Free Ebook Video Training

Monday, May 4, 2009

Pro VB 2005 and the .NET 2.0 Platform


Andrew Troelsen, "Pro VB 2005 and the .NET 2.0 Platform"
Apress | 2006 | ISBN: 1590595785 | 1088 pages | PDF | 14,3 MB

With the release of .NET 2.0, the Visual Basic 2005 language has been updated with numerous new programming constructs (XML code documentation, operator overloading, generics, and partial types just to name a few!). Now more than ever, choosing a .NET language boils down to personal preference (rather than a language’s feature set).

However, to effectively make use of these new language features, developers must have a rock-solid grounding in object-oriented technology, assemblies, and the core .NET technologies. The purpose of Pro VB 2005 and the .NET 2.0 Platform, Second Edition is to provide you with such a foundation by diving deep into the language of VB 2005 and the platform of .NET. Thus, rather than simply showing how a code wizard can generate all the code on your behalf, this text will first show you how to author the code yourself so you can alter the generated code to your liking.

Beyond learning all the details of the VB 2005 programming language, you will also dive into the details of building desktop applications (using Windows Forms) and websites (via ASP.NET 2.0), and how to interact with relational databases (à la ADO.NET). Furthermore, you will explore how to build distributed applications using the .NET remoting layer and XML web services. Rest assured, this text will expose you to all the major services of the .NET platform and put you in the perfect position for further exploration.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Simple Computer Security: Disinfect Your PC


CA, Jim Geier, Eric Geier, "Simple Computer Security: Disinfect Your PC"
Wiley | 2007 | ISBN: 047006854X | 332 pages | PDF | 7,8 MB

Hands-on guide to the CA Internet Security Suite, which includes Parental Controls (blocks offensive Web sites, controls program use, and monitors Internet activity); Anti-Spyware (sweeps PCs of malicious software like spyware and adware); Anti-Spam (ensures that computer users get messages from people they know, while redirecting messages from people they don't); Anti-Virus (detects and removes computer viruses); and Personal Firewall (prevents hackers from attacking a PC)
CA will include a special version of their $70 suite free with this book, which contains separate applications for Parental Controls, Anti-Spyware, Anti-Spam, Anti-Virus, and a Personal Firewall (good for 6 months)


Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Pro Visual C++/CLI and the .NET 2.0 Platform


Stephen R. G. Fraser, "Pro Visual C++/CLI and the .NET 2.0 Platform (Expert's Voice in .Net)"
Apress | 2005 | ISBN: 1590596404 | 960 pages | PDF | 12,1 MB

This book explains how to write .NET 2.0 applications and services. It provides you with a clean slate, erasing the need for developing the COM, DCOM, COM+, or ActiveX components that used to be a necessity. Instead, you'll learn how to write .NET applications using C++/CLI.

This book is based on its highly successful predecessor, and bridges the gap between classic C++ and C++/CLI. Furthermore, this edition is based on the newest version of Visual Studio .NET (2005) and .NET Platform version 2.0. And all topic areas include specific code examples. By the end of the book, you will be proficient in developing .NET applications and services for both the Windows desktop and the Web.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Advanced Number Theory


Harvey Cohn, "Advanced Number Theory"
Dover Publications | 1980 | ISBN: 048664023X | 288 pages | PDF | 9,2 MB

Eminent mathematician, teacher approaches algebraic number theory from historical standpoint. Demonstrates how concepts, definitions, theories have evolved during last 2 centuries. Abounds with numerical examples, over 200 problems, many concrete, specific theorems. Numerous graphs, tables.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Pro Windows Small Business Server 2003


Tony Campbell, "Pro Windows Small Business Server 2003"
Apress | 2006 | ISBN: 1590597036 | 480 pages | PDF | 16,3 MB

Microsofts Windows Small Business Server has taken the market by storm, offering a compelling solution for business with 50 or fewer employees. Pro Windows Small Business Server 2003 is a complete guide for you intermediate-to-advanced administrators who have deployed SBS, gotten it working for your organizations, and want to take the product and its features to the next level. This book is your solid reference to SBS 2003, and youll gain great insight to IT security.

Inside this book, youll find everything you need to know about managing SBS 2003 on a daily basis. Author Tony Campbell walks you through all aspects of installing and running the products in the suite. Specific topics include Windows Server 2003 R2, Windows SharePoint Services, Exchange Server 2003, Microsoft Office Outlook 2003, Microsoft Shared Fax Service, Routing and Remote Access, as well as coverage of the Premium Edition, and even a chapter on troubleshooting. A requirements gathering and mapping exercise will teach you how to best plan a small businesss IT system.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Pro XML Development with Java Technology


Ajay Vohra, Deepak Vohra, "Pro XML Development with Java Technology"
Apress | 2006 | ISBN: 1590597060 | 472 pages | PDF | 9,4 MB

Pro XML Development with Java Technology has been written to help you, the professional Java developer who needs a practical hands-on guide to marrying these technologies together effectively. There are a lot of books out there, but none really explore the combination deeply, and they are largely theoretical. The main objective here was to consolidate the theory and practice of XML and Java technologies in a single, up-to-date source, that is firmly grounded in underlying XML concepts, and can be consulted time and again to rapidly speed up enterprise application development!

It covers all the essential XML topics, including XML Schemas, addressing of XML documents through XPath, transformation of XML documents using XSLT stylesheets, storage and retrieval of XML content in native XML and relational databases, web applications based on Ajax, and SOAP/HTTP and WSDL based Web Services. These XML topics are covered in he applied context of up-to-date Java technologies, including JAXP, JAXB, XMLBeans, and JAX-WS. You will find this book useful in building contemporary, service-oriented enterprise applications.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Numerical Methods in Engineering with MATLAB


Jaan Kiusalaas, "Numerical Methods in Engineering with MATLAB®"
Cambridge University Press | 2005 | ASIN: B000URVB0Q | 434 pages | PDF | 7,7 MB

Numerical Methods in Engineering with MATLAB® is a text for engineering students and a reference for practicing engineers, especially those who wish to explore the power and efficiency of MATLAB®. Examples and applications were chosen for their relevance to real world problems, and where numerical solutions are most efficient. Numerical methods are discussed thoroughly and illustrated with problems involving both hand computation and programming. MATLAB® mfiles accompany each method and are available on the book web site. This code is made simple and easy to understand by avoiding complex bookkeeping schemes, while maintaining the essential features of the method. MATLAB® was chosen as the example language because of its ubiquitous use in engineering studies and practice. Moreover, it is widely available to students on school networks and through inexpensive educational versions. Explore numerical methods with MATLAB®, a great tool for teaching scientific computation.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Beginning Programming for Dummies


Wallace Wang, "Beginning Programming for Dummies"
For Dummies; 3 ed | 2003 | ISBN: 0764549979 | 432 pages | PDF | 7,7 MB

Qbasic is still the perfect language for beginning programmers because it is "English-like," which means it makes more sense than pt->(int)foo. As part of the ever-excellent "Dummies" series, this guide discusses general programming, programming with Qbasic, data structures, algorithms, and Internet programming. Recommended for all public libraries.

Review
"...helps would-be programmers find their feet..." (PC Utilities, 20 February 2004)

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Computer Security Basics


Rick Lehtinen, G.T. Gangemi, "Computer Security Basics"
O'Reilly Media, Inc.; 2 ed | 2006 | ISBN: 0596006691 | 310 pages | CHM | 1,6 MB

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.

