Download Free Computer Ebooks - NET BOOKS

Download Free Computer Ebooks - NET BOOKS

Autodesk Tricky Tips And Tools For Maya Tamed By A Technical Director

Posted: 11 Oct 2009 12:55 PM PDT

Autodesk Tricky Tips And Tools For Maya Tamed By A Technical Director | 285 MB

Unlock the power of Maya in record time with these podcasts. Learn technical skills, hidden features and scripting techniques that will increase your productivity and bring your creativity to the next level!


Learnkey – WirelessNetworking

Posted: 11 Oct 2009 12:54 PM PDT
5 Sessions – 15 Hours of Interactive Training

The popularity of wireless networks is exploding, and with it, demand for trained wireless IT professionals. In the Wireless Networking course from LearnKey, you’ll learn the fundamentals of wireless LANs from a vendor-neutral perspective. Expert instructor Michael Storm takes you through radio frequency (RF) technologies, industry standards, site surveys, wireless security issues and much more. At the conclusion of this course you’ll be prepared to implement, manage, and troubleshoot wireless networks, and be prepared to pass the Certified Wireless Network Administrator (CWNA) exam.

Session 1

Section A: CWNP Introduction
� CWNP Certification Program
� Levels of Certification
� Course Overview
� Course Objectives

Section B: Wireless Application
� History
� Standards
� Roles
� Last Mile Delivery
� Mobility
� Wireless LANs
Section C: Radio Frequency Technology
� Radio Frequency
� Behaviors
� Gain/Loss
� Reflection/Refraction
� Diffraction/Scattering
� Absorption
� VSWR Measurements

Section D: Antennas
� Principals
� Line of Sight/Fresnel Zone
� Obstructions
� Antenna Gain
� Intentional Radiator

Section E: RF Mathematics
� Power Calculation
� Units of Measure
� Power Gain/Loss
� dBm
� dBi
� Sample Calculation

Section F: Spread Spectrum
� Overview
� Narrowband/High Power
� Wideband/Low Power
� Usage
� Wireless LANs
� Wireless PANs
� Wireless MANs

Session 2

Section A: Spread Spectrum Technologies
� FCC Specifications
� FHSS Interference
� FHSS Channel
� Timing
� DSSS Channels
� DSSS Interference

Section B: FHSS vs. DSSS
� Comparison Factors
� Interference/Cost
� Co-location
� Equipment
� Data Rates
� Security
� Standards Support

Section C: Wireless Access Points
� Device Types
� Access Points
� Access Modes
� Access Point Options
� Antenna Options
� Filtering/Modular Cards
� Variable Power/Wired Connectivity
� Mounting Access Points

Section D: Access Point Features
� Enterprises
� Management

Section E: Client Devices
� LAN Devices
� Adaptors
� PCI & ISA Adaptors
� Configuring Devices

Section F: Infrastructure Devices
� Wireless Bridges
� Workgroup Bridges
� Common Options
� Residential Gateways
� Enterprise Wireless Gateways
� Device Management

Section G: Antenna Types
� Antenna Selection
� Dipole
� Semidirectional
� Highly Directional

Session 3

Section A: Tuning Antennas
� RF Antenna Concepts
� Polarization
� Antenna Gain/Beamwidth
� Free Space Path Loss
� Installation
� Orientation/Alignment
� Safety

Section B: Power Over Ethernet
� Usage
� Compatibility
� Voltage Pinout Standards

Section C: RF Accessories
� Accessory Types
� RF Amplifier
� RF Attenuators
� Lightning Arrestors
� RF Splitters
� RF Connectors
� RF Cables
� RF Pigtail

Section D: Organizations
� Organizational Roles
� FCC Role
� ISM vs. U-NII
� IEEE 802-11b
� IEEE 802.11a/IEEE 802.11g
� Other Organizations
� Competition

Section E: Locating Access Points
� 802.11 Architectures
� Beacons
� Passive Scanning
� Active Scanning


Section A: Authentication
� Authentication Process
� Association Process
� States
� Authentication Methods
� Authentication Security
� EAP Types
� VPN Solutions

Section B: Service Sets
� Service Sets Overview
� Roaming
� Roaming Standards
� Connections
� Limitations
� Load Balancing

