Free Ebook Video Training

Thursday, April 16, 2009

Marketing Your Consulting Services

Marketing Your Consulting Services


A Business of Consulting Resource

If consultants did not have to market and sell themselves, I am sure
that the number of consultants would at least quadruple. Just the
thought of submitting our work and ourselves to the judgment of others
scares many people away from making a living as an independent
consultant.Marketing and sales helps define the boundary between
those who choose to consult and those who do not.

I’ve been on my own for years, and I am still uneasy about new encounters with potential
clients. The phrase “standing naked before strangers” captures

my worst fears.

Download




Password default : booktraining.net

Windows XP for Power Users: Power Pack

Windows XP for Power Users: Power Pack


Product Description
* Shows power users how to take Windows XP to the next level, focusing on functionality, networking, and overall performance
* Features to-the-point coverage that skips introductory explanations and focuses instead on the real-world tips and tricks power users need to become more productive
* Written in a friendly, approachable style by experienced XP author and power user Curt Simmons
* Topics covered include scripting, managing applications, making the most of digital media, power management, hardware management, the registry and file systems, security, auditing, backup and data storage, system performance, system recovery, Microsoft’s popular download XP Power Toys, networking, and wireless

From the Back Cover
Everything you need to know about

* Using third-party interface and application compatibility tools
* Working with digital media applications
* Managing power, security, hardware, and software
* Auditing files and restoring data
* Setting up wireless, workgroup, and remote networks
* Applying Service Pack 1 for improved security, compatibility, and stability
* Maximizing system performance
* Having fun with Windows XP Power Toys

Learn how you can harness all the power of Windows XP

If you’re ready to use all the features of Windows XP to your best advantage, here’s how to sharpen your skills as a power user. This book enables you to take control of the system, configure operating system services, build and manage networks, handle the interface, expand XP’s capabilities with scripting, enhance security features, experiment with Power Toys, and a whole lot more. Packed with step-by-step instructions and thorough coverage of configuration and performance, it takes you to a new level of Windows expertise.

About the Author
Curt Simmons is a technical trainer and author of more than thirty books on Microsoft® and Internet technologies, including several bestsellers. Considered an expert on Microsoft Office and Windows, he recently penned Windows XP Secrets, Windows XP Headaches, Windows XP Networking Inside Out and How to Do Everything with Windows XP.

Download




Password default : booktraining.net

Windows Server Hacks

Windows Server Hacks


Product Description
One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It’s possible, in fact, to accomplish about 90% of all Windows administration without ever opening a command prompt or running a script! But what about the other ten percent of the time? While it’s true that most common, day-to-day tasks of Windows administration can be performed from the GUI, it’s not always the best way, especially with complex or repetitive tasks Scripts and command-line tools often provide a faster, more flexible approach.

Windows Server Hacks reveals techniques that go well beyond basic management tasks found in most handbooks to help busy system administrators master the more powerful features of Windows Server. Windows Server Hacks focuses on scripts and other tools that will make your life as an administrator much easier. These tools, or hacks–quick and dirty solutions to problems, or clever ways of doing things–were created by other professionals who’ve also had to struggle to find solutions to administering Windows environments. You’ll save valuable time using their scripts, tools, tips, and advice. Plus, you can easily learn to customize the scripts to create even more powerful tools for your own, specific needs. The book includes secrets of the masters in such areas as Active Directory, User Management, Group Policy, DNS and DHCP, File and Print, IIS, performance and security. The hundred, industrial strength hacks in the book range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, and backup and recovery. No matter which Windows server you use–NT, IIS, 2000, or 2003–this book will put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server.

About the Author
Mitch Tulloch is a trainer, consultant, and author living in Winnipeg, in the Canadian province of Manitoba. In addition to his many Nutshell books for O’Reilly (Windows 2000 Administration, Windows Server 2003, Microsoft Exchange Server)

Download




Password default : booktraining.net

Web Database Applications with PHP, and MySQL

Web Database Applications with PHP, and MySQL


Book description
Web Database Applications with PHP and MySQL offers web developers a mixture of theoretical and practical information on creating web database applications. Using PHP, and MySQL, two open source technologies the are often combined to develop web applications, the book offers detailed information on designing relational databases and on web application architecture, both of which will be useful to readers who have never dealt with these issues before. The book also introduces Hugh and Dave’s Online Wine Store, a complete (but fictional) online retail site implemented using PHP and MySQL.
What do eBay, Amazon.com and CNN.com have in common? They’re all applications that integrate large databases with the Web. The popularity (and power) of these applications stems from their accessibility and usability: thousands of users can access the same data at the same time without theneed to install any additional software on their computers. Web Database Applications with PHP and MySQL offers web developers a mixture of theoretical and practical information on creating web database applications. Using PHP, and MySQL, two open source technologies that are often combined to develop web applications, the book offers detailed information on designing relational databases and on web application architecture, both of which will be useful to readers who have never dealt with these issues before. The book also introduces Hugh and Dave’s Online Wines, a complete (but fictional) online retail site that allows users to browse, search a database, add items to a shopping cart, manage their membership, and purchase wines. Using this site as an example, the book shows you how to implement searching and browsing, store user data, validate user input, manage transactions, and maintain security. If you want to build small to medium-scale web database applications that can run on modest hardware and process more than a million hits a day from users, this book will show you how.

