Free Ebook Video Training

Thursday, July 9, 2009

Computer-Based Environmental Management


Computer-Based Environmental Management (Vom Wasser)
Wiley-VCH | ISBN: 352730732X | 300 pages | December 9, 2003 | PDF | 4 Mb

"This is a well-written and understandable book.... The author is to be commended on his effort." (Energy Sources, August 2004) "This book is a giant step forward in describing the development and use of environmental models..." (G.F Bennett Journal of Hazardous Materials, 108 March 2004) "Die Publikation von R. Seppelt bietet eine fundierte, reich mit Beispielen illustrierte Grundlage fur theoretische und praktische Aspekte der Umweltmodellierung, indem es mathematische Methoden mit Themen aus Umweltforschung und Okologie zusammenbringt und so Losungsansatze zu aktuellen Herausforderungen im Umweltmanagement vorstellt. Neueste Entwicklungen in der Umweltmodellierung sind ubersichtlich dargestellt." (Janine Bolliger, Schweizerische Zeitschrift fur Forstwesen, 5/04)

Link download

http://uploading.com/files/BQXRXG0K/booktraining.net_352730732X.rar.html


http://rapidshare.com/files/254003353/booktraining.net_352730732X.rar

MySQL (4th Edition) (Developer's Library)

MySQL (4th Edition) (Developer's Library)

Paul DuBois, «MySQL (4th Edition) (Developer's Library)»
Addison Wesley | ISBN: 0672329387 | 2008 | PDF | 1224 pages | 6.29 MB

In MySQL, Paul DuBois provides you with a comprehensive guide to one of the most popular relational database systems. As an important contributor to the online documentation for MySQL, Paul uses his day-to-day experience answering questions users post on the MySQL mailing list to pinpoint the problems most users and administrators encounter.

Link download

http://uploading.com/files/N4HPH29G/booktraining.net_ebook.MySQL_Developers_Library.0672329387.zip.html


http://rapidshare.com/files/253904299/booktraining.net_ebook.MySQL_Developers_Library.0672329387.zip

Microsoft Visual Studio 2008 Programming


Jamie Plenderleith, Steve Bunn "Microsoft Visual Studio 2008 Programming"
McGraw-Hill Osborne Media | English | 2009-03-23 | ISBN: 0071604081 | 442 pages | PDF | 10,8 MB


Take your Microsoft Visual Studio 2008 programming skills to the top tier

"A must-read for experienced developers who want to dive deeply into Visual Studio 2008. The authors provide practical guidance combined with real-world applicability. The best of Visual Studio 2008 uncovered-buy this book!" --Michelle Clarke, Program Manager, Microsoft Ireland

Maximize every powerful programming feature available in Visual Studio 2008 with expert instruction from two Microsoft MVPs. Through clear explanations and real-world code samples, Microsoft Visual Studio 2008 Programming reveals how to develop innovative, high-performance applications with C# and VB.NET. Learn how to deploy ADO.NET and WCF services, incorporate XML and Ajax scripts, build hack-resistant code, and much more. The latest security tools, visualizers, and debuggers are also covered in detail.

• Work with WinForms, JavaScript, and Windows Services
• Use extension methods, partial classes, and XML literals
• Handle database transactions with XSLT, ADO.NET, and LINQ
• Build mobile-ready and offline applications using Sync Services
• Manage Active Directory and Internet Information Services from code
• Defend against SQL injection and cross-site scripting attacks
• Learn from secure code guru Michael Howard how to take advantage of the security defenses in Visual C++
• Construct setup packages using ClickOnce and Windows Installer
• Cut development time using Visual Studio Team System and WPF

Link download

http://uploading.com/files/F36LVX3Q/booktraining.net_0071604081.rar.html

http://rapidshare.com/files/253903606/booktraining.net_0071604081.rar

John R. Goodall, Gregory Conti, Kwan-Liu Ma, "Visualization for Computer Security"


John R. Goodall, Gregory Conti, Kwan-Liu Ma, "Visualization for Computer Security"
Springer 2008 | ISBN-10: 3540859314 | 197 Pages | PDF | 33 MB

This book constitutes the refereed proceedings of the 5th International Workshop on Visualization for Cyber Security held on September 15, 2008, in Cambridge, Massachusetts, USA, in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection (RAID).

The 18 papers presented in this volume were carefully reviewed and selected from 27 submissions. VizSec research has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defence. This year paper focus on bridging the gap between visualization and automation.

D0wn10ad


Mirr0r

Computer Network Security


Computer Network Security
Springer; 1 edition | ISBN: 0387204733 | 538 pages | April 7, 2005 | PDF | 23 Mb

A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.

D0wn10ad


Mirr0r

WAP, Bluetooth, and 3G Programming: Cracking the Code

WAP, Bluetooth, and 3G Programming: Cracking the Code
Posted By : karapuzik | Date : 29 Jun 2009 20:06 | Comments : 0

WAP, Bluetooth, and 3G Programming: Cracking the Code
Wiley | 0764549057 | 1061 pages | November 15, 2001 | PDF | 7 Mb

This book brings you complete web application with design specifications, flow diagrams, and source code with line-by-line explanation. You'll build a completely functional web application and make it available to a wide range of devices. Cracking the Code includes coverage of client access from i-mode enabled devices, voice-enabled devices, WAP and HDML devices, and various cross-platform GUIs. The technologies covered include XML, XSLT, cHTML, HDML, XUL (XML-based user interfaces,) and Voice XML.

D0wn10ad

Mirr0r

Michael Erbschloe - Physical Security for IT


Michael Erbschloe - Physical Security for IT
Digital Press | 2004 | ISBN: 155558327X | Pages: 256 | PDF | 1.03 MB

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications.

Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.

