Download Free Computer Ebooks - NET BOOKS

Download Free Computer Ebooks - NET BOOKS

Windows® Small Business Server 2008 Administrator’s Companion

Posted: 30 Mar 2009 03:03 AM PDT

Windows® Small Business Server 2008 Administrators Companion

Windows® Small Business Server 2008 Administrator's Companion

Product Description
This comprehensive administrator s reference delivers the details you need to successfully deploy, manage, and support Windows Small Business Server 2008. The authors, experts in Microsoft operating systems and server technologies, provide easy-to-follow procedures, practical workarounds, and key troubleshooting tactics.

Delve into system features and capabilities and get hands-on insights for completing everyday tasks, including implementing messaging and collaboration, Internet access, database administration, security, faxing, support for line-of-business applications, and end-to-end network administration. This single volume covers all Small Business Server 2008 components, including Windows Server(r) 2008, Windows SharePoint(r) Services 3 technologies, Microsoft Exchange Server 2007 technologies, Microsoft SQL Server(r) 2008, Windows(r) Update Services 3.0, Web Server technologies, Windows Live OneCare for Server, and remote administration services. The book also includes timesaving tools and scripts and a complete eBook on the CD.

download

Visual Basic 2005 By Practice

Posted: 30 Mar 2009 02:52 AM PDT

Visual Basic 2005 By Practice

Visual Basic 2005 By Practice

Product Description
Learning an object oriented programming language like Visual Basic can be a challenging and often frustrating task. Many Visual Basic books are intimidating for the beginning programmer because they are mostly theory, making the material difficult to apply. Visual Basic 2005 by Practice cuts through the jargon and provides a better understanding of the language by teaching concepts through step-by-step, clear, and concise examples.

These examples provide an easy-to-follow and simple approach to learning the concepts and tools involved with Visual Basic 2005, including the new language features and controls needed to complete beginning and intermediate projects. The examples cover a vast array of language features, including flow charts, radio buttons, detailed message boxes, loading images dynamically, calculations, constants, variables, image lists, creating sub procedures, printing, adding forms to a project, data grids, and string functions. The book also covers important topics such as interactive programming, database features, debugging, and Web controls. The source code for all the examples in the book is provided on the companion CD-ROM, which allows you to see the programs in action and examine their features. The book is written for entry- and intermediate-level Visual basic programmers as well as those experienced with other programming languages, such as those experienced with other programming languages, such as C++, Java and BASIC, and the .NET Framework - Visual Basic’s development environment - is explained to the degree needed to learn programming. The user-friendly style, sequence of topical coverage, ample examples, and simple approach of this book make it a must-have for any beginning programmer eager to learn Visual Basic 2005.

download

Programming Microsoft Infopath: A Developer’s Guide

Posted: 30 Mar 2009 02:52 AM PDT

Programming Microsoft Infopath: A Developers Guide

Programming Microsoft Infopath: A Developer's Guide

Product Description
Create Applications that Gather, Process, and Analyze Information with InfoPath! InfoPath is one of the fastest growing products within the Microsoft Office System. It is a forms-based solution that streamlines the process of gathering, sharing, and using information by enabling teams and organizations to create, share, and work with dynamic forms.

Programming Microsoft InfoPath: A Developer’s Guide, Second Edition is a completely updated edition of the best-selling book that covers the new features and options of InfoPath with Service Pack 1, that center on east of use for end users and extensibility for developers. The book takes a practical and code-oriented approach to provide the essential skill set needed to develop and implement applications with InfoPath. Updated examples that clearly demonstrate the use of InfoPath with the Service Pack 1 extensions are also included. Programming Microsoft InfoPath: A Developer’s Guide, Second Edition is an ideal reference for developers creating distributed applications using InfoPath with Service Pack 1.