This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.
Topics include:
Computer security concepts
Security breaches, such as viruses and other malicious programs
Access controls
Security policy
Web attacks
Communications and network security
Encryption
Physical security and biometrics
Wireless network security
Computer security and requirements of the Orange Book
OSI Model and TEMPEST


Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO


Lee Jordan, "Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO"
Packt Publishing | ISBN: 184719317X | 2008 | 356 pages | PDF | 12,7 MB

This book will take you beyond the basics of Blogger, helping you take full advantage of the rich and powerful features of Blogger to transform your blog into a fresh and state-of-the-art blog as quickly and painlessly as possible. The book is aimed at current users of the Blogger platform who want to get the most out of Blogger and people who use a different blogging platform and are planning on switching to Blogger. Blog owners who promote their own services, expertise, and products, and want to increase their blog's success by pushing the limits of what Blogger can do will get the most out of this book. The book doesn't require any specific knowledge of Blogger or the related technologies: RSS, CSS, HTML, and XML. Everything you need to know to grow beyond the basics is covered in this book. The companion website to this book (http://bloggerbeefedup.blogspot.com) includes free resource images and content.

Download
Uploading

Rapidshare

Readme
Password default : booktraining.net

Anti-Hacker Tool Kit


Mike Shema, Chris Davis, "Anti-Hacker Tool Kit, 3 Ed"
McGraw-Hill Osborne Media; 3 ed | 2006 | ISBN: 0072262877 | 800 pages | CHM | 34,4 MB

Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the information you'll need to lock down your network from the ground up. Logically organized by category, each tool's function, installation, and configuration is fully described, alongside screenshots and code examples. Brand-new examples and in-depth case studies detail how to implement each vital tool in real-world situations..

. Explains how to configure and use these and other key tools:.
MULTIFUNCTIONAL UTILITIES: Netcat, Cryptcat, Sbd.
PORT SCANNERS: Nmap, THC-Amap,IPEye.
EMULATORS: VMware, Virtual PC, Gnoppix, Cygwin.
ENUMERATORS: Samba, Winfingerprint, PsTools, HFNetChk.
WEB HACKING APPLICATIONS: Nikto, LibWhisker, Paros, Burp.
PASSWORD CRACKERS AND BRUTE-FORCE TOOLS: John the Ripper, LophtCrack, THC-Hydra, PwDump.
WAR DIALERS: ToneLoc, THC-Scan.
HOST HARDENING APPLICATIONS: Clamav, Titan, Msec.
BACKDOORS AND REMOTE ACCESS: VNC, Netbus, Back Orifice, SubSeven, Loki, Knark.
AUDITING TOOLS: Flawfinder, RATS, Nessus, STAT, Tripwire.
PORT REDIRECTERS: Datapipe, FPipe, WinRelay.
SNIFFERS: BUTTSniffer, WinDump, Ethereal, Dsniff, Snort.
WIRELESS TOOLS: NetSlumber, TCPsic, ICMpsic, Iptest.
FORENSIC UTILITIES: dd, EnCase, Sleuth Kit, Vnode, WinHex


Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

LabVIEW for Everyone: Graphical Programming Made Easy and Fun


Jeffrey Travis, Jim Kring, "LabVIEW for Everyone: Graphical Programming Made Easy and Fun,3 Ed"
Prentice Hall PTR; 3 ed | 2006 | ISBN: 0131856723 | 1032 pages | CHM | 25,2 MB

Master LabVIEW 8 with the industry’s friendliest, most intuitive tutorial: LabVIEW for Everyone, Third Edition. Top LabVIEW experts Jeffrey Travis and Jim Kring teach LabVIEW the easy way: through carefully explained, step-by-step examples that give you reusable code for your own projects!

This brand-new Third Edition has been fully revamped and expanded to reflect new features and techniques introduced in LabVIEW 8. You’ll find two new chapters, plus dozens of new topics, including Project Explorer, AutoTool, XML, event-driven programming, error handling, regular expressions, polymorphic VIs, timed structures, advanced reporting, and much more. Certified LabVIEW Developer (CLD) candidates will find callouts linking to key objectives on NI’s newest exam, making this book a more valuable study tool than ever.
Not just what to do: why to do it!
Use LabVIEW to build your own virtual workbench
Master LabVIEW’s foundations: wiring, creating, editing, and debugging VIs; using controls and indicators; working with data structures; and much more
Learn the “art” and best practices of effective LabVIEW development
NEW: Streamline development with LabVIEW Express VIs
NEW: Acquire data with NI-DAQmx and the LabVIEW DAQmx VIs
NEW: Discover design patterns for error handling, control structures, state machines, queued messaging, and more
NEW: Create sophisticated user interfaces with tree and tab controls, drag and drop, subpanels, and more
Whatever your application, whatever your role, whether you’ve used LabVIEW or not, LabVIEW for Everyone, Third Edition is the fastest, easiest way to get the results you’re after!


Download

Uploading
Rapidshare

Readme
Password default : booktraining.net

Pro .NET 2.0 Windows Forms and Custom Controls in C#

http://www.ebookpdf.net/screen/cover3/1634199463834.jpg
Matthew MacDonald, "Pro .NET 2.0 Windows Forms and Custom Controls in C#"

Apress | 2005 | ISBN: 1590594398 | 1080 pages | PDF | 25,5 MB

Renowned author Matthew MacDonald combines careful treatment of the API with detailed user-interface design principles. Further, this book incorporates C# and the final beta of .NET 2.0. The result: thorough coverage of Windows Forms and GDI+ namespaces for you .NET programmers! You will become equipped to design state-of-the-art Windows interfaces and program graphics, and learn how to create your own controls.

As a developer, you must know more than just how to add a control to a window. You must be able to create an entire user interface framework that's scalable, flexible, and reusable. This book is not a reference manual. Instead, it contains detailed discussions about user interface elements that you'll use on a regular basis.


Download
Uploading
Rapidshare


http://uploading.com/files/BWU4DUKD/pro-net-2-0-windows-forms-and-custom-con...pdf.html
http://hotfile.com/dl/7197716/7d8988c/pro-net-2-0-windows-forms-and-custom-controls-in-c.9781590594391.20341.pdf.html
http://rapidshare.com/files/246499064/pro-net-2-0-windows-forms-and-custom-controls-in-c.9781590594391.20341.pdf

Pro .NET 2.0 Windows Forms and Custom Controls


Matthew MacDonald, "Pro .NET 2.0 Windows Forms and Custom Controls"
Apress 2005 | ISBN: 1590594398 | 1080 pages | PDF | 18 MB

Renowned author Matthew MacDonald combines careful treatment of the API with detailed user-interface design principles. Further, this book incorporates C# and the final beta of .NET 2.0. The result: thorough coverage of Windows Forms and GDI+ namespaces for you .NET programmers! You will become equipped to design state-of-the-art Windows interfaces and program graphics, and learn how to create your own controls.



As a developer, you must know more than just how to add a control to a window. You must be able to create an entire user interface framework that's scalable, flexible, and reusable. This book is not a reference manual. Instead, it contains detailed discussions about user interface elements that you'll use on a regular basis.


