Free Ebook Video Training

Thursday, July 16, 2009

Perl Hacks Tips & Tools for Programming


Perl Hacks Tips & Tools for Programming
O'Reilly | May 2006 | ISBN: 0596526741 | CHM | 296 pages | English | 1.48 MB

With more than a million dedicated programmers, Perl has proven to be the best computing language for the latest trends in computing and business. While other languages have stagnated, Perl remains fresh, thanks to its community-based development model, which encourages the sharing of information among users. This tradition of knowledge-sharing allows developers to find answers to almost any Perl question they can dream up.

And you can find many of those answers right here in "Perl Hacks," Like all books in O'Reilly's Hacks Series, "Perl Hacks" appeals to a variety of programmers, whether you're an experienced developer or a dabbler who simply enjoys exploring technology. Each hack is a short lesson--some are practical exercises that teach you essential skills, while others merely illustrate some of the fun things that Perl can do. Most hacks have two parts: a direct answer to the immediate problem you need to solve right now and a deeper, subtler technique that you can adapt to other situations. Learn how to add CPAN shortcuts to the Firefox web browser, read files backwards, write graphical games in Perl, and much more.

For your convenience, "Perl Hacks" is divided by topic--not according to any sense of relative difficulty--so you can skip around and stop at any hack you like. Chapters include: Productivity Hacks User Interaction Data Munging Working with Modules Object Hacks Debugging

Whether you're a newcomer or an expert, you'll find great value in "Perl Hacks," the only Perl guide that offers something useful and fun for everyone.

About the Author
chromatic is the technical editor of the O'Reilly Network, where he edits Perl.com, ONLamp.com, and the Linux and Security dev centers. He is also the author of O'Reilly's "Extreme Programming Pocket Guide", "Running Weblogs with Slash", and "Perl Testing: A Developer's Notebook", as well as the editor of "BSD Hacks" and "Gaming Hacks". He is the original author of Test::Builder, the foundation for most modern testing modules in Perl 5, and has contributed many of the tests for core Perl. He has given tutorials and presentations at several Perl conferences, including OSCON.

Damian Conway holds a PhD in Computer Science and is an honorary Associate Professor with the School of Computer Science and Software Engineering at Monash University, Melbourne, Australia. Currently he runs an international IT training company--Thoughtstream--which provides programmer development from beginner to masterclass level throughout Europe, North America, and Australasia. Damian was the winner of the 1998, 1999, and 2000 Larry Wall Awards for Practical Utility. The best technical paper at the annual Perl Conference was subsequently named in his honour. He is a member of the technical committee for The Perl Conference, a keynote speaker at many Open Source conferences, a former columnist for The Perl Journal, and author of the book Object Oriented Perl. In 2001 Damian received the first "Perl Foundation Development Grant" and spent 20 months working on projects for the betterment of Perl. A popular speaker and trainer, he is also the author of numerous well-known Perl modules, including Parse::RecDescent (a sophisticated parsing tool), Class::Contract (design-by-contract programming in Perl), Lingua::EN::Inflect (rule-based English transformations for text generation), Class::Multimethods (multiple dispatch polymorphism), Text::Autoformat (intelligent automatic reformatting of plaintext), Switch (Perl's missing case statement), NEXT (resumptive method dispatch), Filter::Simple (Perl-based source code manipulation), Quantum::Superpositions (auto-parallelization of serial code using a quantum mechanical metaphor), and Lingua::Romana::Perligata (programming in Latin). Most of his time is now spent working with Larry Wall on the design of the new Perl 6 programming language.

Curtis "Ovid" Poe is a Senior Programmer at Kineticode, Inc. and lives in Portland, OR. Earlier this century, displaying his usual stellar sense of timing, Ovid switched from mainframes to Web programming in Perl and promptly watched the dot-com industry implode. Despite this minor setback and working for several currently non-existent companies, Ovid stuck with Perl and actually discovered he liked it. A frequent speaker at user groups and author of numerous CPAN modules and a popular Perl CGI course, Ovid is a Perl Foundation Steering Committee member and also heads the TPF grant committee.


D0wn10ad

Mirr0r

Jon Duckett - Beginning Web Programming with HTML, XHTML, and CSS (Repost)


Jon Duckett - Beginning Web Programming with HTML, XHTML, and CSS
Wrox | 2008 | ISBN: 0470259310 | Pages: 768 | PDF | 8.33 MB

This beginning guide reviews HTML and also introduces you to using XHTML for the structure of a web page and cascading style sheets (CSS) for controlling how a document should appear on a web page. Youll learn how to take advantage of the latest features of browsers while making sure that your pages still work in older, but popular, browsers. By incorporating usability and accessibility, youll be able to write professional-looking and well-coded web pages that use the latest technologies.

http://uploading.com/files/1JJZH5G5/eee10.rar.html


http://rapidshare.com/files/256528157/eee10.rar

XML in Theory and Practice


XML in Theory and Practice
Wiley | ISBN: 0470843446 | 482 pages | July 16, 2003 | CHM | 7 Mb

XML is a powerful cross-platform mark-up language which has readily been adopted as a standard in many spheres of web and software development. Real benefits include its ease of integration into existing systems, the simplicity of using it in object-oriented environments and its wide applicability. Chris Bates shows how to use XML in modern software developments and backs up a thorough treatment of its key points with clear, practical examples.
Programmers and developers wanting both A-Z coverage and a practical how-to, will find stepwise guidance on:
* creating data,
* storage formats,
* implementing interfaces,
* providing a wireless protocol in distributed applications (SOAP), and
* creating intermediate data formats on the web.

Chris Bates provides live code in Java to show how XML can be employed in the development of applications and also provides details of how XML parsers work. You will learn more than simply how XML operates. You’ll gain insight and understanding of the concepts, their importance and their application. Problems and exercises are provided and make the book ideal for self-study or classroom situations. With an accompanying website containing code samples and links to important web-sites, XML in Theory and Practice is a must-have primer on the subject.



http://uploading.com/files/VA0CML23/booktraining.net_0470843446.rar.html



http://rapidshare.com/files/256522778/booktraining.net_0470843446.rar

Wireless Markup Language (WML): Scripting and Programming using WML, cHTML, and xHTML

Wireless Markup Language (WML): Scripting and Programming using WML, cHTML, and xHTML

William Routt, «Wireless Markup Language (WML): Scripting and Programming using WML, cHTML, and xHTML»
Althos Publishing | ISBN: 0974278750 | 2003 | CHM | 292 pages | 11.43 MB

This book describes why and how to use gateways and script languages to convert standard Internet web pages into formats that can be used by portable devices and some of the problems that this can cause. The reader will learn the structure of the WML language and how to create script files that controls the display of information on mobile devices and the different ways that users can control content delivery of information with the limited keypads on mobile devices.


http://uploading.com/files/FZ24YR7X/wireless-markup-language-wml-scripting-and-programming-using-wml-chtml-and-xhtml...html.html


http://rapidshare.com/files/256519789/wireless-markup-language-wml-scripting-and-programming-using-wml-chtml-and-xhtml.9780974278759.16969

The Little Black Book of Computer Viruses: The Basic Technology

The Little Black Book of Computer Viruses: The Basic Technology

Mark A. Ludwig, «The Little Black Book of Computer Viruses: The Basic Technology»
American Eagle | ISBN: 0929408020 | 1991 | PDF | 183 pages | 1.39 MB

This is the first in a series of three books about computer viruses. In these volumes I want to challenge you to think in new ways about viruses, and break down false concepts and wrong ways of thinking, and go on from there to discuss the relevance of computer viruses in today’s world. These books are not a call to a witch hunt, or manuals for protecting yourself from viruses. On the contrary, they will teach you how to design viruses, deploy them, and make them better. All three volumes are full of source code for viruses, including both new and well known varieties.