Download



Password default : booktraining.net

Using Samba, Second Edition

Using Samba, Second Edition


Book description
Using Samba, Second Edition is a comprehensive guide to Samba administration. It covers all versions of Samba from 2.0 to 2.2, including selected features from an alpha version of 3.0, as well as the SWAT graphical configuration tool. Updated for Windows 2000, ME, and XP, the book also explores Samba’s new role as a primary domain controller and domain member server, its support for the use of Windows NT/2000/XP authentication and filesystem security on the host Unix system, and accessing shared files and printers from Unix clients.

This book, which has been officially adopted by the Samba Team and is under the GNU Free Documentation License (FDL), is a comprehensive guide to Samba administration. The 2nd edition focuses on Samba 2.2 and covers the most important features of 3.0, which was under development as this book went to print. Samba is a cross-platform triumph: it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. Samba is so robust, flexible, fast, and secure that many people are choosing it over Windows NT/2000/XP for their file and print services. Samba is also free software, licensed under the GNU General Public License. This book will help you make file and print sharing as robust, powerful, and efficient as possible. The authors delve into the internals of the Windows activities and protocols to an unprecedented degree, explaining the strengths and weaknesses of each feature in Windows domains and in Samba itself. Using Samba takes you from basic installation and configuration–on both the client and server side, for a wide range of systems–to subtle details of security, cross-platform compatibility, and resource discovery that make the difference between whether a user sees the folder they expect or a cryptic error message. The range of this book knows few bounds. Wondering how to integrate Samba’s authentication with that of a Windows PDC? How to get Samba to serve Microsoft Dfs shares? How to share files on Mac OS X? These and a dozen other issues of interest to system administrators are covered. A whole chapter is dedicated to troubleshooting. Whether you’re playing on one note or a full three-octave range, on your personal computer or an enterprise network, Using Samba will give you an efficient and secure server.

Download




Password default : booktraining.net

Inside Linux

Inside Linux


Product Description
With in-depth complete coverage on the installation process, editing and typesetting, graphical user interfaces, programming system administration, and managing Internet sites, Inside Linux is the only book “smart users” new to Linux will need. Many of the users new to Linux have an understanding of computer technology and will be looking for just the right reference to fit their sophisticated needs. This book guides users to a high level of proficiency with all the flavors of Linux, and help them with crucial system administration chores. Inside Linux is different than other books available because it’s a unique blend of a how-to and a reference guide.

Amazon.com
The author of Inside Linux acknowledges that adequately teaching how to use Linux involves more than communicating a series of recipes. For that reason, he goes to considerable effort to explain what’s going on when the user executes various commands. He uses procedures to expose facts about Linux’s innards, rather than as mere strategies for achieving desired effects. Therefore, his prose–particularly his extended coverage of the bash shell–reads like a scientist’s journal: If we do this, here’s what happens (and by the way, here’s why). The approach is more leisurely than that of many introductory Linux books, and it leads to a deeper understanding of what’s going on under the shell.

The author shows how to configure and use XFree86, the K Desktop Environment (KDE), and GNOME. These are handy skills to have, even if most distributions will more or less automate those processes and some readers may wish instead for information on more obscure aspects of the operating system. Coverage of network configuration, where an intimate knowledge of the command line and configuration files is critical, suits this book’s experiment-and-observe format very well. The reader gets to see lots of important pieces of software in action. There’s nothing about Apache, but the sections on setting up FTP and Unix-to-Unix Copy Protocol (UUCP) services are particularly detailed. –David Wall

Topics covered: Linux for those unfamiliar with the operating system, with particular focus on the Caldera OpenLinux 2.2, Red Hat Linux 6, Slackware Linux 4, and SuSE Linux 6.1 distributions. Installation of XFree86, KDE, and GNOME are covered, as are the mechanics of setting up a TCP/IP network at the command line. Coverage of FTP and UUCP services conclude this book.

Download



Password default : booktraining.net

Game Programming with Python, Lua, and Ruby (Game Development)

Game Programming with Python, Lua, and Ruby (Game Development)


Product Description
Get ready to dive headfirst into the world of programming! “Game Programming with Python, Lua, and Ruby” offers an in-depth look at these three flexible languages as they relate to creating games. No matter what your skill level as a programmer, this book provides the guidance you need. Each language is covered in its own section?you’ll begin with the basics of syntax and style and then move on to more advanced topics. Follow along with each language or jump right to a specific section! Similar features in Python, Lua, and Ruby?including functions, string handling, data types, commenting, and arrays and strings?are examined. Learn how each language is used in popular game engines and projects, and jumpstart your programming expertise as you develop skills you’ll use again and again!