Download

Uploading
Rapidshare

Readme
Password default : booktraining.net

Adobe Photoshop Lightroom 2 for Digital Photographers Only


Rob Sheppard, "Adobe Photoshop Lightroom 2 for Digital Photographers Only"
Wiley | 2008 |ISBN: 0470278048 | 368 pages | PDF | 24,8 MB

Learn to breathe life into your images with Lightroom 2
Technology should complement talent. Veteran photographer Rob Sheppard finds that Lightroom 2 is perfectly designed for the photographer's needs, giving you back the control over color images that photographers once enjoyed in the traditional darkroom. From editing and organizing your images to processing and displaying photos, this book shares secrets Rob has discovered and developed. His insight will make Lightroom the most valuable tool at your disposal.

Learn how Lightroom processes RAW and JPEG files non-destructively

Discover the way Lightroom is designed for photographers and their workflow needs

Improve your efficiency with the organizational features in the Library module

Navigate quickly through your photos in any module with Filmstrip

Learn how you can optimize your photos quickly with the adjustment brush and graduated filter tools

Discover the keyboard shortcuts that will really save you time

Process multiple images quickly and easily using Sync, Copy, and Paste

Prepare images for the unique requirements of print or online display

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Japanese Verbs and Essentials of Grammar


Rita Lampkin, "Japanese Verbs and Essentials of Grammar"
McGraw-Hill | 2004 | ISBN: 007143514X | 160 pages | PDF | 12,8 MB

Your all-in-one resource for Japanese verbs and grammar

Simplify your Japanese-language learning with this compact, yet comprehensive guide to verbs and grammar. Everything you need to know about Japanese sentence structure and its elements is right here in one helpful volume.

Japanese Verbs & Essentials of Grammar, Second Edition, gives you an introduction to all major verbal and grammatical concepts of the Japanese language. Each entry is clearly explained and illustrated by plenty of examples based on contemporary situations. Divided into two parts--verbs and grammar--the book's user-friendly layout makes it easy for you to look up what you need quickly.

Here you will find all you need to know about :

Verbs
Romanizations and pronunciation
Kinds of verbs
Desu
The Masu form
The informal form and informal endings

Grammar
Basic principles
Demonstrative forms ("Ko-so-a-do")
Interrogatives + ka, mo, demo
Common noun prefixes and suffixes

In the grammar section, you will also find helpful expressions covering everyday topics such as the family, the weather, directions, health and body, shopping, and more.

This latest edition of the popular and accessible guide has been updated to include:
Expanded vocabulary lists featuring common idiomatic phrases
New examples of sentences and sentence structure
An in-depth introduction to Japanese scripts

Whether you are a novice looking for basic information or an intermediate learner who needs a quick refresher, Japanese Verbs & Essentials of Grammar, Second Edition, untangles Japanese sentence structure and helps you express yourself with confidence in your new language.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Modern Developments in X-Ray and Neutron Optics


Alexei Erko, Mourad Idir, Thomas Krist, Alan G. Michette, "Modern Developments in X-Ray and Neutron Optics"
Springer | 2008 | ISBN: 3540745602 | 536 pages | PDF | 31,6 MB

This volume describes modern developments in reflective, refractive and diffractive optics for short wavelength radiation as well as recent theoretical approaches to modelling and ray-tracing the X-ray and neutron optical systems. It is based on the joint research activities of specialists in X-ray and neutron optics from 11 countries, working together under the framework of the European Programme for Cooperation in Science and Technology (COST, Action P7) in the period 2002--2006. The chapters are written by leading specialists from European laboratories, universities and large facilities. In addition to new ideas and concepts, the contents provide a large amount of practical information about recently implemented devices and methods.

Download

Uploading
Rapidshare

Readme
Password default : booktraining.net

Quantum Computing Devices: Principles, Designs, and Analysis (repost)


Goong Chen, David A. Church, Berthold-Georg Englert and oth., "Quantum Computing Devices: Principles, Designs, and Analysis"
Chapman & Hall/CRC | 2006 | ISBN: 1584886811 | 560 pages | PDF | 7,5 MB

One of the first books to thoroughly examine the subject, Quantum Computing Devices: Principles, Designs, and Analysis covers the essential components in the design of a "real" quantum computer. It explores contemporary and important aspects of quantum computation, particularly focusing on the role of quantum electronic devices as quantum gates. Largely self-contained and written in a tutorial style, this reference presents the analysis, design, and modeling of the major types of quantum computing devices: ion traps, cavity quantum electrodynamics (QED), linear optics, quantum dots, nuclear magnetic resonance (NMR), superconducting quantum interference devices (SQUID), and neutral atom traps. It begins by explaining the fundamentals and algorithms of quantum computing, followed by the operations and formalisms of quantum systems. For each electronic device, the subsequent chapters discuss physical properties, the setup of qubits, control actions that produce the quantum gates that are universal for quantum computing, relevant measurements, and decoherence properties of the systems. The book also includes tables, diagrams, and figures that illustrate various data, uses, and designs of quantum computing. As nanoelectronics will inevitably replace microelectronics, the development of quantum information science and quantum computing technology is imperative to the future of information science and technology. Quantum Computing Devices: Principles, Designs, and Analysis helps fulfill this need by providing a comprehensive collection of the most promising devices for the future.

Download
Rapidshare
Uploading

Readme
Password default : booktraining.net

Evaporites: Sediments, Resources and Hydrocarbons


John K. Warren, "Evaporites: Sediments, Resources and Hydrocarbons"
Springer | 2006 | ISBN: 3540260110 | 1036 pages | PDF | 22,4 MB

The monograph offers a comprehensive discussion of the role of evaporites in hydrocarbon generation and trapping. For the first time, diverse knowledge on exploitable salts has been assembled and organized, along with a summary of evaporate karst hazards as well as a summary of exploitative methods and pitfalls in dealing with evaporites in conventional and solution mining. Written by a field specialist in research and exploration, the book presents a comprehensive synthesis of the low temperature realm of evaporite evolution. It is aimed for earth science professionals, sedimentologists, oil and gas explorers, mining geologists, as well as environmental geologists.


Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Philosophical Darwinism: On the Origin of Knowledge by Means of Natural Selection


Peter Munz, "Philosophical Darwinism: On the Origin of Knowledge by Means of Natural Selection"
Routledge | 1993 | ISBN: 0415086027 | 264 pages | PDF | 1 MB

Philosophical Darwinism brings an entirely new perspective to contemporary debates. It has far-reaching implications for cognitive science and artificial intelligence, and questions attempts from the field of biology to reduce mental events to neural processes. Most importantly, it provides a rational postmodern alternative to what the author views as the unreasonable postmodern theories of Kuhn, Lyotard, and Rorty.

Download

Uploading
Rapidshare

Readme
Password default : booktraining.net

Cisco CCSP - Exam-Pack 642-523: SNPA


This exam will be unavailable after January 18, 2009

Network security is a must-have, and Cisco's Adaptive Security Appliance (ASA) combines the features of PIX firewall, intrusion prevention, network antivirus, VPN, Modular Policy framework, advanced protocol handling, AIPSSM & CSCSSM and the ASDM graphical interface into a single device.

ASA makes advanced network security possible at small businesses and remote offices and on internal portions of larger networks.

Our Exam-Pack 642-523: SNPA covers Cisco's Securing Networks with PIX and ASA (SNPA) exam. You'll learn how your network can benefit best from PIX, ASA or both. Plus, you'll learn how to deploy, configure and manage the Cisco PIX and ASA security appliances.

