Download Free Computer Ebooks - NET BOOKS

Download Free Computer Ebooks - NET BOOKS

fxphd: NUK202 – Intermediate Nuke

Posted: 29 Jun 2009 04:56 PM PDT

Our new intermediate Nuke course picks up where the 100 level offering left off. Using Nuke version 5, professor Sean Deveraux will work through concepts in the app as well as lead several project-based classes. The 3D compositing environment of Nuke is one of its strengths, so several classes will dive fully into this feature with practical, real-world examples. Deveraux will also be covering the nuts and bolts of setting up Nuke for automation as well as taking a first look at Gizmos, Nuke’s “macro” functionality. The focus is on the type of work that any compositor might run into while working at a facility.

Deveraux is our lead Nuke professor at fxphd. He has been using Nuke since 2000, working as a compositor at Digital Domain on Hollywood blockbusters such as How the Grinch Stole Christmas, I, Robot, and Star Trek: Nemesis. Using a variety of compositing packages, his freelance work has taken him to ILM (Transformers), Hydraulx (Rise of the Silver Surfer), and others.

Class 1: Warping Minds and Pixels. One of the key tools to any compositor’s toolbox is image warping. This week we’ll cover shape based warps with corner pin, the grid and spline warper and image driven warps using the iDistort node.

Class 2: Project Class 1 – 2D Photoshop in a 3D Nuke world. Using a massive layered Photoshop still we will build and animate a stylized forest to wow friends and influence recruiters.

Class 3: Gizmos for the geeks in all of us. The “macro” system in Nuke is called gizmos. We will create a “smart” gizmo utilizing expressions and user controls and learn how to add that gizmo to our nuke menus for others to access.

Class 4: Pimp my Nuke. Pimp my Nuke. Building on last week’s course, we will further customize nuke by adding and setting default working resolutions on launch, setting up shot specific working directories and other tasks that nuke can automate.

Class 5: Project Class 2 – Set Building and Camera Projections. Some live action, some CG, some set geometry, some keying. All part of the fun in our second project based class of the term.

Class 6: Part 2 of a 2 part production class that covers keying, 3D Projections, color correction, cameras and much more.

Class 7: Another 2 part production class. Part 1 of 2 covers keying, 3D Cards, stabilizing and turning a still frame into multi-dimensional image using the 3D system.

Class 8: Part 2 of 2 covers advanced keying, setting looks and overall comp production tips as we finish our night balcony scene.

Class 9: Project Class 4 – Multi, Multi-Pass Compositing – Part 1 of 2 . A completely CG shot with many layers to comp and refine. Focusing on Multi-pass compositing, layer ordering and organizing your 3D assets.

Class 10: Part 2: A completely CG shot with many layers to comp and refine. More in-depth multi-pass compositing and making the best of your elements.
download links:

TCP/IP Tutorial and Technical Overview, 8th Edition

Posted: 29 Jun 2009 01:43 PM PDT

Product Description
Comprehensive, authoritative introduction to the protocols that drive the Internet. Covers internetworking, routing, transport protocols, multicast, and more. Includes detailed coverage of the latest trends in networking and infrastructure. Softcover.

From the Back Cover

* The comprehensive, authoritative introduction to the protocols that drive the Internet
* Covers internetworking, routing, transport protocols, multicast, and much more
* Includes detailed coverage of application protocols—DNS, TELNET, FTP, HTTP, SMTP, RTP/RTCP, SNMP, and WAP
* Presents techniques for maximizing security, availability, and scalability
* Extensive new coverage includes QoS, MPLS, IP telephony, and WAP
* An in-depth introduction to the entire TCP/IP suite—including the latest protocols and concepts
* Systematic coverage of internetworking, routing, transport, multicast, and application protocols
* New and updated coverage of QoS, MPLS, IP telephony, security, WAP, and more

TCP/IP Tutorial and Technical Overview is an exceptionally complete, easy-to-understand, and up-to-date guide to the protocols that drive the Internet. Ideal for beginners—and for networking professionals who want to deepen their understanding—this book covers the entire TCP/IP suite, including emerging protocols that address the Internet’s key challenges.