* Expert advice on identifying physical security needs
* Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems
* Explanation of the processes for establishing a physical IT security function
* Step-by-step instructions on how to accomplish physical security objectives
* Illustrations of the major elements of a physical IT security plan
* Specific guidance on how to develop and document physical security methods and procedures

D0wn10ad


Mirr0r

Architecting Secure Software Systems


Architecting Secure Software Systems
456 pages | Auerbach Publications; 1 edition (December 12, 2008) | ISBN-10: 1420087843 | PDF | 3,4 Mb

Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach which allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation.


D0wn10ad


Mirr0r

Billy Hoffman, Bryan Sullivan, «Ajax Security»

Ajax Security

Billy Hoffman, Bryan Sullivan, «Ajax Security»
Addison Wesley | ISBN: 0321491939 | 2007 | PDF | 504 pages | 12.45 MB

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications aren’t designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need guidance on securing their applications: knowledge that’s been virtually impossible to find, until now.


D0wn10ad

Mirr0r

Owen Poole - Network Security: A Practical Guide


Owen Poole - Network Security: A Practical Guide
Butterworth-Heinemann | 2002 | ISBN: 0750650338 | Pages: 224 | PDF | 1.53 MB

Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, from
both an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization.

The book covers a broad range of issues, starting with an assessment of network security, including the financial implications of security breaches, and moving on to discuss the different types of security threats facing computer networks. Particular attention is also given to the legal framework for network security. Attention is then turned to increasing security awareness and readiness, including system configuration, acceptable use, business continuity, and explaining technical solutions available such as firewalls and content control.

Introduction of a security policy is widely accepted as best practise in informing and educating users, and the final chapter is devoted to policy writing. By the end of the book readers should be ready to create and implement a network security policy for their organization and start reducing overheads and downtime immediately!

*Discusses all the relevant issues with a concise, straightforward, and readily accessible approach.
*Important emphasis placed on the people management aspects of network security.
*Practical business oriented approach includes reference to legal and financial aspects of network security.
*Companion web site at www.networksecurity.org.uk includes updates, additional material, downloads, and links to resources and further information.

*Designed to walk the reader through computer network security issues with active participation through checklists and action plans for their completion
*Readers are encouraged to develop their ideas for the construction and implementation of a security policy throughout the book, covered in the final chapter
*Additional material provided on an accompanying web site

D0wn10ad
Download

Mirror1

Mirror2
Mirr0r

MCSA/MCSE Self-Paced Training Kit (Exam 70-299): Implementing and Administering Security in a Microsoft Windows Server 2003 Network


MCSA/MCSE Self-Paced Training Kit (Exam 70-299):
Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Microsoft Press | ISBN: 073562061X | 1200 pages | April 21, 2004 | PDF | 5 Mb

Announcing an all-new MCSA/MCSE Training Kit designed to help maximize your performance on Exam 70-299, one of two core exams for the MCSE: Security specialization and an elective for MCSA and MCSE. This kit packs the tools and features exam candidates want most#151;including in-depth, self-paced training based on exam content; exam tips from an expert, exam-certified author; and a robust testing suite. It also provides real-world scenarios, case study examples, and troubleshooting labs for the skills and expertise you can apply to the job. Focusing on implementing and administering network security in a Windows Server 2003 environment, the official study guide covers implementing, managing, and troubleshooting security policies, patch management infrastructure, security features for network communications, and planning, configuring, and troubleshooting authentication, authorization, and PKI.
Ace your exam preparation by working at your own pace through the lessons, hands-on exercises, and practice tests. The flexible, best-of-class testing suite features a test engine on CD with 325 practice questions. Choose timed or untimed testing mode, generate random tests or focus on discrete objectives or chapters, and get detailed explanations for right and wrong answers#151;including a customized learning path to enhance further study. You also get a 180-day evaluation version of Windows Server 2003 software#151;making this kit an exceptional value and a great career investment.


D0wn10ad


Mirr0r

Yang Xiao, Yi Pan - Security in Distributed and Networking Systems


Yang Xiao, Yi Pan - Security in Distributed and Networking Systems
World Scientific Publishing Company | 2007 | ISBN: 9812708073 | Pages: 493 | PDF | 7.63 MB

Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The book includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, security architectures and protocols, security theory and tools, secrecy and integrity, and trust models. This volume provides an excellent reference for students, faculty, researchers and people in the industry related to these fields.

D0wn10ad


Mirr0r

A Practical Guide to Ubuntu Linux(R)


A Practical Guide to Ubuntu Linux(R)
English | Prentice Hall PTR | December 28, 2007 | 1200 pages | ISBN : 013236039X,0132360395 | PDF | 7.7MB

Product Description:

Praise for A Practical Guide to Ubuntu Linux®

“I am so impressed by how Mark Sobell can approach a complex topic in such an understandable manner. His command examples are especially useful in providing a novice (or even advanced) administrator with a cookbook on how to accomplish real-world tasks on Linux. He is truly an inspired technical writer!”

–George Vish II, Senior Education Consultant, Hewlett-Packard Company

“Overall, I think it’s a great, comprehensive Ubuntu book that’ll be a valuable resource for people of all technical levels.”

–John Dong, Ubuntu Forum Council Member, Backports Team Leader

“The JumpStart sections really offer a quick way to get things up and running, allowing you to dig into the details of his books later.”

–Scott Mann, Aztek Networks



“Ubuntu is gaining popularity at the rate alcohol did during prohibition, and it’s great to see a well-known author write a book on the latest and greatest version. Not only does it contain Ubuntu-specific information, but it also touches on general computer-related topics, which will help the average computer user to better understand what’s going on in the background. Great work, Mark!”