In addition to giving you practical, hands-on instruction, the training in Exam-Pack 642-523: SNPA maps to exam objectives, preparing you for the simulation- and knowledge-based SNPA exam requirements. Exam 642-523: SNPA is one of five exams required to earn the Cisco Certified Security Professional certification and is also a part of the Cisco Firewall Specialist certification program.

A thorough understanding of Cisco networking such as a CCNA certification or equivalent knowledge is recommended before viewing these videos.

Cisco CCSP - Exam-Pack 642-523: SNPA Contains:

- Introduction to Firewall Technology (free video)
- CISCO PIX Product Line
- PIX Firewall Essentials
- Translations and Connections (part 1)
- Translations and Connections (part 2)
- Access Control Lists
- Grouping PIX Objects
- Protocol Handling
- Intrusion Detection and Shunning
- AAA Services
- Routing and Switching (part 1)
- Routing and Switching (part 2)
- Virtual Private Networking
- Easy VPN (part 1)
- Easy VPN (part 2)
- Using Certificates with the ASA
- WebVPN
- Security Appliance Modes
- Maintaining a Cisco Security Appliance (part 1)
- Maintaining a Cisco Security Appliance (part 2)
- Managing the Security Appliance in the Enterprise
- Configuring Failover on PIX and ASA
- Configuring Modular Policy
- Introduction to Cisco product updates and certification (free video)
- Fresh look at the Cisco ASA product family
- Cisco Modular Policy Framework
- Advanced Protocol handling
- Cisco Adaptive Security Device Manager (ASDM)
- AIPSSM and CSCSSM for the ASA device

All trademarks and copyrights are the property of their respective holders.

Home: http://www.cbtnuggets.com/webapp/product?id=414

Download

http://rapidshare.com/files/229664337/agcncces.part2.rar
http://rapidshare.com/files/229664290/agcncces.part1.rar
http://rapidshare.com/files/229664253/agcncces.part3.rar


Readme
Password default : booktraining.net

Mathematical Foundations of Information Theory

0486604349

Mathematical Foundations of Information Theory: A. Ya. Khinchin (Repost)
Dover Publications | ISBN: 0486604349 | 1957-06-01 | PDF / djvu (ocr) | 120 pages | 16.58 / 9.58 Mb

Comprehensive, rigorous introduction to work of Shannon, McMillan, Feinstein and Khinchin. Translated by R. A. Silverman and M. D. Friedman.

Review:
A Y Khinchin was one of the great mathematicians of the first half of the twentieth century. His name is is already well-known to students of probability theory along with A N Kolmogorov and others from the host of important theorems, inequalites, constants named after them. He was also famous as a teacher and communicator. The books he wrote on Mathematical Foundations of Information Theory, Statistical Mechanics and Quantum Statistics are still in print in English translations, published by Dover. Like William Feller and Richard Feynman he combines a complete mastery of his subject with an ability to explain clearly without sacrificing mathematical rigour.

In his "Mathematical Foundations" books Khinchin develops a sound mathematical structure for the subject under discussion based on the modern theory of probability. His primary reason for doing this is the lack of mathematically rigorous presentation in many textbooks on these subjects.

This book contains two papers written by Khinchin on the concept of entropy in probability theory and Shannon's first and second theorems in information theory - with detailed modern proofs. Like all Khinchin's books, this one is very readable. And unlike many recent books on this subject the price is very cheap. Two minor complaints are: lack of an index, and typesetting could be improved.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Microsoft® Encyclopedia of Security

Microsoft® Encyclopedia of Security

Microsoft® Encyclopedia of Security
Microsoft Press | July 16, 2003 | ISBN: 0735618771 | 480 pages | PDF | 7 MB

Get the single resource that defines and illustrates the rapidly evolving world of computer and network security. The MICROSOFT ENCYCLOPEDIA OF SECURITY delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues including sources and types of attacks, countermeasures, policies, and more. You get clear, concise explanations and case scenarios that deftly take you from concept to real-world application ready answers to help maximize security for your mission-critical systems and data. Know your vulnerabilities understand the ways black-hat attackers footprint and enumerate systems, exploit security holes, crack passwords, elevate privileges, and cover their tracks. Deploy your best defense review fundamental concepts of intrusion detection systems, encryption technologies, virus protection, and computer forensics. Stay one step ahead keep pace with emerging security technologies, such as Wi-Fi Protected Access and XML Encryption; recent government legislation; and the latest industry trends.


Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Development and Validation of Analytical Methods


Development and Validation of Analytical Methods (Progress in Pharmaceutical and Biomedical Analysis)
by: C.M. Riley, T.W. Rosanske

Publisher: Pergamon | 01-05-1996 | ISBN: 0080427928 | Pages: 362 | PDF | 13.30 MB

The need to validate an analytical or bioanalytical method is encountered by analysts in the pharmaceutical industry on an almost daily basis, because adequately validated methods are a necessity for approvable regulatory filings. What constitutes a validated method, however, is subject to analyst interpretation because there is no universally accepted industry practice for assay validation. This book is intended to serve as a guide to the analyst in terms of the issues and parameters that must be considered in the development and validation of analytical methods. In addition to the critical issues surrounding method validation, this book also deals with other related factors such as method development, data acquisition, automation, cleaning validation and regulatory considerations.

The book is divided into three parts. Part One, comprising two chapters, looks at some of the basic concepts of method validation. Chapter 1 discusses the general concept of validation and its role in the process of transferring methods from laboratory to laboratory. Chapter 2 looks at some of the critical parameters included in a validation program and the various statistical treatments given to these parameters.

Part Two (Chapters 3, 4 and 5) of the book focuses on the regulatory perspective of analytical validation. Chapter 3 discusses in some detail how validation is treated by various regulatory agencies around the world, including the United States, Canada, the European Community, Australia and Japan. This chapter also discusses the International Conference on Harmonization (ICH) treatment of assay validation. Chapters 4 and 5 cover the issues and various perspectives of the recent United States vs. Barr Laboratories Inc. case involving the retesting of samples.

Part Three (Chapters 6 - 12) covers the development and validation of various analytical components of the pharmaceutical product development process. This part of the book contains specific chapters dedicated to bulk drug substances and finished products, dissolution studies, robotics and automated workstations, biotechnology products, biological samples, analytical methods for cleaning procedures and computer systems and computer-aided validation. Each chapter goes into some detail describing the critical development and related validation considerations for each topic.

This book is not intended to be a practical description of the analytical validation process, but more of a guide to the critical parameters and considerations that must be attended to in a pharmaceutical development program. Despite the existence of numerous guidelines including the recent attempts by the ICH to be implemented in 1998, the practical part of assay validation will always remain, to a certain extent, a matter of the personal preference of the analyst or company. Nevertheless, this book brings together the perspectives of several experts having extensive experience in different capacities in the pharmaceutical industry in an attempt to bring some consistency to analytical method development and validation.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Unicode Explained

Unicode Explained

Unicode Explained

Product Description

Fundamentally, computers just deal with numbers. They store letters and other characters by assigning a number for each one. There are hundreds of different encoding systems for mapping characters to numbers, but Unicode promises a single mapping. Unicode enables a single software product or website to be targeted across multiple platforms, languages and countries without re-engineering. It’s no wonder that industry giants like Apple, Hewlett-Packard, IBM andMicrosoft have all adopted Unicode.

