Download Free Computer Ebooks - NET BOOKS |
- UNIX: The Complete Reference, Second Edition (Complete Reference Series)
- AutoCAD LT 2006: The Definitive Guide
- Quartz 2D Graphics for Mac OS X(R) Developers
- Extended STL, Volume 1: Collections and Iterators
- Endpoint Security
- Building High Availability Windows Server(TM) 2003 Solutions
- Practical Business Intelligence with SQL Server 2005
- Innovation Games: Creating Breakthrough Products Through Collaborative Play
- Stopping Spyware
- Essential ASP.NET 2.0
UNIX: The Complete Reference, Second Edition (Complete Reference Series) Posted: 08 Jul 2009 04:30 PM PDT Product Description Get cutting-edge coverage of the newest releases of UNIX–including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD–from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities.
Get up-and-running on UNIX quickly, use the command shell and desktop, and access the Internet and e-mail. You’ll also learn to administer systems and networks, develop applications, and secure your UNIX environment. Up-to-date chapters on UNIX desktops, Samba, Python, Java Apache, and UNIX Web development are included.
|
AutoCAD LT 2006: The Definitive Guide Posted: 08 Jul 2009 04:29 PM PDT Product Description About the Author |
Quartz 2D Graphics for Mac OS X(R) Developers Posted: 08 Jul 2009 04:28 PM PDT Product Description |
Extended STL, Volume 1: Collections and Iterators Posted: 08 Jul 2009 04:27 PM PDT One area in which this dichotomy is most pronounced is in using and, particularly, in extending the Standard Template Library (STL). This book, distills the knowledge and experience I have accumulated in tackling this challenging subject over the last decade or so.
|
Posted: 08 Jul 2009 04:26 PM PDT Product Description Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones.
Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today's newest threats, and prepare yourself for tomorrow's attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to "trusted computing."
Unlike traditional "one-size-fits-all" solutions, Kadrich's approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. |
Building High Availability Windows Server(TM) 2003 Solutions Posted: 08 Jul 2009 04:24 PM PDT This is the definitive resource for every network administrator, consultant, and architect who needs to maximize availability, scalability, and performance in Windows server environments.
|
Practical Business Intelligence with SQL Server 2005 Posted: 08 Jul 2009 04:23 PM PDT Product Description In this book, two of Microsoft's leading consultants illustrate how to use SQL Server 2005 Business Intelligence (BI) technologies to solve real-world problems in markets ranging from retail and finance to healthcare. Drawing on extensive personal experience with Microsoft's strategic customers, John C. Hancock and Roger Toren offer unprecedented insight into BI systems design and step-by-step best practices for implementation, deployment, and management.
Hancock and Toren introduce practical BI concepts and terminology and provide a concise primer on the Microsoft BI platform. Next, they turn to the heart of the book—constructing solutions. Each chapter-length case study begins with the customer's business goals, and then guides you through detailed data modeling. The case studies show how to avoid the pitfalls that derail many BI projects. You'll translate each model into a working system and learn how to deploy it into production, maintenance, and efficient operation.
Whether you're a decision-maker, architect, developer, or DBA, this book brings together all the knowledge you'll need to derive maximum business value from any BI project. • Leverage SQL Server 2005 databases, Integration Services, Analysis Services, and Reporting Services • Build data warehouses and extend them to support very large databases • Design effective Analysis Services databases • Ensure the superior data quality your BI system needs • Construct advanced enterprise scorecard applications • Use data mining to segment customers, cross-sell, and increase the value of each transaction • Design real-time BI applications • Get hands-on practice with SQL Server 2005's BI toolset |
Innovation Games: Creating Breakthrough Products Through Collaborative Play Posted: 08 Jul 2009 04:21 PM PDT Product Description The toughest part of innovation? Accurately predicting what customers want, need, and will pay for. Even if you ask them, they often can't explain what they want. Now, there's a breakthrough solution: Innovation Games. Drawing on his software product strategy and product management consulting experience, Luke Hohmann has created twelve games that help you uncover your customers' true, hidden needs and desires.
You'll learn what each game will accomplish, why it works, and how to play it with customers. Then, Hohmann shows how to integrate the results into your product development processes, helping you focus your efforts, reduce your costs, accelerate time to market, and deliver the right solutions, right from the start.
Innovation Games will be indispensable for anyone who wants to drive more successful, customer-focused product development: product and R&D managers, CTOs and development leaders, marketers, and senior business executives alike. |
Posted: 08 Jul 2009 04:20 PM PDT Stop spyware in its tracks! Spyware infects the vast majority of home computers today. After it’s on your machine, it can be used to access your social security number, track every website you visit, and take control of your computer away from you. If you work for a large company, odds are your company has purchased anti-spyware protection for you. But readers using home computers or running small businesses are on their own and vulnerable to infection.
|
Posted: 08 Jul 2009 04:18 PM PDT Essential ASP.NET 2.0 is the Microsoft developer’s definitive reference for ASP.NET 2.0 programming. It covers all you need to know to build robust, well-designed Web applications with ASP.NET 2.0, Visual Studio 2005, and .NET 2.0. ASP.NET MVP Fritz Onion and Developer Security MVP Keith Brown draw on their unparalleled experience working with ASP.NET 2.0 and teaching it to professional developers. From data binding to security, UIs to performance, they demystify ASP.NET 2.0’s most difficult areas, and introduce little-known techniques for leveraging it to the fullest. |
You are subscribed to email updates from Download Free Computer Ebooks - NET BOOKS To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |