Download Free Computer Ebooks - NET BOOKS

Download Free Computer Ebooks - NET BOOKS

CBT Nuggets: Cisco CCNA/CCENT – Exam-Pack 640-822: ICND1

Posted: 23 Jun 2009 04:09 PM PDT

Cisco CCNA/CCENT - Exam-Pack 640-822: ICND1

Wouldn’t it be cool to walk into a small business that has no network and configure a fairly advanced network from the ground up using Cisco gear? Let the CBT Nuggets’ Cisco CCNA/CCENT – Exam-Pack 640-822: ICND1 video series teach you the essential skills for passing the CCENT certification exam and meeting the network support needs of employers and clients.

Successful networking careers begin with Cisco CCENT certification and the fundamental knowledge it represents. Trainer Jeremy Cioara carefully explains the certification process by walking you through CCENT networking basics and mapping those basics directly to the exam. His organized and captivating presentation prepares new users for junior administrator positions and provides managers of any description with a sound understanding of what their technicians are talking about.

You proceed at your own pace, watching videos that break down the CCENT certification process and basic Cisco networking into bite-sized nuggets. Video by video you learn how to install, operate and troubleshoot a small enterprise branch network — including basic network security.

Cisco CCNA/CCENT – Exam-Pack 640-822: ICND1 shows you how to be a subnetting master, teaches you about switches and routers, helps you understand essential protocols like TCP and UDP, explains cabling and networking, and covers exciting topics like wireless networking and Cisco’s SDM graphic interface.

These videos go beyond simply prepping you for the CCENT test (although they’re great test prep!). They also teach you skills you’ll need day-in and day-out as a networking technician professional. Over and over again you’ll draw on these videos as an indispensable reference tool. They also lay a terrific foundation for the follow-up CCNA exam and certification.

Download Here


CBT Nuggets: Intro to XML and Programming using the Microsoft.NET

Posted: 23 Jun 2009 04:06 PM PDT

XML, the standardized format of the World Wide Web Consortium (W3C) aims to make application development and integration very simple. It is a data format and framework that has been adopted as the basis for information exchange by the software development community. It is so powerful that Microsoft developed their entire .NET platform around using XML.

It is simple to learn, flexible to use and easy to understand. It works with applications, the internet and databases and is platform independent meaning it can be used to share data between a variety of database and application types and formats.

Garth Schulte, the instructor for this series, details how XML came to life, why it is needed and how you can use it. This creates a very informative foundation of knowledge that will benefit programmers, administrators and engineers alike. If your job entails any type of interface with databases, connectivity of applications or transferring of information, you need to watch these videos. Programmers will find the videos a great place to start if they are considering an MCAD or MCSD for .NET certification track. The series contains 14 videos that average 30 minutes in length. This provides for 7 hours of in-depth instruction that is designed to entertain as well as educate. You won’t fall asleep watching these. Garth has a great personality that shines through in his presentation of the material. He is truly passionate about programming and what you can create with a computer.

Download Links


CBT Nuggets: Cisco CCSP – Exam-Pack 642-513: HIPS

Posted: 23 Jun 2009 04:04 PM PDT

CBT Nuggets Cisco CCSP – Exam-Pack 642-513: HIPS Are you prepared for malicious attacks on your network? Rest easy with Cisco CCSP – HIPS.

This video series shows you how to configure and deploy Cisco Security Agent (CSA) Management Center (MC) — a terrific weapon for defeating attacks and gaining security piece of mind. Once CSA MC is installed, and your system is rebooted, it provides immediate protection for all the workstations, hosts and servers throughout your system.

The CSA MC is a vital part of Cisco’s Self-Defending Network (SDN) strategy, which offers you a layered approach to network security. Threats, both internal and external, can’t slip through your defenses just by defeating a single obstacle; CSA MC lets you put other layered security barriers in place to keep your system safe and secure.

HIPS includes Agent Kits, which ease your network administrator tasks by simplifying the installation process. This training shows you how to set up Agent Kits step by step.

Because this security strategy lets you group hosts as you please, you’ll spend less time deploying software updates. It also provides variables, so you won’t need to create the same security rules over and over again. Variables let you apply rules quickly throughout your network. And they also let you group similar components for easier management — such as data sets, file sets, network address sets, network services sets, registry sets, COM component sets and query settings.

