Download Free Computer Ebooks - NET BOOKS

Download Free Computer Ebooks - NET BOOKS

Live Lessons Python Fundaments

Posted: 17 Apr 2009 07:29 AM PDT


Live Lessons Python Fundaments | 2.2 GB

In this one-of-a-kind video package, leading Python developer and trainer Wesley Chun helps you learn Python quickly and comprehensively, so that you can immediately succeed with any Python project. Just click and watch: One step at a time, you will master Python fundamentals. If you already have Python experience, these videos will help further develop your skills. The lessons start with an introduction to the core features of the Python language, including syntax basics and standard types and operations. The lessons progress into advanced topics, such as Python's memory model and object-oriented programming.

download links:
http://rapidshare.com/files/221587010/LL.Python.part01.rar
http://rapidshare.com/files/221587192/LL.Python.part02.rar
http://rapidshare.com/files/221579469/LL.Python.part03.rar
http://rapidshare.com/files/221653062/LL.Python.part04.rar
http://rapidshare.com/files/221615043/LL.Python.part05.rar
http://rapidshare.com/files/221580654/LL.Python.part06.rar
http://rapidshare.com/files/221630948/LL.Python.part07.rar
http://rapidshare.com/files/221605105/LL.Python.part08.rar
http://rapidshare.com/files/221588053/LL.Python.part09.rar
http://rapidshare.com/files/221582062/LL.Python.part10.rar
http://rapidshare.com/files/221595943/LL.Python.part11.rar
http://rapidshare.com/files/221653013/LL.Python.part12.rar
http://rapidshare.com/files/221596448/LL.Python.part13.rar
http://rapidshare.com/files/221596757/LL.Python.part14.rar
http://rapidshare.com/files/221638140/LL.Python.part15.rar
http://rapidshare.com/files/221657533/LL.Python.part16.rar
http://rapidshare.com/files/221597628/LL.Python.part17.rar
http://rapidshare.com/files/221606144/LL.Python.part18.rar
http://rapidshare.com/files/221606321/LL.Python.part19.rar
http://rapidshare.com/files/221657403/LL.Python.part20.rar
http://rapidshare.com/files/221660829/LL.Python.part21.rar
http://rapidshare.com/files/221620104/LL.Python.part22.rar

Sam Bowne CNIT-123 Ethical Hacking And Network Defense

Posted: 17 Apr 2009 01:41 AM PDT


CNIT 123 Ethical Hacking and Network Defense

Catalog Description
Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.

Prerequisites: CNIT 106 and 120 or equivalent familiarity with the fundamentals of networking and security.

Upon successful completion of this course, the student will be able to:
Explain what an ethical hacker can and can not do legally, and explain the credentials and roles of penetration testers.
Define the types of malicious software found in modern networks.
Explain the threats and countermeasures for physical security and social engineering.
Perform footprinting to learn about a company and its network.
Perform port scans to locate potential entry points to servers and networks.
Perform enumeration (finding resources, accounts, and passwords) on Microsoft, Netware, and Unix/Linux targets.
Perform very simple programming in C, HTML, and Perl, specifically oriented towards the needs of network security professionals.
Learn how to identify Microsoft Windows vulnerabilities and to harden systems.
Learn how to identify Linux vulnerabilities and to protect servers.
Describe how to take control of Web Servers, and how to protect them.
Locate and hack into wireless networks, and protect them.
Explain how cryptography and hashing work, and perform attacks against them such as password cracking and man-in-the-middle attacks.
Describe and deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.
Textbooks
Hands-On Ethical Hacking and Network Defense by Michael T. Simpson — ISBN: 0-619-21708-1 Buy from Amazon

