download Free Computer Ebook

Trainsignal Windows Server 2008 Application Infrastructure

Posted: 16 Mar 2009 03:21 AM PDT

Trainsignal Windows Server 2008 Application Infrastructure

English | 800600 | 15.00fps | WMV | WMA 48kbps mono | 517 MB

Course Outline:

Video 01 - Introduction

Video 02 - Setting Up Hyper-V Server

Video 03 - How to Set Up Windows Deployment Services

Video 04 - How to Install Internet Information Services (IIS) 7.0

Video 05 - IIS 7 Manager and FTP Tools

Video 06 - Implementing SSL for IIS 7

Video 07 - Terminal Services

Video 08 - Implementing Remote Applications

Video 09 - Creating Highly Available Solutions with Network Load Balancing

Video 10 - Setting Up Windows Media Server and Intro to Clustering

Video 11 - Certification

Video 12 - Exam Prep Automated Activation

download links:

Beginning Java Objects: From Concepts To Code, 2nd Edition

Posted: 16 Mar 2009 12:50 AM PDT

Beginning Java Objects: From Concepts To Code, 2nd Edition

Product Description

Learning to design objects effectively with Java is the goal of Beginning
Java Objects: From Concepts to Code, Second Edition. Plenty of titles dig
into the Java language in massive detail, but this one takes the unique
approach of stepping back and looking at fundamental object concepts first.
Mastery of Javafrom understanding the basic language features to building
complete industrial-strength Java applicationsemerges only after a thorough
tour of thinking in objects.

The first edition of B.J.O. has been a best seller; this second edition
includes new material on the key features of J2SE 5, conceptual
introductions to JDBC and J2EE, and an in-depth treatment of the critical
design principles of model-data layer separation and model-view separation.

Despite the plethora of beginning Java titles on the market, this book is
truly unique in its coverage of three critical topicsobject concepts, UML
modeling, and Java programmingwithin a single cover. Its ideal for both
individual self-study and as a university-level textbook. Let Beginning
Java Objects, Second Edition be your guide!


Beginning GIMP: From Novice to Professional

Posted: 16 Mar 2009 12:49 AM PDT

Beginning GIMP: From Novice to Professional

Product Description

From first installation to advanced image manipulation techniques,
Beginning GIMP: From Novice to Professional, Second Edition explains how
anyone can utilize The GIMP: a free, open source image manipulation
program. You will learn how to install The GIMP on Windows, Linux, and
MacOS X platforms. Once you've installed the application, you'll learn
about the interface and configuration options, and then jump into a quick
and simple project to familiarize yourself.

With four–color graphics and screenshots throughout, you'll learn how to
prepare camera images for display on web pages—including processes like
rescaling, cropping, and balancing color. Utilizing layers, paths, and
masks are also covered in extensive detail. Of course, you will also learn
how to draw lines and shapes; utilize patterns and gradients; and even
create your own brushes, patterns, and gradients.

GIMP expert and author Akkana Peck teaches you how to touch up digital
photographs, smudging away blemishes, fixing red–eye, and stitching
panoramic images. You'll learn how to tap into the powerful filters,
effects, and plug–ins that are available for The GIMP and automate tasks
using scripts. The entire book is approached in a project–based manner, and
as you progress, numerous projects will help strengthen your newly acquired
What you'll learn

Install The GIMP on Windows, Linux, and Mac OSX.
Explore the interface and configuration options.
Prepare your camera images for use on the Web, including rescaling,
cropping, and balancing color.
Learn basic techniques such as drawing lines and shapes, utilizing
patterns, and making use of gradients.
Master advanced techniques such as layers, paths, and masks.
Create your own brushes, patterns, and gradients.
Discover tricks for fixing blemishes, removing redeye, and stitching
together panoramic images.


Creating Brain-Like Intelligence: From Basic Principles to Complex
Intelligent Systems

Posted: 16 Mar 2009 12:49 AM PDT

Creating Brain-Like Intelligence: From Basic Principles to Complex
Intelligent Systems

Product Description

This state-of-the-art-survey documents the scientific outcome of the
International Symposium „Creating Brain-Like Intelligence, which took place
in Hohenstein, Germany, in February 2007. It presents an introduction to
this emerging interdisciplinary field by drawing together 15 articles from
researchers across a broad range of disciplines.

Brain-Like intelligence attempts a representation of the environment
including the system itself. It has to cope with a continuous influx of an
immense amount of mostly unspecific information and cannot be identified
with a singular functionality. It is the versatility of brain-like
intelligence, its robustness and plasticity which makes it the object of
our quest.

After 50 years of artificial intelligence research however, we are still
not able to mimic even the lower level sensory capabilities of animals. But
we are beginning to move in the right direction by identifying the biggest
obstacles and starting to understand the autonomy, flexibility, and
robustness of intelligent biological systems. This collection of articles
is evidence of this progress and represents the current state of art in
several research fields that are embraced by brain-like intelligence.


