Download Free Computer Ebooks - NET BOOKS

Download Free Computer Ebooks - NET BOOKS

OPC Unified Architecture

Posted: 04 May 2009 05:49 PM PDT

 OPC Unified Architecture

OPC Unified Architecture

Product Description

The OPC Foundation defines standards for online data exchange between automation systems. They address access to current data (OPC DA), alarms and events (OPC A&E) and historical data (OPC HDA). Those standards are successfully applied in industrial automation.

The new OPC Unified Architecture (OPC UA) unifies the existing standards and brings them to state-of-the-art technology using service-oriented architecture (SOA). Main advantages of the new standard are:

Platform-independent technology allows the deployment of OPC UA beyond current OPC applications only running on Windows-based PC systems. OPC UA can also run on embedded systems as well as Linux / UNIX based enterprise systems.

The provided information can be generically modeled and therefore arbitrary information models can be provided using OPC UA.

This book gives an easy to understand introduction into OPC UA and explains the concepts of the standard and other relevant topics that are not directly addressed by the standard.

download

Social Computing in Homeland Security: Disaster Promulgation and Response

Posted: 04 May 2009 05:46 PM PDT

Social Computing in Homeland Security: Disaster Promulgation and Response

Social Computing in Homeland Security: Disaster Promulgation and Response

Product Description
The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face.

Social Computing in Homeland Security: Disaster Promulgation and Response presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.
About the Author
Amy Wenxuan Ding is an assistant professor at University of Illinois (USA). She received a PhD in information technology and cognitive science from Carnegie Mellon University (USA). She specializes in computational intelligence, mathematical description of natural intelligence, and advanced methods of modeling, simulation, and decision making. She has published numerous papers at various top-tiered academic journals. Currently she is an associate editor of the Journal of Defense Modeling and Simulation, and serves on the editorial boards of the International Journal of Social and Humanistic Computing and International Journal of Electronic Banking.

download

Embedded Memories for Nano-Scale VLSIs

Posted: 04 May 2009 05:43 PM PDT

Embedded Memories for Nano-Scale VLSIs

Embedded Memories for Nano-Scale VLSIs

Product Description

The book provides a comprehensive and in-depth view on the state-of-the-art embedded memory technologies. The book helps practicing engineers grasp key technology attributes and advanced design techniques in nano-scale VLSI design. It also helps them make decisions concerning the right design tradeoffs in real product development.

This book first provides an overview on the landscape and trend of embedded memory in various VLSI system designs, including high-performance microprocessor, low-power mobile handheld devices, micro-controllers, and various consumer electronics. It then shows an in-depth view on each different type of embedded memory technology, including high-speed SRAM, ultra-low-voltage and alternative SRAM, embedded DRAM, embedded nonvolatile memory, and emerging or so-called "universal" memories such as FeRAM, MRAM, and PRAM. Each topic covers all the key technology attributes from a product application perspective, ranging from technology scaling challenges to advanced circuit techniques for achieving optimal design tradeoff in performance and power. As VLSI systems become increasingly dependent on on-die memory to provide adequate memory bandwidth for various applications, the book gives readers a broader view of this important field and helps them to achieve their optimal design goals for different applications.

This book provides readers a broad knowledge on the entire embedded memory technologies in order to better comprehend the technologies and create optimal memory solutions in real applications.

download

VB.NET for Beginners to Programming Workbook and Videos

Posted: 04 May 2009 04:59 PM PDT


Home: http://www.learnvisualstudio.net/content/series/vbdotnet_for_beginners_to_programming_workbook_and_videos.aspx
This unique series features 23 lessons, each lesson containing a workbook chapter with questions, exercises, further readings and one or more videos that step an absolute beginner through learning the most fundamental Visual Basic.NET topic matter. If you have never programmed before and want to learn Visual Basic.NET, this is a great place to start.

Anatomy of The Curriculum

Each of the “First Time Programmers” series contains two workbooks, a Questions edition and an Answers edition, which is identical to the Questions edition but contains the answers to all the questions in blue text.

download links:
http://rapidshare.com/files/229245809/vbdotnet.part2.rar
http://rapidshare.com/files/229245989/vbdotnet.part1.rar

Lynda Flash CS4 Professional Tools for Character Animation Tutorial

Posted: 04 May 2009 04:33 PM PDT


The animation tools have been greatly enhanced in Flash CS4, and Todd Perkins teaches their advanced capabilities in Flash CS4 Professional Tools for Character Animation. He shows how to master the new Motion Tween model and the Motion Editor to control easing and effects such as Squash and Stretch. He demonstrates how to use the new 3D tools to add rotation, perspective shadows, and layered animations. Complex interactive animations and walk cycles are created without a line of code using bone systems. Todd also demonstrates the power of advanced masking, sound effect syncing, and much more. Exercise files accompany the course.