http://uploading.com/files/JSSGW4D0/the-little-black-book-of-computer-viruses-the-basic-technology.9780929408026.861.pdf.html


http://rapidshare.com/files/256518009/the-little-black-book-of-computer-viruses-the-basic-technology.9780929408026.861.pdf

Law, Infrastructure and Human Rights (Law in Context) By Michael B. Likosky


Michael B. Likosky. Law, Infrastructure and Human Rights
(Law in Context)
Cambridge Univ. Press | 2006 | 052185962X / 9780521859622 | 242 pages | PDF | 5 Mb | rar

From attacks on oil infrastructure in postwar reconstruction Iraq to the laying of gas pipelines in the Amazon rain forest through indigenous community villages, infrastructure projects are sites of intense human rights struggles.
Many state and nonstate actors have proposed solutions for handling human rights problems in the context of specific infrastructure projects. Solutions have been admired for being lofty in principle; however, they have been judged wanting in practice.
This book analyzes how human rights are handled in varied contexts and then assesses the feasibility of a common international institutional solution under the auspices of the United Nations to the alleged problem of the inability to translate human rights into practice.


1 Introduction
Part 1 Framework
2 Transnational public-private partnerships
3 Human rights risks
Part 2 Case Studies
4 Iraq
5 Antiterrorism
6 Banks
7 EU enlargement
8 Antipoverty
9 Toward a human rights unit

D0wn10ad
Mirr0r

Contemporary Cryptography


Rolf Oppliger, "Contemporary Cryptography"
Artech House Publishers | May 1, 2005 | ISBN: 1580536425 | 510 pages | PDF | 2,4 MB

Whether you’re new to the field or looking to broaden your knowledge of contemporary cryptography, this comprehensive resource puts all aspects of this important topic into perspective. Delivering an accurate introduction to the current state-of-the-art in modern cryptography, the book offers you a practical understanding of essential tools and applications to help you with your daily work. You also find complete coverage of the underpinnings and basic principles of cryptography to help you fully master the material.

From mathematical fundamentals and an overview of cryptographic systems… to details on unkeyed, secret key, and public key cryptosystems, this authoritative reference gives you solid working knowledge of the latest and most critical concepts, techniques, and systems in contemporary cryptography. Additionally, the book is supported with over 200 equations, more than 60 illustrations, and numerous time-saving URLs that connect you to Web sites with related information.

D0wn10ad
Mirr0r

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography


Roger R. Dube, “Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography”
Wiley | 2008-08-25 | ISBN: 0470193395 | 256 pages | PDF | 12,4 MB

The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security technologies. It is an invaluable source for computer engineers, computer security specialists, electrical engineers, software engineers, IT professionals, and advanced undergraduate and graduate students in computer engineering and computer science.

D0wn10ad
Mirr0r

Khalid Sayood, «Lossless Compression Handbook (Communications, Networking and Multimedia)»

Align CenterLossless Compression Handbook (Communications, Networking and Multimedia)

Khalid Sayood, «Lossless Compression Handbook (Communications, Networking and Multimedia)»
Academic Press | ISBN: 0126208611 | 2002 | PDF | 454 pages | 24.84 MB

Compression schemes can be divided into two major classes: lossless compression schemes and lossy compression schemes. Data compressed using lossless compression schemes can be recovered exactly, while lossy compression introduces some loss of information in the reconstruction.

http://uploading.com/files/24FO2T7O/booktraining.net_lossless-compression-handbook-communications-networking-and-mul...pdf.html

http://rapidshare.com/files/256502380/booktraining.net_lossless-compression-handbook-communications-networking-and-multimedia.978012620861

Payment Card Industry Data Security Standard Handbook


Timothy M. Virtue, "Payment Card Industry Data Security Standard Handbook"
Wiley | 2008-11-03 | ISBN: 0470260467 | 216 pages | PDF | 1,3 MB

Clearly written and easy to use, Payment Card Industry Data Security Standard Handbook is your single source along the journey to compliance with the Payment Card Industry Data Security Standard (PCI DSS), addressing the payment card industry standard that includes requirements for security management, protection of customer account data, policies, procedures, network architecture, software design, and other critical protective measures. This all-inclusive resource facilitates a deeper understanding of how to put compliance into action while maintaining your business objectives.

D0wn10ad
Mirr0r

mprovements in System Safety: Proceedings of the Sixteenth Safety-critical Systems Symposium, Bristol, UK, 5-7 February 2008


Felix Redmill, Tom Anderson, "Improvements in System Safety: Proceedings of the Sixteenth Safety-critical Systems Symposium, Bristol, UK, 5-7 February 2008"
Springer | 2008-01-22 | ISBN: 1848000995 | 266 pages | PDF | 1,7 MB

Improvements in System Safety contains the full complement of papers presented at the sixteenth annual Safety-critical Systems Symposium, held at Bristol, UK, in February 2008.
The Symposium is for engineers, managers and academics in the field of safety, across all industry sectors, and so the papers included in this volume offer a wide-ranging coverage of major safety issues as well as a good blend of academic research and industrial experience. They include discussions of some of the most recent developments in the field.
The book begins with a tutorial examining the recent marked shift in the regulatory approach to ensuring software safety. Whereas compliance with development standards used to be norm, the responsibility has now shifted on to the developers and operators to construct and present well reasoned arguments that their software is acceptably safe (in a system context). These arguments, together with supporting evidence, are typically assembled, structured and presented in a software safety case. This tutorial is crucial to all involved in the discipline and an excellent introduction to the topics subsequently discussed.
The first paper reflects a tutorial on The Safety Case held on the first day of the Symposium. The subsequent 14 papers are presented under the headings of the Symposiums sessions: Themes Reprised from SSS 07; The Safety Case; Safety Culture; Human Factors; Achieving and Improving System Safety; Safety and Risk Analysis.
This book will be of interest to both academics and practitioners working in the safety-critical systems arena.



D0wn10ad
Mirr0r

Cyber Criminals on Trial


Russell G. Smith, Peter Grabosky, Gregor Urbas, "Cyber Criminals on Trial"
Cambridge University Press | 2004-10-25 | ISBN: 0521840473 | 262 pages | PDF | 1,3 MB

This book comprises an international study of the manner in which cyber criminals are currently handled by the judicial system. As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been prevented. Very little has been written about the capture, possible extradition, prosecution, sentencing and incarceration of the cyber criminal--until now.

D0wn10ad
Mirr0r

Safety-Critical Systems: Problems, Process and Practice


Chris Dale, Tom Anderson, “Safety-Critical Systems: Problems, Process and Practice”
Springer | 2009-01-30 | ISBN: 1848823487 | 246 pages | PDF | 5,1 MB

"Safety-Critical Systems: Problems, Process and Practice" contains the papers presented at the seventeenth annual Safety-critical Systems Symposium, held at Brighton, UK, in February 2009.
The Symposium is for engineers, managers and academics in the field of system safety, across all industry sectors, so the papers making up this volume offer a wide-ranging coverage of current safety topics, and a blend of academic research and industrial experience. They include both recent developments in the field and discussion of open issues that will shape future progress.
The first paper reflects a tutorial - on Hazard Analysis - held on the first day of the Symposium. The subsequent 14 papers are presented under the headings of the Symposium's sessions: the Economics of Safety, Transport Safety, Safety in Society, New Challenges, Safety Assessment and Safety Standards.
The book will be of interest to both academics and practitioners working in the safety-critical systems arena.


