earn online money

Tuesday, February 2, 2010

Beginning Cryptography with Java (repost)

Posted By : prestige |
Date : 04 Dec 2009 11:14:00 |
Comments : 0
Beginning Cryptography with Java


Beginning Cryptography with Java

Wrox | August 19, 2005 | ISBN: 0764596330 | 480 pages | CHM | 2,5 MB


While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.



This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.



What you will learn from this book



* How to understand and use JCE, JCA, and the JSSE for encryption and authentication

* The ways in which padding mechanisms work in ciphers and how to spot and fix typical errors

* An understanding of how authentication mechanisms are implemented in Java and why they are used

* Methods for describing cryptographic objects with ASN.1

* How to create certificate revocation lists and use the Online Certificate Status Protocol (OCSP)

* Real-world Web solutions using Bouncy Castle APIs



Who this book is for



This book is for Java developers who want to use cryptography in their applications or to understand how cryptography is being used in Java applications. Knowledge of the Java language is necessary, but you need not be familiar with any of the APIs discussed.



Wrox Beginning guides are crafted to make learning programming languages and technologies easier than you think, providing a structured, tutorial format that will guide you through all the techniques involved.



ADVERTISING » Download fast


« ADVERTISING

Pattern Matching Algorithms

Posted By : johinson |
Date : 05 Dec 2009 10:22:57 |
Comments : 0
Pattern Matching Algorithms


Alberto Apostolico, Zvi Galil, «Pattern Matching Algorithms»

Oxford University Press | ISBN: 0195113675 | 1997 | PDF | 400 pages | 19.65 MB


This book provides an overview of the current state of pattern matching as seen by specialists who have devoted years of study to the field. It covers most of the basic principles and presents material advanced enough to faithfully portray the current frontier of research.









ADVERTISING » Download fast


« ADVERTISING

Data Structures for Game Programmers (repost)

Posted By : prestige |
Date : 05 Dec 2009 14:30:50 |
Comments : 1
Data Structures for Game Programmers


Data Structures for Game Programmers (Premier Press Game Development)

Muska & Lipman/Premier-Trade | November 25, 2002 | ISBN: 1931841942 | 884 pages | PDF | 11 MB


Game programmers, check out the only book on data structures written especially for you! Described in layman's terms, this book will explain all of the essential data structures that are used in video game programming. It will also go over some of the more advanced and specialized data structures, too. Data Structures for Game Programmers is written in C++, and any special skills required to understand the book will be explained within it. The CD will include source code of the book, compiled demo's of the source, graphical demo code, plus tools such as Visual C++ 5, SDL, STLPort, Paint Shop Pro, and an SDL Primer by Ernest Pazera.



ADVERTISING » Download fast


« ADVERTISING

Portable DBA: Oracle (repost)

Portable DBA: Oracle (repost)
Posted By : Book-er |
Date : 09 Dec 2009 17:05:36 |
Comments : 0


Robert Freeman "Portable DBA: Oracle"

McGraw-Hill Osborne Media | English | 2004-07-21 | ISBN: 0072229802 | 598 pages | CHM | 12,7 MB




This handy, affordable reference is ideal for on-the-job DBAs in need of quick access to administrative commands, error resolutions, and best practices. Covering the most commonly used Oracle database versions, the book contains invaluable tables so problems can be diagnosed quickly and includes examples and syntax diagrams for each command.



To start download click HERE:






No another mirrors, please! >>> Read RULES
ADVERTISING » Download fast


« ADVERTISING

Foundations of Data Mining and Knowledge Discovery

Posted By : masin |
Date : 13 Dec 2009 22:43:46 |
Comments : 0
Foundations of Data Mining and Knowledge Discovery (Studies in Computational Intelligencem 6.)


Tsau Young Lin, "Foundations of Data Mining and Knowledge Discovery (Studies in Computational Intelligence, 6.)"

Springer; 1 edition (October 1, 2005) | English | 3540262571 | 375 pages | PDF | 5.83 MB


"Foundations of Data Mining and Knowledge Discovery" contains the latest results and new directions in data mining research. Data mining, which integrates various technologies, including computational intelligence, database and knowledge management, machine learning, soft computing, and statistics, is one of the fastest growing fields in computer science. Although many data mining techniques have been developed, further development of the field requires a close examination of its foundations. This volume presents the results of investigations into the foundations of the discipline, and represents the state of the art for much of the current research. This book will prove extremely valuable and fruitful for data mining researchers, no matter whether they would like to uncover the fundamental principles behind data mining, or apply the theories to practical applications.