About the Author
Thom Robbins is the Director of Developer Outreach for Microsoft. He is responsible for working with the worldwide developer audience and delivering technical content and experiences that enhance their career and experiences with Microsoft. Thom is a regular speaker and author for a variety of magazines. He spends his time working with developers across the world on how they can best use Microsoft technologies.

download

Fundamentals of Computer Organization and Architecture

Posted: 30 Mar 2009 02:51 AM PDT

Fundamentals of Computer Organization and Architecture

Fundamentals of Computer Organization and Architecture

Product Description
This is the first book in the two-volume set offering comprehensive coverage of the field of computer organization and architecture. This book provides complete coverage of the subjects pertaining to introductory courses in computer organization and architecture, including:
* Instruction set architecture and design
* Assembly language programming

* Computer arithmetic
* Processing unit design
* Memory system design
* Input-output design and organization
* Pipelining design techniques
* Reduced Instruction Set Computers (RISCs)
The authors, who share over 15 years of undergraduate and graduate level instruction in computer architecture, provide real world applications, examples of machines, case studies and practical experiences in each chapter.

download

Introduction to Network Security

Posted: 30 Mar 2009 02:49 AM PDT

Introduction to Network Security

Introduction to Network Security

Product Description
In today’s online, connected world where computers outsell TVs and e-commerce sales surpass those of “brick-and-mortar” stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators who can protect networks is growing.

If you are tasked with protecting your networks from these threats, or are studying security, Introduction to Network Security will help you increase your understanding of potential threats, learn how to apply practical mitigation options, and react to attacks quickly. The book teaches you the skills and knowledge you need to design, develop, implement, analyze, and maintain networks and network protocols. It explains how these systems currently operate and the limitations that lead to security weaknesses. All of the fundamental issues needed to understand network security, including the definition of security terms, security ethics, the OSI network model, and cryptography for networks are covered in detail. The book focuses on the seven layers in the OSI network model by describing each overall layer, its security role, common vulnerabilities, and mitigation techniques. The discussion of each layer is followed by explicit examples of common protocols within the layer and their respective security issues. The last part of the book explores the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues. If you are new to network security, a general IT administrator, or a student, this is a must-have a resource to help ensure that you have the skills and knowledge required to protect your networks!

About the Author
Neal Krawetz (Fort Collins, CO) operates Hacker Factor Solutions and holds a Ph.D. in Computer Science from Texas A&M University. He is a computer security professional with experience in computer forensics, profiling, cryptography and cryptanalysis, artificial intelligence, and software solutions: architecture, design, research, and development.

download

Enterprise Web Services Security

Posted: 30 Mar 2009 02:49 AM PDT

Enterprise Web Services Security

Enterprise Web Services Security

Product Description
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security professionals need to build security policies and strategies from the ground up in a Web Services environment.

Most security books focus on computer or network security in isolation, relegating the other areas to overview chapters or appendices. A single-system view of security, however, is not adequate to describe a distributed Web Services-based environment as it causes the developer to have to piece together material from several resources in order to create secure Web sites and services. This book takes a holistic approach that mirrors the perspective developers need to take regardless of whether they are planning and implementing the security mechanisms for a Web Service, a Web site, or an enterprise. It details how to secure critical components such as workstations, servers, and networks, the goals behind an enterprise's security policies, the policies an organization should have in place, and how to communicate those policies using WS-Policy Framework and WS-Security Policy. Various threats and attacks are also covered, as well as the identity management, authentication, authorization, access control, confidentiality, and integrity mechanisms needed to protect messages and transactions. Enterprise Web Services Security is the one book developers need to make all their security mechanisms work successfully to thwart attacks and protect assets.

Key Features! * Teaches developers, application architects, and security professionals how to build security policies and select appropriate security mechanisms and strategies in a Web Services environment * Covers the underlying protocols and technologies that form the Internet (TCP/IP, HTTP) and Web Services (XML, SOAP, WSDL, UDDI), and the major XML and Web Services standards that are the basis of implementing security in a Web Services environment * Teaches how to implement and communicate security mechanisms using WSSecurity, XML Encryption, XML Signature, SAML, and XACML * Explores the importance of auditing at both the server and network level and how to create trust relationships and domains * Explains how to implement security policies and mechanisms in both J2EE and .NET * Includes a companion CD-ROM with all of the references, source code, and figures from the book ON THE CD (see Appendix B for more details) * Code Samples: Contains all of the XML listings from the book * References: Provides hyperlinks for all the reference materials used in the book * Work sheet: Includes a work sheet for deploying a Web Services system as described in the book * Figures: Includes all of the fi gures from the book by chapter SYSTEM REQUIREMENTS: Any Windows, Macintosh, or UNIX system that allows reading this CDROM and has the ability to view and display XML, text, PDF, and Microsoft Office files.

download

Digital Communication Systems Using SystemVue

Posted: 30 Mar 2009 02:48 AM PDT

Digital Communication Systems Using SystemVue

Digital Communication Systems Using SystemVue

Product Description
SystemVue (Formerly SystemView) by Agilent is a communication systems simulator with advanced capabilities for design, analysis, and implementation in DSP processors and in HDL. Digital Communication Systems Using SystemVue servers as an introduction to simulation for undergraduate students in a contemporary course, where it provides the opportunity to go beyond the lecture or the hardware laboratory.

Graduate students in a rigorous first course will find the SystemVue simulation environment an adjunct to their understanding of the concepts of digital communication systems, facilitating their projects and theses. Professionals, once having had a course primarily in analog communications, will be able to acquaint themselves with modern digital communications in the SystemVue simulation environment. An extensive discussion of the precepts of digital communications is coupled with simulation models and observed results. With clear and concise descriptions this is an essential guide for anyone wishing to understand digital communication systems through simulations using SystemVue.

Key Features: * A complete description of the Agilent SystemVue simulation environment suitable for undergraduate and graduate students and professionals * Describes the analysis and design of modern digital communication systems with noise and non-linearities using simulation models without analytical equations * Simulation results are used to illustrate and validate the concepts of digital communications with the complete development of the correlation receiver in AWGN and the power spectral density and bandwidth of modulated signals * Provides a translation of digital communication system block diagrams to the SystemVue simulation environment with a complete description of the parameters * Facilitates the what-ifs of digital communication system design by rapidly changing simulation parameters * Includes a CD-ROM of the simulation models, audio .wav files, and the Agilent SystemVue Textbook Edition software

On the CD-ROM The CD-ROM contains the SystemVue Textbook Edition application software from the Agilent that executes the simulation models in the text. The CD-ROM autoplays and installs the SystemVue Textbook Edition application software and the simulation models for each of the six chapters in individual folders under the Examples folder. The simulation models are referenced by figure numbers noted in the text.

System Requirements Communication systems simulations require large amounts of RAM and adequate processor speeds. Minimum requirements are a Pentium III 1 GHz processor with at least 256MB of RAM and the Windows 2000 or the Windows XP operating system. Available hard drive storage requirements for the CD-ROM are approximately 50MB, which includes the online SystemVue Help facility with the manuals and the SystemVue simulation models in the text.

download

The Software Vulnerability Guide

Posted: 30 Mar 2009 02:48 AM PDT

The Software Vulnerability Guide

The Software Vulnerability Guide

Product Description
In today's market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT infrastructures and the Internet.

Most of these security bugs (and the viruses, worms, and exploits that derive from them) started out as programmer mistakes. With this easy-to-use guide, professional programmers and testers will learn how to recognize and prevent these vulnerabilities before their software reaches the market. For each of the 30 common software vulnerabilities featured the authors provide a summary, description of how the vulnerability occurs, and famous examples of how it has been used. Tips on how to find and fix the vulnerability in software are also provided along with source code snippets, commentary, tools, and techniques in easy-to-read sidebars. This guide is a must-have for today's software developers.

KEY FEATURES
* Includes coding examples in a variety of languages, including C, C++, Java, VB, .NET, scripting languages, and more
* Provides tips for uncovering vulnerabilities in a diverse array of systems, including what it may look like in code, and how the offending code can be fixed
* Covers vulnerabilities such as permitting default or weak passwords, cookie poisoning, exchanging sensitive data in plain text, leaving things in memory, and format string attacks
* Includes a CD-ROM with all of the source code, as well as many freeware/shareware tools discussed in the book

About the Author
Herbert Thomas is the Director of Security Technology at Security Innovation LLC and serves on the graduate faculty of the Florida Institute of Technology. He is the co-author of How to Break Sofware Security: Effective Techniques for Security Testing and is a frequent speaker at industry conferences. Scott Chase is a Security Architect at SI Government Solutions, where he manages key research projects for the US government. He has also worked as a university researcher in information security and as a software tester in industry.

download

Innovative Cryptography

Posted: 30 Mar 2009 02:47 AM PDT

Innovative Cryptography

Innovative Cryptography

Product Description
Innovative Cryptography, Second Edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions.