D0wn10ad

Mirr0r

The Complete Idiot's Guide to Creating a Web Page (5th Edition)

The Complete Idiot's Guide to Creating a Web Page (5th Edition)

Paul McFedries, «The Complete Idiot's Guide to Creating a Web Page (5th Edition)»
Alpha | ISBN: 002864316X | 2002 | PDF | 408 pages | 8.36 MB

Offers quick and easy guidance for designing and creating Web pages. Explains HTML basics and Netscape extensions and how to work with images, create forms, put your page on the Web, and spruce up your page. Softcover. CD-ROM included.


http://uploading.com/files/DEITSPQA/the-complete-idiots-guide-to-creating-a-web-page-5th-edition.9780028643168.44287.pdf.html



http://rapidshare.com/files/256500240/the-complete-idiots-guide-to-creating-a-web-page-5th-edition.9780028643168.44287.pdf

Contemporary Security Management, 2 Ed m


John Fay, "Contemporary Security Management, 2 Ed"
Butterworth-Heinemann | 2005-10-04 | ISBN: 075067928X | 544 pages | PDF | 4,3 MB

Contemporary Security Management serves as an indispensable working tool for students and security professionals at all levels of experience. It is designed to provide the hard facts on modern practices to efficiently and effectively run a security department and covers such vital topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management. New topics covered include terrorism and the new government mandate to perform standard vulnerability assessments for various industries.
· Offers an experience-proven, practical approach to the business of security
· Includes case studies throughout the text provide real-world examples and solutions to management issues.
· Contains samples of security plans and procedures, checklists, diagrams and illustrations aid in explaining a wide range of critical concepts



D0wn10ad
Mirr0r

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions


Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
300 pages | IRM Press (March 28, 2008) | 1599048043 | PDF | 1,7 Mb

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations and habits, with major political and social implications. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a special focus on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations. An estimable addition to any library collection, this reference source compiles high quality, timely content on such cutting-edge topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.


D0wn10ad
Mirr0r

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard, Marcus Pinto, "The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws"
Wiley | 2007-10-22 | ISBN: 0470170778 | 736 pages | PDF | 4,8 MB

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.
The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.
The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.



D0wn10ad
Mirr0r

IT-Sicherheit mit System


Klaus-Rainer Müller, “IT-Sicherheit mit System”
Vieweg | 2007-11 | ISBN: 3834803685 | 506 pages | PDF | 4,6 MB

Das Buch vermittelt das wegweisende Handlungswissen, um IT-Prozesse anschaulich, effizient und ganzheitlich auf Sicherheit auszurichten. Durch Dr.-Ing. Müllers Sicherheitspyramide bietet es ein strukturiertes und strategisches Top-Down-Vorgehensmodell zum ganzheitlichen Aufbau des Sicherheitsmanagements. Es zeigt die Struktur, die von den geschäftspolitischen Sicherheitsanforderungen des Unternehmens ausgeht und Sicherheitsziele sowie -architektur angemessen berücksichtigt. Für die erfolgreiche Praxis ergeben sich daraus relevante Sicherheitskonzepte und -maßnahmen. Risiken und Schwachstellen werden transparent, Sicherheitslücken können geschlossen werden. Darüber hinaus enthält das Buch Tipps und Checklisten.

D0wn10ad
Mirr0r

A Practical Guide to Security Assessments


Sudhanshu Kairab "A Practical Guide to Security Assessments"
Auerbach Publications | 2004-09-29 | ISBN: 0849317061 | 520 pages | PDF | 5,5 MB


The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this with a slowdown in IT spending resulting in justifications of every purchase, and security professionals are forced to scramble to find comprehensive and effective ways to assess their environment in order to discover and prioritize vulnerabilities, and to develop cost-effective solutions that show benefit to the business. A Practical Guide to Security Assessments is a process-focused approach that presents a structured methodology for conducting assessments. The key element of the methodology is an understanding of business goals and processes, and how security measures are aligned with business risks. The guide also emphasizes that resulting security recommendations should be cost-effective and commensurate with the security risk. The methodology described serves as a foundation for building and maintaining an information security program. In addition to the methodology, the book includes an Appendix that contains questionnaires that can be modified and used to conduct security assessments. This guide is for security professionals who can immediately apply the methodology on the job, and also benefits management who can use the methodology to better understand information security and identify areas for improvement.

D0wn10ad
Mirr0r

Network Security Illustrated


Jason Albanese, Wes Sonnenreich, "Network Security Illustrated"
McGraw-Hill Professional | 2003-09-26 | ISBN: 0071415041 | 423 pages | PDF | 8,3 MB

"* Organized around common problems rather than technology or protocols, this reference shows readers all their options * Helps make the best decisions based on available budget * Explains the limitations and risks of each solution * Excellent visuals--intuitive illustrations and maps, not graphs and charts * How to implement the chosen solution "

D0wn10ad
Mirr0r

Multispectral Image Analysis Using the Object-Oriented Paradigm


Multispectral Image Analysis Using the Object-Oriented Paradigm
CRC | 2006-12-05 | ISBN: 1420043064 | 184 pages | PDF | 12,2 MB


Bringing a fresh new perspective to remote sensing, object-based image analysis is a paradigm shift from the traditional pixel-based approach. Featuring various practical examples to provide understanding of this new modus operandi, Multispectral Image Analysis Using the Object-Oriented Paradigm reviews the current image analysis methods and demonstrates advantages to improve information extraction from imagery. This reference describes traditional image analysis techniques, introduces object-oriented technology, and discusses the benefits of object-based versus pixel-based classification. It examines the creation of object primitives using image segmentation approaches and the use of various techniques for object classification. The author covers image enhancement methods, how to use ancillary data to constrain image segmentation, and concepts of semantic grouping of objects. He concludes by addressing accuracy assessment approaches. The accompanying two CD-ROMs present sample data that enable the use of different approaches to problem solving. Integrating remote sensing techniques and GIS analysis, Multispectral Image Analysis Using the Object-Oriented Paradigm distills new tools to extract information from remotely sensed data.

http://uploading.com/files/PU9XPS96/1420043064.rar.html



http://rapidshare.com/files/256494202/1420043064.rar

How to Comply with the PCI Data Security Standard


How to Comply with the PCI Data Security Standard
Sumedh Thakar, Terry Ramos | ISBN: 0470744529 | 2009-01-17 | 68 pages |PDF | 1,2 MB

Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This book is a quick guide to understanding how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance.

PCI Compliance for Dummies arms you with the facts, in plain English, and shows you how to achieve PCI Compliance. In this book you will discover:

* What the Payment Card Industry Data Security Standard (PCI DSS) is all about
* The 12 Requirements of the PCI Standard
* How to comply with PCI
* 10 Best-Practices for PCI Compliance
* How QualysGuard PCI simplifies PCI compliance

D0wn10ad
Mirr0r

Terrorism and Global Security


Ann E. Robertson, "Terrorism and Global Security"
Facts on File | 2007-06 | ISBN: 081606766X | 408 pages | PDF | 1,6 MB

For most Americans, the terrorist attacks of September 11, 2001, are a watershed event, a turning point in how Americans think about their place in the world. Before 9/11, the United States suffered the occasional attack on its citizens abroad, but the homeland remained secure, and public safety focused on ordinary dangers such as crime, fire, flood, and influenza. After 9/11, new fears intruded on daily life, and Americans were now forced to face a clever enemy who could seemingly attack at any time, at any place. Just as earlier generations remember where they were when they learned of John F. Kennedy's assassination or the explosion of the Challenger space shuttle, 9/11 marks the moment American adolescents became aware of international events as well as the broader outlines of global security issues. The subsequent war on terrorism also dramatically changed the terms of a possible career in the military. Accurate and balanced, "Terrorism and Global Security" provides key information on the definition, causes, and goals of terrorism; the history of terrorism; the perpetrators and their backgrounds; counterterrorism; and the issues of balancing security and liberty. Separate case studies focus on the United States as well as the United Kingdom, Germany, Japan, Peru, and Colombia, examining how each has been affected by terrorism and comparing and contrasting the measures taken in response.