–Daniel R. Arfsten, Pro/ENGINEER Drafter/Designer

D0wn10ad


Mirr0r

GNU/Linux Application Programming (Programming Series)


GNU/Linux Application Programming (Programming Series)
English | Charles River Media | 2005-02-02 | 512 pages | ISBN : 1584503718 | PDF | 2.41MB

Book Description:

The wide range of applications available in GNU/Linux includes not only pure applications, but also tools and utilities for the GNU/Linux environment. GNU/Linux Application Programming takes a holistic approach to teaching developers the ins-and-outs of GNU/Linux programming using APIs, tools, communication, and scripting. Covering a variety of topics related to GNU/Linux application programming, the book is split into six parts: The GNU/Linux Operating System, GNU Tools, Application Development, Advanced Topics (including communication and synchronization and distributed computing), Debugging GNU/Linux Applications, and Scripting. The book introduces programmers to the environment from the lowest layers (kernel, device drivers, modules) to the user layer (applications, libraries, tools), using an evolutionary approach that builds on knowledge to cover the more complex aspects of the operating system. Through a readable, code-based style developers will learn about the relevant topics of file handling, pipes and sockets, processes and POSIX threads, inter-process communication, and other development topics. After working through the text, theyíll have the knowledge base and skills to begin developing applications in the GNU/Linux environment.

Download


Mirror

UNIX(R) Shells by Example 4th Edition 2004-09 [includes link to CD contents]


UNIX(R) Shells by Example 4th Edition 2004-09 [includes link to CD contents]
English | Prentice Hall PTR | 4 edition (October 4, 2004) | 1200 pages | ISBN : 013147572X,0131475724 | PDF | 2.77MB

Book description :
The second edition of Unix Shells by Examples shows off basic commands and utilities in the three most popular Unix shells--C, Bourne, and Korn--with side-by-side examples. The new edition of this book is sure to be a worthy reference for Unix programmers for getting around their favorite shell.

The best thing in this new edition is that the author presents short, effective examples of using basic commands and utilities for each of the three major Unix shells. This comparative approach means that you can use this book on different flavors of Unix and even migrate scripts between different shells. For each shell, the author provides fundamentals, like accessing profiles, command-line histories, and shell programming. "Lab sections" let you develop your skills with short, hands-on exercises for each shell. As in the earlier edition, the author's short examples show you how to perform basic tasks quickly with common switches and options.

Other sections here cover three major Unix utilities: grep (for searching), sed (for editing), and awk (for scripting and reporting). (The reference and tutorial on AWK programming is a notable feature here. There is also good coverage of regular expressions.)

Instead of hunting down information in countless man pages, this book will save you valuable time every day with its efficient format and comparative approach--truly useful features for the beginning and intermediate Unix user. --Richard Dragan

Download


Mirror

Integrating Excel and Access


Integrating Excel and Access
O'Reilly Media, Inc. | ISBN: 0596009739 | 232 pages | November 1, 2005 | CHM | 4 Mb

In a corporate setting, the Microsoft Office Suite is an invaluable set of applications. One of Offices' biggest advantages is that its applications can work together to share information, produce reports, and so on. The problem is, there isn't much documentation on their cross-usage. Until now. Introducing Integrating Excel and Access, the unique reference that shows you how to combine the strengths of Microsoft Excel with those of Microsoft Access. In particular, the book explains how the powerful analysis tools of Excel can work in concert with the structured storage and more powerful querying of Access. The results that these two applications can produce together are virtually impossible to achieve with one program separately.

But the book isn't just limited to Excel and Access. There's also a chapter on SQL Server, as well as one dedicated to integrating with other Microsoft Office applications. In no time, you'll discover how to:
* Utilize the built in features of Access and Excel to access data
* Use VBA within Access or Excel to access data
* Build connection strings using ADO and DAO
* Automate Excel reports including formatting, functions, and page setup
* Write complex functions and queries with VBA
* Write simple and advanced queries with the Access GUI
* Produce pivot tables and charts with your data

With Integrating Excel and Access, you can crunch and visualize data like never before. It's the ideal guide for anyone who uses Microsoft Office to handle data.

Download

Mirror

Programming Ruby 1.9: The Pragmatic Programmers' Guide (Facets of Ruby)


Programming Ruby 1.9: The Pragmatic Programmers' Guide (Facets of Ruby)
Pragmatic Bookshelf | 3rd Edition | 2009 | ISBN 1934356085 | 1000 Pages | PDF | 5.66 MB


This is the reference manual for Ruby, including a description of all the standard library modules, a complete reference to all built-in classes and modules (including all the new and changed methods introduced by Ruby 1.9). It also includes all the new and changed syntax and semantics introduced since Ruby 1.8. Learn about the new parameter passing rules, local variable scoping in blocks, fibers, multinationalization, and the new block declaration syntax, among other exciting new features.

Link download

http://uploading.com/files/CBVIEX5X/booktraining.net_Ruby_Prog.pdf.html

http://rapidshare.com/files/253740663/booktraining.net_Ruby_Prog.pdf

Multitool Linux: Practical Uses for Open Source Software


Multitool Linux: Practical Uses for Open Source Software
Pearson Education; 1st edition | ISBN: 0201734206 | 576 pages | May 7, 2002 | CHM | 6 Mb

This resource-packed guide delivers pragmatic solutions for real-world Linux development needs—all using open-source software tools. Viewing Linux as a well-stocked toolbox, Multitool Linux shows programmers and sophisticated users how to create a wide variety of exciting and useful applications for business and entertainment, from speech synthesis and video production to network security.

The book begins with a general introduction to Linux and a look at working with its source code. A wide variety of programming projects—encompassing communications, privacy, music and audio, graphics, photography, and much more—are then explored in-depth. Each chapter is filled with examples, helpful screenshots, step-by-step tutorials, lists of open-source tools, and URLs for sites where those tools can be obtained for free.

Many of the tools discussed in the book will work not only with Linux, but with any flavor of UNIX—from FreeBSD up to expensive, proprietary versions of UNIX running on high-speed massively parallel hardware.