About the Author
Tom Gutschmidt has been a freelance technical writer for the past two years, with articles mainly appearing on Earthweb, Gamelan, and Developer.com. He also worked as an editor for the RPG website GameBanshee for the year 2001. Currently he is the youngest member of a small development team in an encryption and key management company (Widevine Technologies). Gutschmidt has worked on a number of open source game projects, do freelance work currently making web based games, and actively work on mod development.

His current projects include running an online gaming site that focuses on NWN mods and flash game development. The site has a small but regular following. He is wrapping up production on a full length NWN game mod that is in the late stages of beta testing.

Download




Password default : booktraining.net

Ansi/Iso C++ Professional Programmer’s Handbook (Que Professional Series)

Ansi/Iso C++ Professional Programmer’s Handbook (Que Professional Series)

Book Description
The ANSI/ISO C++ Professional Programmers Handbook is a concise professional C++ reference tool that presents all of the changes and addenda to the language specification. It contains tips and guidelines for exerting the full potential of C++ as a multi-purpose object-oriented programming language. The new Standard Briefing component provides coverage of the latest version of the C++ language including additions and modifications to the language, new constructs such as built-in bool type, namespaces, RTTI, new header file conventions, internalization, memory management and new cast notation. Additionally, we’ve included a Manual of Programming Style, a Compatibility Compendium, and Future Directions overview.

About the Author
Danny Kalev is a certified system analyst and software engineer with 10 years of experience, specializing in C++ and object-oriented analysis and design. Danny’s technical interests involve networking, distributed data systems, compiler technology, and embedded systems. He is currently working towards an MA degree in Applied Linguistic at the University of Tel Aviv, Israel and is a contributing columnist for the C/C++ User’s Journal. As a member of the ANSI/ISO C++ committee, Danny has been involved with every aspect of the language, deciding the rationale behind every new feature of the language and the recommended ways of using it. He has taken part in C++ projects in such diverse fields as data processing, networking, real-time programming, virtual machines, GUI, AI, automated speech synthesis and processing, compilers and parsers.

Download




Password default : booktraining.net

UNIX User’s Handbook (2nd Edition)

UNIX User’s Handbook (2nd Edition)


Back Cover Copy

The in-depth UNIX guide for every end-user: completely updated and full of examples!

* For every key UNIX platform: practical examples, real depth!
* Covers all basic UNIX commands, plus sed, grep, awk, vi, and more
* Complete shell programming coverage—plus NEW programming section covering C/C++, Java(tm), and Internet development
* KornShell, Bash, C Shell, and Shell Programming
* Windows interoperability, in depth: Samba, NFS, Windows 2000 Services for UNIX, and much more

UNIX end-users desperately need an up-to-date reference guide with real depth: one that teaches UNIX commands and doesn’t just list them! In UNIX User’s Handbook, Second Edition, best-selling UNIX author Marty Poniatowski covers every topic UNIX users need to master—with exceptional clarity and practical, real-world examples. Part I brings together thorough coverage of virtually every key aspect of day-to-day UNIX operation and end-user administration. Part II presents an in-depth programming reference. Part III covers every leading option for Windows interoperability. You’ll find fast, easy answers for all this and more:

* Getting started: login, mail, Internet access, and key UNIX file management commands
* All basic UNIX commands and a complete UNIX file system overview (cd, cp, file, ls, mv, pwd, rm, rmdir, cut, paste, split, sort, diff, and more)
* Key UNIX tools—including in-depth coverage of find, vi, find, grep, sed, and awk
* Shells and shell programming: Bash, Korn, and C
* Full programming section—including a NEW user-centered introduction to C/C++ and Java
* End-user administration: processes, startup, shutdown, users/groups, backup, software management, printing, and more
* Networking and Internet protocols
* UNIX/Windows interoperability: Samba, X Window, NFS, Posix, Windows 2000 Services for UNIX, and other alternatives
* Performance and monitoring

This new edition has been updated throughout and redesigned for even faster, easier access to information. Whatever your experience, whatever UNIX version you use, you won’t find a more useful reference!

About the Author

MARTY PONIATOWSKI, a technical consultant for Hewlett-Packard in the New York metropolitan area, has worked with UNIX systems since 1981. His best-selling books include HP-UX 11i System Administration Handbook and Toolkit and HP-UX 11.x System Administration “How To” Book (Prentice Hall PTR).

Download



Password default : booktraining.net

UNIX Fault Management: A Guide for System Administrators

UNIX Fault Management: A Guide for System Administrators

Book Info
Designed to help you maximize system integrity and availability on any Unix system-including clusters, monitor systems, disks, networks applications, and databases, with tips for recovery and prevention. Provides quick reference diagnostics and recovery section for systems operators. Softcover. DLC: UNIX (Computer file).

From the Inside Flap
Preface

This book is intended for system administrators and operators who are responsible for maintaining the integrity and availability of mission-critical UNIX systems. The book provides a description of the fault monitoring tools and techniques available for UNIX servers, including systems that are configured as high availability clusters.

This book can therefore be a handy quick reference for an operator trying to troubleshoot a problem in the customer environment, by pointing out where to find key diagnostic messages and describing how to take recovery actions.

A system administrator responsible for the initial configuration and administration of UNIX systems will also find this book useful because it describes the procedures to follow to set up the appropriate levels of system monitoring. The product descriptions can also help in making purchasing decisions as the customer determines the appropriate amount of event monitoring needed in their environment.

An overview of the tasks performed by an operator is provided, with details on how events are received and processed. The remainder of the book focuses on the types of events that can be received, how they are detected, how operators receive event notifications, and how problems can be investigated and recovery performed. The goal is to introduce the necessary tools, but not to show how every possible problem can be solved.

This book provides numerous descriptions of how fault management tools and products can be used to solve a variety of problems. Many of the chapters are focused on specific computer components, such as disks or databases, to be helpful to operators with specific roles. Here is a description of the individual chapters:

Chapter 1, “Analyzing the Role of System Operators,” describes the tasks performed by a system operator and the evolution of fault management.
Chapter 2, “Enumerating Possible Events,” describes the various types of events that are interesting to monitor on a UNIX system.
Chapter 3, “Using Monitoring Frameworks,” describes monitoring frameworks and the administrative tasks that must be done before they can be used.
Chapter 4, “Monitoring the System,” describes the tools and products used to monitor the UNIX server.
Chapter 5, “Monitoring the Disks,” describes the tools and products used to monitor external disk devices.
Chapter 6, “Monitoring the Network,” provides an overview of the many tools available for detecting problems and events related to the use of the network.
Chapter 7, “Monitoring the Application,” describes methods for monitoring the response times and availability of critical applications.
Chapter 8, “Monitoring the Database,” focuses specifically on tools to detect problems and events related to database usage.
Chapter 9, “Enterprise Management,” discusses the problems with trying to deal with fault management for the large-scale customer enterprise.
Chapter 10, “UNIX Futures,” discusses the future plans of some of the major UNIX system vendors in the area of fault management.
Appendix A, “Standards,” describes fault management standards that have emerged and how you can benefit from them.

The Glossary contains the important terms used in the book, and their definitions.
Although it is assumed that most customers concerned about fault management will implement high availability solutions, this book does not describe how to create highly available computing environments. Readers needing additional information on high availability may check Hewlett-PackardÕs external Web site on high availability (hp/go/ha) or read Clusters for High Availability by Peter Weygant.

In general, this book does not discuss the configuration and installation of the hardware and software components of your UNIX system. You should rely on your vendorsÕ product manuals for this.

Many of the examples used in this book were created on HP-UX servers. Other UNIX platforms behave similarly, and we note when tools are supported only on certain UNIX platforms.

Download




Password default : booktraining.net

Unix Shell Programming 3rd Edition

Unix Shell Programming 3rd Edition




Product Description
Unix Shell Programming is a tutorial aimed at helping Unix and Linux users get optimal performance out of their operating out of their operating system. It shows them how to take control of their systems and work efficiently by harnessing the power of the shell to solve common problems. The reader learns everything he or she needs to know to customize the way a Unix system responds.

The vast majority of Unix users utilize the Korn shell or some variant of the Bourne shell, such as bash. Three are covered in the third edition of Unix Shell Programming. It begins with a generalized tutorial of Unix and tools and then moves into detailed coverage of shell programming.

Topics covered include: regular expressions, the kernel and the utilities, command files, parameters, manipulating text filters, understanding and debugging shell scripts, creating and utilizing variables, tools, processes, and customizing the shell.


Download


Password default : booktraining.net

Securing Linux: A Survival Guide for Linux Security

Securing Linux: A Survival Guide for Linux Security





Book Description
As the Linux operating system has matured and grown in popularity, security risks have increased. SANS is pleased to announce publication of Securing Linux, a collaborative effort from many authorities who work with and secure Linux on a daily basis. This new addition to the Security Step-by-Step guides is not just an update to the previous Linux Step-by-Step from SANS. The book is a complete rewrite from the ground up, showing the latest in best practices for securing a Linux system. Check it out: the 104-page definitive guide is not only for security experts. The novice experimenting with Linux at home or in the workplace will benefit from this guide, which covers both workstations and many server setups. By using example scripts and the accompanying text that explains why a task should be carried out, you can increase the security of your Linux system.