D0wn10ad
Mirr0r

Hacking Ubuntu: Serious Hacks Mods and Customizations


Neal Krawetz, “Hacking Ubuntu: Serious Hacks Mods and Customizations”
Wiley | 2007-04-23 | ISBN: 047010872X | 408 pages | CHM | 9,7 MB

Ubuntu, an African word meaning "humanity to others," is the hottest thing in Linux today and is fast becoming the choice for Linux users
This down-and-dirty book shows readers how they can blow away the default system settings to get Ubuntu to behave however they want
Readers will take total control of their Ubuntu system by optimizing its appearance, speed, usability, and security
Includes hundreds of hacks such as running Ubuntu from a USB drive, installing it on a Mac, enabling multiple CPUs, and putting scripts in menus and panels
Readers are encouraged to roll up their sleeves and devise hacks for wireless adapters, cameras, drawing pads, TV cards, and more


D0wn10ad
Mirr0r

Lisa Cornelio, Gail Eisenberg. "Public Safety, Law, and Security (Top Careers in Two Years)"


Lisa Cornelio, Gail Eisenberg. "Public Safety, Law, and Security (Top Careers in Two Years)"
Ferguson Publ., Infobase Publ. | 2008 | ISBN: 0816069042 | 127 pages | PDF | 5 Mb

Students with an interest in the fields of public safety, law, and security have many career options available to them with an associate's degree, comparable certification, and work/life experience. This book is an accessible guide that takes readers on a tour of a variety of careers in this industry and gives them an insider's glance at a day on the job.Job profiles include: Corrections officer, Firefighter, Forensic specialist, Homeland security worker, Legal secretary, Paralegal, Paramedic/emergency medical technician, Park ranger, Patrol officer, and, Private security specialist.

TOC
1 Firefighter
2 Legal Secretary
3 Paralegal
4 Patrol Officer
5 Park Ranger
6 Paramedic/Emergency Medical Technician
7 Corrections Officer
8 Forensic Specialist
9 Private Security Specialist
10 Homeland Security Worker
Appendix A: Tools for Career Success
Appendix B: Financial Aid
How to Use This Book
This book, part of the Top Careers in Two Years series, highlights indemand careers for readers considering a two-year degree program—either straight out of high school or after working a job that does not require advanced education.

The focus throughout is on the fastest-growing jobs with the best potential for advancement in the field. Readers learn about future prospects while discovering jobs they may never have heard of.
An associate’s degree can be a powerful tool in launching a career. This book tells you how to use it to your advantage, explore job opportunities,
and find local degree programs that meet your needs.
Each chapter provides the essential information needed to find not just a job but a career that fits your particular skills and interests. All chapters
include the following features:

$ “Vital Statistics” provides crucial information at a glance, such as salary range, employment prospects, education or training needed, and work environment.
$ Discussion of salary and wages notes hourly versus salaried situations as well as potential benefits. Salary ranges take into account regional differences across the United States.
$ “Keys to Success” is a checklist of personal skills and interests needed to thrive in the career.
$ “A Typical Day at Work” describes what to expect at a typical day on the job.
$ “Two-Year Training” lays out the value of an associate’s degree for that career and what you can expect to learn.
$ “What to Look For in a School” provides questions to ask and factors to keep in mind when selecting a two-year program.
$ “The Future”discusses prospects for the career going forward.
$ “Interview with a Professional”
$ “Job Seeking Tips” offers suggestions on how to meet and work with people in the field, including how to get an internship or apprenticeship.
$ “Career Connections” lists Web addresses of trade organizations providing more information about the career.
$ “Associate’s Degree Programs” provides a sampling of some of the better-known two-year schools.
$ “Financial Aid” provides career-specific resources for financial aid.
$ “Related Careers” lists similar related careers to consider.

D0wn10ad
Mirr0r

RSA Security's Official Guide to Cryptography


Steve Burnett, Stephen Paine, "RSA Security's Official Guide to Cryptography"
McGraw-Hill Osborne Media | 2001 | ISBN: 007213139X | 419 pages | PDF | 8,7 MB

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security, this expert resource explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security, how the RSA algorithm works within protocols, and much more. You'll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks.
This book will show you how to:
*Distinguish different types of symmetric-key encryption algorithms and know where each is best used
*Find out how password-based encryption works
*Communicate safely over unsecure channels using public-key technology
*Use public-key technology for authentication and non-repudiation
*Get details on current PKI standards and technology--including vendor information
*Understand X.509 certificates and directory structures
*Get an operational overview of widely-used protocols--including IPSec, SSL, and SET
*Recognize how corporations use cryptography to improve security through real-world case studies
*View cryptography from different perspectives--corporations, developers, and users
*Effectively use digital signatures and hardware solutions--smart cards, tokens, key storage devices, and more
Improve security and protect your company's information with the most authoritative guide to cryptography available.



D0wn10ad
Mirr0r

Introduction to Network Security


Neal Krawetz, "Introduction to Network Security"
Charles River Media | 2006 | ISBN: 1584504641 | 608 pages | PDF | 2,1 MB

In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators who can protect networks is growing. If you are tasked with protecting your networks from these threats, or are studying security, Introduction to Network Security will help you increase your understanding of potential threats, learn how to apply practical mitigation options, and react to attacks quickly. The book teaches you the skills and knowledge you need to design, develop, implement, analyze, and maintain networks and network protocols. It explains how these systems currently operate and the limitations that lead to security weaknesses. All of the fundamental issues needed to understand network security, including the definition of security terms, security ethics, the OSI network model, and cryptography for networks are covered in detail. The book focuses on the seven layers in the OSI network model by describing each overall layer, its security role, common vulnerabilities, and mitigation techniques. The discussion of each layer is followed by explicit examples of common protocols within the layer and their respective security issues. The last part of the book explores the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues. If you are new to network security, a general IT administrator, or a student, this is a must-have a resource to help ensure that you have the skills and knowledge required to protect your networks!


D0wn10ad
Mirr0r

The Ap Professional Graphics Cd-Rom Library

The Ap Professional Graphics Cd-Rom Library

AP Professional, «The Ap Professional Graphics Cd-Rom Library»
Academic Press | ISBN: 012059756X | 1995 | PDF | 625 pages | 4.76 MB

This book can be used in many ways. It can be used as a reference, to find the solution to a specific problem that confronts you. If you are addressing the same problem as one discussed in a particular Gem, you’re more than halfway to a solution, particularly if that Gem provides C or C + + code. Many of the ideas in this volume can also be used as a starting point for new work, providing a fresh point of view. However you choose to use this volume, there are many ideas contained herein.


D0wn10ad
http://uploading.com/files/RSLC960L/booktraining.net_the-ap-professional-graphics-cd-rom-library.9780120597567.26882.pdf.html

Peter Walsh, Adrian Perez - Advanced 3-D Game Programming with DirectX 8.0


Peter Walsh, Adrian Perez - Advanced 3-D Game Programming with DirectX 8.0
Wordware Publishing | 2001 | ISBN: 155622513X | Pages: 600 | PDF | 6.79 MB

Microsoft’s DirectX is a powerful set of application programming interfaces used for multimedia application development. The latest version offers increased performance, better usability, and more power to create the next generation of interactive entertainment products that rival anything seen in the past. This revision of the best-selling Advanced 3-D Game Programming Using DirectX 7.0 focuses on the new features of DirectX 8.0, providing plenty of code to help readers understand how to create computer games using this advanced multimedia application development platform.

Among the topics discussed are: * Lighting and shading schemes * Networking and multithreading * Texture mapping * Scene management

Along with several sample applications that target specific algorithms, full source code is provided for a client-server networked 3-D first-person game that demonstrates many of the techniques discussed in the book. This gives readers the opportunity to develop their own code easily, basing it upon the technology discussed in the book.

D0wn10ad
http://uploading.com/files/ICNSZS99/booktraining.net_we30.rar.html

Steve Ince - Writing for Video Games

Steve Ince - Writing for Video Games

Steve Ince - Writing for Video Games
A&C Black | 2007 | ISBN: 0713677619 | Pages: 192 | PDF | 1.45 MB

Video games are a lucrative market for scriptwriters, but writing for video games is complex and very different from traditional media such as television or film. This practical guide shows how you can adapt your writing skills to this exciting medium. Written by an award-winning games writer, the book provides a realistic picture of how companies work, how the writer fits into the development process, and the skills required:

D0wn10ad
http://uploading.com/files/7J3E4OZA/booktraining.net_we21.rar.html

Thomas Petchel - Java 2 Game Programming


Thomas Petchel - Java 2 Game Programming
Course Technology PTR | 2001 | ISBN: 1931841071 | Pages: 600 | PDF | 5.01 MB

With the power of today's personal computer, game developers no longer need to rely on low-level "tricks" to write computer games. Increasingly, object-oriented programming languages, such as Java, are being used to create cutting-edge games. "Java 2 Game Programming" gives you an inside look at how Java can be used to create powerful gaming applications more quickly and easily than ever before. With topics ranging from Java basics for newbie Java programmers to advanced coverage of animation and scene management, this book has it all. Put your new skills to use as you create a fully functional 2D game development engine and sample game. Get ready to take your programming skills to the next level as you master the concepts you need to create the hot new game of tomorrow!


D0wn10ad
http://uploading.com/files/SYI720TS/booktraining.net_we27.rar.html

Wolfgang Engel, Amir Geva - Beginning Direct3D Game Programming


Wolfgang Engel, Amir Geva - Beginning Direct3D Game Programming
Muska & Lipman | 2002 | ISBN: 0761531912 | Pages: 528 | PDF | 3.19 MB

Beginning Direct3D Game Programming covers all of the elements that are necessary to create a Direct3D game for your PC! You will learn the essentials of Direct3D game programming, including basic algorithms, texture mapping basics, 3D math, lighting, use of depth buffers, and much more! This book also covers the Transformation & Lighting Pipeline and how to use it to map texture object with different effects, as well as different file formats and how to integrate them into your game engines. You'll go from the basics to hardcore Direct3D game programming in a matter of pages!

D0wn10ad
http://uploading.com/files/6QGQGJS1/booktraining.net_Yooply_operating_system_concepts_with_java.rar.html

Peter Walsh, Adrian Perez - Advanced 3-D Game Programming with DirectX 8.0




Peter Walsh, Adrian Perez - Advanced 3-D Game Programming with DirectX 8.0
Wordware Publishing | 2001 | ISBN: 155622513X | Pages: 600 | PDF | 6.79 MB

Microsoft’s DirectX is a powerful set of application programming interfaces used for multimedia application development. The latest version offers increased performance, better usability, and more power to create the next generation of interactive entertainment products that rival anything seen in the past. This revision of the best-selling Advanced 3-D Game Programming Using DirectX 7.0 focuses on the new features of DirectX 8.0, providing plenty of code to help readers understand how to create computer games using this advanced multimedia application development platform.

Among the topics discussed are: * Lighting and shading schemes * Networking and multithreading * Texture mapping * Scene management

Along with several sample applications that target specific algorithms, full source code is provided for a client-server networked 3-D first-person game that demonstrates many of the techniques discussed in the book. This gives readers the opportunity to develop their own code easily, basing it upon the technology discussed in the book.

D0wn10ad
http://uploading.com/files/HU0VENWN/booktraining.net_Information_Theory_Computer_Vision.rar.html

Operating Systems Concepts with Java




Operating Systems Concepts with Java
Wiley | 2003-10-31 | ISBN: 0471489050 | 976 pages | PDF | 13,4 MB


* New edition of the bestseller provides readers with a clear description of the concepts that underlie operating systems
* Uses Java to illustrate many ideas and includes numerous examples that pertain specifically to popular operating systems such as UNIX, Solaris 2, Windows NT and XP, Mach, the Apple Macintosh OS, IBM's OS/2 and Linux
* Style is even more hands-on than the previous edition, with extensive programming examples written in Java and C
* New coverage includes recent advances in Windows 2000/XP, Linux, Solaris 9, and Mac OS X
* Detailed case studies of Windows XP and Linux give readers full coverage of two very popular operating systems

D0wn10ad
Mirr0r

Information Theory in Computer Vision and Pattern Recognition



Francisco Escolano, Pablo Suau, Boyán Bonev, A. Yuille, "Information Theory in Computer Vision and Pattern Recognition"
Springer | 2009 | ISBN: 1848822960 | 412 pages | PDF | 16,9 MB

Information theory has proved to be effective for solving many computer vision and pattern recognition (CVPR) problems (such as image matching, clustering and segmentation, saliency detection, feature selection, optimal classifier design and many others). Nowadays, researchers are widely bringing information theory elements to the CVPR arena. Among these elements there are measures (entropy, mutual information!), principles (maximum entropy, minimax entropy) and theories (rate distortion theory, method of types).This book explores and introduces the latter elements through an incremental complexity approach at the same time where CVPR problems are formulated and the most representative algorithms are presented. Interesting connections between information theory principles when applied to different problems are highlighted, seeking a comprehensive research roadmap. The result is a novel tool both for CVPR and machine learning researchers, and contributes to a cross-fertilization of both areas.

D0wn10ad
http://uploading.com/files/BAMGQFAP/booktraining.net_Information_Theory_Computer_Vision.rar.html

Face Processing: Advanced Modeling and Methods (Repost)

Face Processing: Advanced Modeling and Methods (Repost)

Face Processing: Advanced Modeling and Methods

Wenyi Zhao, Rama Chellappa, «Face Processing: Advanced Modeling and Methods»
Academic Press | ISBN: 0120884526 | 2005 | PDF | 768 pages | 23.42 MB

This book begins with a comprehensive introductory chapter for those who are new to the field. A compendium of articles follows that is divided into three sections. The first covers basic aspects of face processing from human to computer. The second deals with face modeling from computational and physiological points of view. The third tackles the advanced methods, which include illumination, pose, expression, and more. Editors Zhao and Chellappa have compiled a concise and necessary text for industrial research scientists, students, and professionals working in the area of image and signal processing.


D0wn10ad
http://uploading.com/files/0UTMHB4I/booktraining.net_face-processing-advanced-modeling-and-methods.9780120884520.374...pdf.html

Image Processing and Pattern Recognition (Neural Network Systems Techniques and Applications)



Image Processing and Pattern Recognition (Neural Network Systems Techniques and Applications)

Cornelius T. Leondes, «Image Processing and Pattern Recognition (Neural Network Systems Techniques and Applications)»
Academic Press | ISBN: 0124438652 | 1998 | PDF | 386 pages | 18.02 MB

Image Processing and Pattern Recognition covers major applications in the field, including optical character recognition, speech classification, medical imaging, paper currency recognition, classification reliability techniques, and sensor technology. The text emphasizes algorithms and architectures for achieving practical and effective systems, and presents many examples. Practitioners, researchers, and students in computer science, electrical engineering, andradiology, as well as those working at financial institutions, will value this unique and authoritative reference to diverse applications methodologies.