ADVERTISING » Download fast


« ADVERTISING

Scratch 1.4: Beginner's Guide

Scratch 1.4: Beginner's Guide
Posted By : robin-bobin |
Date : 18 Dec 2009 22:39:52 |
Comments : 0


Scratch 1.4: Beginner's Guide by Michael Badger

Publisher: Packt Publishing (July 17, 2009) | 264 pages | ISBN: 1847196764 | PDF | 6.5 MB


Learn to program while creating interactive stories, games, and multimedia projects using Scratch



* Create interactive stories, games, and multimedia projects that you can reuse in your own classroom

* Learn computer programming basics - no computer science degree required

* Connect with the Scratch community for inspiration, advice, and collaboration

* Provides hands-on projects that help you learn by experiment and play



In Detail

If you have the imaginative power to design complex multimedia projects but can't adapt to programming languages, then Scratch 1.4: Beginner's Guide is the book for you. Imagine how good you'll feel when you drag-and-drop your way to interactive games, stories, graphic artwork, computer animations, and much more using Scratch even if you have never programmed before.



This book provides teachers, parents, and new programmers with a guided tour of Scratch's features by creating projects that can be shared, remixed, and improved upon in your own lesson plans. Soon you will be creating games, stories, and animations by snapping blocks of "code" together.



When you program you solve problems. In order to solve problems, you think, take action, and reflect upon your efforts. Scratch teaches you to program using a fun, accessible environment that's as easy as dragging and dropping blocks from one part of the screen to another.



In this book you will program games, stories, and animations using hands-on examples that get you thinking and tinkering. For each project, you start with a series of steps to build something. Then you pause to put our actions into context so that you can relate our code to the actions on Scratch's stage. Throughout each chapter, you'll encounter challenges that encourage you to experiment and learn.



One of the things you're really going to love is that, as you begin working through the examples in the book, you won't be able to stop your imagination and the ideas will stream as fast as you can think of them. Write them down. You'll quickly realize there are a lot of young minds in your home, classroom, or community group that could benefit from Scratch's friendly face. Teach them, please.



What you will learn from this book?



* Design user interfaces, including sequence, characters, and controls.

* Think critically and make decisions - based on need, program limitations and knowledge level.

* Get to know the concepts of scratch programming such as loops, conditional statements, variables, arrays, Boolean logic, dynamic interaction, coordination, synchronization, threads, and event handling, and apply it later to other programming languages.

* Develop a barnyard humor that let's you shine as a storyteller.

* Debug problems in your design and code.

* Revise your projects to fix problems and add functionality.

* Collaborate with the Scratch community by remixing and sharing projects so that you can learn from each other.

* Communicate with peers and students about the details of your projects.

* Capture sound, light, touch, and resistance via an external PicoBoard and use it as input for your Scratch projects.



Approach



This is a Packt Beginners Guide, which means it focuses on practical examples and has a friendly approach, with the opportunity to learn by experiment and play. We work through the project tutorials one block of code at a time, and we periodically pause to reflect on the relationship between our code blocks, our project, and Scratch programming in general. As you work through the book, you are encouraged to experiment with the concepts presented. As each chapter in the book progresses, the topics get increasingly more complex.



Who this book is written for?



Scratch is a teaching language, so it's ideal for people who want to learn how to program or teach others how to program. Educators and parents will learn how to program using Scratch, so they can use Scratch to teach the latest learning skills to their students and children.



No previous computer programming knowledge is required. You only need to know how to perform basic tasks on a computer and this book will teach the rest. You can then use it as a platform to learn more advanced programming languages.



Parents, stuck with a child who wants to play video games all night? Make a new rule. He can only play a video game if he programs the game first.





About the Author



Michael Badger



Micheal Badger is a technical communicator with a history of helping others to use their computer software and technology. For fun, Michael reads computer books and blogs about technology. When he finally decides to disconnect, he spends his spare time fishing, growing pigs, raising honeybees, and tending the family.



Michael also wrote Zenoss Core Network and System Monitoring, a step-by-step guide to configuring the open source IT monitoring software application.











DoWnLoAd FiLe



mirror



mirror







>>:: NO PASSWORD ::<<





mirror






>>::..::!!!NO MIRRORS!!!::..::<<









ADVERTISING » Download fast


« ADVERTISING

Algorithms for Fuzzy Clustering: Methods in c-Means Clustering with Applications (repost)

Algorithms for Fuzzy Clustering


Algorithms for Fuzzy Clustering: Methods in c-Means Clustering with Applications (Studies in Fuzziness and Soft Computing)

Springer | April 15, 2008 | ISBN: 3540787364 | 248 pages | PDF | 3.56 MB


The main subject of this book is the fuzzy c-means proposed by Dunn and Bezdek and their variations including recent studies. A main reason why we concentrate on fuzzy c-means is that most methodology and application studies in fuzzy clustering use fuzzy c-means, and hence fuzzy c-means should be considered to be a major technique of clustering in general, regardless whether one is interested in fuzzy methods or not. Unlike most studies in fuzzy c-means, what we emphasize in this book is a family of algorithms using entropy or entropy-regularized methods which are less known, but we consider the entropy-based method to be another useful method of fuzzy c-means. Throughout this book one of our intentions is to uncover theoretical and methodological differences between the Dunn and Bezdek traditional method and the entropy-based method. We do note claim that the entropy-based method is better than the traditional method, but we believe that the methods of fuzzy c-means become complete by adding the entropy-based method to the method by Dunn and Bezdek, since we can observe natures of the both methods more deeply by contrasting these two.