Download


Password default : booktraining.net

Securing & Optimizing Linux: A Hands on Guide for Linux Professionals

Securing & Optimizing Linux: A Hands on Guide for Linux Professionals




As an NT Administrator I have read many Linux books trying to bridge my NT knowledge to the Linux and Unix world, this book is by far the best.

Most of the Linux books I have read before tell you what to do to administer a Linux server, but they assume that you know how to do it. Gerhard Mourani tells you in detail what to do, how to do it, and why to do it. I have learned a great deal not only about Linux server applications, but about the Linux operating system itself.

If you want to take advantage of Linux’s versatility as a server operating system, and do it in the most secure and efficient manner, you can find no better book than this one. In addition to operating system configuration there are many chapters individually dedicated to installing and configuring specific Linux server applications such as Sendmail, SQL server, Apache, BIND, and many more.

One disclaimer: If you are looking for information on how to build a Linux workstation or cool Gnome desktop, this is not the book for you. It is focus is exclusively building Linux application servers.


Download


Password default : booktraining.net

OpenSSH: A Survival Guide for Secure Shell Handling

OpenSSH: A Survival Guide for Secure Shell Handling





Book Description
The OpenSSH suite of tools provides replacements for some of the common administrative tools used today such as telnet, FTP and the r-utilities; yet, these tools, considered insecure because they use clear-text communication over the network, are in still in common use. OpenSSH provides an encrypted channel between computers and remote servers to ensure against a malicious attacker intercepting and reading information in transit.


Download


Password default : booktraining.net

Eclipse Cookbook

Eclipse Cookbook




Product Description
You’ve probably heard the buzz about Eclipse, the powerful open source platform that gives Java developers a new way to approach development projects. It’s like a shiny new car–no longer content to just admire Eclipse, you’re now itching to get in and drive.

Eclipse is to Java developers what Visual Studio is to .NET developers–it’s an integrated development environment (IDE) that combines a code editor, compiler, debugger, text editor, graphical user interface (GUI) builder, and other components into a single, user-friendly application. It provides a solid foundation that enables Java developers to construct and run integrated software-development tools for web development, application design, modeling, performance, testing, and much more.

As with any extensive programming tool, however, there’s a lot to learn. And there s no better guy than well-known Java expert Steve Holzner to teach you. An award-winning and best-selling author who has been writing about Java topics since the language first appeared, Holzner delivers just the kind of targeted, practical, everyday knowledge you need to hone your mastery of Eclipse.

Perfect as a companion to an Eclipse programming tutorial (such as Holzner’s own Eclipse, O’Reilly, April 2004) or an ideal stand-alone for all those developers who either don’t want or don’t need the tutorial approach, the “Eclipse Cookbook” contains task-oriented recipes for more than 800 situations you may encounter while using this new Java platform–from deploying a web application automatically to reverse engineering compiled code, from re-naming all references to a class across multiple packages to initializing the SWT JNI libraries.

Each recipein the ever-popular and utterly practical problem-solution-discussion format for O’Reilly cookbooks contains a clear and thorough description of the problem, a brief but complete discussion of a solution, and in-action examples illustrating that solution. The “Eclipse Cookbook” will satiate Java programmers at all levels who are ready to go beyond tutorials–far beyond writing plug-ins and extensions–and actually use the powerful and convenient Eclipse day to day.

About the Author
Steve Holzner is an award-winning author who has been writing about Java topics since Java first appeared. He’s a former PC Magazine contributing editor, and his many books have been translated into 18 languages around the world. His books sold more than 1.5 million copies, and many of his bestsellers have been on Java. Steve graduated from MIT and got his PhD at Cornell; he’s been a very popular member of the faculty at both MIT and Cornell, teaching thousands of students over the years and earning an average student evaluation over 4.9 out of 5.0. He also runs his own software company and teaches week-long classes to corporate programmers on Java around the country.


Download


Password default : booktraining.net

Swing Extreme Testing

Swing Extreme Testing




Thorough testing is the basis of good software. Whether we use an agile development methodology such as Extreme Programming, or a more traditional approach, we must test our software at the unit level and application level. The tests must run automatically and cover all aspects of the software.

In this book, the authors draw on more than 20 years of experience to show how automated testing can be applied to a real commercial product.

This book will teach you how to automatically test user interfaces (Swing GUIs), the help system, internationalization, log files, spreadsheets, email, and web services, how to perform tests involving multiple JVMs, and a host of other things. These tests are applied at the module level (unit tests) and at the application level (function tests).
565 pages | May 30, 2008 | PDF | 4 Mb


Download


Password default : booktraining.net

Implementing Cisco Unified Communications Manager (CIPT1)

Implementing Cisco Unified Communications Manager (CIPT1)




Implementing Cisco Unified Communications Manager, Part 1 (CIPT1), is a Cisco®-authorized, self-paced learning tool for CCVP® foundation learning. This book provides the knowledge necessary to install, configure, and deploy a Cisco Unified Communications solution based on Cisco Unified Communications Manager, the call routing and signaling component of the Cisco Unified Communications solution. By reading this book, you will gain an understanding of deploying a Cisco Unified Communications Manager to support single site, centralized, distributed, and hybrid call processing models.