Section C: WAN Communication
� Frames
� Management Frames
� Collision Handling
� Fragmentation
� Fragment Bursting
� Interframe Spacing
� Random Backoff/Slot Time

Section D: Troubleshooting
� RF Environments
� Multipath Problems
� Multipath Solutions
� Hidden Node Problem
� Hidden Node Solutions
� Near/Far Problems
� Near/Far Solution
� Co-location Problems
� Co-location Solutions

Session 5

Section A: WEP/TKIP
� Wireless Security
� WEP Attacks
� WEP Implementation
� WEP Keys
� WEP Key Deployment
� Usage

Section B: Security Options
� Filtering
� SSID Filtering
� MAC Address Filtering
� Protocol Filtering

Section C:Wireless Attacks
� Attacks on Wireless LANs
� Passive Attacks
� Active Attacks
� Jamming
� Man-in-the-Middle Attacks

Section D: Corporate Security Policy
� Security Policies
� Public Wireless Networks
� Security Recommendations

Section E: Site Survey
� Specifications
� Preparation/Facility Analysis
� Networks & Network Needs
� Area Usage & Towers
� Requirements
� Available Resources
� Security Requirements

Section F: Preparation
� Preparation Checklist
� Site Survey Equipment
� Site Survey Kit Checklist
� Gathering RF Information
� Site Survey Reporting
� Additional Information


AppDev Developing Applications Using C Sharp 2008 Volume 1

Posted: 11 Oct 2009 12:54 PM PDT

AppDev Developing Applications Using C Sharp 2008 Volume 1 DVD

AppDev Developing Applications Using C Sharp 2008 Volume 1 DVDDate : 9/9/2009 | 2.48 GB

"Visual Studio 2008 adds a large set of new functionality for the Visual Studio developer. From new language features, including LINQ (Language Integrated Query), to new client-side data support, Visual Studio 2008 and the .NET Framework 3.5 make it easier than ever to create robust, enterprise-level applications. You will learn how to build solid applications using structured exception handling, how to use the Visual Studio debugging features, how to use MenuStrip and ToolStrip controls, and how to add unprecedented flexibility to your user interfaces using the container controls. As you continue through this course you will learn about important development topics that aren’t normally covered in a beginning Windows application programming course such as an introduction to .NET interoperability, using .NET Serialization, Windows Management Instrumentation (WMI), and drawing your own user interfaces using the System.Drawing namespace. You will dig deeper into the most complex of Visual Studio’s built-in controls, the DataGridView control, Windows Communication Foundation (WCF), using ClickOnce, Windows Workflow Foundation (WF), and many more topics that will extend your knowledge, your capabilities, and your value as a developer."


Cisco Networkers 2009 – Deploying Wired 802.1X

Posted: 11 Oct 2009 04:51 AM PDT

This session covers the principles and design aspects of identity-based networking based on the IEEE 802.1x standard, which allows enterprise network administrators to explicitly control who and what gets on their networks. Identity services are technology solutions with tools to improve the security of physical and logical access to LANs. The Cisco Identity Based Networking Services (IBNS) solution incorporates all of the capabilities defined in 802.1x and provides enhancements and extensions for improving identity-based access control. Important extensions discussed include the ability to provide interoperation with IP telephony and the ability to track when and where anyone gets onto an enterprise network. Identity services are a requisite technology for network admission control (NAC).

download links:

Cisco Networkers 2009 – Understanding and Preventing Layer 2 Attacks

Posted: 11 Oct 2009 04:12 AM PDT

This session focuses on the network security issues surrounding Layer 2, the data link layer. Because many network attacks originate inside the corporate firewall, exploring this soft underbelly of data networking is critical for any secure network design. Issues covered include Address Resolution Protocol (ARP) spoofing, MAC flooding, VLAN hopping, Dynamic Host Configuration Protocol (DHCP) attacks, and Spanning Tree Protocol concerns. Common myths about Ethernet switch security are addressed and specific security lockdown recommendations are provided. Attack mitigation options presented include the new DHCP snooping and Dynamic ARP Inspection (DAI) functionality. Attendees can expect to learn Layer 2 design considerations from a security perspective and mitigation techniques for Layer 2 attacks. This session is for network designers, administrators, and engineers in all areas of data networking.

download links:

Macworld – November 2009 (US)