Writing Efficient Programs

Writing Efficient Programs
Posted By : lout |
Date : 10 Jan 2010 10:01:52 |
Comments : 0


Writing Efficient Programs By Jon Louis Bentley

Publisher: Prentice Hall 1982 | 170 Pages | ISBN: 0139702512 | DJVU | 1 MB






Jon Bentley is recongized as one of the great authorities on Computer Programming and also as one of the best writers in the field. In this book he gives practical advice on improving the efficiency (optimizing) and the limits there of. While showing how to trade off speed for space or vice-versa, he points out the limits that can be expected to gain. His list of techniques is a collection of practical approaches rather than theoretical possibilities.

At 158 pages (not counting index) this book is eminently readable, accessable and useful. Clearly written and well organized this is a book to keep on your shelf for when a program needs improving. It is also a book to read before a program as a reminder not to make things complicated with optimization that aren't needed.






NO PASSWORD














!!!No Mirrors below, please! Follow Rules!


ADVERTISING » Download fast


« ADVERTISING

A Handbook of Statistical Analyses Using Stata, Fourth Edition: Sophia Rabe-Hesketh, Brian S. Everitt

Posted By : ubut |
Date : 11 Jan 2010 08:03:48 |
Comments : 0
1584887567


A Handbook of Statistical Analyses Using Stata, Fourth Edition: Sophia Rabe-Hesketh, Brian S. Everitt

Chapman and Hall/CRC | ISBN: 1584887567 | 2006-11-15 | PDF (OCR) | 352 pages | 40.2 Mb


Fully updated, the fourth edition of this highly acclaimed and perpetually bestselling text demonstrates how a wide variety of statistical analyses, including descriptive statistics, graphics, and model estimation and diagnostics, can be performed using Stata version 9. The authors present many of Stata's novel features, including a new mixed-models estimation command and a new matrix language. This edition also contains additional exercises that use various data sets and numerous examples of real-life data, enabling a better understanding of the methodology. The book offers selected solutions in an appendix as well as a solutions manual with qualifying course adoptions.



pdf@Uploading.com

pdf@Rapidshare.com

My other publications can be found here.

No password







ADVERTISING » Download fast


« ADVERTISING

Signals and Systems with MATLAB Applications

Signals and Systems with MATLAB Applications
Posted By : dinozo125 |
Date : 12 Jan 2010 08:18:36 |
Comments : 0


Steven T Karris, ''Signals and Systems with MATLAB Applications''

Orchard Publications | 2nd edition (February 24, 2007) | English | ISBN: 0970951168 | 598 pages | PDF | 10.3 Mb


This text is now in its fourth edition, "Signals and Systems with MATLAB Computing and Simulink Modeling", ISBN 978-1-934404-11-9. NOTE: 3rd Edition = 2nd Edition + Simulink - 2nd Edition = 1st Edition + End of Chapter Solutions - 1st Edition = No End-of Chapter Solutions but will be sent in PDF as attachment free of charge if you purchase this edition. Best buy if you do not want Simulink





ADVERTISING » Download fast


« ADVERTISING

UML 2 et MDE : Ingénierie des modèles avec études de cas

UML 2 et MDE : Ingénierie des modèles avec études de cas
Posted By : maymak |
Date : 24 Jan 2010 17:34:56 |
Comments : 0




UML 2 et MDE : Ingénierie des modèles avec études de cas, «Franck Barbier»

Dunod | ISBN: 2100495267 | 2005-11-04 | PDF | 360 pages | 8 Mb


Cet ouvrage s'adresse aux ingénieurs logiciel, developpeurs, architectes et chefs de projet, ainsi qu'aux étudiants en écoles d'ingénieurs et en master d'informatique.

Il décrit en détail les nouveautés d'UML 2 (Unified Modeling Language) et le nouveau paradigme informatique MDE (Model Driven Engineering).

• La première partie porte sur la technologie des objets et plus particulièrement sur le lien entre modélisation orientée objet et programmation orientée objet. De nombreux exemples de code sont fournis avec une étude de cas concise en C++.

• La seconde partie est une présentation détaillée d'UML 2 et notamment de toutes les différences et avancées par rapport à UML 1.x.