This book focuses on Cisco Unified Communications Manager Release 6.x. You will learn how to install and configure Cisco Unified Communications Manager, power over Ethernet switches, and gateways using MGCP. You will also learn how to build a scalable dial plan for on-net and off-net calls. The dial plan chapters of the book cover call routing, call coverage, digit manipulation, class of service, and call coverage components. This book will teach you how to implement media resources, LDAP directory integration, and various endpoints including Skinny Client Control Protocol (SCCP) and Session Initiation Protocol (SIP).

Cisco Unified Video Advantag endpoint configuration is covered, in addition to, Cisco Unity® voice mail integration and basic voice mail box creation. Various user features are discussed including Presence.
656 pages | Jun, 2008 | PDF | 13 Mb


Download


Password default : booktraining.net

CCENT: Cisco Certified Entry Networking Technician


CCENT: Cisco Certified Entry Networking Technician



Expert exam prep from leading Cisco authority Todd Lammle
Start your preparation here for Cisco’s new CCENT entry-level networking certification, your entry point into Cisco’s popular CCNA certification track. This comprehensive study guide from leading Cisco authority Todd Lammle thoroughly prepares you for the Interconnecting Cisco Networking Devices, Part 1 exam (640-822) and the start of a career, with pages of exam essentials, real-world scenarios, and hands-on exercises.

Topics include the operation of data networks, how to implement both switched and routed networks, and much more.
648 pages | Mar, 2008 | PDF | 10,5 Mb


Download


Password default : booktraining.net

Nokia Network Security Solutions Handbook


Nokia Network Security Solutions Handbook



The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are covered in detail, as well as installation and configuration of the Check Point firewall on the Nokia system.

Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as well as learning how to use Nokia’s command line interface. Routing configurations and the different protocols involved are covered in detail, finishing off with a comprehensive discussion of the High-availability configuration that is Nokia’s strength. The appendices include coverage of the UNIX basics which lie at the heart of the IPSO operating system and a review of the other packages available for Nokia systems (such as Perl and Bash).

The only book dedicated to coverage of the latest Nokia hardware and software offerings, from the SOHO appliances to the enterprise-class IP700 series, with an emphasis on administering and securing these systems.
Long-term market potential. The operating system referenced will be Nokia IPSO 3.4.1, which has an interface that has been specifically tailored to make upgrading to newer versions of IPSO simple and intuitive. In addition, the underlying interface is UNIX based, which has been a constant for over 30 years.
Up-to-the-Minute Web-based Support. Once they have absorbed the content of the book, readers can receive up-to-the minute links, white papers, and analysis for one year.

560 pages | October 2002 | English | 7.9MB


Download


Password default : booktraining.net

Adapting to Web Standards: CSS and Ajax for Big Sites


Adapting to Web Standards: CSS and Ajax for Big Sites



After learning the language of design, how does one effectively use standards-based technologies to create visually strong Web sites? The full-color Professional Web Standards Design and Development gives developers a peek into the process of the best designers in the world through the work of high profile, real-world Web sites that made them famous. The book focuses on deconstructing these top-tier large-scale sites with particular attention given to deconstructing CSS.

288 pages | Mar, 2008 | PDF | 5 Mb


Download


Password default : booktraining.net

Code Leader: Using People, Tools, and Processes to Build Successful Software



Code Leader: Using People, Tools, and Processes to Build Successful Software


Code Leader: Using People, Tools, and Processes to Build Successful Software
“Patrick is a pragmatist with a purist’s knowledge. He has a deep understanding of what ’smells’ right, and he knows when and how to find the right balance to get the job done. This philosophy of balanced ‘pure pragmatism’ pervades this book and makes it useful.”

—from the foreword by Scott Hanselman, Author of ComputerZen Blog, www.computerzen.com; Senior Program Manager, Developer Division, Microsoft Corporation
Writing code is rewarding, but writing high-quality code, on time and at the lowest possible cost, is what makes a software project successful. As the role of a professional developer has evolved and taken on additional responsibilities, it is now necessary to work in concert with a team in order to improve both the process and final results of a software project. This unique book introduces a set of concrete best practices and construction techniques that can be applied to the development process and to actual code construction, so that you can confidently solve business problems rather than deal solely with pure coding tasks.
Patrick Cauldwell understands that it is no longer sufficient to just write software that solves a problem; it must also be fast, scalable, reliable, and easy to use. In this reference, he explains how to build software that is of high quality at a lower cost and shares with you the practical steps you must take in order to transition from software engineer to technical lead.
May 21, 2007 | PDF | 5 Mb