CNIT 123: Ethical Hacking and Network Defense — Lecture Notes and Projects (Spring 2008 Revision) by Sam Bowne (buy it at the CCSF Bookstore)
download links:
http://rapidshare.com/files/222349758/S.Bowne.CNIT.part15.rar
http://rapidshare.com/files/222350475/S.Bowne.CNIT.part12.rar
http://rapidshare.com/files/222350492/S.Bowne.CNIT.part03.rar
http://rapidshare.com/files/222350559/S.Bowne.CNIT.part09.rar
http://rapidshare.com/files/222350566/S.Bowne.CNIT.part07.rar
http://rapidshare.com/files/222350589/S.Bowne.CNIT.part02.rar
http://rapidshare.com/files/222350635/S.Bowne.CNIT.part06.rar
http://rapidshare.com/files/222350641/S.Bowne.CNIT.part10.rar
http://rapidshare.com/files/222350684/S.Bowne.CNIT.part14.rar
http://rapidshare.com/files/222350689/S.Bowne.CNIT.part11.rar
http://rapidshare.com/files/222350691/S.Bowne.CNIT.part08.rar
http://rapidshare.com/files/222350702/S.Bowne.CNIT.part04.rar
http://rapidshare.com/files/222350716/S.Bowne.CNIT.part01.rar
http://rapidshare.com/files/222350739/S.Bowne.CNIT.part13.rar
http://rapidshare.com/files/222350748/S.Bowne.CNIT.part05.rar

Ruby for Rails: Ruby Techniques for Rails Developers

Posted: 16 Apr 2009 11:06 PM PDT

Ruby for Rails: Ruby Techniques for Rails Developers

Ruby for Rails: Ruby Techniques for Rails Developers

Product Description
-The word is out: with Ruby on Rails you can build powerful Web applications easily and quickly! And just like the Rails framework itself, Rails applications are Ruby programs. That means you can’t tap into the full power of Rails unless you master the Ruby language.

Ruby for Rails, written by Ruby expert David Black (with a forward by David Heinemeier Hansson), helps Rails developers achieve Ruby mastery. Each chapter deepens your Ruby knowledge and shows you how it connects to Rails. You’ll gain confidence working with objects and classes and learn how to leverage Ruby’s elegant, expressive syntax for Rails application power. And you’ll become a better Rails developer through a deep understanding of the design of Rails itself and how to take advantage of it.

Newcomers to Ruby will find a Rails-oriented Ruby introduction that’s easy to read and that includes dynamic programming techniques, an exploration of Ruby objects, classes, and data structures, and many neat examples of Ruby and Rails code in action. Ruby for Rails: the Ruby guide for Rails developers!

What’s Inside

  • Classes, modules, and objects
  • Collection handling and filtering
  • String and regular expression manipulation
  • Exploration of the Rails source code
  • Ruby dynamics
  • Many more programming concepts and techniques!

    About the Author
    A Ruby community leader, David A. Black is a director of Ruby Central, the parent organization of the annual International Ruby Conference (RubyConf) and the International Rails Conference. David is a Ruby core contributor and the creator and maintainer of the Rails-based Ruby Change Request Archive (RCRchive). He lives and works as a consultant in New Jersey.

  • download

    Intelligent and Evolutionary Systems (Studies in Computational Intelligence)

    Posted: 16 Apr 2009 11:05 PM PDT

    Intelligent and Evolutionary Systems (Studies in Computational Intelligence)

    Intelligent and Evolutionary Systems (Studies in Computational Intelligence)

    Product Description

    Artificial evolutionary systems are computer systems, inspired by ideas from natural evolution and related phenomena. The field has a long history, dating back to the earliest days of computer science, but it has only become an established scientific and engineering discipline since the 1990s, with packages for the commonest form, genetic algorithms, now widely available.

    Researchers in the Asia-Pacific region have participated strongly in the development of evolutionary systems, with a particular emphasis on the evolution of intelligent solutions to highly complex problems. The Asia-Pacific Symposia on Intelligent and Evolutionary Systems have been an important contributor to this growth in impact, since 1997 providing an annual forum for exchange and dissemination of ideas. Participants come primarily from East Asia and the Western Pacific, but contributions are welcomed from around the World.

    This volume features a selection of fourteen of the best papers from recent APSIES. They illustrate the breadth of research in the region, with applications ranging from business to medicine, from network optimization to the promotion of innovation.

    download

    Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics

    Posted: 16 Apr 2009 11:03 PM PDT

    Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics

    Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics

    Product Description

    This book constitutes the refereed proceedings of the 6th European Conference on Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, EvoBIO 2008, held in Naples, Italy, in March 2008 colocated with the Evo* 2008 events.

    The 18 revised full papers were carefully reviewed and selected from 63 submissions. EvoBio is the premiere European event for experts in computer science meeting with experts in bioinformatics and the biological sciences, all interested in the interface between evolutionary computation, machine learning, data mining, bioinformatics, and computational biology. Topics addressed by the papers include biomarker discovery, cell simulation and modeling, ecological modeling, uxomics, gene networks, biotechnology, metabolomics, microarray analysis, phylogenetics, protein interactions, proteomics, sequence analysis and alignment, as well as systems biology.

    download

    Beginning Java EE 5: From Novice to Professional

    Posted: 16 Apr 2009 11:02 PM PDT

    Beginning Java EE 5: From Novice to Professional

    Beginning Java EE 5: From Novice to Professional

    Product Description
    Sun’s new lightweight Java Enterprise Edition (EE) 5 is an extremely powerful platform for developing enterprise-level Java-based applications, primarily for the server. This book shows you how to harness that power, examining how the pieces of the new Java EE 5 platform fit together, including the newly redesigned annotations-driven EJB 3 spec as well as JavaServer Faces (JSF), integrated into the platform for the first time.This book surpasses explaining how to code a JSP or an EJB: It explains when and where to use these APIs, what their strengths and weaknesses are, and perhaps most importantly, how to employ the best practices for using them

    .Hands-on tutorials are also included, along with clear explanations and working code examples. You will grow to take the next step, from writing client-side desktop applications to writing enterprise applications. You will also learn how to use the individual APIs and tools in the J2EE platform, and how to merge these to create your own enterprise applications.

    About the Author
    Kevin Mukhar is a software developer in Colorado Springs, Colorado. For the past 7 years, he has worked on various software systems using different Java Enterprise technologies. He has coauthored several other books, including <i>Beginning Java Databases</i>, and <i>The Ultimate Palm Robot</i>. In addition to developing software during the day, he is working on a master’s degree in computer science.Chris Zelenak is a programmer at Learning Assistant Technologies, where he helps in the development of server-side Cocoon and Rails applications, Java and .NET client applications, and rampant devil’s advocacy. He recently graduated from the Computer Science department of Indiana Wesleyan University.

    James L. Weaver is the chief scientist at Learning Assistant Technologies, a company that specializes in developing learner-centric tools. He is also the president of JMentor, a Java mentoring, training, and consulting practice.

    Jim Crume is a Java architect at Fusion Alliance, an Indianapolis, Indiana-based consulting company that specializes in web application development. Jim has spent many years as a consultant, and specializes in architecting and developing web-based systems, but he particularly enjoys Java.

    download

    Stream Data Processing: A Quality of Service Perspective: Modeling, Scheduling, Load Shedding, and Complex Event Processing

    Posted: 16 Apr 2009 11:00 PM PDT

    Stream Data Processing: A Quality of Service Perspective: Modeling, Scheduling, Load Shedding, and Complex Event Processing

    Stream Data Processing: A Quality of Service Perspective: Modeling, Scheduling, Load Shedding, and Complex Event Processing

    Product Description

    Traditional database management systems, widely used today, are not well-suited for a class of emerging applications, such as computer network management, homeland security, sensor computing, and environmental monitoring. These applications need to continuously process large amounts of data coming in the form of a stream, and meet stringent response time requirements. Support for handling QoS metrics, such as response time, memory usage, and throughput, is central to any system proposed for the above applications.

    Stream Data Processing: A Quality of Service Perspective (Modeling, Scheduling, Load Shedding, and Complex Event Processing), presents a new paradigm suitable for stream and complex event processing. This book covers a broad range of topics in stream data processing and includes detailed technical discussions of a number of proposed techniques.