The book also discusses the role of symmetric ciphers and symmetric block ciphers, and details the need for fast symmetric ciphers for hardware (DES), software (RC5, Blowfish), and universal (AES, RC6, Twofish, IDEA, GOST) implementations. In addition, the book covers the issues surrounding the development and design of software-oriented ciphers, including ciphers based on the algorithm formed depending on the secret key. Some specific issues related to the cryptographic strength of ciphers with the flexible algorithm of data transformation are considered, and a combinational probabilistic model is suggested for obtaining minimal evaluations of the software ciphers being considered. A highly promising new command suggested to be used in universal processors is also discussed. This command executes controlled bit permutation, and is expected to sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type. Innovative Cryptography, Second Edition is written for anyone involved in the development of cryptopgraphic tools, including engineers, researches, programmers, and IT security professionals.

About the Author
Nickolay Moldovyan, Ph.D., is the chief researcher of the Specialized Center of Program Systems (SPECTR), an instructor, and an honored Russian inventor. He is the author of 58 inventions and more than 250 printed publications in the field of information security and cryptography.

Alexander Moldovyan, Ph.D., is the chief designer of the Specialized Center of Program Systems (SPECTR), an instructor, and the author of 34 inventions and more than 200 printed publications in the field of information security and cryptography.

download

Digital Communication Systems Using SystemVue

Posted: 30 Mar 2009 01:32 AM PDT

Digital Communication Systems Using SystemVue

Digital Communication Systems Using SystemVue

Product Description
SystemVue (Formerly SystemView) by Agilent is a communication systems simulator with advanced capabilities for design, analysis, and implementation in DSP processors and in HDL. Digital Communication Systems Using SystemVue servers as an introduction to simulation for undergraduate students in a contemporary course, where it provides the opportunity to go beyond the lecture or the hardware laboratory.

Graduate students in a rigorous first course will find the SystemVue simulation environment an adjunct to their understanding of the concepts of digital communication systems, facilitating their projects and theses. Professionals, once having had a course primarily in analog communications, will be able to acquaint themselves with modern digital communications in the SystemVue simulation environment. An extensive discussion of the precepts of digital communications is coupled with simulation models and observed results. With clear and concise descriptions this is an essential guide for anyone wishing to understand digital communication systems through simulations using SystemVue.

Key Features: * A complete description of the Agilent SystemVue simulation environment suitable for undergraduate and graduate students and professionals * Describes the analysis and design of modern digital communication systems with noise and non-linearities using simulation models without analytical equations * Simulation results are used to illustrate and validate the concepts of digital communications with the complete development of the correlation receiver in AWGN and the power spectral density and bandwidth of modulated signals * Provides a translation of digital communication system block diagrams to the SystemVue simulation environment with a complete description of the parameters * Facilitates the what-ifs of digital communication system design by rapidly changing simulation parameters * Includes a CD-ROM of the simulation models, audio .wav files, and the Agilent SystemVue Textbook Edition software

On the CD-ROM The CD-ROM contains the SystemVue Textbook Edition application software from the Agilent that executes the simulation models in the text. The CD-ROM autoplays and installs the SystemVue Textbook Edition application software and the simulation models for each of the six chapters in individual folders under the Examples folder. The simulation models are referenced by figure numbers noted in the text.

System Requirements Communication systems simulations require large amounts of RAM and adequate processor speeds. Minimum requirements are a Pentium III 1 GHz processor with at least 256MB of RAM and the Windows 2000 or the Windows XP operating system. Available hard drive storage requirements for the CD-ROM are approximately 50MB, which includes the online SystemVue Help facility with the manuals and the SystemVue simulation models in the text.

download