- SQL Server 2005 T-SQL Recipes: A Problem-Solution Approach
- Pro SQL Server Reporting Services
- 1000 Java Tips
- The Art of Intrusion
- Create Your Own Home Networks
- The Art of Deception: Controlling the Human Element of Security
- XNA 3.0 Game Programming Recipes: A Problem-Solution Approach
- Networking Fundamentals: Wide, Local and Personal Area Communications
- Digital Photos, Movies, & Music Gigabook For Dummies
- CRM as a Rapid Development Platform
Posted: 28 May 2009 05:37 PM PDT
When it comes to performing your daily SQL Server tasks, technical documentation tends to tell you more than you need to know.
Posted: 28 May 2009 05:36 PM PDT
At its core, the process of designing reports hasn't changed substantially in the past 15 years. The report designer lays out report objects, which contain data from a known data source, in a design application such as Crystal Reports or Microsoft Access. He or she then tests report execution, verifies the accuracy of the results, and distributes the report to the target audience.
Posted: 28 May 2009 05:34 PM PDT
Posted: 28 May 2009 05:33 PM PDT
It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. He clearly inspires unusual fear in the authorities and unusual dedication in the legions of computer security dabblers, legal and otherwise.
Renowned for his use of “social engineering,” the art of tricking people into revealing secure information such as passwords, Mitnick (The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda–style terrorist; and a prison convict leverages his computer skills to communicate with the outside world, unbeknownst to his keepers. Mitnick’s handling of these engrossing tales is exemplary, for which credit presumably goes to his coauthor, writing pro Simon. Given the complexity (some would say obscurity) of the material, the authors avoid the pitfall of drowning readers in minutiae. Uniformly readable, the stories—some are quite exciting—will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry.
Posted: 28 May 2009 05:31 PM PDT
You have a family computer for e-mail and browsing the Internet. Your son and daughter have their own computer for school work and your spouse has a laptop that he or she brings home from work every day. With your family spread out all over the house on their computers, wouldn’t it be nice if you could make them all work together? Create Your Own Home Networks is a unique book that will show you how to make your home computers talk to each other while sharing files, music and printers. The most common networking tasks are presented in project-format that doesn’t require any in-depth understanding of computer systems or networks beyond that of a typical computer user. You will learn how to setup your computers to:
Share printers, files, and Internet connections
You’ll also get tips on choosing the right networking equipment, hiding wires and patching holes in your drywall, and when to call the pros. Create Your Own Home Networks is all that you need to get started on creating your very own home network.
Posted: 28 May 2009 04:58 PM PDT
Mitnick is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie War Games. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security.
It’s not clear whether this book is a means toward that end or a, wink-wink, fictionalized account of his exploits, with his name changed to protect his parole terms. Either way, it’s a tour de force, a series of tales of how some old-fashioned blarney and high-tech skills can pry any information from anyone. As entertainment, it’s like reading the climaxes of a dozen complex thrillers, one after the other. As a security education, it’s a great series of cautionary tales; however, the advice to employees not to give anyone their passwords is bland compared to the depth and energy of Mitnick’s descriptions of how he actually hacked into systems. As a manual for a would-be hacker, it’s dated and nonspecific better stuff is available on the Internet but it teaches the timeless spirit of the hack. Between the lines, a portrait emerges of the old-fashioned hacker stereotype: a socially challenged, obsessive loser addicted to an intoxicating sense of power that comes only from stalking and spying.
Posted: 28 May 2009 04:57 PM PDT
Join the game development revolution today! XNA 3.0 greatly simplifies the development of your own games, lowering the barrier for programmers to get into game development. In XNA, you can start coding your games from the very start, a true revelation compared to other game programming environments. XNA doesn't sacrifice power for this ease of use—it is built entirely on DirectX technology.
Completely updated for XNA 3.0, expert Riemer Grootjans brings together a selection of the hottest recipes in XNA programming for the Xbox 360, PC, and Zune. Advanced XNA programmers, experienced coders new to game development, and even complete beginners will find XNA 3.0 Game Programming Recipes an invaluable companion whether building games for fun or as commercial products.
Posted: 28 May 2009 04:55 PM PDT
Part I explains the principles of design and analysis of information networks at the lowest layers. It concentrates on the characteristics of the transmission media, applied transmission and coding, and medium access control. Parts II and III are devoted to detailed descriptions of important WANs and LANs respectively with Part II describing the wired Ethernet and Internet as well as cellular networks while Part III covers popular wired LANs and wireless LANs (WLANs), as well as wireless personal area network (WPAN) technologies. Part IV concludes by examining security, localization and sensor networking. The partitioned structure of the book allows flexibility in teaching the material, encouraging the reader to grasp the more simple concepts and to build on these foundations when moving onto more complex information.
Networking Fundamentals contains numerous illustrations, case studies and tables to supplement the text, as well as exercises with solutions at the end of each chapter. There is also a companion website with password protected solutions manual for instructors along with other useful resources.
Posted: 28 May 2009 04:53 PM PDT
* Covers printing and sharing pictures, selecting a camcorder, capturing good film footage, and importing video clips
Posted: 28 May 2009 04:50 PM PDT
We will explore how its declarative data modeling, security model, dynamic SOA Web Service creation and other platform services make it a fast and easy platform for development. CRM 4.0 uses popular developer technologies like SQL Server, SQL Server Reporting Services and Windows Workflow Foundation for process automation. See how you can build your applications on top of it, integrate with it or simply extend it using ASP.NET, SharePoint, Silverlight, Virtual Earth, Custom Workflow Activities, Mobile and more.
|You are subscribed to email updates from Download Free Computer Ebooks - NET BOOKS |
To stop receiving these emails, you may unsubscribe now.
|Email delivery powered by Google|
|Inbox too full?|
|If you prefer to unsubscribe via postal mail, write to: Download Free Computer Ebooks - NET BOOKS, c/o Google, 20 W Kinzie, Chicago IL USA 60610|