Many security rules are common to both Windows and UNIX, but others are specific to one or the other. This training makes sure you know which is which and how to handle system-specific rules.

The training also goes into detail on event logging, report generation and monitoring applicant deployment behavior and investigation — vital topics for every security administrator.

In addition to giving you practical, hands-on instruction, the training in Exam-Pack 642-513: HIPS maps to exam objectives. It prepares you to describe, configure, and verify the Cisco Security Agent product for the simulation- and knowledge-based HIPS exam. Exam 642-513: HIPS is one of five exams required to earn the Cisco Certified Security Professional certification.

The CCSP-HIPS video series contains:
# Introduction to the Cisco HIPS Series

# Introduction to the CSA

# Configuring and Installing the CSA MC

# Installing the CSA Agent

# Configuring Groups on the CSA MC

# The CSA Agent Kit

# Host Management (free video!)

# Policy Configuration

# Working with Variables

# Working with Application Classes

# Working with Rules (part 1)

# Working with Rules (part 2)

# Managing Events

# Generating Reports

# Application Deployment Investigation and Reporting

# Application Behavior Investigation and Reporting

A thorough understanding of Cisco networking such as a CCNA certification or equivalent knowledge is recommended before viewing these videos.

Here’s what you’ll learn in each video of the CCSP-HIPS series:

Video 1 – “Introduction to the Cisco HIPS Series” – Introduces you to Cisco Security Agent (CSA). Familiarizes you with the CCSP – HIPS 642-513 certification exam. Separates the exam content into five main domains and discusses the exam.

Video 2 – “Introduction to the CSA” – Walks you through CSA and its role in Cisco’ Self-Defending Network (SDN). Describes how CSA works on workstations, hosts and servers to enforce the security of network traffic. You’ll learn about CSA architecture, the features of CSA and CSA Management Center (MC) components. You’ll also see a portrait of typical network attack and how CSA handles it.

Video 3 – “Configuring and Installing the CSA MC” – You’ll learn about the CSA interface and how to configure security policies. (Understanding the interface is necessary to pass the exam.) Plus, you’ll learn the CSA MC installation requirements.

Video 4 – “Installing the CSA Agent” – This video shows you how to customize CSA MC installation using installation kits. You’ll learn system-specific installation requirements and how to use CSA to monitor system functions and analyze operations, and you’ll see how CSA proactively blocks malicious activity attempts.

Video 5 – “Configuring Groups on the CSA MC” – This video provides an overview of groups and why to use them. It covers a variety of configuration topics, including: setting security requirements for groups of similar hosts; streamlining the process of assigning common policies to groups and sending out updates and alerts; configuring groups; and generating and distributing rule groups before policies take effect.

Video 6 – “The CSA Agent Kit” – Agent kits make your job as a network administrator easier. They simplify installing CSA (along with pre-existing security policies and rules) onto a host. Learn how to build agent kits step by step. This video walks you through agent kit status levels, rebooting options and controlling host registration by defining IP addresses.

Video 7 – “Host Management” – Protect yourself from structured and unstructured network attacks with effective policies. Learn how to generate solid security policies. This video provides you with an overview and key considerations of security policy. It also discusses security policy issues and configuring policy elements on CSA MC.

Video 9 – “Working with Variables” – Why create the same rules over and over to cover hosts across the network? Simplify the process by connecting similar components using variables. Variables can connect data sets, file sets, network address sets, network services sets, registry sets, COM component sets and query settings.

Video 10 – “Working with Application Classes” – Gain an overview of application classes. Understand the difference between static and dynamic classes. Learn to configure application classes in CSA MC.

Video 11 – “Working with Rules (part 1)” – This video shows you rules for using workstations in a host-based IPS environment. It also covers managing files and registry keys, and shows how to handle COM components and network access. You’ll understand CSA rules, major rule types, rules common to both UNIX and Microsoft, rule configuration and rule prioritization for specific actions.

Video 12 – “Working with Rules (part 2)” – Learn about rules specific to UNIX or Windows. Windows-specific rules include clipboard access control, COM component access, file version control, kernal control, NT event log, registry access, service restart and sniffer & protocol detection. UNIX-specific rules include network interface control, resource access control, root kit/kernal protection and Syslog control.