Containing everything you need to understand Unicode, this comprehensive reference from O’Reilly takes you on a detailed guide through the complex character world. For starters, it explains how to identify and classify characters - whether they’re common, uncommon, or exotic. It then shows you how to type them, utilize their properties, and process character data in a robust manner.

The book is broken up into three distinct parts. The first few chapters provide you with a tutorial presentation of Unicode and character data. It gives you a firm grasp of the terminology you need to reference various components, including character sets, fonts and encodings, glyphs and character repertoires.

The middle section offers more detailed information about using Unicode and other character codes. It explains the principles and methods of defining character codes, describes some of the widely used codes, and presents code conversion techniques. It also discusses properties of characters, collation and sorting, line breaking rules and Unicode encodings. The final four chapters cover more advanced material, such as programming to support Unicode.

You simply can’t afford to be without the nuggets of valuable information detailed in Unicode Explained.

About the Author
Jukka Korpela is a consultant who specializes in character codes, localization, orthography, usability, and accessibility. After graduating from Helsinki University of Technology, he taught these subjects in the university’s Computer Science department and worked on localization and accessibility issues at TIEKE before becoming a full-time author and consultant. His previous books on CSS and XHTML were published in Finland by Docendo press.

download

Uploading

Password default : booktraining.net

Cohomology of Groups


K. S. Brown, Kenneth S. Brown "Cohomology of Groups"
Springer | 1994-11-18 | ISBN: 0387906886 | 324 pages | DJVU | 9,4 MB


As a second year graduate textbook, Cohomology of Groups introduces students to cohomology theory (involving a rich interplay between algebra and topology) with a minimum of prerequisites. No homological algebra is assumed beyond what is normally learned in a first course in algebraic topology. The basics of the subject are given (along with exercises) before the author discusses more specialized topics.


Download


Uploading
Rapidshare

Readme
Password default : booktraining.net

Professional K2 blackpearl

Professional K2 blackpearl

Professional K2 blackpearl

Product Description
Built on Microsoft technologies including Microsoft Office SharePoint Server, SQL Server, Microsoft Office 2007, and Visual Studio 2005 and 2008, the latest K2 [blackpearl] release provides you with mature workflow management systems that can automate processes or pull together people, services, and systems. You’ll get an introduction to workflow and business processes management, planning and administering a K2 infrastructure, and building processes and workflow.

download

Uploading
Rapidshare

Password default : booktraining.net

Windows XP Networking (The Addison-Wesley Microsoft Technology Series)

Windows XP Networking (The Addison-Wesley Microsoft Technology Series)

Windows XP Networking (The Addison-Wesley Microsoft Technology Series)

Product Description
Windows XP: practical solutions for working network administrators Deploying, managing, or supporting networks with Windows XP clients? Here’s all the information you need to maximize reliability, security, and performance…and minimize hassles and aggravation! Kackie Cohen and Andrew Daniels share the extraordinary experience they’ve gained deploying and running some of the world’s largest Windows networks. They don’t waste time on the “basics” you already know. Rather, they focus on the specific challenges you face as a working professional.

You’ll find best practices and real-world tips for everything from authentication to Internet connectivity, firewalls to wireless networking…and a whole lot more.Coverage includes: *Security best practices: system hardening, access control, authentication, authorization, and VPNs *LANs in depth: TCP/IP configuration, heterogeneous networking, services for Unix, and more *Wireless networking configuration and features, including Windows XP’s new UPnP support *Internet connection firewall and Internet connection sharing: step-by-step configuration and management recommendations *Mobile/remote networking, including dial-up and remote access services *Saving money with Windows XP’s new IP telephony and conferencing features *QoS: prioritizing network traffic to improve mission-critical application performance *Troubleshooting: network diagnostics, remote assistance, utilities, service packs, and command-line tools *Includes extensive coverage of Windows XP Professional clients

download

Uploading

Password default : booktraining.net

SQL for Microsoft Access (Wordware Applications Library)

SQL for Microsoft Access (Wordware Applications Library)

SQL for Microsoft Access (Wordware Applications Library)

Product Description
SQL for Microsoft Access unlocks the power of Structured Query Language (SQL) in Microsoft Access. It guides the reader through step-by-step examples of creating a database in Microsoft Access using SQL script to create tables, add records to tables, and retrieve and manage records using simple to advanced data manipulation techniques including queries and views. The reader also encounters exam-ples of integrating SQL script into VBA and ASP code.

* Explore the relational database structure and the basics of SQL. * Learn how to insert, retrieve, and filter records. * Understand how table joins, unions, and subqueries are used to retrieve records from multiple tables. * Learn how to use views and temporary tables. * Discover how to prompt the user for information with parameter queries. * Find out how SQL can be used to enhance Active Server pages. * Test your knowledge through the end-of-chapter quizzes and projects.
About the Author
Cecelia Allison is an experienced software tester and technical support specialist with extensive hands-on experience using and teaching SQL. She wrote and facilitates an on-line course titled Introduction to SQL that is offered through hundreds of accredited colleges, universities, and other educational facilities around the world. She also facilitates on-line technical courses for ITT Technical Institute and Park University. She holds a bachelor’s degree in finance and a master’s degree in computer information systems.

Neal Berkowitz is a computer consultant, author, web designer, system analyst, and computer builder with 25 years of experience. An acknowledged Access expert in the Dallas area, he has co-authored four books for Wordware and written a number of articles.

download

Uploading
Rapidshare

Password default : booktraining.net

Securing Your Business with Cisco ASA and PIX Firewalls (Networking Technology)

Securing Your Business with Cisco ASA and PIX Firewalls (Networking Technology)

Securing Your Business with Cisco ASA and PIX Firewalls (Networking Technology)

Product Description

Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent

  • Understand how attacks can impact your business and the different ways attacks can occur
  • Learn about the defense-in-depth model for deploying firewall and host protection
  • Examine navigation methods and features of Cisco ASDM

  • Set up Cisco ASA, PIX Firewall, and ASDM hardware and software
  • Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network
  • Authenticate firewall users and users of public web servers
  • Filter traffic and protect your network from perimeter attacks
  • Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response
  • Stop attacks launched at the desktop by deploying Cisco Security Agent
  • Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN)
  • Enhance your security posture through proper security management
  • Understand the advanced features available in the Cisco PIX version 7 operating system
  • Recover from software failure with Cisco PIX version 7

Many people view security as a “black-box-voodoo” technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security.

Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network.

Securing Your Business with Cisco ASA and PIX Firewalls provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network.

“Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today’s open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place.”

—Martin E. Hellman, professor emeritus of Electrical Engineering,

Stanford University and co-inventor of public key cryptography

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

About the Author
Greg Abelar has been an employee of Cisco Systems® since December 1996. He was an original member of the Cisco Technical Assistance Security team, helping to hire and train many of the engineers. He has held various positions in both the Security Architecture and Security Technical Marketing Engineering teams at Cisco. Greg is the primary founder and project manager of the Cisco written CCIE® Security exam.

download

Uploading

Password default : booktraining.net

Web design for teens

Web Design for Teens

Web Design for Teens

Product Description
Your Web site is a way to communicate who you are to the world-your style, your interests, your voice. “Web Design for Teens” gives you the skills you need to create your first Web site. You don’t need any coding experience to begin. You’ll cover everything from how to write the code to how to create a cool design. Begin by learning HTML as you move from the basics to advanced coding topics. Then it’s on to design as you conquer the fine points of color and navigation systems. Wrap things up as you learn how to put your Web site online, advertise it, and attract visitors.

