Download Free Computer Ebooks - NET BOOKS

Download Free Computer Ebooks - NET BOOKS
Add to Google


CCNA Cisco Certified Network Associate Fast Pass 3rd Edition

Posted: 03 Jun 2009 05:11 PM PDT

CCNA Cisco Certified Network Associate Fast Pass 3rd Edition

CCNA Cisco Certified Network Associate Fast Pass 3rd Edition

Product Description
Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CCNA: Cisco Certified Network Associate Study Guide, 6th and Deluxe editions.

The book will consist of four high-level chapters, each mapping to the four main Domains of the exam skill-set. The book will drill down into the specifics of the exam, covering the following:

*Designing Cisco internetworks

*Developing an access list

*Evaluating TCP/IP communication

*Configuring routers and switches

*Configuring IP addresses, subnet masks, and gateway addresses

*Performing LAN, VLAN, and WAN troubleshooting

*Understanding rules for packet control

The interactive CD contains two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms.

download

Ajax Design Patterns

Posted: 03 Jun 2009 05:10 PM PDT

Ajax Design Patterns

Ajax Design Patterns

Product Description

Ajax, or Asynchronous JavaScript and XML, exploded onto the scene in the spring of 2005 and remains the hottest story among web developers. With its rich combination of technologies, Ajax provides a strong foundation for creating interactive web applications with XML or JSON-based web services by using JavaScript in the browser to process the web server response.

Ajax Design Patterns shows you best practices that can dramatically improve your web development projects. It investigates how others have successfully dealt with conflicting design principles in the past and then relays that information directly to you.

The patterns outlined in the book fall into four categories:

  • Foundational technology: Examines the raw technologies required for Ajax development
  • Programming: Exposes techniques that developers have discovered to ensure their Ajax applications are maintainable
  • Functionality and usability: Describes the types of user interfaces you’ll come across in Ajax applications, as well as the new types of functionality that Ajax makes possible
  • Development: Explains the process being used to monitor, debug, and test Ajax applications

Ajax Design Patterns will also get you up to speed with core Ajax technologies, such as XMLHttpRequest, the DOM, and JSON. Technical discussions are followed by code examples so you can see for yourself just what is-and isn’t-possible with Ajax. This handy reference will help you to produce high-quality Ajax architectures, streamline web application performance, and improve the user experience.

download

Designing Reliable and Efficient Networks on Chips

Posted: 03 Jun 2009 05:09 PM PDT

 Designing Reliable and Efficient Networks on Chips

Designing Reliable and Efficient Networks on Chips

Product Description

Developing NoC based interconnect tailored to a particular application domain, satisfying the application performance constraints with minimum power-area overhead is a major challenge. With technology scaling, as the geometries of on-chip devices reach the physical limits of operation, another important design challenge for NoCs will be to provide dynamic (run-time) support against permanent and intermittent faults that can occur in the system. The purpose of Designing Reliable and Efficient Networks on Chips is to provide state-of-the-art methods to solve some of the most important and time-intensive problems encountered during NoC design.

download

Cladding of Buildings

Posted: 03 Jun 2009 05:08 PM PDT

Cladding of Buildings

Cladding of Buildings

Product Description

Written by well-known specialists, this key, well-illustrated text addresses the topic of lightweight claddings in buildings and is a useful guide and reference. This new edition incorporates the latest environmental issues and use of new materials.

download

Guide to Wireless Sensor Networks

Posted: 03 Jun 2009 05:06 PM PDT

 Guide to Wireless Sensor Networks

Guide to Wireless Sensor Networks

Product Description

Wireless communication technologies continue to undergo rapid advancement. In recent years, there has been a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributed, autonomous sensor nodes equipped to sense specific information. WSNs can be found in a variety of both military and civilian applications worldwide. Examples include detecting enemy intrusion on the battlefield, object tracking, habitat monitoring, patient monitoring and fire detection. Sensor networks are emerging as an attractive technology with great promise for the future. However, challenges remain to be addressed in issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy efficiency and security. This highly useful guide presents a comprehensive account of the fundamental concepts, new ideas and results in the field of WSNs.

download

Linux Timesaving Techniques For Dummies

Posted: 03 Jun 2009 05:05 PM PDT

Linux Timesaving Techniques For Dummies

Linux Timesaving Techniques For Dummies

Product Description
Linux Timesaving Technique For Dummies provides experienced and first-time Linux users with concise, step-by-step, timesaving,powerful techniques to help them perform tasks efficiently. The techniques, broken down into task-oriented topic areas, are delivered without technical jargon and in the For Dummies friendly, easy-to-understand style. The book corresponds with the latest releases of the Fedora Core, SUSE, and Mandrake distributions. It has over 60 techniques that help users perform end-user, system administration, and development tasks in many areas, including the following: Desktop File system, RPM, Databases, Internet Server, Email Server, Networking, System monitoring, Security, Data Back-up and recovery, Programming (e.g., C and PHP), and Linux Kernel.

download

How to be a Programmer

Posted: 03 Jun 2009 05:04 PM PDT

How to be a Programmer

How to be a Programmer

The text is primarily concerned with social situations and team relationships that occur in typical software development. The author tried to cover what he considers the essential, often non-techncial, skills of the beginning, intermediate and advanced programmer. To the beginner, it may be a peek into the culture of the software engineer; to the advanced programmer, it is an opinionated review.

download

Gröbner Bases, Coding, and Cryptography

Posted: 03 Jun 2009 05:02 PM PDT

Gröbner Bases, Coding, and Cryptography

Gröbner Bases, Coding, and Cryptography

Product Description

Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside. Gröbner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations.

This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including encoding, construction, decoding, list decoding) are individually analysed, reporting all significant approaches appeared in the literature. Also, stream ciphers, PK cryptography, symmetric cryptography and Polly Cracker systems deserve each a separate chapter, where all the relevant literature is reported and compared. While many short notes hint at new exciting directions, the reader will find that all chapters fit nicely within a unified notation.

download

Voice over Internet Protocol (VoIP) Security

Posted: 03 Jun 2009 05:01 PM PDT

Voice over Internet Protocol (VoIP) Security

Voice over Internet Protocol (VoIP) Security

Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today’s complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.

* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures
. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation.
* In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability.

download

Financial Numerical Recipes in C++

Posted: 03 Jun 2009 04:59 PM PDT

Financial Numerical Recipes in C++

Financial Numerical Recipes in C++

In finance, there are areas where formulas tend to get involved. Sometimes it may be easier to follow an exact computer routine. The author made some C++ subroutines that implements common algorithms in finance. Typical examples are option/derivatives pricing, term structure calculations, mean variance analysis. These routines are presented together with a good deal of explanations and examples of use, but it is by no means a complete book with all the answers and explanations.

download