Video 13 – “Managing Events” – Learn about CSA MC event log and event monitor. This video discusses event log management and event management wizard. It also explains event sets and alerts/system status.

Video 14 – “Generating Reports” – Some activities require ongoing monitoring, such as upgrades and patches. Configuring rules in CSA MC lets you log specific events. Learn how to generate the following reports: events by severity, events by groups, host detail, policy detail and group detail.

Video 15 – “Application Deployment Investigation and Reporting” – Learn about monitoring applications running on host systems (end-user workstations, servers, etc.). Other topics include: configuring the CSA MC to perform application deployment investigation on all installed network applications; analyzing and compiling data on all network host applications and creating application deployment reports.

Video 16 – “Application Behavior Investigation and Reporting” – Detecting and rectifying application violations and locating undesirable intrusions and activities are essential security activities. This video gives you an overview of behavior Analysis in CSA MC. It also explains the following reports: file event, registry event, COM event, network event and summary.



Pocket pc network programming

Posted: 23 Jun 2009 09:35 AM PDT,204,203,200_PIsitb-sticker-arrow-click,TopRight,35,-76_AA240_SH20_OU01_.jpg
Product Description
Pocket PC Network Programming is the resource students need to exploit the power of mobile technology and high-speed wireless connections. This book is a comprehensive tutorial and reference for writing network applications on Pocket PC 2002 and Pocket PC 2002 Phone Edition devices. It explains how the Pocket PC communicates with the Internet, with other mobile devices, and with networks. It teaches students the basics of Pocket PC telephony, synchronization, and messaging.

From the Back Cover

Pocket PC Network Programming is the resource developers need to exploit the power of mobile technology and high-speed wireless connections. This book is a comprehensive tutorial and reference for writing network applications on Pocket PC 2002 and Pocket PC 2002 Phone Edition devices. It explains how the Pocket PC communicates with the Internet, with other mobile devices, and with networks. It teaches developers the basics of Pocket PC telephony, synchronization, and messaging.

Pocket PC Network Programming begins with a guide to writing applications that communicate over the Internet and then explores how to use Pocket PC devices with Windows-based networks, how these devices communicate over serial and infrared, and how they utilize Remote Access Services (RAS). The focus then shifts to the Pocket PC 2002 Phone Edition before turning to the building of applications designed for synchronization with a desktop computer. The final chapters cover the Pocket Outlook Object Model, the Mail API, and the .NET Compact Framework.

Key topic coverage includes:

  • Understanding the basics of Winsock, Windows Internet (WinINet), the IP Helper APIs, HTTP, and the File Transfer Protocol (FTP)
  • Using network resources
  • Creating, establishing, and controlling dialup network connections
  • Integrating applications with the Pocket PC Connection Manager
  • Short Message Service (SMS) Messaging
  • Using the Global System for Mobile communication (GSM)
  • Interacting with the Subscriber Identity Module (SIM)
  • Remote control of a device from a desktop
  • Building an ActiveSync Service Provider
  • Building applications that integrate with Contact, Application, and Task data
  • Writing e-mail enabled applications
  • Programming and writing network applications and using Web Services with the .NET Compact Framework

Sample applications clearly demonstrate each of the networking technologies discussed, and answers to developers’ most frequently asked questions are indexed on the book’s inside covers.


DNS on Windows

Posted: 23 Jun 2009 09:34 AM PDT

DNS on Windows 2000
O’Reilly Media; 2 edition | ISBN: 0596002300 | 376 pages | October 15, 2001 | CHM | 2 Mb

DNS on Windows 2000 is a special Windows-oriented edition of the classic DNS and BIND. The Domain Name System (DNS) is one of the Internet’s fundamental building blocks: the distributed host information database that’s responsible for translating names into addresses, routing mail to its proper destination, and many other services. As the preface says, if you’re using the Internet, you’re already using DNS–even if you don’t know it. Besides covering general issues like installing, setting up, and maintaining the server, DNS on Windows 2000 tackles those specific to the Windows environment: integration between DNS and Active Directory, conversion from BIND to the Microsoft DNS server, and registry settings. You’ll also acquire a grounding in:
* Security issues
* System tuning
* Caching
* Zone change notification
* Troubleshooting
* Planning for growth