About the Author
Maneesh Sethi is a high school student in California. Maneesh has worked with Web design and development since he was in fifth grade and was the founder and head designer of Standard Design, a Web site design company. He is also the team leader of Cold Vector Games, a game programming team, and the author of Game Programming for Teens (1592000681).

download

Uploading
Rapidshare

Password default : booktraining.net

Object-Oriented JavaScript

Object-Oriented JavaScript

Object-Oriented JavaScript: Create scalable, reusable high-quality JavaScript applications and libraries
Packt Publishing | July 24, 2008 | ISBN: 1847194141 | 356 pages | PDF | 7 Mb

Once listed in the "nice to have" sections of job postings, these days the knowledge of JavaScript is a deciding factor when it comes to hiring web developers. And rightly so. Where in the past we used to have the occasional few lines of JavaScript embedded in a web page, now we have advanced libraries and extensible architectures, powering the "fat-client", AJAX-type rich internet applications.

JavaScript is the language of the browser, but it's also heavily employed in many other environments: server-side programming, desktop applications, application extensions and widgets. It's a pretty good deal: you learn one language and then code all kinds of different applications. While this book has one chapter specifically dedicated to the web browser environment including DOM, events, and AJAX tutorials, the rest is applicable to all the other environments too.

This book treats JavaScript as a serious object-oriented language, showing you how to build robust, maintainable, and powerful libraries and applications. Along the way, we cover many of the recent innovations such as AJAX, JSON, and interesting design and coding patterns. After reading this book, you'll be prepared to ace your JavaScript job interview and even impress with some bits that the interviewer maybe didn't know. You should read this book if you want to be able to take your JavaScript skills to a new level of sophistication.


Download

Uploading
Rapidshare

Readme
Password default : booktraining.net

Computer and Information Science 2009


Roger Lee, Gongzu Hu, Huaikou Miao "Computer and Information Science 2009 (Studies in Computational Intelligence)"
Springer | 2009-04-23 | ISBN: 3642012086 | 304 pages | PDF | 14,2 MB


The purpose of the 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009) to be held on June 1-3, 2009 in Shanghai, China is to bring together scientist, engineers, computer users, students to share their experiences and exchange new ideas, and research results about all aspects (theory, applications and tools) of computer and information Science; and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

The conference organizers selected 27 outstanding papers from ICIS 2009, all of which you will find in this volume of Springer’s Studies in Computational Intelligence.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

Beginning Math Concepts for Game Developers


Ph.D., John P Flynt, Boris Meltreger, “Beginning Math Concepts for Game Developers”
Course Technology PTR | 2006 | ISBN: 1598632906 | 352 pages | CHM | 8,1 MB

Successful game programmers understand that in order to take their skills beyond the basics, they must have an understanding of central math topics; however, finding a guide that explains how these topics relate directly to games is not always easy. Beginning Math Concepts for Game Developers is the solution! It includes several hands-on activities in which basic math equations are used for the creation of graphs and, ultimately, animations. By the time you finish, you will have developed a complete application from the ground up that allows you to endlessly explore game development scenarios for 2D games. If you have a basic understanding of programming essentials and a desire to hone your math skills, then get ready to take a unique journey that examines what is possible when you combine game development with basic math concepts.

Download
Uploading
Rapidshare

Readme
Password default : booktraining.net

PHP 6 Fast and Easy Web Development

PHP 6 Fast and Easy Web Development

PHP 6 Fast and Easy Web Development

Product Description
Learn to create Web pages quickly and easily with PHP—no prior programming experience required! PHP 6 Fast & Easy Web Development provides a step-by-step, learn-by-example path to learning through easy-to-understand language and illustrations. Unlike the verbose text-only chapters found in most programming books, the Fast & Easy Web Development style appeals to users who are new to PHP, or to programming in general.

The first three chapters are dedicated to getting Apache, MySQL, and PHP up and running on your Windows or Linux machine. You’ll be surprised at how simple it is, and how quickly you’ll be working. From there, you’ll learn how to create multi-part scripts, display dynamic content, work with MySQL databases, restrict access to certain pages of your site using PHP, create contact management systems, and work with XML. After completing this book, you will have a strong foundation in the basics of Web-based technologies and application design, and will be prepared to learn more advanced topics and programming methods.

About the Author
Matt Telles is a senior consultant working in the software development world. His experience includes both desktop and web development using a variety of languages and platforms. He is the author of seven other books ranging from C++ to Python.

Julie Meloni is the technical director for i2i Interactive, a multimedia company located in Los Altos, CA. She’s been developing Web-based applications since the Web first saw the light of day and remembers the excitement surrounding the first GUI Web browser. She is the author of several books and articles on Web-based programming languages and database topics, and you can find translations of her work in several languages, including Chinese, Italian, Portuguese, Polish, and even Serbian.

download

Uploading

Password default : booktraining.net

Just Enough Web Programming with XHTML, PHP, and MySQL

Just Enough Web Programming with XHTML, PHP, and MySQL

Just Enough Web Programming with XHTML, PHP, and MySQL

Product Description
Just Enough Web Programming with XHTML, PHP, and MySQL provides a layperson’s guide to web programming for the casual web designer, student, or serious professional. The book explains how to build powerful interactive sites, whether you’re designing a bulletin board, game, or web store. As part of the Just Enough series, the book provides “just enough” information to get you started quickly, without overloading you with unnecessary details.

After a brief introduction, the book concisely explains the XML, XHTML, and CSS concepts you need to understand to start creating web sites. From there, you’ll start programming and learning the basics of client side and server side scripting and web databases. Then it’s time to put it all together using Content Management Systems. The book includes several chapters on emerging Web 2.0 and how you can put it to use to create your own interactive sites quickly. Part of the beauty of Just Enough Web Programming with XHTML, PHP, and MySQL is its breadth of coverage. By cutting out what you don’t need, the book helps you learn a lot about web programming, and helps you put all of the information together to make a site quickly. So what are you waiting for? Let’s get started!

About the Author
Guy W. Lecky-Thompson is an experienced author in the field of video game design and software development, whose articles have been published in various places, including Gamasutra and the seminal Game Programming Gems. He is also the author of Infinite Game Universe: Mathematical Techniques;Infinite Game Universe, Volume 2: Level Design Terrain, and Sound; and Video Game Design Revealed.

download

Uploading

Password default : booktraining.net

PHP For Teens

PHP For Teens

PHP For Teens

Product Description
Don’t limit the functionality of your web site! If you’re ready to create interactive, dynamic pages for your site, then PHP for Teens is ready to show you how. You don’t need any experience with PHP to begin. You’ll learn everything you need to know along the way. The topics covered by PHP for Teens will get you up and running whether you’re using a PC, a Mac®, or Linux®. You’ll cover everything from basic design and introductory PHP concepts to variables, expressions, and operators. You’ll also get a quick overview of HTML and PHP form design. Take control of your web site using the power of PHP!

