Download Free Computer Ebooks - NET BOOKS |
Flash CS4 Professional Building Search Engine Friendly Sites Posted: 15 Apr 2009 04:47 PM PDT
|
Groovebox Training - Antares AutoTune 5 Explained Posted: 15 Apr 2009 05:36 AM PDT
Auto-Tune Explained - Beginner to Intermediate |
M.O.C: Course 4994AL-Intro to Programming Microsoft .NET FW App with VS2005 Posted: 14 Apr 2009 11:51 PM PDT Introduction Course 4994AL: Five weeks: Microsoft Official Distance Learning (MODL) The target audience for this course includes both novice programmers who have a minimum of three months programming experience and intermediate-level programmers who are otherwise new to .NET Framework development, and want to learn how to use Visual Basic or Visual C#. After completing this course, students will be able to: * Create a simple Windows Forms application and explain programming fundamentals. |
Security in Computing Systems: Challenges, Approaches and Solutions Posted: 14 Apr 2009 11:32 PM PDT Product Description With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing. About the Author |
Posted: 14 Apr 2009 11:31 PM PDT Product Description This book provides the know-how that is required to successfully respond to counterfeit trade. It constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel management tools, and product protection technologies. The book thereby aids the definition and implementation of market monitoring, reaction, and prevention strategies. Key benefits are the unbiased analysis of the supply- and demand-side of the illicit market, the strong focus on assisting practitioners to deal with the challenge, as well as the high standard of research that supports the presented findings. |
The JavaScript Anthology 101 Essential Tips, Tricks & Hacks Posted: 14 Apr 2009 11:29 PM PDT Product Description
Included in this book is extensive coverage of DHTML and Ajax, including how-to create and customize advanced effects such as draggable elements, dynamically sorting data in a Web Browser, advanced menu systems, retrieving data from a Web Server using XMLHttpRequest and more. The JavaScript Anthology also includes extensive coverage of object oriented coding, efficient script design, accessibility, and cross-browser issues. Best of all, you’ll get download access to all the code used in the book, so you can put the scripts to use instantly. |
A Concise and Practical Introduction to Programming Algorithms in Java Posted: 14 Apr 2009 11:28 PM PDT Product Description A Concise and Practical Introduction to Programming Algorithms in Java has two main goals. The first is for novice programmers to learn progressively the basic concepts underlying most imperative programming languages using Java. The second goal is to introduce new programmers to the very basic principles of thinking the algorithmic way and turning the algorithms into programs using the programming concepts of Java. The book is divided into two parts and includes: The fundamental notions of variables, expressions and assignments with type checking - Conditional and loop statements - Explanation of the concepts of functions with pass-by-value arguments and recursion - Fundamental sequential and bisection search techniques - Basic iterative and recursive sorting algorithms. Each chapter of the book concludes with a set of exercises to enable students to practice concepts covered. |
Posted: 14 Apr 2009 11:27 PM PDT Product Description The Linux Cookbook covers everything you’d expect: backups, new users, and the like. But it also covers the non-obvious information that is often ignored in other books the time-sinks and headaches that are a real part of an administrator’s job, such as: dealing with odd kinds of devices that Linux historically hasn’t supported well, building multi-boot systems, and handling things like video and audio. The knowledge needed to install, deploy, and maintain Linux is not easily found, and no Linux distribution gets it just right. Scattered information can be found in a pile of man pages, texinfo files, and source code comments, but the best source of information is the experts themselves who built up a working knowledge of managing Linux systems. This cookbook’s proven techniques distill years of hard-won experience into practical cut-and-paste solutions to everyday Linux dilemmas. Use just one recipe from this varied collection of real-world solutions, and the hours of tedious trial-and-error saved will more than pay for the cost of the book. But those who prefer to learn hands-on will find that this cookbook not only solves immediate problems quickly, it also cuts right to the chase pointing out potential pitfalls and illustrating tested practices that can be applied to a myriad of other situations. Whether you’re responsible for a small Linux system, a huge corporate system, or a mixed Linux/Windows/MacOS network, you’ll find valuable, to-the-point, practical recipes for dealing with Linux systems everyday. The Linux Cookbook is more than a time-saver; it’s a sanity saver. About the Author |
Data Mining for Design and Marketing Posted: 14 Apr 2009 11:26 PM PDT Product Description The expert contributors discuss how data mining can identify valuable consumer patterns, which aid marketers and designers in detecting consumers' needs. They also explore visualization tools based on the computational methods of data mining. Discourse analysis, chance discovery, knowledge discovery, formal concept analysis, and an adjacency matrix are just some of the novel approaches covered. The book explains how these methods can be applied to website design, the retrieval of scientific articles from a database, personalized e-commerce support tools, and more. Through the techniques of data mining, this book demonstrates how to effectively design business processes and develop competitive products and services. By embracing data mining tools, businesses can better understand the behavior and needs of their customers. About the Author |
Posted: 14 Apr 2009 11:24 PM PDT Product Description Cellular Genetic Algorithms defines a new class of optimization algorithms based on the concepts of structured populations and Genetic Algorithms (GAs). The authors explain and demonstrate the validity of these cellular genetic algorithms throughout the book. This class of genetic algorithms is shown to produce impressive results on a whole range of domains, including complex problems that are epistatic, multi-modal, deceptive, discrete, continuous, multi-objective, and random in nature. The focus of this book is twofold. On the one hand, the authors present new algorithmic models and extensions to the basic class of Cellular GAs in order to tackle complex problems more efficiently. On the other hand, practical real world tasks are successfully faced by applying Cellular GA methodologies to produce workable solutions of real-world applications. These methods can include local search (memetic algorithms), cooperation, parallelism, multi-objective, estimations of distributions, and self-adaptive ideas to extend their applicability. The methods are benchmarked against well-known metaheuristics like Genetic Algorithms, Tabu Search, heterogeneous GAs, Estimation of Distribution Algorithms, etc. Also, a publicly available software tool is offered to reduce the learning curve in applying these techniques. The three final chapters will use the classic problem of "vehicle routing" and the hot topics of "ad-hoc mobile networks" and "DNA genome sequencing" to clearly illustrate and demonstrate the power and utility of these algorithms. |
You are subscribed to email updates from Download Free Computer Ebooks - NET BOOKS To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Inbox too full? Subscribe to the feed version of Download Free Computer Ebooks - NET BOOKS in a feed reader. | |
If you prefer to unsubscribe via postal mail, write to: Download Free Computer Ebooks - NET BOOKS, c/o Google, 20 W Kinzie, Chicago IL USA 60610 |