The authors—an expert team of IBM TCP/IP instructors and consultants—begin by introducing TCP/IP’s fundamental goals, roles, components, and underlying concepts. They survey today’s core TCP/IP application protocols, from DNS to HTTP, SMTP to RTP, as well as protocols designed for advanced wireless and multimedia applications.

The book includes detailed coverage of the latest trends in networking and infrastructure, including Quality of Service, MPLS, security, IP mobility, IP telephony, and IPv6. The authors also introduce leading tools for maximizing availability and scalability in IBM and Cisco environments, including IBM Sysplex Distributor, Cisco MultiNode Load Balancing, and OS/390 DNS/WLM.

Prentice Hall PTR has selected this IBM Redbook for its worldwide publishing program. IBM Redbooks are produced by the International Technical Support Organization where experts from around the world work together to build effective technical information based on their practical work experience.

For more information:


The ABCs of TCP/IP

Posted: 29 Jun 2009 01:41 PM PDT

Product Description
The TCP/IP protocol suite is changing dynamically to reflect advances in technology and can be considered to represent the “protocol for the new millenium.” The ABCs of TCP/IP reflects these advances and includes new coverage on: ·Secure Web transactions ·Practical subnetting examples·Security threats and countermeasures ·IPSec·ICMP utilization and threatsThis comprehensive reference provides professionals with an overview of the TCP/IP suite and details its key components. While many books on the subject focus on the details and minutae of TCP/IP, this book covers applications, methods, concepts, and economics associated with the TCP/IP stack. It illustrates how to leverage investments in TCP/IP and how to economize network operations. The ABCs of TCP/IP examines: the manner by which various protocols and applications operate, addressing issues, security methods, routing, network design constraints, testing methods, troubleshooting, management issues, and emerging applications. It also includes separate chapters focusing on security threats and methods useful for overcoming these threats. About the Author: Gilbert Held is an award-winning author and lecturer. Mr. Held is the author of over 40 books and 400 technical articles covering personal computers and computer communications. Some his recent titles include Building a Wireless Office and The ABCs of IP Addressing, published by Auerbach Publications. Mr. Held can be reached via email at


Oracle Web Applications: PL/SQL Developer’s Intro: Developer’s Introduction

Posted: 29 Jun 2009 01:05 PM PDT Review
Oracle databases sit behind a large number of Web servers. The latest release, Oracle 8i, is sold as an Internet database and gives developers tools to build Web applications. Oracle Web Applications is a guide for using Oracle 8i for content management, application development, and application integration. You’ll learn about its support for the latest Internet technologies, including XML and Oracle’s WebDB application development tools. There’s also an overview of the InternetLite technologies that allow you to deliver Oracle databases to handhelds like the Palm organizer.

The real meat of the book begins with two chapters that cover building Web applications in WebDB and Oracle’s Application Server. The rest of the book goes into plenty of detail and provides lots of code on how to use Oracle’s PL/SQL programming language to generate HTML and XML. When you’ve worked your way through this, you should be ready to start working with Oracle 8i and the Web–and you should be ready to begin linking Oracle databases to the Internet. Code samples and plenty of tips make this an excellent developer’s reference. –Simon Bisson,

Product Description
Oracle8i, Oracle’s “Internet database,” introduces a variety of Web development tools that extend traditional database concepts to Web content. With Oracle’s DBMS, you can now build Web technology on top of a relational database, rather than on a traditional filesystem. This approach remedies many of the problems that have slowed down the ability of organizations to build new Web applications and to put their legacy applications on the Web. Many developers are intimidated by the vast array of new technologies in Oracle8i. And yet, they are under pressure to build complex Web applications immediately. This book provides the information you need to start building these applications right away. It is a compact, easy-to-read guide to PL/SQL, HTML, XML, WebDB,and Oracle Application Server (OAS). It also covers the packages in the PL/SQL toolkit and shows several fully realized Web applications. This book provides the jump-start you need to to make the transition from traditional programming to the development of useful Web applications for Oracle8i. Even those who know nothing about HTML, PL/SQL, or Oracle’s other tools will learn how to create simple Web applications in a matter of days. The book also covers Web development for earlier Oracle versions (Oracle8 and Oracle7).