Posted: 11 Oct 2009 03:26 AM PDT

Macworld - November 2009 (US)

Macworld - November 2009 (US)

Macworld – November 2009 (US)
English | 104 pages | PDF | 30.83 Mb


PC World – November 2009 (US)

Posted: 11 Oct 2009 03:25 AM PDT

Evidence-based Design for Healthcare Facilities

Evidence-based Design for Healthcare Facilities

PC World – November 2009 (US)
True PDF | 103 Pages | English | 7.4 Mb


Evidence-based Design for Healthcare Facilities

Posted: 11 Oct 2009 03:24 AM PDT

Evidence-based Design for Healthcare Facilities

Evidence-based Design for Healthcare Facilities

Product Description
Spurred by the healthcare building boom, evidence-based healthcare facility design is an important and growing trend in creating safe and nurturing patient-care environments. Hospital administrators are continually searching for proven, cost-effective strategies to do everything from enhancing patient safety and staff efficiency to improving the budget and bottom line.In this book, nurse and healthcare design consultant Cynthia McCullough gives readers the necessary knowledge, tools, and strategies to incorporate these design concepts into any design project-from the largest new healthcare facility construction to the smallest departmental renovation.

Learn about:

* Working with design firms

* Aesthetics

* Healing environments

* Family-centered care

* Benchmarking

* Efficiency

* Sustainability/green practices

* Move-in transition planning

* Future trends


Web Standards Solutions: The Markup and Style Handbook, Special Edition

Posted: 11 Oct 2009 03:23 AM PDT

Product Description

Web Standards Solutions: The Markup and Style Handbook, Special Edition

Web Standards Solutions: The Markup and Style Handbook, Special Edition

Welcome to the expanded second edition of Dan Cederholm’s best-selling Web Standards Solutions. Web Standards are the standard technology specifications enforced by the World Wide Web Consortium (W3C) to make sure that web designers and browser manufacturers are using the same technology syntax.

It is important that these implementations are the same throughout the Web, otherwise it becomes a messy proprietary place, and lacks consistency. These standards also allow content to be more compatible with multiple different viewing devices, such as screen readers for people with vision impairments, cell phones, PDFs, etc. HTML, XML, and CSS are all such technologies.

This book is your essential guide to understanding the advantages you can bring to your web pages by implementing web standards and precisely how to apply them. Web standards such as XHTML and CSS are now fairly well-known technologies, and they will likely be familiar to you, the web designer. Indeed, they are all around you on the Web. However, within web standards still lies a challenge: while the browser’s support for web standards is steadily increasing, many web developers and designers have yet to discover the real benefits of web standards and respect the need to adhere to them.

The real art is in truly understanding the benefits and implementing the standards efficiently. As a simple example of its power, you can use CSS to lay out your pages instead of nesting tables. This can make file sizes smaller, allowing pages to load faster, ultimately increasing accessibility for all browsers, devices, and web users.

  • Expanded edition containing bonus material.
  • Teaches how to use Web Standards effectively to build better web sites.
  • Solutions style promotes learning by work-through examples and assessments.


Accelerated Silverlight 3

Posted: 11 Oct 2009 03:21 AM PDT

Accelerated Silverlight 3

Accelerated Silverlight 3

Product Description

Accelerated Silverlight 3 teaches you how to get up to speed with the latest version of Silverlight quickly and efficiently. The book assumes you’re already comfortable with the basics of .NET coding and with WPF and builds on your existing knowledge to make your journey to Silverlight 3 proficiency as quick and painless as possible. Where coding techniques are similar to other, more established, areas of .NET, the text says so. Likewise, where there’s a syntax or conceptual “gotcha” that you’re existing coding habits will walk you into, the text points that out, too.

This book provides you with fast-track coverage of all the most important elements of the Silverlight 3 technology ranging from XAML to standard controls, from dealing with media to networking, from testing to deployment. It concludes with a pair of fully worked sample applications for you to follow through, because nothing reinforces your understanding of how concepts fit together as much as looking at finished code.

It is assumed that readers are already be comfortable with the workings of the .NET Framework. Knowledge of Expression Blend is useful, but not mandatory: you’ll learn the Blend techniques that you need to know as you go through the book. By the end, you will have followed a sound, concise, path to mastery of Silverlight 3.