Multitool Linux shows you how to:
* Control your computer remotely, from anywhere, at anytime, with any operating system
* Run a whole network with one IP address
* Communicate with Windows networks using Samba (SMB)
* Extend Apache
* Build a secure Webmail service supporting IMAP and SSL
* Secure e-mail with GPG
* Integrate your palm-connected organizer
* Process images with GIMP and Imagemagick
* And much more

Download


Mirror

LPIC-1: Linux Professional Institute Certification Study Guide (Level 1 Exams 101 and 102)


LPIC-1: Linux Professional Institute Certification Study Guide (Level 1 Exams 101 and 102)
Sybex | ISBN: 078214425X | 656 pages | September 30, 2005 | PDF | 10 Mb

LPIC-1 Linux Professional Institute Certification Study Guide

Here's the book you need to prepare for the LPI Level 1 exams from Linux Professional Institute. This study guide was developed to meet the exacting requirements of today's certification candidates, and has been reviewed and designated as LPI Approved Training Material. In addition to the consistent and accessible instructional approach that readers have come to expect from Sybex, this book provides:
* Clear and concise information on Linux technologies and topics
* Practical examples and insights drawn from real-world experience
* Coverage of key topics such as security, the boot process and scripts, and kernel maintenance tools
* Linux compatible exam preparation software, including a testing engine and electronic flashcards for your Palm

You'll find authoritative coverage of key exam topics including:
* Linux command line tools
* Using regular expressions
* Managing shared libraries
* Configuring hardware
* Designing a hard disk layout
* Creating partitions and file systems
* Configuring X Window system
* Managing GUI logins
* Customizing a desktop environment
* Creating a custom kernel
* Managing the shell environment
* Configuring a boot loader
* Managing servers
* Configuring Samba


D0wnload


Mirror

Microsoft Exchange Server 2003 Distilled (The Addison-Wesley Microsoft Technology Series)


Microsoft Exchange Server 2003 Distilled (The Addison-Wesley Microsoft Technology Series)
Addison-Wesley Professional | ISBN: 032124592X | 592 pages | March 16, 2004 | CHM | 5 Mb

Nearly three years in the making, Exchange Server 2003 is the most reliable and secure messaging solution that Microsoft has ever produced. Microsoft Exchange Server 2003 Distilled is a practical, hands-on guide designed to bring readers quickly up to speed on the latest changes and enhancements to the leading e-mail server. Drawing on his involvement in Microsoft’s Exchange Server 2003 Joint Development Program, author Scott Schnoll offers the detailed technical information that Exchange administrators need to know. He has a clear and concise style, and focuses on what’s new, what’s improved, and what’s been removed from Exchange Server 2003. Throughout the book Scott illustrates key points with real-world scenarios, and provides best practices drawn from his years of experience working with Exchange.


Download

Mirror

Implementing Service Quality in IP Networks


Implementing Service Quality in IP Networks
Wiley | ISBN: 047084793X | 312 pages | March 31, 2003 | PDF | 1 Mb

While more and more data is shifted from circuit-switched to packet-switched networks, the users of these networks expect a smooth, continuously unproblematic service (unrelated to the amount of data transported). Therefore, the reliability of a network as well as the satisfaction of its users relies largely on Quality of Service (QoS). Service quality through resource management in IP networks will ensure that sufficient resources are available to fulfil the delay of applications and packet loss requirements.
This year several books on QoS from the angle of operators/engineers have been published HOWEVER, none of these titles tackle the management side of the problem. This book shows how to determine quality requirements of services, it discusses and considers the various means of allocating network resources and of supervising the service quality. Furthermore, it explores strategies for allocating network resources and their relation to revenue or operator utility as well as service allocation optimization. The book concludes with a Nokia case study that illustrates the previously mentioned concepts.

Essential reading for networking professionals wishing to understand service quality management in IP networks, as well as students needing to understand principles and basic techniques of service quality management.

Download


Mirror

MODx Web Development


MODx Web Development
250 pages | Packt Publishing (April 10, 2009) | 1847194907 | PDF | 5 Mb

Building dynamic websites with the PHP application framework and CMS
Simple, step-by-step instructions detailing how to install, configure, and customize MODx
Covers detailed theory from the basics, to practical implementation
Learn the most common web requirements and solutions, and build a site in the process

MODx is a content management system and PHP web application framework rolled into one. With the ease of a CMS and the extensibility of a framework, MODx allows you to develop professional-looking, intricate websites with its easy-to-use interface and flexible architecture. MODx provides reusable code called snippets most of which are so generic that, without any modification, they can serve multiple functionalities. The generic nature of the snippets makes it possible to get the perfect customization that is so hard in other content management systems.

This book will get web developers up-and-running with MODx. With step-by-step examples and illustrative screenshots, you will be guided through installation, configuration, and customization. By the end of the book, you will have created a powerful, dynamic website by using the individual elements of MODx, without the need for programming know-how.

Starting with a walk-through of installing MODx, you will quickly learn how to develop your site without having to use any programming language. Logical, step-by-step instructions will show you how to create your own unique site by adding and editing documents using the inbuilt TinyMCE editor. Change the look and feel of your site by creating your own templates using HTML, CSS, and widgets. By following the example of a blog site, you will learn how to extend your templates to allow rich user interactions through comments, posts, and forms. The book teaches a few core snippets such as Ditto and Wayfinder in detail. These powerful and flexible snippets will enable you to add multiple functionalities to your site. The book will also introduce you to many more snippets which will help you build some of the commonly required web functionalities such as forums and image galleries. Manage your users with authentication and authorization and make your site user-friendly with user groups, forums, and the use of PHx notations to embed logic in templates.

Through following this easy-to-use, step-by-step guide, by the end of the book you will have a fully functional, feature-rich MODx site with professional-looking, dynamic web pages that are totally customizable.