About the Author
Maneesh Sethi is a student at Stanford University in Palo Alto, California. As a high-school student, Sethi founded Standard Design, a web-site design company. He is the author of Game Programming For Teens, first and second editions, and Web Design For Teens. Sethi lectures on game programming topics at conferences across the country and has been a guest on G4TechTV. Visit his web site at www.maneeshsethi.com.

download

Uploading
Rapidshare

Password default : booktraining.net

C# Cookbook, 2nd Edition

C# Cookbook, 2nd Edition

C# Cookbook, 2nd Edition

Product Description
With “C# Cookbook, 2nd Edition,” you’ll be able to learn and improve your mastery of both the C# language and the .NET platform. This updated bestseller has been completely revised to account for C# 2.0, the latest version of this popular object-oriented programming language. It also includes more than 100 new code solutions (over 300 overall) to common problems and tasks that you’re sure to face as a C# programmer.

Nearly every solution, or “recipe,” contains a complete, documented code sample showing you how to solve the specific problem, as well as a detailed discussion of how and why the underling technology works. This question-solution-discussion format is a proven teaching method, as any fan of O’Reilly’s “Cookbook” series can attest to. In fact, no other source offers a learn-as-you-go format quite like this.

“C# Cookbook, 2nd Edition” is organized into 20 chapters, each of which focuses on a particular topic in creating C# solutions. Here are just some of what’s covered: Numeric data types Strings and characters Classes and structures Generics Exception handling Delegates, events, and anonymous methods Filesystem interactions Web site access XML usage (including XPath and XSLT) Networking Threading Unsafe code

Best of all, you don’t have to be an experienced C# or .NET developer to use “C# Cookbook, 2nd Edition,” You just have to be someone who wants to solve a problem now, without having to learn all the related theory first.

download

http://uploading.com/files/HCSBJPQ8/booktraining.net_C_Sharp_Cookbook.rar.html
Mirror
http://www.uploading.com/files/WPIXZ92R/booktraining.net_C_Sharp_Cookbook.rar.html

Password default : booktraining.net

Douglas Crockford Javascript Videos


Douglas Crockford Javascript Videos
13 flv videos | 246MB+258MB+151MB+167MB+212MB+70MB | Total duration 6hr 24min


Yahoo! JavaScript Architect Douglas Crockford covers JavaScript in a series of tutorial and lecture videos.


Class 1 - The JavaScript Programming Language

Yahoo! JavaScript Architect Douglas Crockford provides a comprehensive introduction to the JavaScript Programming Language in this four-part video.

Part 1: 30:58
Part 2: 31:08
Part 3: 29:08
Part 4: 19:47
246MB

http://rapidshare.com/files/228859182/booktraining.net__C1.part1.rar
http://rapidshare.com/files/228859179/booktraining.net__C1.part2.rar
http://rapidshare.com/files/228859064/booktraining.net__C1.part3.rar

Class 2 - The Theory of the DOM

Douglas Crockford teaches "An Inconvenient API: The Theory of the Dom."
This course is broken into three clips.

Part 1: 31:11
Part 2: 21:25
Part 3: 26:24

258MB

http://rapidshare.com/files/228859194/booktraining.net__C2.part1.rar
http://rapidshare.com/files/228859255/booktraining.net__C2.part2.rar
http://rapidshare.com/files/229268403/booktraining.net__C2.part3.rar

Class 3 - Advanced Javascript

Douglas Crockford teaches "Advanced JavaScript." This course is broken into three clips; this is the first of those three clips. Note that when Douglas begins the talk referring to the "third installment", he's referring to "Advanced JavaScript" being the third class in a series; this is indeed the first of the three clips comprising the "Advanced JavaScript" class. The other 2 classes are: "The JavaScript Programming Language" and "Theory of the DOM".

Part 1: 31:03
Part 2: 25:35
Part 3: 11:01

151MB

http://rapidshare.com/files/228859307/booktraining.net__C3.part1.rar
http://rapidshare.com/files/228858993/booktraining.net__C3.part2.rar

JavaScript, The Good Stuff

Yahoo JavaScript architect Douglas Crockford delivered the keynote talk at the 2007 Konfabulator Developer Day and discussed the evolution of JavaScript and of his relationship to the language. Through his description of his own journey with the language, Douglas evokes what he considers to be the "good stuff" therein.

Part 1: 39:37

167MB

http://rapidshare.com/files/228859161/booktraining.net__JTGS.part1.rar
http://rapidshare.com/files/228859108/booktraining.net__JTGS.part2.rar

Quality

Yahoo! JavaScript Architect Douglas Crockford provided the anchoring keynote for Yahoo!'s annual internal web-development conference. The subject of the talk is "Quality" -- the processes by which we engineer quality into our software and, of course, the processes by which we often fail to do so.

Part 1: 48:22

212MB

http://rapidshare.com/files/228859389/booktraining.net__Q.part1.rar
http://rapidshare.com/files/228859185/booktraining.net__Q.part2.rar
http://rapidshare.com/files/228858799/booktraining.net__Q.part3.rar

The State of AJAX

With Ajax, a name was given to immediately interactive distributed applications, and the focus of innovation has moved from the browser makers to the web developers. We are seeing now an explosion of application patterns and styles. In some cases, the demands of Ajax developers have gotten significantly ahead of the browsers. How will we manage large applications? How will we manage offline usage? How will we manage security when the browser's security model is hopelessly out of date?

Part 1: 38:32

70MB

http://rapidshare.com/files/228859075/booktraining.net__TSOA.rar


Readme
Password default : booktraining.net

Leerburg's Dealing with Aggressive and Dominant Dogs - Dog Training Video


DVDRip | English | 3.5hr | AVI (XVID 512x384 29.97fps 1500Kbps | MP3 44100Hz 2 Chan. Stereo 128Kbps) | 1.75GB

Dealing With Dominant & Aggressive Dogs - what our DVD is all about:

In my DVD I provide 3 1/2 hours of information to help people solve their problems with dominant dogs and aggressive dogs. This information is based on 45 years of experience training dogs. For the last 30 years I have studied the art of protection training dogs. I was a police K9 handler for 10 years, and was chairman of the training committee for the WI police dog association for a number of those years. I have bred German Shepherds for police service work for 28 years. During this time I have bred over 350 litters of working dogs. I have dogs from my kennel working in law enforcement, Search and Rescue and competing in Schutzhund all over this country. No one I know in the United States can make these claims.

Everyone has an Opinion:

I tell you these things for one reason. You found this web page because you have a problem with your dog. You have also found out that "Everyone has an opinion on how to solve your problem." You only need to use Google for a few minutes to see this, or ask your neighbor or best friend. Everyone thinks they know what you should be doing. The problem is that very few people have the experience to back up their opinions.

Every year hundreds of thousands of dogs go through obedience training. The vast majority of dominant dogs that enter training classes come out of class just as dominant as before they started. The reason for this is that instructors and owners alike do not address issues of pack drive and rank within the pack.

These instructors and pet owners underestimate the genetic power of the "PACK DRIVE GENES" that flows through the veins of a family dog. Dogs, like wolves, seek to live in a family packs. A family pack can be one dog living with his human family, or multiple dogs and their human family.

When the average pet owner gets a new dog the owner's first goal is to show the dog how much he likes the dog. This is the absolute opposite of how dogs think. When a dog meets another dog they will always establish their rank with each other before they become friends and play (or fight) with the new dog.