Swarm Creativity: Competitive Advantage through Collaborative Innovation

Posted: 16 Mar 2009 12:48 AM PDT

Swarm Creativity: Competitive Advantage through Collaborative Innovation

Filled with real examples and practical suggestions, this thought-provoking
book gives insightful guidance to anyone trying to harness the power of
collaborative innovation unleashed by todays new communication
technologies. Thomas W. Malone, Director, MIT Center for Coordination
Science, and Patrick J. McGovern Professor of Management, MIT Sloan School
of Management

This book illustrates that collaboration is key for successful companies.
It shows how collaboration and innovation extends into all aspects of daily
business life. Applying the principles outlined in this book will help
companies to innovate by working together and learning from each other in
social networks. Dirk Havighorst, Senior Manager Procurement & Supply,

Swarm Creativity brings a totally fresh look at innovation and
collaboration. This book is a must-read for anyone in a business who is
faced with the need to constantly innovate in order to remain competitive.
It helps organizations shape their strategies based on principles of social
networks, ethics, and meritocracy. By becoming Collaborative Innovation
Networks, organizations will increase performance and become more creative.
Kurt Wolf, Managing Director, UBS

Peter Gloor offers a visionary guide into novel organizational forms and
the opportunities they present for innovative companies. This is a wake-up
call, challenging our most basic assumptions about management of
organizations. His timing is perfect: loosen the hierarchyharness
democracythink not of employees, but of partners. This is a book packed
with insights and wisdom. Leadership would be well served to incorporate
its lessons into the new networkedbusiness world of today. Walter Etter,
COO, Banca del Gottardo, Switzerland

We live in the age of networks. We advise young people to build networks to
advance their careers. We study organizations by assessing the networks
that develop within and among them. We encourage firms with like technology
to cluster geographically so their scientists can network. And, of course,
there is the Internet that has changed the world, scientifically, socially,
and politically. Peter Gloor takes us through one of the most important of
these developments: the creation of Collaborative Innovation Networks
Thomas J. Allen, Howard W. Johnson Professor of Management and Professor of
Engineering Systems, MacVicar Faculty Fellow, Massachusetts Institute of

Gloors contribution is the enumeration of a set of principles to improve
the probability of incubating a successful collaboration network.Journal of
Product Innovation Management


Data Mining and Medical Knowledge Management: Cases and Applications

Posted: 16 Mar 2009 12:20 AM PDT

Data Mining and Medical Knowledge Management: Cases and Applications

Product Description

The healthcare industry produces a constant flow of data, creating a need
for deep analysis of databases through data mining tools and techniques
resulting in expanded medical research, diagnosis, and treatment.
Data Mining and Medical Knowledge Management: Cases and Applications
presents case studies on applications of various modern data mining methods
in several important areas of medicine, covering classical data mining
methods, elaborated approaches related to mining in electroencephalogram
and electrocardiogram data, and methods related to mining in genetic data.
A premier resource for those involved in data mining and medical knowledge
management, this book tackles ethical issues related to cost-sensitive
learning in medicine and produces theoretical contributions concerning
general problems of data, information, knowledge, and ontologies.

About the Author

Petr Berka is a full professor at the Department of Information and
Knowledge Engineering, University of Economics and also works in the Centre
of Biomedical Informatics, Institute of Computer Science, Academy of
Sciences of the Czech Republic. His main research interests are machine
learning, data mining and knowledge-based systems.

Jan Rauch is an associate professor at the Deptartment of Information and
Knowledge Engineering, University of Economics and also works in the Centre
of Biomedical Informatics, Institute of Computer Science, Academy of
Sciences of the Czech Republic. His main research interest is data mining.

Djamel Abdelkader Zighed received his Master in Computer and Automatic
Science in 1982 and his PhD in computer science in 1985 both from
University Lyon I. He was as assistant professor at University Lyon 1 in
1984-1987. In 1987, he joined the University Lyon II where he worked as
lecturer (1987-1991), professor (1991-2000) and 1st class professor (2000 -
present). He is interested in data mining (including mining complex data),
machine learning and knowledge engineering. He is the founder and was
director (1995-2002) of the ERIC laboratory (laboratory for development of
methods and software for knowledge engineering, and more specifically
automatic Knowledge Discovery in Databases).


Security Engineering for Service-Oriented Architectures

Posted: 16 Mar 2009 12:19 AM PDT

Security Engineering for Service-Oriented Architectures

Product Description

While their basic principles and ideas are well understood and cogent from
a conceptual perspective, the realization of interorganizational workflows
and applications based on service-oriented architectures (SOAs) remains a
complex task, and, especially when it comes to security, the implementation
is still bound to low-level technical knowledge and hence inherently

Hafner and Breu set a different focus. Based on the paradigm of
model-driven security, they show how to systematically design and realize
security-critical applications for SOAs. In their presentation, they first
detail how systems and security engineering go hand in hand and are
integrated from the very start in the requirements elicitation and the
design phase. In a second step, they apply the principles of model-driven
security to SOAs. Model-driven security is an engineering paradigm that
aims at the automatic generation of security-critical executable software
for target architectures. Based on the general principles of model-driven
software development, the automation of security engineering through proven
and reliable mechanisms guarantees correctness and facilitates an agile and
flexible approach to the implementation and high-level management of
security-critical systems.

Their book addresses IT professionals interested in the design and
realization of modern security-critical applications. It presents a
synthesis of various best practices, standards and technologies from
model-driven software development, security engineering, and SOAs. As a
reader, you will learn how to design and realize SOA security using the
framework of an extensible domain architecture for model-driven security.