What you will learn from this book?
Build a complete, feature-rich website using MODx
Manage content easily using documents and containers
Manage users and access with authentication and authorization
Create templates to customize the look of your site
Learn how to enhance your website quickly with dynamic content such as recent posts and dynamic menus using core snippets
Learn the powerful templating language PHx to extend logic to templates
Use custom snippets to add more functionality such as forums and image galleries
Learn to create your own snippet for unique functionalities
Deploy a search-engine-optimized and secure site

Download


Mirror

Paul R. Reed, Developing Applications with Java and UML

Developing Applications with Java and UML

Paul R. Reed, «Developing Applications with Java and UML»
Addison Wesley | ISBN: 0201702525 | 2002 | PDF | 504 pages | 4.88 MB

Developing Applications with Java™ and UML focuses on the craft of creating quality Java software. The book introduces the fundamentals of the Unified Modeling Language (UML) and demonstrates how to use this standard object-oriented notation to build more robust Java applications that fulfill user requirements and withstand the test of time.




Mirr0r


Mirror

Wireless Internet Security: Architecture and Protocols (repost)


Wireless Internet Security: Architecture and Protocols (repost)
James Kempf | ISBN: 0521887836 | PDF | 224 pages | Oct 2008 | 5 MB

In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems. Kempf also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, security threats, functional architecture, and the important internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry.


Download

Mirror

Maximizing ASP.NET Real World, Object-Oriented Development

Maximizing ASP.NET Real World, Object-Oriented Development

Jeffrey Putz, «Maximizing ASP.NET Real World, Object-Oriented Development»
Addison Wesley | ISBN: 0321294475 | 2005 | CHM | 336 pages | 4.66 MB

Using ASP.NET, you can build Web applications that deliver unprecedented power and performance. But to make the most of ASP.NET, Web developers need to think and work very differently from the ways they've programmed in the past. In Maximizing ASP.NET Jeffrey Putz helps you make the transitionand reap the rewards.


D0wn10ad

Mirr0r

Scripting in Java: Languages, Frameworks, and Patterns

Scripting in Java: Languages, Frameworks, and Patterns

Dejan Bosanac, «Scripting in Java: Languages, Frameworks, and Patterns»
Addison Wesley | ISBN: 0321321936 | 2007 | PDF | 552 pages | 3.07 MB

Java is an excellent object-oriented programming language. It has provided many benefits to software developers, including a good object-oriented approach, implicit memory management, and dynamic linking, among others. These language characteristics are one of the main reasons for Java’s popularity and wide acceptance.


D0wnl0ad


Mirr0r


Microsoft Word XP - Erster Band: Schulungsbuch mit Ãœbungen inklusive Diskette mit Ãœbungstexten

Microsoft Word XP - Erster Band: Schulungsbuch mit Ãœbungen inklusive Diskette mit Ãœbungstexten
Posted By : Book-er | Date : 09 Jul 2009 07:03 | Comments : 0

Peter Schiessl "Microsoft Word XP - Erster Band: Schulungsbuch mit Ãœbungen inklusive Diskette mit Ãœbungstexten"
Kami Print | German | 2001-12 | ISBN: 3931857697 | 191 pages | PDF | 2,7 MB


Durch die Einteilung in drei Bände und die vielen Übungen kann der Stoff Schritt für Schritt und aufbauend vermittelt werden, so daß die Leser effektiv an den Umgang mit Word herangeführt werden. Im ersten Band finden Sie: Wiederholung Windows-Grundlagen: Ordner u. Dateien, Tastatur u. Maus, Fenstertechnik, Start-Leiste, Grundtechniken der Textverarbeitung: Markieren, Absatz- und Schrift-Einstellungen, Kopieren und einfügen, Seite einrichten, Einen Brief erstellen, Word-Hilfen: Silbentrennung, Rechtschreibprüfung, Sonderzeichen, Texte ansprechend gestalten: Spezielle Absätze: hängender Absatz, Aufzählungen, Bullet, Rahmen, Füllung, Farbe, Format übertragen, Spezielle Formatierungen: AutoText, Tabulatoren und Tabellen, WordArt, Weiteres: Die Hilfe nutzen, Datensicherung, Word installieren. Abschließende Bemerkung: MS Word kann inzwischen fast von jeder Programmgattung etwas: Texte schreiben bis hin zu Büchern oder professionellem Computersatz, Grafiken entwerfen oder Bilder einbauen, Titelblätter mit Photos als Hintergrund gestalten, Berechnungen in Tabellen, eine Datenbank erstellen und als Serienbrief mit differenzierter Anrede auswerten. Damit ist MS Word wegen dieser Funktionsvielfalt auch zu einem der schwierigsten Programme geworden. Deshalb ist es äußerst wichtig, bei der Schulung systematisch vorzugehen. Unsere drei Word-Bände bereiten optimal und auf den Anwendungsfall zugeschnitten für den Umgang mit Word vor. Mindestbestellmenge: 1 Lieferzeit: 48 h Texte formatieren, ein Brief, die erste Tabelle usw. Band I für Anfänger Mit 189 DIN-A4 Seiten, entspricht bei besserer Übersichtlichkeit über 300 Seiten im Buchformat. Mit stabiler Drahtringbindung zum Umschlagen der Seiten.

D0wn10ad

Mirr0r

Mobile Commerce Application Development


Lei-da Chen, "Mobile Commerce Application Development"
IRM Press | 2005 | ISBN: 1591408067 | 319 pages | PDF | 8 MB

As wireless and mobile technologies become more and more prevalent in businesses and our daily lives, organizations are starting to heavily invest in developing infrastructure and applications for mobile commerce. Wireless technologies allow users to overcome spatial and temporal constraints when communicating, computing, and conducting business transactions. Mobile Commerce Application Development provides in-depth coverage of the various tools and techniques for developing wireless and mobile applications. The coverage offers readers a working knowledge of the technologies that can be readily applied in their work. Mobile Commerce Application Development serves as an excellent instructional or self-teaching resource by providing clear learning objectives, step-by-step instructions, illustrations, real-world cases, and end-of-chapter exercises and projects.