D0wn10ad
http://uploading.com/files/P95FGGB4/booktraining.net_image-processing-and-pattern-recognition-neural-network-systems...pdf.html
Voice, Video, and Data Network Convergence: Architecture and Design, From VoIP to Wireless
Posted By : fajo | Date : 16 Jul 2009 08:04 | Comments : 0
Voice, Video, and Data Network Convergence: Architecture and Design, From VoIP to Wireless

Juanita Ellis, Charles Pursell, Joy Rahman, «Voice, Video, and Data Network Convergence: Architecture and Design, From VoIP to Wireless»
Academic Press | ISBN: 0122365429 | 2003 | PDF | 368 pages | 2.71 MB

The first book that covers convergence of voice, video and data networks from a vendor-neutral perspective. This book provides detailed information on convergence network models, protocol stacks, routing algorithms, gateways and switches required to support these networks.


D0wn10ad
http://uploading.com/files/O2PVADAB/booktraining.net_voice-video-and-data-network-convergence-architecture-and-desig...pdf.html

Advances in Computers, Volume 61: Architectural Issues


Advances in Computers, Volume 61: Architectural Issues

Marvin Zelkowitz Ph.D. MS BS., «Advances in Computers, Volume 61: Architectural Issues»
Academic Press | ISBN: 0120121611 | 2004 | PDF | 364 pages | 6.2 MB

The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computer science, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes architectural issues in the design of new hardware and software system. An architectural design evaluation process is described that allows developers to make sure that their source programs adhere to the architectural design of the specifications. This greatly aids in the maintenance of the system. Telecommunications issues are covered from the impact of new technology to security of wireless systems. Quantum computing, an exciting development that may greatly increase the speed of present computers, is described.

link download:
http://uploading.com/files/M0785FJ2/booktraining.net_advances-in-computers-volume-61-architectural-issues.9780120121...pdf.html

Data Preparation for Data Mining Using SAS




Data Preparation for Data Mining Using SAS
Morgan Kaufmann | 2006-09-29 | ISBN: 0123735777 | 424 pages | PDF | 2,3 MB

Are you a data mining analyst, who spends up to 80% of your time assuring data quality, then preparing that data for developing and deploying predictive models? And do you find lots of literature on data mining theory and concepts, but when it comes to practical advice on developing good mining views find little how to information? And are you, like most analysts, preparing the data in SAS?
This book is intended to fill this gap as your source of practical recipes. It introduces a framework for the process of data preparation for data mining, and presents the detailed implementation of each step in SAS. In addition, business applications of data mining modeling require you to deal with a large number of variables, typically hundreds if not thousands. Therefore, the book devotes several chapters to the methods of data transformation and variable selection.
FEATURES
* A complete framework for the data preparation process, including implementation details for each step.
* The complete SAS implementation code, which is readily usable by professional analysts and data miners.
* A unique and comprehensive approach for the treatment of missing values, optimal binning, and cardinality reduction.
* Assumes minimal proficiency in SAS and includes a quick-start chapter on writing SAS macros.



link download

http://uploading.com/files/WNA16YT7/booktraining.net_0123735777.rar.html

Wireless Communications Design Handbook: Space Interference


http://pixhost.ws/avaxhome/62/2d/000e2d62_medium.jpeg
Reinaldo Perez, «Wireless Communications Design Handbook: Space Interference»
Academic Press | ISBN: 0125507216 | 1998 | PDF | 302 pages | 11.58 MB

Volume One of the Wireless Communications Design Handbook provides an in-depth look at interference problems in satellite communications. The material presented is from a satellite or spacecraft hardware point of view rather than from theoretical models. Each satellite subsystem is described in detail to point out interference and noise problems associated with it. The book also addresses typical architectures and hardware design issues in satellites. In addition, a detailed look at space interference is discussed with emphasis on the possible impact on satellite electronics.


link download
http://uploading.com/files/797KZXPG/booktraining.net_wireless-communications-design-handbook-space-interference.9780...pdf.html

Lossless Compression Handbook

http://pixhost.ws/avaxhome/9f/2d/000e2d9f_medium.jpeg

Khalid Sayood, «Lossless Compression Handbook (Communications, Networking and Multimedia)»
Academic Press | ISBN: 0126208611 | 2002 | PDF | 454 pages | 24.84 MB

Compression schemes can be divided into two major classes: lossless compression schemes and lossy compression schemes. Data compressed using lossless compression schemes can be recovered exactly, while lossy compression introduces some loss of information in the reconstruction.


link download

http://uploading.com/files/J505MB08/booktraining.net_lossless-compression-handbook-communications-networking-and-mul...pdf.html

Java Structures: Data Structures in Java for the Principled Programmer


Duane Bailey, "Java Structures: Data Structures in Java for the Principled Programmer (2nd edition)"
McGraw-Hill Science/Engineering/Math | 2002-07-26 | ISBN: 0072399090, 0071121633, 0071261206 | 528 pages | PDF | 2,1 MB

The second edition of Duane Bailey's Java Structures considers the design, implementation, and use of data structures using Java 2. The structure package, a collection of nearly 100 different classes implementing a wide variety of data structures, has been the basis of Java Structures for more than five years. Thousands of faculty, students, researchers, industrial and recreational programmers have investigated this lean and well tested approach to data structure design.

In this edition, the text develops a heavily tested package that is independent of but consistent with the Collection package offered by Sun. In many cases, the variety of implementations provides the programmer choices of data structure that are not available with the Collection system. For those curricula that make use of the Collection package, the structure package can be easily integrated into existing applications. All classes are fully documented and make consistent use of pre- and post-conditioning, and include support for assertion testing.

The second edition also brings a wealth of new resources, including a large number of new and original exercises and drill problems. Throughout the text, exercises appear in the running text to direct a deeper consideration of subtle issues by students. Perhaps the most innovative feature (first found in Bailey's Java Elements) is the inclusion of more than a dozen original lab exercises that focus on interesting and often classic problems of computer science.

Link download

http://uploading.com/files/NVUPCFPO/booktraining.net_0072399090.rar.html

Security Advisor Middle East - December 2006


Security Advisor Middle East - December 2006
English | 53 pages | PDF | 4.72 Mb

Lynda.com Photoshop CS4: Selections in Depth


Lynda.com Photoshop CS4: Selections in Depth | 683 MB

Photoshop CS4: Selections in Depth
with: Jan Kabili

Choosing the right selection tools for the job and using those tools effectively are among the most important skills for Photoshop users. In Photoshop CS4: Selections in Depth, senior trainer and photographer Jan Kabili goes deep into the subject, showing the best practices for making and working with selections. Jan walks through the manual and automatic selection methods in Photoshop and offers pointers on choosing the most effective selection methods for an image. She explains the underlying relationship between selections and alpha channels, and shows how to fine-tune selections to get the desired results. Exercise files accompany the course.