Download


Password default : booktraining.net

Writing Apache Modules with Perl and C


Writing Apache Modules with Perl and C



Product Description
Apache is the most popular web server on the Internet because it is free, reliable, and extensible. The availability of the source code and the modular design of Apache makes it possible to extend web server functionality through the Apache API. For the most part, however, the Apache API has only been available to C programmers, and requires rebuilding the Apache server from source. mod_perl, the popular Apache module used primarily for enhanced CGI performance, changed all that by making the Apache API available to Perl programmers. With mod_perl, it becomes simple to develop Apache modules with Perl and install them without having to rebuild the web server. Writing Apache Modules with Perl and C shows how to extend web server capabilities regardless of whether the programming language is Perl or C. The book explains the design of Apache, mod_perl, and the Apache API. It then demonstrates how to use them to perform for tasks like the following:

* Rewriting CGI scripts as Apache modules to vastly improve performance
* Server-side filtering of HTML documents, to embed special markup or code (much like SSI)
* Enhancing server log functionality
* Converting file formats on the fly
* Implementing dynamic navigation bars
* Incorporating database access into CGI scripts
* Customizing access control and authorization to block robots or to use an external database for passwords

The authors are Lincoln Stein and Doug MacEachern. Lincoln is the successful author of How to Set Up and Maintain a World Wide web Site and the developer of the widely used Perl CGI.pm module. Doug is a consultant and the creator of the innovative mod_perl Apache module. –This text refers to the Paperback edition.


Download


Password default : booktraining.net

PC World July 2008


PC World July 2008



PC World is a global computer magazine published monthly by IDG. It offers advice on various aspects of PCs and related items, the Internet, and other personal-technology products and services. In each publication, PC world reviews and tests hardware and software products from a variety of manufacturers, as well as other technology related devices such as still and video cameras, audio devices and televisions.
PC World July 2008 | PDF(file-132pages) | 23mb(rar size)


Download


Password default : booktraining.net

Oracle PL/SQL For Dummies

Oracle PL/SQL For Dummies

Oracle PL/SQL For Dummies

Product Description

The Oracle has spoken—you need to get up to speed on PL/SQL programming, right? We predict it’ll be a breeze with this book! You’ll find out about code structures, best practices, and code naming standards, how to use conditions and loops, where to place PL/SQL code in system projects, ways to manipulate data, and more.




Download


Uploading
Rapidshare

Password default : booktraining.net

Windows XP Ebook Collection





Release Notes
-------------------------------------------------------------------------------
Windows XP Ebook Collection

Included Titles

O'Reilly - Windows XP Annoyances

O'Reilly - Windows XP Annoyances for Geeks 2nd Edition

O'Reilly - Windows XP Cookbook

O'Reilly - Windows XP Hacks

O'Reilly - Windows XP Hacks 2nd Edition

O'Reilly - Windows XP in a Nutshell 2nd Edition

O'Reilly - Windows XP Pocket Reference

O'Reilly - Windows XP Power Hound

O'Reilly - Windows XP Pro The Missing Manual

O'Reilly - Windows XP Unwired A Guide For Home Office and The Road

Code:

http://uploading.com/files/1LH0LR3T/Windows XP Ebook Collection.rar.html



Password default : booktraining.net

500 Tips for Tutors



RoutledgeFalmer 2ed (12-2004) | PDF | 160 pages | 0415342783 | 1.74Mb(rar)

500 Tips for Tutors/by Phil Race (Author).This book contains over 500 practical suggestions designed to help tutors establish active learning among their students. Divided into useful sections, the tips cover the gamut of teaching and learning situations and comprise a ‘start anywhere’, dip in resource suitable for both the newcomer and the old hand...supremely relevant and useful to our work in schools...Overall, this is one of the most down-to-earth and honest books about teaching

download link:
http://www.easy-share.com/1904337882/500tips.rar
or:
http://depositfiles.com/files/5ajfdj646
Password default : booktraining.net

CISA Review Manual 2008



http://rapidshare.com/files/210707605/CISA_REVIEW_MANUAL_2008.part1.rar
http://rapidshare.com/files/210707607/CISA_REVIEW_MANUAL_2008.part2.rar
http://rapidshare.com/files/210711460/CISA_REVIEW_MANUAL_2008.part3.rar
http://rapidshare.com/files/210711462/CISA_REVIEW_MANUAL_2008.part4.rar