Rank within the Pack:

Dogs instinctively try to establish a rank within their family pack. The vast majority of dogs would rather not be a pack leader. In fact, many become stressed when they are forced into that position by a human pet owner that does not practice proper pack procedures.

Dominant dogs are dogs that have problems with pack and rank issues.

This DVD was produced to help people analyze their dog’s dominance and aggression problems. I provide the information for them to come up with a solution to those problems. These solutions include educating the owners on pack drive and rank drive.

Learning to be a Pack Leader:

Owners of dominant dogs don't have an option, they must learn to become pack leaders. Unfortunately, many people are not themselves leaders in their normal lives. Becoming a pack leader for some people is a foreign concept. In my DVD I explain a logical protocol for these pet owners to follow that will result in their dogs' changing the way they view their position in the family pack.

This DVD is a project I have been working on for over 5 years. In my opinion it may be the most important training DVD I have ever produced. More dogs are given up for adoption or euthanized every year because of dominance and aggression problems than any other reason. Not all of these dogs are salvageable but I believe the vast majority of dominance problems can controlled so that those dogs can live a better life with their family pack.

More Info:
http://leerburg.com/301.htm




http://rapidshare.com/files/228853870/booktraining.net__Leerburg_DominantDogs_UDS.part01.rar
http://rapidshare.com/files/228853960/booktraining.net__Leerburg_DominantDogs_UDS.part02.rar
http://rapidshare.com/files/228854133/booktraining.net__Leerburg_DominantDogs_UDS.part03.rar
http://rapidshare.com/files/228853879/booktraining.net__Leerburg_DominantDogs_UDS.part04.rar
http://rapidshare.com/files/228853692/booktraining.net__Leerburg_DominantDogs_UDS.part05.rar
http://rapidshare.com/files/228854141/booktraining.net__Leerburg_DominantDogs_UDS.part06.rar
http://rapidshare.com/files/228853821/booktraining.net__Leerburg_DominantDogs_UDS.part07.rar
http://rapidshare.com/files/228853848/booktraining.net__Leerburg_DominantDogs_UDS.part08.rar
http://rapidshare.com/files/228854083/booktraining.net__Leerburg_DominantDogs_UDS.part09.rar
http://rapidshare.com/files/228853784/booktraining.net__Leerburg_DominantDogs_UDS.part10.rar
http://rapidshare.com/files/228853965/booktraining.net__Leerburg_DominantDogs_UDS.part11.rar
http://rapidshare.com/files/228853846/booktraining.net__Leerburg_DominantDogs_UDS.part12.rar
http://rapidshare.com/files/228853841/booktraining.net__Leerburg_DominantDogs_UDS.part13.rar
http://rapidshare.com/files/228853847/booktraining.net__Leerburg_DominantDogs_UDS.part14.rar
http://rapidshare.com/files/228854125/booktraining.net__Leerburg_DominantDogs_UDS.part15.rar
http://rapidshare.com/files/228853828/booktraining.net__Leerburg_DominantDogs_UDS.part16.rar
http://rapidshare.com/files/228853705/booktraining.net__Leerburg_DominantDogs_UDS.part17.rar
http://rapidshare.com/files/228853902/booktraining.net__Leerburg_DominantDogs_UDS.part18.rar

Readme
Password default : booktraining.net

Leerburg's Puppy 8 Week to 8 Months - Dog Training Video



DVD Rip | English | 2.5hr | AVI (XVID 740x480 29.97fps 1500Kbps | MP3 44100Hz 2 Chan. Stereo 128Kbps) | 1.37GB

This training video answers all the questions new puppy owners have concerning the care of their new puppy. Ed Frawley has been breeding dogs since 1978 and has produced over 350 litters of working bloodline German Shepherd puppies.

Over the years Ed has been asked just about every question a new puppy owner can think to ask. This DVD was originally produced to be given to every Leerburg Puppy Customer. The intent was to help Leerburg Puppy Customers get through the first 8 months of the puppy's life.

Even though Leerburg only breeds German Shepherds, this new training video is not just for German Shepherds. It's an all-breed video. Your Puppy 8 Week to 8 Months is sold to breeders all over the country who breed many different kinds of dogs. These breeders then give the video to their puppy customers.

The Topics Covered in this DVD on Puppy Training are:

House Training Your Puppy and Selecting a Dog Crate

Puppies That Eat Their Stool

How and Where to Socialize Your Puppy
Dog Containment System
Pups in the House
Safe Toys
Socializing you pup
Controlling Your Puppy in Your House
Exercise for Pups
Communication Between You and Your Dog
Marker Training

Obedience Training Your Puppy

Training Puppy to Sit
Training Puppy to Down
Training Puppy to Come
Training Your Pup to Go for Walks on a Leash
Training the PLACE command

The Target Exercise - why it's so great
Training the Yuck Command - to spit things out that pup has picked up
Dealing with Puppies that Bite
Health Care for Your Pup
Selecting a Vet for your Puppy

Puppy Vaccinations

Vaccinosis - Be Aware of Over Vaccinating Your Puppy

Worming Your Puppy

Heart worms and Puppies

Fleas and Ticks on Dogs

Diarrhea in Puppies

Neutering

Heat Cycles in Female Dogs

When to Neuter Your Puppy is Discussed in Detail
Puppies' Teething Patterns
Grooming you pup
Trimming Nails and Cleaning Ears (an all-breed approach)
Behavioral Problems
Puppies Chewing

Puppies Digging

Puppies Jumping up on People
Excessive Dog Barking
Kids and Puppies
Raising Two Pups at the Same Time
Introducing Pups to Cats
Riding in the Car
Car Sickness

Feeding Your Puppy - We Recommend the All-Natural Diet

In-Ground Containment Systems

Your Puppy's Medical Needs
Where To Go From Here

Homepage
http://leerburg.com/




http://rapidshare.com/files/228848687/booktraining.net__P8t8_UDS.part01.rar
http://rapidshare.com/files/228848589/booktraining.net__P8t8_UDS.part02.rar
http://rapidshare.com/files/228848654/booktraining.net__P8t8_UDS.part03.rar
http://rapidshare.com/files/228848599/booktraining.net__P8t8_UDS.part04.rar
http://rapidshare.com/files/228848879/booktraining.net__P8t8_UDS.part05.rar
http://rapidshare.com/files/228848545/booktraining.net__P8t8_UDS.part06.rar
http://rapidshare.com/files/228848645/booktraining.net__P8t8_UDS.part07.rar
http://rapidshare.com/files/228848601/booktraining.net__P8t8_UDS.part08.rar
http://rapidshare.com/files/228848644/booktraining.net__P8t8_UDS.part09.rar
http://rapidshare.com/files/228848663/booktraining.net__P8t8_UDS.part10.rar
http://rapidshare.com/files/228848199/booktraining.net__P8t8_UDS.part11.rar
http://rapidshare.com/files/228848659/booktraining.net__P8t8_UDS.part12.rar
http://rapidshare.com/files/228848675/booktraining.net__P8t8_UDS.part13.rar
http://rapidshare.com/files/228848479/booktraining.net__P8t8_UDS.part14.rar
http://rapidshare.com/files/228848200/booktraining.net__P8t8_UDS.part15.rar

Readme
Password default : booktraining.net
This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at youzhny197@gmail.com, we will immediately respond to you.