D0wn10ad
http://uploading.com/files/KUEZ250H/L.c.P.CS4.S.i.D-i_f.part1.rar.html
http://uploading.com/files/R451XHH5/L.c.P.CS4.S.i.D-i_f.part2.rar.html
http://uploading.com/files/PN4IO3JK/L.c.P.CS4.S.i.D-i_f.part3.rar.html
http://uploading.com/files/YNNFEX3L/L.c.P.CS4.S.i.D-i_f.part4.rar.html
http://uploading.com/files/08D157CX/L.c.P.CS4.S.i.D-i_f.part5.rar.html
http://uploading.com/files/2EEKKSOS/L.c.P.CS4.S.i.D-i_f.part6.rar.html
http://uploading.com/files/2I6MB0M5/L.c.P.CS4.S.i.D-i_f.part7.rar.html
Mirror

http://hotfile.com/dl/8702104/e728851/L.c.P.CS4.S.i.D-i_f.part1.rar.html
http://hotfile.com/dl/8702138/bea0bf2/L.c.P.CS4.S.i.D-i_f.part2.rar.html
http://hotfile.com/dl/8702166/aef6ad3/L.c.P.CS4.S.i.D-i_f.part3.rar.html
http://hotfile.com/dl/8702187/282a2df/L.c.P.CS4.S.i.D-i_f.part4.rar.html
http://hotfile.com/dl/8702220/57aa680/L.c.P.CS4.S.i.D-i_f.part5.rar.html
http://hotfile.com/dl/8702249/2438e5a/L.c.P.CS4.S.i.D-i_f.part6.rar.html
http://hotfile.com/dl/8702273/9a06cbd/L.c.P.CS4.S.i.D-i_f.part7.rar.html

Mirr0r
http://rapidshare.com/files/256220642/L.c.P.CS4.S.i.D-i_f.part1.rar
http://rapidshare.com/files/256220605/L.c.P.CS4.S.i.D-i_f.part2.rar
http://rapidshare.com/files/256224094/L.c.P.CS4.S.i.D-i_f.part3.rar
http://rapidshare.com/files/256225243/L.c.P.CS4.S.i.D-i_f.part4.rar
http://rapidshare.com/files/256225615/L.c.P.CS4.S.i.D-i_f.part5.rar
http://rapidshare.com/files/256219784/L.c.P.CS4.S.i.D-i_f.part6.rar
http://rapidshare.com/files/256220681/L.c.P.CS4.S.i.D-i_f.part7.rar

Modeling Architecture in Cinema4D


Modeling Architecture in Cinema4D | 1.56 GB

Video codec: MPEG4 | Video: TSCC 1024x736 15.00fps 484Kbps | Audio: PCM 22050Hz mono 352Kbps

Modeling Architecture in C4D is a collection of 44 lessons on architectural modeliryvaniyu in cinema 4D. The lessons come as novechkam and advanced polzyvatelyam this product, and do not necessarily architects. Izlogayuschy us material Wolfgang Rode not obminet their attention is not a tool in the blue though priblezitelno related to modeling. For 6.5 hours, it will create enough not a bad house the average complexity so that success in learning Cinema 4D.


D0wn10ad
http://uploading.com/files/KZ5GI9HZ/3d.part01.rar.html
http://uploading.com/files/YPUQB7LV/3d.part02.rar.html
http://uploading.com/files/HGXZ4UUR/3d.part03.rar.html
http://uploading.com/files/0R8XHXF2/3d.part04.rar.html
http://uploading.com/files/VMLAVQLG/3d.part05.rar.html
http://uploading.com/files/OREG1JEM/3d.part06.rar.html
http://uploading.com/files/GB10G6ZT/3d.part07.rar.html
http://uploading.com/files/BJ87C717/3d.part08.rar.html
http://uploading.com/files/IFV78BEW/3d.part09.rar.html
http://uploading.com/files/Z95NREAK/3d.part10.rar.html
http://uploading.com/files/RTPHT7EZ/3d.part11.rar.html
http://uploading.com/files/JPYMGZIB/3d.part12.rar.html
http://uploading.com/files/BUF6K0SL/3d.part13.rar.html
http://uploading.com/files/RMLSRBJ7/3d.part14.rar.html
http://uploading.com/files/FND2C4WT/3d.part15.rar.html
http://uploading.com/files/K7XH9631/3d.part16.rar.html
Mirror
http://hotfile.com/dl/8701696/250dec6/3d.part01.rar.html
http://hotfile.com/dl/8701718/31d3389/3d.part02.rar.html
http://hotfile.com/dl/8701728/32477ce/3d.part03.rar.html
http://hotfile.com/dl/8701765/482eaf8/3d.part04.rar.html
http://hotfile.com/dl/8701786/fc31062/3d.part05.rar.html
http://hotfile.com/dl/8701806/b8c9bd2/3d.part06.rar.html
http://hotfile.com/dl/8701831/fe9b29a/3d.part07.rar.html
http://hotfile.com/dl/8701854/9009861/3d.part08.rar.html
http://hotfile.com/dl/8701879/6b50215/3d.part09.rar.html
http://hotfile.com/dl/8701919/c1d7cde/3d.part10.rar.html
http://hotfile.com/dl/8701948/5cab618/3d.part11.rar.html
http://hotfile.com/dl/8701978/2c85d76/3d.part12.rar.html
http://hotfile.com/dl/8702001/6ba94ab/3d.part13.rar.html
http://hotfile.com/dl/8702016/04eaeca/3d.part14.rar.html
http://hotfile.com/dl/8702056/8b1b063/3d.part15.rar.html
http://hotfile.com/dl/8702061/fc4daae/3d.part16.rar.html
Mirr0r
http://rapidshare.com/files/256225043/3d.part01.rar
http://rapidshare.com/files/256225352/3d.part02.rar
http://rapidshare.com/files/256224236/3d.part03.rar
http://rapidshare.com/files/256219813/3d.part04.rar
http://rapidshare.com/files/256219675/3d.part05.rar
http://rapidshare.com/files/256224431/3d.part06.rar
http://rapidshare.com/files/256221515/3d.part07.rar
http://rapidshare.com/files/256222631/3d.part08.rar
http://rapidshare.com/files/256220591/3d.part09.rar
http://rapidshare.com/files/256222079/3d.part10.rar
http://rapidshare.com/files/256223438/3d.part11.rar
http://rapidshare.com/files/256220202/3d.part12.rar
http://rapidshare.com/files/256225126/3d.part13.rar
http://rapidshare.com/files/256226094/3d.part14.rar
http://rapidshare.com/files/256222793/3d.part15.rar
http://rapidshare.com/files/256224831/3d.part16.rar

VTC MasterClass ActionScript 3 and Payment Gateway APIs


VTC MasterClass ActionScript 3 and Payment Gateway APIs | 111 MB

Introduction
Introduction (03:06)

Authorize.net
Intro to Authorize.net (02:29)
Anatomy of a Call to Authorize.net (02:22)
Setting Up the AS3Authorize Class (07:45)
Setting Up as3corelib (03:17)
Generating Fingerprints pt. 1 (07:20)
Generating Fingerprints pt. 2 (03:45)
Sending Transactions (07:52)
Creating the Test Application in Flex Builder (06:43)
Testing SIM Integration & Redirect (01:58)

PayPal
Anatomy of a PayPal Standard Call (04:49)
Setting Up the ActionScript Classes pt. 1 (03:58)
Setting Up the ActionScript Classes pt. 2 (03:43)
Building the HTTP Request (04:32)
Testing PayPal Standard Integration (05:39)
Direct Payment API & Proxy Scripts (04:58)
Building Requests for Direct Payment (05:17)
Testing & API Responses (03:38)

In Conclusion
Wrap Up (03:54)