Architecting Web Services

Posted: 29 Jun 2009 01:03 PM PDT

“ the best serious treatment of Web services I’ve read to date.” Alan Zeichick, SD Times — SD Times

“In his chapter on web-services models…since the issues raised here are fundamental for designing robust services.” Martin Heller, —

Product Description

Architecting Web Services is targeted toward developers and technical architects who have heard about, and even started to work with, Web services. The book starts with a background on the evolution of Web services and their significance to future collaborative efforts via the Internet. It then reveals the architecture for Web services and the various relationships that can be established through their consumption.

Following a short technical primer on XML and related technologies, the Web services model is outlined to illustrate the decisions that have to be made in the areas of presentation, interface, and security before the design is even started. Topics ranging from content to state management to system infrastructures are discussed to help you understand the options and the pitfalls when developing robust Web services.

The life cycle of implementing Web services from start to finish is illustrated, taking existing processes and exposing their functionality through Web services. Examples extend both Java and COM objects as Web services before exposing an entire hotel reservation system through a Web services workflow. These exercises are followed by three application scenarios that consume these Web services, again with both Java and Visual Basic/ASP examples. Discussions cover the design, implementation, and testing of each solution to ensure a successful result.

Finally, the book takes a look ahead at the future of Web services by examining both the current strategies of the primary vendors and the standards initiatives that are presently under way. A companion website provides all the source code, and hosts the Web services and sample applications introduced in the book.


Tricks of the 3D Game Programming Gurus-Advanced 3D Graphics and Rasterization

Posted: 29 Jun 2009 12:59 PM PDT Review
To be an ordinary programmer is one thing: You need only learn how to interact with the computer on its own terms, creating buttons and combo boxes that have no significance away from the screen. To be a game programmer–particularly one that writes games with environments that appear three-dimensional to their players–is something else entirely. Such work requires that the flat screen simulate the real world, complete with light, shading, texture, gravity, and momentum. It’s all quite complicated. Tricks of the 3D Game Programming Gurus helps its readers make great progress in creating 3D worlds and the action that goes on in them.

That this large, dense book manages to explain how to design and implement a 3D game while neither glossing over too many details nor swamping the reader with trivia is a credit to author André LaMothe. He opens by showing (and explaining) the C++ source code of a simple but full-fledged 3D spaceflight shooter game–a real boost to the reader’s confidence. From there, he explains the complicated geometric concepts and mathematics that underlie realistic games (always with an eye toward software algorithms) and shows how to use the many APIs and libraries (including Microsoft DirectX 9.0) that make the world-builder’s job easier. Make no mistake: Designing and building convincing games with 3D visuals and behaviors that convincingly approximate real-world physics is hard work. In this book, LaMothe helps you get it done and enjoy the process. –David Wall

Topics covered: How to design and build 3D worlds and the goings-on within them. Aside from mathematics and geometry, this book focuses on wireframe models, shading, rendering, and animation. Microsoft DirectX 9.0 gets special attention.

Product Description

Today is the greatest time in history to be in the game business. We now have the technology to create games that look real! Sony’s Playstation II, XBOX, and Game Cube are cool! But, all this technology isn’t easy or trivial to understand – it takes really hard work and lots of Red Bull. The difficulty level of game programming has definitely been cranked up these days in relation to the skill set needed to make games. Andre LaMothe’s follow-up book to Tricks of the Windows Game Programming Gurus is the one to read for the latest in 3D game programming. When readers are finished with Tricks of the 3D Game Programming Gurus-Advanced 3D Graphics and Rasterization, they will be able to create a full 3D texture-mapped, lit video game for the PC with a software rasterizer they can write themselves. Moreover, they will understand the underlying principles of 3D graphics and be able to better understand and utilize 3D hardware today and in the future.


Networking Personal Computers with TCP/IP: Building TCP/IP Networks

Posted: 29 Jun 2009 12:56 PM PDT Review
Networking Personal Computers with TCP/IP is a comprehensive guide to connecting a personal computer to a network that is running TCP/IP. Detailed sections cover various flavors of Microsoft operating systems (DOS, Windows 95, Windows NT) and explain in depth the steps necessary to configure the network. Additional sections cover configuration and boot control, mail, and services such as printing and file serving. Replete with screen shots, Networking Personal Computers with TCP/IP will be an invaluable companion as you wade through each task.

Product Description
If you’re like most network administrators, you probably have several networking “islands”: a TCP/IP-based network of UNIX systems (possibly connected to the Internet), plus a separate NetWare or NetBIOS network for your PCs. Perhaps even separate NetWare and NetBIOS networks in different departments, or at different sites. And you’ve probably dreaded the task of integrating those networks into one. If that’s your situation, you need this book! When done properly, integrating PCs onto a TCP/IP-based Internet is less threatening than it seems; long term, it gives you a much more flexible and extensible network. Craig Hunt, author of the classic TCP/IP Network Administration, tells you how to build a maintainable network that includes your PCs. Don’t delay; as Craig points out, if you don’t provide a network solution for your PC users, someone else will. Covers:

* DOS, Windows, Windows for Workgroups, Windows NT, Windows 95, and Novell NetWare
* Chameleon (NetManage), PC/TCP (FTP Software), LAN WorkPlace (Novell), Super TCP, and Trumpet
* Basic Network setup and configuration, with special attention given to email, network printing, and file sharing


Game Programming Golden Rules (Game Development Series)

Posted: 29 Jun 2009 12:34 PM PDT

Product Description
Maximize your team's game development time!

Writing computer games is hard. Games today are complex projects that involve large teams of specialized artists and programmers. These teams are perpetually pushing technology beyond its boundaries and stretching their skills to the max. To alleviate these problems, Game Programming Golden Rules presents a series of nine “Golden Rules” that help define a methodology for creating a modern game. Each rule is written as a simple principle and covered from the perspective of how it works in the overall structure of a game project. The rules cover a variety of topics from embracing C++ and scripting, to the resource pipeline, finite state machines, and optimization. The order in which the rules are presented was carefully chosen, so that each rule presents a topic that is then put to use in later rules. Many of the rules involve empowering the designers and artists to put their own content directly into the game, bypassing the need for a programmer's involvement beyond the initial setup. This frees up the programmers' time to concentrate on creating the systems that make the game, rather than focusing on the output of these systems. By the end of the book, you will have deeper confidence and a more profound understanding of the essential techniques of game programming and how the theory of these techniques interlocks. This is an excellent resource for the entire development team.

*Details essential rules that every game programmer should follow for fast and effective game development
*Teaches programmers how to ease the workload for themselves and the rest of the team
*Discusses topics that have immediate, practical applications— orders of complexity, hashes and hash functions, scripting, the resource pipeline, processing assets, finite state machines, saving game state, and optimization
*Provides a versatile reference that you'll refer to again and again

* Production-quality example programs referenced in the text, both binary and source form
* A full distribution of the most current version of the Zlib compression library
* All the figures from the book

About the Author
Martin Brownlow has been a professional video game programmer for 10 years, and has received numerous programming accolades and awards for his work on both MDK and Sacrifice. He also contributed to Game Programming Gems 3. He has worked for such companies as Virtuality Entertainment, Shiny Entertainment, Tremor Entertainment, and Visual Concepts. He recently worked on Armed & Dangerous for the Xbox and PC.


CBT EC-Council Certified Ethical Hacker V6 Training DVD4

Posted: 29 Jun 2009 12:15 PM PDT

You're up late, banging away at your keyboard. You find the hole you were looking for. Now you just find the right directory, copy a couple files, back right out of the system, and erase your tracks. Within 15 minutes of finding a back door into the network, you've downloaded transaction data for all credit card transactions within the last two years. You'd think credit card processing companies would be more secure than that.
The FBI should be busting down your door any minute now. But they won't. You print out your keystroke logger info. You make a phone call. "I got in." They don't believe it. But when you deliver the keystroke log the next day, they're floored. They cut you a check, and offer you an even bigger contract to help them fix the hole.

Do things that should get you arrested – but get paid instead. Ethical Hacking is so cool.

"What makes this knowledge so valuable?"

The work you do as an Ethical Hacker can save businesses from massive harm. You get to find and close off vulnerabilities that hackers could otherwise exploit to get inside your network and steal or even destroy data. By getting there first, you prevent leaks of sensitive information – even fraud and identity theft against employees and customers.

Businesses recognize the value of security pros that are able to shut down "back-doors" into their network. Protecting their sensitive data protects their livelihood. Because the work you do as an Ethical Hacker can prevent significant harm to their business, companies will pay you top dollar to do some of the most interesting work in information security.

"What will Ethical Hacker training teach me?"

In this series you'll learn the 5 Steps of a Hack. You'll also learn legal considerations for working as an Ethical Hacker. You'll learn all about passive intelligence gathering, and get suggestions for gathering critical information through social engineering.

Other things covered in the Certified Ethical Hacker Series include TCP exploits, ICMP exploits, and other network reconnaissance techniques; pulling packets out of network communications to sniff passwords, hubs, and switches; SNMP and DNS exploits; password cracking; gaining unauthorized access to a wireless network; erasing your tracks after penetrating a network; web and file exploits too dangerous to name; and much more.

"Does this training cover the Certified Ethical Hacker exam?"

The Certified Ethical Hacker Series covers more than how to exploit your network, and how to use that knowledge to keep others from doing the same thing. It also maps to the exam objectives for CEH certification from EC-Council. It's a comprehensive resource to use for both exam prep and on-the-job reference, so you can add this valuable certification to your resume.

"Isn't this knowledge dangerous?"

From CBT Nuggets CEO Dan Charbonneau:

"I actually had a wave of fear hit me as I was half-way through reviewing this series. 'We can't sell this.' That was my gut reaction. It's too dangerous, it teaches too much, it's too powerful. My second thought was, 'We need to sell this to as many people as possible', thinking it safest if the people being attacked know exactly how to attack, and therefore how to protect."

Having a basic understanding of information security and networking such as what's taught in the Security+ and Network+ series is recommended before viewing this training. More advanced security policy training such as SSCP or CISSP is strongly recommended before using this knowledge on the job.

The Certified Ethical Hacker Series contains:

- Series Intro (free video)
- Hacker Terms
- Hacker Procedures
- Using VMWare
- Using Linux
- Passive Intelligence Gathering Part 1
- Passive Intelligence Gathering Part 2
- Social Engineering
- Network Reconnaissance Part 1
- Network Reconnaissance Part 2
- Service Identification and Enumeration
- Vulnerability Assessment: Nessus & GFI Languard
- Vulnerability Assessment: Network Sniffing
- Password Cracking
- Exploits Part 1: Linux
- Exploits Part 2: Windows
- Web and File Exploits
- Wireless Security
- Erasing Tracks



Building Your Intranet with Windows NT(r) 4.0

Posted: 29 Jun 2009 12:14 PM PDT,204,203,200_PIsitb-sticker-arrow-click,TopRight,35,-76_AA240_SH20_OU01_.jpg
Product Description
Because it is easy to use and install, many companies are using Windows NT to construct their corporate Intranets. With Windows NT 4.0, Intranets will be even easier to use and much more powerful. This manual is a step-by-step guide to installing, configuring, and operating an NT Intranet. Written in a non-technical style, the author takes the reader through the entire process, from construction to administration. Each topic includes technical sidebars for more advanced readers looking to create more complex applications.

From the Publisher
Because it is easy to use and install, many companies are using Windows NT to construct their corporate Intranets. With Windows NT 4.0, Intranets will be even easier to use and much more powerful. This manual is a step-by-step guide to installing, configuring, and operating an NT Intranet. Written in a non-technical style, the author takes the reader through the entire process, from construction to administration. Each topic includes technical sidebars for more advanced readers looking to create more complex applications.