• La troisième partie présente trois études de cas décrites dans leur totalité (le code est téléchargeable sur Internet)

Au sommaire

• Avant-propos

• Modélisation objet

• UML Structure

• UML Behavior

• Prison de Nantes

• Système de domotique

• Système bancaire

• Index



ADVERTISING » Download fast


« ADVERTISING

Network Security: Private Communication in a Public World

Network Security: Private Communication in a Public World
Posted By : robin-bobin |
Date : 29 Jan 2010 20:52:53 |
Comments : 0


Network Security: Private Communication in a Public World (2nd Edition) By Charlie Kaufman, Radia Perlman, Mike Speciner

Publisher: Prentice Hall 2002-05-02 | 752 Pages | ISBN: 0130460192 | PDF | 5.2 MB


Authors with credentials from some of the top software and hardware companies explain the latest advances in computer network security protocol. For security managers, programmers, and graduate or advanced undergraduate students.





Download

http://hotfile.com/dl/44343468/8cb1f71/Security.chm.html

http://www.megaupload.com/?d=YWGW03P6

Designing Interfaces: Patterns for Effective Interaction Design (Repost)

Designing Interfaces: Patterns for Effective Interaction Design (Repost)
Posted By : JohnGenry |
Date : 31 Jan 2010 20:50:09 |
Comments : 0


Designing Interfaces: Patterns for Effective Interaction Design

Publisher: O'reilly | ISBN: 0596008031 | edition 2005 | CHM | 352 pages | 18,3 mb


Designing a good interface isn't easy. Users demand software that is well-behaved, good-looking, and easy to use. Your clients or managers demand originality and a short time to market. Your UI technology -- web applications, desktop software, even mobile devices -- may give you the tools you need, but little guidance on how to use them well.

UI designers over the years have refined the art of interface design, evolving many best practices and reusable ideas. If you learn these, and understand why the best user interfaces work so well, you too can design engaging and usable interfaces with less guesswork and more confidence.

Designing Interfaces captures those best practices as design patterns -- solutions to common design problems, tailored to the situation at hand. Each pattern contains practical advice that you can put to use immediately, plus a variety of examples illustrated in full color. You'll get recommendations, design alternatives, and warnings on when not to use them.





ADVERTISING » Download fast


« ADVERTISING

MDA en action : Ingénierie logicielle guidée par les modèles (1Cédérom)

DA en action : Ingénierie logicielle guidée par les modèles (1Cédérom)
Posted By : Gi-shits |
Date : 27 Jan 2010 13:45:05 |
Comments : 0


MDA en action : Ingénierie logicielle guidée par les modèles

Eyrolles (7 avril 2005) | ISBN: 2212115393 | 260 pages | PDF | 4 MB


Nouvelle approche d'ingénierie logicielle élaborée par l'OMG, MDA (Model Driven Architecture) prône l'utilisation systématique de modèles dans toutes les phases du cycle de vie des applications informatiques, de l'analyse et conception à la génération de code et au déploiement. Pour une meilleure productivité et une plus grande pérennité des développements, la logique métier d'une application est modélisée indépendamment de toute plate-forme d'exécution, un mécanisme de transformation de modèles permettant ensuite de produire automatiquement les modèles et le code spécifiques à chaque plate-forme (J2EE, NET, PHP... ). Mise en œuvre pratique de MDA, illustrée par une étude de cas : Après une description détaillée des standards sur lesquels repose MDA, tels que UML, MOF, OCL et XMI, l'ouvrage insiste sur les aspects pratiques de sa mise en oeuvre. Il montre comment construire des transformations de modèles en java à l'aide de l'API )MI et du framework EMF, et présente deux outils MDA du marché IBM Rational Software Modeler et Objecteering/MDA Modeler. L'ouvrage décrit enfin comment MDA prend en compte les plate-formes d'exécution, en détaillant plus particulièrement les environnements J2EE/EJB et PHP. Tous ces aspects de l'approche MDA sont illustrés par une étude de cas, une application de commerce électronique développée simultanément en J2EE et en PHP.














ADVERTISING » Download fast


« ADVERTISING

Security Informatics, Vol. 9

Security Informatics, Vol. 9
Posted By : Book-er |
Date : 28 Jan 2010 11:37:54 |
Comments : 0


Christopher C. Yang, Michael Chiu-Lung Chau, Jau-Hwang Wang, Hsinchun Chen "Security Informatics, Vol. 9"

Springer | English | 2009-11-23 | ISBN: 1441913246 | 163 pages | PDF | 4 MB




Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. ISI topics include ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, and other related topics. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners.



SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field; the volume will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics. The volume features high-quality contributions from worldwide leading experts across a variety of discipline domains. Each contribution follows a uniform structure and has undergone a thorough peer-review process.





Download links:






NO MIRRORS according to the rules







ADVERTISING » Download fast


« ADVERTISING