Link download

http://uploading.com/files/SK08W7HW/booktraining.net_MobileApplicationDevelopment.rar.html

http://rapidshare.com/files/253671381/booktraining.net_MobileApplicationDevelopment.rar

HTML und XHTML Sprachen des Webs aufbereiten und praesentieren


HTML und XHTML Sprachen des Webs aufbereiten und praesentieren
DPunkt Verlag | 2003 | ISBN: 3932588584 | 5 MB | PDF | 331 Seiten | German


5. Auflage

Die Sprachen des Web: HTML und XHTML setzt auf detaillierte Gründlichkeit und einen lückenlosen Erklärungsansatz: Wissenswerte Anmerkungen zur Entwicklung des Webs und eine allgemeine Kurzeinführung in Auszeichnungssprachen treffen sich zur Lingua Franca HTML in der Version 4.0. Aufbauend von Dokumentenstruktur und Seitenaufbau führt der Autor standardmäßig durch Textauszeichnung und -strukturen, Formulare und Grafiken, Imagemaps, Tabellen, Frames, Netscape Layers und Cascading Style Sheets. Neben den Erklärungen, Source Codes und Anwendungsbeispielen werden hier aktuelle Angaben zur Browserkompatibilität (Netscape Navigator 4.5, Internet Explorer 5, Opera, Lynx 2.7) gemacht.

Der zweite Teil des Buches öffnet mit grundlegenden Erklärungen zu XML und einem Ausblick auf XHTML, das anwendungsspezifische Erweiterungen von HTML möglich machen wird und nicht nur vom W3-Konsortium als die nächste Stufe der Mark-Up-Languages gehandelt wird. Weitere Kapitel erklären in Ansätzen HTTP und CGIs; Stilempfehlungen für "sauberes" HTML und gut aufgebaute Seiten sowie Anmerkungen zu HTML-Editoren, Textkonvertern und Wartungsprogrammen geben Orientierung und Ratschläge zum Aufbau des eigenen HTML-Arbeitsplatzes.

Link download

http://uploading.com/files/HFOVU3QB/booktraining.net_3898641554.rar.html

http://rapidshare.com/files/253671353/booktraining.net_3898641554.rar

Embedded Systems: Desktop Integration (Wordware Applications Library)


Embedded Systems: Desktop Integration (Wordware Applications Library)
400 pages | Wordware Publishing, Inc.; illustrated edition edition (June 25, 2005) | 1556229941 | PDF | 5 Mb

Embedded Systems: Desktop Integration explores designing embedded systems and monitoring and controlling them from desktop systems. Through the step-by-step development of an embedded thermostat, readers learn how to implement three different hardware interfaces: RS-232, USB, and Ethernet. Several different components are used to provide the reader with alternative hardware solutions.

Additionally, three different types of microcontrollers are used to implement the intelligence in the thermostat: the BASIC Stamp, the dsPIC, and the Cypress PSoC. Monitor and control software is developed for Windows, Linux, and the BSD operating Systems. Several cross-platform tools are explored including wxWindows, Borland Delphi and Kylix, and C++BuilderX, and there is even a section on how to make your own printed circuit boards.

Link download

http://uploading.com/files/OESPBVUL/booktraining.net_1556229941.zip.html

http://rapidshare.com/files/253245712/booktraining.net_1556229941.zip

Drupal 6: Ultimate Community Site Guide


Drupal 6: Ultimate Community Site Guide
149 pages | MSc MIS (2009) | 978-2839904902 | PDF | 4 Mb

Published by Holistic Vibes Sarl in 2009, the book was written by Dorien Herremans, an independent Web developer in Belgium who holds an MSc degree in MIS from the University of Antwerp, and has lectured in IT and 3D computer animation at Les Roches University of Applied Sciences, in Bluche, Switzerland. Her Drupal story is no doubt similar to that of many other Web developers: After building numerous sites in Drupal, she decided to create a new community site — in this case, Raw Vegan Dating. She was well aware that other CMSs offered fairly sophisticated modules that could be dropped into a fresh CMS installation, thereby creating a new community site instantly. But that approach generally requires one to accept the functional limitations of the chosen module, or start hacking the module's code (which for most modules is poorly written and equally poorly documented), with no guarantee that one's modifications will even work. Dorien instead opted for Drupal's flexibility, but found the development process rather difficult and time-consuming, partly because of some technical issues that arose: How can one easily create advanced profiles in Drupal? Can one add a photo gallery to each profile? Ultimately, these lead to a much broader question: Is it possible to build a feature-rich community/dating site using only core and contributed modules, without having to make any modifications to them?

Link download

http://uploading.com/files/IQ8JESFQ/booktraining.net_9782839904902.rar.html

http://rapidshare.com/files/253635900/booktraining.net_9782839904902.rar

Visual Modeling with Rational Rose 2000 and UML


Visual Modeling with Rational Rose 2000 and UML

Terry Quatrani, «Visual Modeling with Rational Rose 2000 and UML»
Addison Wesley | ISBN: 0201699613 | 1999 | CHM | 288 pages | 2.07 MB

Visual Modeling with Rational Rose 2000 and UML is a comprehensive introduction and tutorial providing guidance on how to use a tool (Rational Rose 2000), a process (the Rational Unified Process), and a language (the UML) to successfully visualize, specify, document, and construct a software system. Written by the Rose Evangelist at Rational Software Corporation, a leader in UML and object technology, this book breaks the technology down to its essentials and provides clear explanations of each element. It follows a simplified version of the Rational Unified Process from project inception through system analysis and design. A sample case study running throughout the book illustrates this iterative development process, the UML in practice, and the application of Rational Rose. New appendices demonstrate code generation and reverse engineering using Rational Rose 2000 with the Visual C++, C++, and Visual Basic languages.