If you’re a Windows administrator, DNS on Windows 2000 is the operations manual you need for working with DNS every day; if you’re a Windows user who simply wants to take the mystery out of the Internet, this book is a readable introduction to the Internet’s architecture and inner workings. Topics include:
* What DNS does, how it works, and when you need to use it
* How to find your own place in the Internet’s namespace
* Setting up name servers
* Integrating Active Directory with DNS
* Dynamic updates, storing zone information in Active Directory, and incremental zone transfers
* Using MX records to route mail
* Configuring hosts to use name servers
* Subdividing domains (parenting)
* Securing your name server: preventing unauthorized zone transfers
* Mapping one name to several servers for load sharing
* Troubleshooting: using nslookup, diagnosing common problems

The rational unified process made easy

Posted: 23 Jun 2009 09:34 AM PDT,204,203,200_PIsitb-sticker-arrow-click,TopRight,35,-76_AA240_SH20_OU01_.jpg
Product Description
The Rational Unified Process (RUP) is a software engineering process developed and marketed by Rational Software Corporation. The RUP comprises a host of software development best practices collected from a number of contributors, over many yeras, and across a wide variety of situations. The RUP is popular because it provides a disciplined approach to assigning and managing tasks and responsibiltites to ensure success in a software project. In this new book, the industry’s leading RUP experts borrow from their significant experience and insider knowledge to teach you how to apply the RUP and succeed with it. The reader will discover what works, and what doesn’t, as well as specific advice on how and when to apply the RUP. Overall, the reader will gain knowledge of how the RUP impacts their job, and how this process can benefit their organization.

From the Back Cover

“Per Kroll and Philippe Kruchten are especially well suited to explain the RUP…because they have been the central forces inside Rational Software behind the creation of the RUP and its delivery to projects around the world.”

–From the Foreword by Grady Booch

This book is a comprehensive guide to modern software development practices, as embodied in the Rational Unified Process, or RUP. With the help of this book’s practical advice and insight, software practitioners will learn how to tackle challenging development projects–small and large–using an iterative and risk-driven development approach with a proven track record.

The Rational Unified Process Made Easy will teach you the key points involved in planning and managing iterative projects, the fundamentals of component design and software architecture, and the proper employment of use cases. All team members–from project managers to analysts, from developers to testers–will learn how to immediately apply the RUP to their work. You will learn that the RUP is a flexible, versatile process framework that can be tailored to suit the needs of development projects of all types and sizes.

Key topics covered include:

  • How to use the RUP to develop iteratively, adopt an architecture-centric approach, mitigate risk, and verify software quality
  • Tasks associated with the four phases of the RUP: Inception, Elaboration, Construction, and Transition
  • Roles and responsibilities of project managers, architects, analysts, developers, testers, and process engineers in a RUP project
  • Incrementally adopting the RUP with minimal risk
  • Common patterns for failure with the RUP–and how to avoid them

Use this book to get quickly up to speed with the RUP, so you can easily employ the significant power of this process to increase the productivity of your team.


Unix/Linux Survival Guide: Erik Keller

Posted: 23 Jun 2009 09:33 AM PDT


Unix/Linux Survival Guide: Erik Keller
Addison Wesley Verlag | ISBN: 3827321727 | 2004-12-31 | PDF (OCR) | 271 pages | 3.16 Mb


Incident Response: Computer Forensics Toolkit

Posted: 23 Jun 2009 09:32 AM PDT

Incident Response: Computer Forensics Toolkit
Publisher: Wiley | ISBN: 0764526367 | edition 2003 | PDF | 360 pages | 5,08 mb
" * Incident response and forensic investigation are the processes of detecting attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks
* This much-needed reference covers the methodologies for incident response and computer forensics, Federal Computer Crime law information and evidence requirements, legal issues, and working with law enforcement
* Details how to detect, collect, and eradicate breaches in e-mail and malicious code