D0wn10ad
http://uploading.com/files/2FDJVFJ5/VTC.MasterClass.ActionScript.3.and.Payment.Gateway.APIs-iNKiSO.part1.rar.html
http://uploading.com/files/EU7LJVWE/VTC.MasterClass.ActionScript.3.and.Payment.Gateway.APIs-iNKiSO.part2.rar.html
Mirror
http://hotfile.com/dl/8704634/9274653/VTC.MasterClass.ActionScript.3.and.Payment.Gateway.APIs-iNKiSO.part1.rar.html
http://hotfile.com/dl/8704638/2b6e8e1/VTC.MasterClass.ActionScript.3.and.Payment.Gateway.APIs-iNKiSO.part2.rar.html
Mirr0r
http://rapidshare.com/files/256221931/VTC.MasterClass.ActionScript.3.and.Payment.Gateway.APIs-iNKiSO.part1.rar
http://rapidshare.com/files/256218470/VTC.MasterClass.ActionScript.3.and.Payment.Gateway.APIs-iNKiSO.part2.rar

Lynda.com ColdFusion MX Essential Training

http://pic.leech.it/i/224ae/e364f51000e12ecme.png
Lynda.com ColdFusion MX Essential Training Updated | 1.2 GB

ColdFusion is a technology that enables you to build sophisticated Web applications quickly and efficiently. It uses a markup language similar to HTML, so the learning curve is short, but don't let that fool you. In this comprehensive introduction to ColdFusion MX, expert Joey Lott shows how to use this powerful program to build scalable, durable web applications. Working along with Joey, you'll not only review skills such as working with databases, using forms, storing persistent data, creating dynamic charts, uploading files, and using email features, but you'll also get a chance to apply this knowledge by building specific applications. This in-depth tutorial illustrates how you can make the most of ColdFusion's common workflow and best practices in your own web development.


D0wn10ad
http://uploading.com/files/7JS1ITOQ/LCColdFusion.part01.rar.html
http://uploading.com/files/00MGE8ST/LCColdFusion.part02.rar.html
http://uploading.com/files/278C81DP/LCColdFusion.part03.rar.html
http://uploading.com/files/Z9H3BZ2I/LCColdFusion.part04.rar.html
http://uploading.com/files/G68QZSGA/LCColdFusion.part05.rar.html
http://uploading.com/files/ZPO0N4VZ/LCColdFusion.part06.rar.html
http://uploading.com/files/WYVS7KB7/LCColdFusion.part07.rar.html
http://uploading.com/files/I6MX7R8Z/LCColdFusion.part08.rar.html
http://uploading.com/files/K83W33ZU/LCColdFusion.part09.rar.html
http://uploading.com/files/KJDX4T7T/LCColdFusion.part10.rar.html
http://uploading.com/files/PJ5IOLNX/LCColdFusion.part11.rar.html
http://uploading.com/files/Y4FDYODC/LCColdFusion.part12.rar.html
Mirror
http://hotfile.com/dl/8702304/bf72966/LCColdFusion.part01.rar.html
http://hotfile.com/dl/8702329/88f7746/LCColdFusion.part02.rar.html
http://hotfile.com/dl/8702355/675fbf8/LCColdFusion.part03.rar.html
http://hotfile.com/dl/8702379/5c9b636/LCColdFusion.part04.rar.html
http://hotfile.com/dl/8702405/ba0c7cb/LCColdFusion.part05.rar.html
http://hotfile.com/dl/8702446/a80c896/LCColdFusion.part06.rar.html
http://hotfile.com/dl/8702479/28a1ecf/LCColdFusion.part07.rar.html
http://hotfile.com/dl/8702527/6099598/LCColdFusion.part08.rar.html
http://hotfile.com/dl/8702586/27ddd6e/LCColdFusion.part09.rar.html
http://hotfile.com/dl/8702625/e007ac2/LCColdFusion.part10.rar.html
http://hotfile.com/dl/8702648/790d7ed/LCColdFusion.part11.rar.html
http://hotfile.com/dl/8702675/8c0b33a/LCColdFusion.part12.rar.html
Mirr0r
http://rapidshare.com/files/256220536/LCColdFusion.part01.rar
http://rapidshare.com/files/256220697/LCColdFusion.part02.rar
http://rapidshare.com/files/256222234/LCColdFusion.part03.rar
http://rapidshare.com/files/256224844/LCColdFusion.part04.rar
http://rapidshare.com/files/256223740/LCColdFusion.part05.rar
http://rapidshare.com/files/256221107/LCColdFusion.part06.rar
http://rapidshare.com/files/256221964/LCColdFusion.part07.rar
http://rapidshare.com/files/256220088/LCColdFusion.part08.rar
http://rapidshare.com/files/256221525/LCColdFusion.part09.rar
http://rapidshare.com/files/256221992/LCColdFusion.part10.rar
http://rapidshare.com/files/256222946/LCColdFusion.part11.rar
http://rapidshare.com/files/256223310/LCColdFusion.part12.rar

The Mind - Teaching Modules

http://pic.leech.it/i/adfc1/4d3361f000e0f0bme.jpg
The Mind - Teaching Modules | 900 MB

By: Learner.org | ISBN: 1576801802 | 35 video modules (from 5 to 20 minutes in length)

Unravel the mysteries of the mind with these video teaching modules. An extension of topics covered in The Brain: Teaching Modules, these programs explore cognition and human behavior. The modules present current findings on language processing, drug treatment and addictions, and cognitive development throughout the life span. The programs also cover mood and personality disorders, and pain and its treatment. These modules are flexible additions to courses in psychology, abnormal and physiological psychology, neuropsychology, and occupational therapy.


D0wn10ad
http://uploading.com/files/LD725SAE/the_mind_-_teaching_modules.part01.rar.html
http://uploading.com/files/RYVUBOIX/the_mind_-_teaching_modules.part02.rar.html
http://uploading.com/files/6J2TDZVP/the_mind_-_teaching_modules.part03.rar.html
http://uploading.com/files/93RRBBKR/the_mind_-_teaching_modules.part04.rar.html
http://uploading.com/files/BLUNA3D9/the_mind_-_teaching_modules.part05.rar.html
http://uploading.com/files/T2DFP9O0/the_mind_-_teaching_modules.part06.rar.html
http://uploading.com/files/BT0R7BAX/the_mind_-_teaching_modules.part07.rar.html
Mirror
http://hotfile.com/dl/8704693/f889f1e/the_mind_-_teaching_modules.part01.rar.html
http://hotfile.com/dl/8704708/ff3b431/the_mind_-_teaching_modules.part02.rar.html
http://hotfile.com/dl/8704731/7d92f32/the_mind_-_teaching_modules.part03.rar.html
http://hotfile.com/dl/8704752/5498c39/the_mind_-_teaching_modules.part04.rar.html
http://hotfile.com/dl/8704774/470367d/the_mind_-_teaching_modules.part05.rar.html
http://hotfile.com/dl/8704825/62f9147/the_mind_-_teaching_modules.part06.rar.html
http://hotfile.com/dl/8704843/f2e0943/the_mind_-_teaching_modules.part07.rar.html
Mirr0r
http://rapidshare.com/files/256226276/the_mind_-_teaching_modules.part01.rar
http://rapidshare.com/files/256219778/the_mind_-_teaching_modules.part02.rar
http://rapidshare.com/files/256226326/the_mind_-_teaching_modules.part03.rar
http://rapidshare.com/files/256222649/the_mind_-_teaching_modules.part04.rar
http://rapidshare.com/files/256222150/the_mind_-_teaching_modules.part05.rar
http://rapidshare.com/files/256224452/the_mind_-_teaching_modules.part06.rar
http://rapidshare.com/files/256223881/the_mind_-_teaching_modules.part07.rar
This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at youzhny197@gmail.com, we will immediately respond to you.