D0wnl0ad


Mirror


Mirr0r

Windows Sockets Network Programming

Windows Sockets Network Programming

Bob Quinn, David Shute, «Windows Sockets Network Programming»
Addison Wesley | ISBN: 0201633728 | 1995 | PDF | 656 pages | 2.82 MB

Windows Sockets Network Programming is geared for novice and experienced network programmers alike. The early chapters provide a tutorial that brings novices up to speed quickly, and the remainder provides a detailed reference, with examples. These include complete source code for a number of useful applications, including an ftp client. Other topics covered include: how to create a dynamic link library to run over WinSock, how to port existing BSD Sockets source code to WinSock, and how/when to use WinSock's optional features. It also details debugging techniques and tools.


D0wnl0ad


Mirr0r


Mirr0r

The Practical SQL Handbook: Using SQL Variants (4th Edition)

The Practical SQL Handbook: Using SQL Variants (4th Edition)

Judith S. Bowman, «The Practical SQL Handbook: Using SQL Variants (4th Edition)»
Addison Wesley | ISBN: 0201703092 | 2001 | CHM | 512 pages | 1.51 MB

The Practical SQL Handbook begins with a step-by-step introduction to SQL basics and examines the issues involved in designing SQL-based database applications. It fully explores SQL’s most popular implementations from industry leaders, Oracle, Microsoft, Sybase, and Informix.


D0wnl0ad


Mirr0r


Mirr0r

Pure Java 2


Pure Java 2
Sams | 2000 | ISBN: 0672316544 | 816 pages | PDF | 3 MB

Pure Java 2 is a substantial and focused reference for professional Java programmers. This book begins with an accelerated introduction to Java 2 so that you can quickly understand the new concepts and begin developing your own applications. Professional programmers prefer to learn by examining code, so Pure Java 2 also contains hundreds of programming techniques, complete with well-commented code examples that you can immediately use in your own Java programs.

D0wnl0ad


Mirror


Mirr0r

Integrating Excel and Access


Integrating Excel and Access
O'Reilly Media, Inc. | ISBN: 0596009739 | 232 pages | November 1, 2005 | CHM | 4 Mb

In a corporate setting, the Microsoft Office Suite is an invaluable set of applications. One of Offices' biggest advantages is that its applications can work together to share information, produce reports, and so on. The problem is, there isn't much documentation on their cross-usage. Until now. Introducing Integrating Excel and Access, the unique reference that shows you how to combine the strengths of Microsoft Excel with those of Microsoft Access. In particular, the book explains how the powerful analysis tools of Excel can work in concert with the structured storage and more powerful querying of Access. The results that these two applications can produce together are virtually impossible to achieve with one program separately.

But the book isn't just limited to Excel and Access. There's also a chapter on SQL Server, as well as one dedicated to integrating with other Microsoft Office applications. In no time, you'll discover how to:
* Utilize the built in features of Access and Excel to access data
* Use VBA within Access or Excel to access data
* Build connection strings using ADO and DAO
* Automate Excel reports including formatting, functions, and page setup
* Write complex functions and queries with VBA
* Write simple and advanced queries with the Access GUI
* Produce pivot tables and charts with your data

With Integrating Excel and Access, you can crunch and visualize data like never before. It's the ideal guide for anyone who uses Microsoft Office to handle data.

D0wnload


Mirr0r


Mirror

Wireless Internet Security: Architecture and Protocols (repost)


Wireless Internet Security: Architecture and Protocols (repost)
James Kempf | ISBN: 0521887836 | PDF | 224 pages | Oct 2008 | 5 MB

In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems. Kempf also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, security threats, functional architecture, and the important internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry.

Link download

http://uploading.com/files/APHQ6A8X/booktraining.net_H4096843809864.rar.html

http://rapidshare.com/files/253635898/booktraining.net_H4096843809864.rar

PMP Exam Prep, Sixth Edition: Rita's Course in a Book for Passing the PMP Exam


Rita Mulcahy, PMP, "PMP Exam Prep, Sixth Edition: Rita's Course in a Book for Passing the PMP Exam"
RMC Publications, Inc. | 2009-04-10 | ISBN: 1932735186 | 544 pages | PDF | 18,9 MB

Can you imagine valuing a book so much that you send the author a Thank You letter?

Hundreds of thousands of project managers understand why PMP Exam Prep by Rita Mulcahy, PMP, is a worldwide best-seller. Is it Rita's years of PMP exam preparation experience? The endless hours of ongoing research? The interviews with project managers who failed the exam, to identify gaps in their knowledge? Or is it the razor-sharp focus on making sure project managers don't waste a single minute of their time studying any more than they absolutely have to? Actually, it's all of the above.

PMP Exam Prep, Sixth Edition by Rita Mulcahy contains hundreds of updates and improvements from previous editions--including new exercises and sample questions never before in print. Offering hundreds of sample questions, critical time-saving tips plus games and activities available nowhere else, this book will help you pass the PMP exam on your FIRST try.

Link download
http://uploading.com/files/SE8H09IW/booktraining.net_1932735186.rar.html

http://rapidshare.com/files/253635903/booktraining.net_1932735186.rar

Coding for Data and Computer Communications

Coding for Data and Computer Communications

Coding for Data and Computer Communications
Springer | ISBN: 0387212450 | April 12, 2005 | 552 pages | PDF | 35 MB

Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area. "Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the core concepts, principles, and methods of channel codes ( for error correction), source codes (for compressing data), and secure codes (for cryptography, data hiding, and privacy). Conveniently organized and segmented into three associated parts for these coding types, the book examines the most important approaches and techniques used to make the storage and transmission of information (data) fast, secure, and reliable. Topics and features: *Integrates the disciplines of error control, data compression, and cryptography and data hiding *Presents material in a logical, clear, and lively way for rapid learning *Highly inclusive, balanced coverage for specialists and nonspecialists *Contains a chapter on the rarely covered topic of check digits *Provides numerous examples, illustrations, and other helpful learning aids An essential resource and monograph for all security researchers and professionals who need to understand and effectively use coding employed in computers and data communications. Anchored by a clear, nonmathematical exposition, the book presents all the major topics, principles, and methods in an accessible style suitable for professional specialists, nonspecialists, students, and individual self-study.

Link download

http://uploading.com/files/6HWWXN23/booktraining.net_Codc.rar.html


http://rapidshare.com/files/253528857/booktraining.net_Codc.rar

A Practical Guide to Ubuntu Linux(R)


A Practical Guide to Ubuntu Linux(R)
English | Prentice Hall PTR | December 28, 2007 | 1200 pages | ISBN : 013236039X,0132360395 | PDF | 7.7MB

Product Description:

Praise for A Practical Guide to Ubuntu Linux®

“I am so impressed by how Mark Sobell can approach a complex topic in such an understandable manner. His command examples are especially useful in providing a novice (or even advanced) administrator with a cookbook on how to accomplish real-world tasks on Linux. He is truly an inspired technical writer!”

–George Vish II, Senior Education Consultant, Hewlett-Packard Company

“Overall, I think it’s a great, comprehensive Ubuntu book that’ll be a valuable resource for people of all technical levels.”

–John Dong, Ubuntu Forum Council Member, Backports Team Leader

“The JumpStart sections really offer a quick way to get things up and running, allowing you to dig into the details of his books later.”

–Scott Mann, Aztek Networks



“Ubuntu is gaining popularity at the rate alcohol did during prohibition, and it’s great to see a well-known author write a book on the latest and greatest version. Not only does it contain Ubuntu-specific information, but it also touches on general computer-related topics, which will help the average computer user to better understand what’s going on in the background. Great work, Mark!”

Link download

http://uploading.com/files/SITB68MF/booktraining.net_013236039x.rar.html

http://rapidshare.com/files/253528824/booktraining.net_013236039x.rar

Fundamental Data Compression


Fundamental Data Compression
Butterworth-Heinemann | ISBN: 0750663103 | 256 pages | December 28, 2005 | PDF | 11 Mb

Fundamental Data Compression provides all the information students need to be able to use this essential technology in their future careers. A huge, active research field, and a part of many people's everyday lives, compression technology is an essential part of today's Computer Science and Electronic Engineering courses. With the help of this book, students can gain a thorough understanding of the underlying theory and algorithms, as well as specific techniques used in a range of scenarios, including the application of compression techniques to text, still images, video and audio. Practical exercises, projects and exam questions reinforce learning, along with suggestions for further reading.
* Dedicated data compression textbook for use on undergraduate courses
* Provides essential knowledge for today's web/multimedia applications
* Accessible, well structured text backed up by extensive exercises and sample exam questions

Link download

http://uploading.com/files/2BIXEK5L/booktraining.net_0750663103.rar.html


http://rapidshare.com/files/253245702/booktraining.net_0750663103.rar

MODx Web Development


MODx Web Development
250 pages | Packt Publishing (April 10, 2009) | 1847194907 | PDF | 5 Mb

Building dynamic websites with the PHP application framework and CMS
Simple, step-by-step instructions detailing how to install, configure, and customize MODx
Covers detailed theory from the basics, to practical implementation
Learn the most common web requirements and solutions, and build a site in the process

MODx is a content management system and PHP web application framework rolled into one. With the ease of a CMS and the extensibility of a framework, MODx allows you to develop professional-looking, intricate websites with its easy-to-use interface and flexible architecture. MODx provides reusable code called snippets most of which are so generic that, without any modification, they can serve multiple functionalities. The generic nature of the snippets makes it possible to get the perfect customization that is so hard in other content management systems.

This book will get web developers up-and-running with MODx. With step-by-step examples and illustrative screenshots, you will be guided through installation, configuration, and customization. By the end of the book, you will have created a powerful, dynamic website by using the individual elements of MODx, without the need for programming know-how.

Starting with a walk-through of installing MODx, you will quickly learn how to develop your site without having to use any programming language. Logical, step-by-step instructions will show you how to create your own unique site by adding and editing documents using the inbuilt TinyMCE editor. Change the look and feel of your site by creating your own templates using HTML, CSS, and widgets. By following the example of a blog site, you will learn how to extend your templates to allow rich user interactions through comments, posts, and forms. The book teaches a few core snippets such as Ditto and Wayfinder in detail. These powerful and flexible snippets will enable you to add multiple functionalities to your site. The book will also introduce you to many more snippets which will help you build some of the commonly required web functionalities such as forums and image galleries. Manage your users with authentication and authorization and make your site user-friendly with user groups, forums, and the use of PHx notations to embed logic in templates.

Through following this easy-to-use, step-by-step guide, by the end of the book you will have a fully functional, feature-rich MODx site with professional-looking, dynamic web pages that are totally customizable.

What you will learn from this book?
Build a complete, feature-rich website using MODx
Manage content easily using documents and containers
Manage users and access with authentication and authorization
Create templates to customize the look of your site
Learn how to enhance your website quickly with dynamic content such as recent posts and dynamic menus using core snippets
Learn the powerful templating language PHx to extend logic to templates
Use custom snippets to add more functionality such as forums and image galleries
Learn to create your own snippet for unique functionalities
Deploy a search-engine-optimized and secure site


D0wnl0ad


Mirror


Mirr0r

The Guru's Guide to SQL Server Architecture and Internals

The Guru's Guide to SQL Server Architecture and Internals

Ken Henderson, «The Guru's Guide to SQL Server Architecture and Internals»
Addison Wesley | ISBN: 0201700476 | 2003 | CHM | 1072 pages | 1.63 MB

The latest book from the highly regarded and best-selling author Ken Henderson, The Guru's Guide to SQL Server Architecture and Internals is the consummate reference to Microsoft SQL Server. Picking up where documentation and white papers leave off, this book takes an all-inclusive approach to provide the most depth and breadth of coverage of any book on SQL Server architecture, internals, and tuning.


D0wnl0ad


Mirror


Mirr0r
This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at youzhny197@gmail.com, we will immediately respond to you.