High Performance MySQL: Optimierung, Datensicherung & Lastverteilung

Posted: 23 Jun 2009 09:31 AM PDT

Product Description
As users come to depend on MySQL, they find that they have to deal with issues of reliability, scalability, and performance–issues that are not well documented but are critical to a smoothly functioning site. This book is an insider’s guide to these little understood topics. Author Jeremy Zawodny has managed large numbers of MySQL servers for mission-critical work at Yahoo!, maintained years of contacts with the MySQL AB team, and presents regularly at conferences. Jeremy and Derek have spent months experimenting, interviewing major users of MySQL, talking to MySQL AB, benchmarking, and writing some of their own tools in order to produce the information in this book. In High Performance MySQL you will learn about MySQL indexing and optimization in depth so you can make better use of these key features. You will learn practical replication, backup, and load-balancing strategies with information that goes beyond available tools to discuss their effects in real-life environments. And you’ll learn the supporting techniques you need to carry out these tasks, including advanced configuration, benchmarking, and investigating logs.

About the Author
Jeremy Zawodny and his two cats moved from Northwest Ohio to Silicon Valley in late 1999 so he could work for Yahoo!–just in time to witness the .com bubble bursting first-hand. He’s been at Yahoo!(R) ever since, helping to put MySQL and other Open Source technologies to use in fun, interesting, and often very big ways. Starting with the popular and high-traffic Yahoo! Finance site, he worked to make MySQL part of the site’s core infrastructure in large batch operations as well as real-time feed processing and serving content directly on the site. He then helped to spread “the MySQL religion” to numerous other groups within Yahoo!, including News, Personals, Sports, and Shopping. Nowadays he acts as Yahoo!’s MySQL guru, working with Yahoo!’s many engineering groups to get the most out of their MySQL deployments. In 2000, he began writing for Linux Magazine and continues to do so today as a columnist and contributing editor. After over a year of active participation on the MySQL mailing list, he got the idea to write a book about MySQL. (How hard could it be, really?) You can still find him answering questions on the list today. Since 2001, Jeremy has been speaking about MySQL at various conferences (O’Reilly’s Open Source Conference, PHPCon, The MySQL User Conference, etc.) and user groups in locations as far away as Bangalore, India. His favorite topics are performance tuning, replication, clustering, and backup/recovery. In more recent times, he’s rediscovered his love of aviation, earning a Private Pilot Glider license in early 2003. Since then he’s spent far too much of his free time flying gliders out of Hollister, California and Truckee, near Lake Tahoe. He hopes to soon earn his Commercial Pilot license and then go on to become a certified flight instructor someday. Occasional MySQL consulting also helps to pay for his flying addiction. Derek J. Balling has been a Perl programmer and UNIX/Linux system administrator since 1996, having helped build two different ISPs from the ground up in the midwestern United States. He spent several years of his career at Yahoo!, working in their Infrastructure Group, where he worked on tools to help improve system uptime. He presently works at a healthcare supply company in the New York metro area, helping infiltrate the Open Source virus into their infrastructure. He has also written articles for The Perl Journal and a number of online magazines. When not working on computer-related issues, Derek relaxes with his two cats in his lakeside residence, and has recently taken up the sport of fencing.

Thanks to the original uploader!


IP in Wireless Networks

Posted: 23 Jun 2009 09:24 AM PDT

IP in Wireless Networks
Publisher: Prentice Hall PTR | ISBN: 0130666483 | edition 2003 | CHM | 400 pages | 2,56 mb

" This is a guide to integrating the Internet Protocol in second generation and third generation wireless networks. Implementation issues associated with running IP in a wireless environment are examined in-depth. For each type of wireless network discussed, the authors examine the architecture, operation/deployment strategies, mobility model, routing and applications. The evolution from circuit switched to packet switched networks in 802.11,GSM, CDMA and TDMA networks is covered from a data(IP) network perspective. The authors discuss the type of applications that are prevalent in these networks today with a special emphasis on messaging. Also examined are emerging wireless IP applications including VoIP over wireless and wireless multimedia messaging. The authors also examine the standards bodies that play a role in defining the specifications for wireless networks that are evolving into extensions of the Internet (or what is referred to as the wireless Internet). Patil is the Chair of the IETF Committee charged with developing routing standards in mobile and wireless networks.