download links:
http://rapidshare.com/files/229241477/Flash_20CS4_20Professional_20Tools_20for_20Character_20Animation_20Exercise_20Files.rar
http://rapidshare.com/files/229241562/Flash_CS4_Professional_Tools_for_Character_Animation.part2.rar
http://rapidshare.com/files/229241643/Flash_CS4_Professional_Tools_for_Character_Animation.part1.rar

Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO

Posted: 04 May 2009 12:53 PM PDT

Lee Jordan, “Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO”
Packt Publishing | ISBN: 184719317X | 2008 | 356 pages | PDF | 12,7 MB

This book will take you beyond the basics of Blogger, helping you take full advantage of the rich and powerful features of Blogger to transform your blog into a fresh and state-of-the-art blog as quickly and painlessly as possible. The book is aimed at current users of the Blogger platform who want to get the most out of Blogger and people who use a different blogging platform and are planning on switching to Blogger.

Blog owners who promote their own services, expertise, and products, and want to increase their blog’s success by pushing the limits of what Blogger can do will get the most out of this book. The book doesn’t require any specific knowledge of Blogger or the related technologies: RSS, CSS, HTML, and XML. Everything you need to know to grow beyond the basics is covered in this book. The companion website to this book (http://bloggerbeefedup.blogspot.com) includes free resource images and content.

Download
Uploading

Rapidshare

Simple Computer Security: Disinfect Your PC

Posted: 04 May 2009 12:48 PM PDT

CA, Jim Geier, Eric Geier, “Simple Computer Security: Disinfect Your PC”
Wiley | 2007 | ISBN: 047006854X | 332 pages | PDF | 7,8 MB

Hands-on guide to the CA Internet Security Suite, which includes Parental Controls (blocks offensive Web sites, controls program use, and monitors Internet activity); Anti-Spyware (sweeps PCs of malicious software like spyware and adware); Anti-Spam (ensures that computer users get messages from people they know, while redirecting messages from people they don’t);

Anti-Virus (detects and removes computer viruses); and Personal Firewall (prevents hackers from attacking a PC)
CA will include a special version of their $70 suite free with this book, which contains separate applications for Parental Controls, Anti-Spyware, Anti-Spam, Anti-Virus, and a Personal Firewall (good for 6 months)

Download
Uploading
Rapidshare

Advanced Number Theory

Posted: 04 May 2009 12:39 PM PDT

Harvey Cohn, “Advanced Number Theory”
Dover Publications | 1980 | ISBN: 048664023X | 288 pages | PDF | 9,2 MB

Eminent mathematician, teacher approaches algebraic number theory from historical standpoint. Demonstrates how concepts, definitions, theories have evolved during last 2 centuries. Abounds with numerical examples, over 200 problems, many concrete, specific theorems. Numerous graphs, tables.

Download
Uploading
Rapidshare

Numerical Methods in Engineering with MATLAB

Posted: 04 May 2009 12:35 PM PDT

Jaan Kiusalaas, “Numerical Methods in Engineering with MATLAB®”
Cambridge University Press | 2005 | ASIN: B000URVB0Q | 434 pages | PDF | 7,7 MB

Numerical Methods in Engineering with MATLAB® is a text for engineering students and a reference for practicing engineers, especially those who wish to explore the power and efficiency of MATLAB®. Examples and applications were chosen for their relevance to real world problems, and where numerical solutions are most efficient. Numerical methods are discussed thoroughly and illustrated with problems involving both hand computation and programming.

MATLAB® mfiles accompany each method and are available on the book web site. This code is made simple and easy to understand by avoiding complex bookkeeping schemes, while maintaining the essential features of the method. MATLAB® was chosen as the example language because of its ubiquitous use in engineering studies and practice. Moreover, it is widely available to students on school networks and through inexpensive educational versions. Explore numerical methods with MATLAB®, a great tool for teaching scientific computation.

Download
Uploading
Rapidshare

Computer Security Basics

Posted: 04 May 2009 12:28 PM PDT

Rick Lehtinen, G.T. Gangemi, “Computer Security Basics”
O’Reilly Media, Inc.; 2 ed | 2006 | ISBN: 0596006691 | 310 pages | CHM | 1,6 MB

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.

This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.
Topics include:
Computer security concepts
Security breaches, such as viruses and other malicious programs
Access controls
Security policy
Web attacks
Communications and network security
Encryption
Physical security and biometrics
Wireless network security
Computer security and requirements of the Orange Book
OSI Model and TEMPEST

Download
Uploading
Rapidshare