Password default : booktraining.net

Implementing & Managing Microsoft Exchange Server 2003 (70-284) Tutorials

http://ecx.images-amazon.com/images/I/51NFJS34Y6L._AA280_.jpg
Home:http://www.vtc.com/products/Implementing-Managing-Microsoft-Exchange-Server-2003-70-284-tutorials.htm
Welcome
Intro (02:19)
Course Overview (04:17)
Active Directory Overview (04:05)
Active Directory & Exchange (03:07)
Active Directory Forests & Domains (04:02)
Active Directory Sites (04:29)
Global Catalog Servers (03:06)
Active Directory Operations Masters (03:48)
Message System Basics - Shared File (04:07)
Message System Basics - Client Server (03:49)
SMTP (03:20)
Exchange & IIS 6.0 (02:41)
Exchange From Ten Thousand Feet (05:23)
Installing Exchange 2003
Installation Planning (05:34)
System Requirements (04:45)
Enabling Windows 2003 Services (03:25)
ForestPrep (04:58)
DomainPrep (05:09)
Troubleshooting ForestPrep & DomainPrep (03:18)
Installing Exchange 2003 Admin Tools (03:43)
Installing Exchange 2003 (06:22)
Post Installation Checks (03:11)
Unattended Installations (05:09)
Exchange 5.5 Coexistence
Active Directory Connector Basics (03:51)
Installing ADC Tools (05:07)
Setting Up A Connection Agreement (02:16)
Installing Exchange 2003 Into 5.5 Org (04:54)
Upgrading From Exchange 5.5 & 2000
Upgrading From Exchange 5.5 (02:56)
Upgrading From 2000 (02:05)
Removing Tuning Parameters (02:16)
Exchange 2003 High Availability
Clustering Basics (03:29)
Clustering Exchange 2003 (04:28)
Network Load Balancing (03:43)
Front End-Back End Servers (02:52)
Configuring A Front End Server (02:02)
Front End/Back End Server Considerations (03:45)
Designing Exchange 2003 Infrastructure
Administrative Model (04:30)
Administration Overview (03:05)
Viewing Admin & Routing Groups (03:15)
Assigning Administrative Permissions (05:43)
Security Tab (02:44)
Admin From Client Computers (02:46)
Adding & Removing Exchange Components (02:47)
Server Placement (03:10)
Server Specialization (02:19)
Data Storage Basics (03:39)
Database Issues (01:59)
Stores/Storage Groups (05:15)
Routing Groups (05:09)
Routing Group Connectors (02:58)
Removing Exchange Servers (03:07)
Recipients
Types of Recipients (03:07)
Creating A Mailbox (02:15)
Creating Recipient Types (02:15)
Mailbox Management (03:20)
Mail-enabling AD Groups (03:20)
Setting Mailbox Storage Limits (02:24)
Creating Recipient Policies (02:24)
System Policies (04:47)
Address Lists
What Are Address Lists (04:38)
Creating Address Lists (04:15)
Recipient Update Service (03:26)
Offline Address Lists (02:53)
Controlling Address List Usage (02:53)
Public Folders
Public Folder Basics (01:49)
Public Folder Trees (01:49)
Creating GP Public Folder Trees (03:16)
Public Folder Replication (02:59)
Public Folder Creation/Security (02:57)
Public Folder Permissions (02:57)
Exchange Virtual Servers
Introduction (04:43)
Creating A Virtual Server (05:35)
Virtual Server Settings (04:24)
Virtual Server Authentication (05:27)
Virtual Server URLS (05:15)
SMTP
Using SMTP (02:24)
Manual SMTP (05:09)
DNS & SMTP (04:38)
Internet Connectivity (03:51)
SMTP Relay (03:29)
Exchange Security
Firewall Basics (05:16)
MAPI Through A Firewall (03:57)
RPC Over HTTP (03:33)
Worms, Horses & Viruses (03:31)
Connection Filtering (03:23)
Recipient Filtering (03:14)
Sender Filtering (03:08)
Required Services (02:31)
Protocol Logging (04:12)
Physical Security (02:56)
Backup & Restoring Exchange 2003
Understanding Data Storage (02:33)
Transaction Logs (04:55)
Storage Naming Conventions (03:30)
What To Back Up (05:11)
System State Data (02:43)
Backup Types (03:06)
Recovering Databases (02:42)
Recovery Storage Group (03:15)
Managing, Monitoring & Troubleshooting
Server health (02:34)
Event Viewer (04:14)
Monitoring & Status Utility (03:27)
Queue Viewer (03:39)
Performance Console (04:07)
Badmail Folder (01:52)
Credits
About The Author (01:22)

Download

http://rapidshare.com/files/221310183/VTC_70-284_EXCHSERV__by_hatillensen_Tico.rar.001.html
http://rapidshare.com/files/221332540/VTC_70-284_EXCHSERV__by_hatillensen_Tico.rar.002.html
http://rapidshare.com/files/221350686/VTC_70-284_EXCHSERV__by_hatillensen_Tico.rar.003.html
http://rapidshare.com/files/221371535/VTC_70-284_EXCHSERV__by_hatillensen_Tico.rar.004
http://rapidshare.com/files/221380694/VTC_70-284_EXCHSERV__by_hatillensen_Tico.rar.005

use hjsplit to join the files

Password default : booktraining.net
This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at youzhny197@gmail.com, we will immediately respond to you.