    This volume is intended as a textbook for graduate courses and as a reference book for researchers, advanced-level students in CS, and IT practitioners.

    download

    Game Design Workshop: Designing, Prototyping, and Playtesting Games (Gama Network Series)

    Posted: 16 Apr 2009 10:59 PM PDT

    Game Design Workshop: Designing, Prototyping, and Playtesting Games (Gama Network Series)

    Game Design Workshop: Designing, Prototyping, and Playtesting Games (Gama Network Series)

    Product Description
    Master the craft of game design so you can create that elusive combination of challenge, competition, and interaction that players seek. This design workshop begins with an examination of the fundamental elements of game design; then puts you to work in prototyping, playtesting, and redesigning your own games with exercises that teach essential design skills. Workshop exercises require no background in programming or artwork, releasing you from the intricacies of electronic game production, so you can develop a working understanding of the essentials of game design.

    The ideas and exercises in this Game Design Workshop answer the questions asked by every aspiring game designer: How do I learn to design games? What skills do I need to become a professional game designer? Game design is demystified with a clear, accessible analysis of the formal and dramatic systems of game design. Examples, illustrations, and exercises strengthen your understanding of what makes game systems function; and teach you the skills and tools that you need to create a compelling game.

    Refined over a number of years, this workshop curriculum has provided the foundation for hundreds of careers in all areas of the game industry including game design, producing, programming, visual design, quality assurance, and marketing. This guide to the language and business of game design will help anyone pursuing a career in the industry.

    download

    Data Compression: The Complete Reference

    Posted: 16 Apr 2009 10:58 PM PDT

    Data Compression: The Complete Reference

    Data Compression: The Complete Reference

    Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD ROMs, and from coding theory to image analysis, many facets of modern computing rely upon data compression.

    Data Compression provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions on the use and comparative benefits of methods and description of “how to” use them. The presentation is organized into the main branches of the field of data compression: run length encoding, statistical methods, dictionary-based methods, image compression, audio compression, and video compression. Detailed descriptions and explanations of the most well-known and frequently used compression methods are covered in a self-contained fashion, with an accessible style and technical level for specialists and nonspecialists. Topics and features: coverage of video compression, including MPEG-1 and H.261; thorough coverage of wavelets methods, including CWT, DWT, EZW and the new Lifting Scheme technique; complete audio compression; QM coder used in JPEG and JBIG, including new JPEG 200 standard; image transformations and detailed coverage of discrete cosine transform and Haar transform; coverage of EIDAC method for compressing simple images; prefix image compression; ACB and FHM curve compression; geometric compression and edgebreaker technique.
    Data Compression provides an invaluable reference and guide for all computer scientists, computer engineers, electrical engineers, signal/image processing engineers and other scientists needing a comprehensive compilation for a broad range of compression methods.

    download

    Database in Depth: Relational Theory for Practitioners

    Posted: 16 Apr 2009 10:56 PM PDT

    Database in Depth: Relational Theory for Practitioners

    Database in Depth: Relational Theory for Practitioners

    Product Description
    This book sheds light on the principles behind the relational model, which is fundamental to all database-backed applications–and, consequently, most of the work that goes on in the computing world today. “Database in Depth: The Relational Model for Practitioners” goes beyond the hype and gets to the heart of how relational databases actually work.

    Ideal for experienced database developers and designers, this concise guide gives you a clear view of the technology–a view that’s not influenced by any vendor or product. Featuring an extensive set of exercises, it will help you:

    understand why and how the relational model is still directly relevant to modern database technology (and will remain so for the foreseeable future)

    see why and how the SQL standard is seriously deficient

    use the best current theoretical knowledge in the design of their databases and database applications

    make informed decisions in their daily database professional activities

    “Database in Depth” will appeal not only to database developers and designers, but also to a diverse field of professionals and academics, including database administrators (DBAs), information modelers, database consultants, and more. Virtually everyone who deals with relational databases should have at least a passing understanding of the fundamentals of working with relational models.

    Author C.J. Date has been involved with the relational model from its earliest days. An exceptionally clear-thinking writer, Date lays out principle and theory in a manner that is easily understood. Few others can speak as authoritatively the topic of relational databases as Date can.

    download