicate via TCP and UDP.

- Ever wonder which n*map scan was the right one to use? Thirteen different n*map scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis!

- n*map includes seven different ping types, and we'll show you exactly how they work!

- n*map's operating system fingerprinting can provide amazing detail about a remote device using only fourteen IP frames that never open an application session or log in. How is that possible? This book will show you!

- Over fifty additional n*map options are documented, including ways to customize host specifications, port numbers, logging methods, packet tracing, data tuning, packet timing, Windows-only options, and many more!

- Six "real world" n*map scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification, asset management, compliance testing, firewall auditing, and more

Download Link
http://rapidshare.com/users/MXVNLL

Password default : booktraining.net

Professor Teaches Office 2003

 Professor Teaches Office 2003

Professor Teaches Office 2003 is the most comprehensive training for Mzoft Office available. Not only is it the #1 best-selling training software, the Office 2003 courses are Mzoft Office Specialist approved and independently tested. Professor Teaches courses have received many prestigious awards and are the highest quality training available.

Complete 15 pro6r4m Tutorial Library
• Mzoft Word 2003
• Mzoft Excel 2003
• Mzoft PowerPoint 2003
• Mzoft Outlook 2003
• Mzoft Access 2003
• Mzoft FrontPage 2003
• Mzoft Publisher 2003
• win**s XP Home & Professional
• Integrating Office Applications
* Most Mzoft(R) Office courses above include both Standard and Advanced courses.

Easy Learning
Learn from each of the nine courses or just the ones you need! Professor Teaches courses use real-world settings and accurate simulations to help you apply your new knowledge directly to daily tasks and the knowledge you gain becomes an asset for life.

Improve Your Productivity
Each course is educationally organized into chapters and lessons.
• Learning objectives guide you to success.
• Colorful graphics and clear instructions keep you interested.
• Professional voice narration assists retention.

Most Interactive Training
Learn more effectively in an accurately simulated environment that is highly interactive.
• Accurate screen presentations, menus, and buttons provide an easy transition to the real application.
• Step by step interactive exercises achieve high retention rates.
• Practical exercises and examples make learning understandable.

Comprehensive Content
Become more productive because you will learn more.
• Each course covers the most important topics.
• 4 to 8 hours of interactive training in each course.
• Separate courses for Advanced Mzoft Office Topics are included

Comprehensive Content
Learn from the best training available
• All Mzoft Office versions are designed to meet Mzoft Office Specialist Exam Requirements.
• All 15 courses use the same design and education methods to ensure consistent quality throughout.
• Professor Answers provides true just-in-time learning.

Just-in-Time Training
Professor Answers is more useful than Mzoft Help. It provides learning just when you need it. Powerful search and browse features give you the training you need right away.

download:
http://rapidshare.com/users/O5J3ZT

use this to join the file:
http://rapidshare.com/files/49689450/FSJSetup.exe

Password default : booktraining.net
This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at youzhny197@gmail.com, we will immediately respond to you.