lunes, 31 de marzo de 2008

Todd Lammle's CCNA IOS Commands Survival Guide

To become a Cisco Certified Network Associate (CCNA), you must learn the hundreds of IOS commands used by Cisco routers and switches. This handy reference from Cisco networking authority Todd Lammle is just what you need to master those commands. From a thorough introduction to Cisco’s basic operating system to making the transition to IPv6, Todd Lammle walks you through hundreds of commands with short, to-the-point explanations and plenty of figures and real-world examples.


Publisher:
Sybex (November 28, 2007)
Pages: 292
Language: English
ISBN-10: 0470175605
ISBN-13: 978-0470175606
Format:
PDF


Descarga/Download

Ajax: The Complete Reference

Ajax: The Complete Reference explains how to create and test Ajax-enabled Web applications using the XMLHttpRequest object as well as alternative JavaScript-based communication mechanisms. You'll explore a variety of sample applications featuring emerging user-interface conventions and build applications that address real-world networking and security issues. A robust communication library is developed throughout the book that enables you to architect flexible Ajax applications. The latest technologies such as Web services, Flash-Ajax integration, client-side templates, Comet, and Offline Access are also covered.


Publisher:
McGraw-Hill Osborne Media (February 21, 2008)
Pages:
654
Language:
English
ISBN-10:
007149216X
ISBN-13:
978-0071492164
Format:
PDF



Descarga/Download

Physical Database Design: The Database Professional's Guide to Exploiting Indexes, Views, Storage and More

The rapidly increasing volume of information contained in relational databases places a strain on databases, performance, and maintainability: DBAs are under greater pressure than ever to optimize database structure for system performance and administration.

Physical Database Design discusses the concept of how physical structures of databases affect performance, including specific examples, guidelines, and best and worst practices for a variety of DBMSs and configurations. Something as simple as improving the table index design has a profound impact on performance. Every form of relational database, such as Online Transaction Processing (OLTP), Enterprise Resource Management (ERP), Data Mining (DM), or Management Resource Planning (MRP), can be improved using the methods provided in the book.


Publisher:
Morgan Kaufmann (March 21, 2007)
Pages: 448
Language: English
ISBN-10: 0123693896
ISBN-13: 978-0123693891
Format:
PDF


Descarga/Download

domingo, 30 de marzo de 2008

Oracle Application Server 10g Administration Handbook

From the exclusive publisher of Oracle Press books, here is an architectural and technical reference on how to use Oracle Application Server 10g to Web-enable Oracle databases for application server systems. You'll find coverage of installation, configuration, and tuning, using Java with Oracle Application Server 10g, and much more.



Publisher: McGraw-Hill Osborne Media (March 25, 2004)
Pages: 400
Language: English
ISBN-10: 0072229586
ISBN-13: 978-0072229585
Format:
PDF


Descarga/Download

Hacking Ubuntu: Serious Hacks Mods and Customizations

You can't "test quality into" a software product, but neither can you build a quality software product without test and analysis. Software test and analysis is increasingly recognized, in research and in industrial practice, as a core challenge in software engineering and computer science. Software Testing and Analysis: Process, Principles, and Techniques is the first book to present a range of complementary software test and analysis techniques in an integrated, coherent fashion. It covers a full spectrum of topics from basic principles and underlying theory to organizational and process issues in real-world application. The emphasis throughout is on selecting a complementary set of practical techniques to achieve an acceptable level of quality at an acceptable cost.


Publisher:
Wiley (April 16, 2007)
Pages: 408
Language: English
ISBN-10: 047010872X
ISBN-13: 978-0470108727
Format:
CHM


Descarga/Download

The Practice of System and Network Administration (2nd Edition)

The first edition of The Practice of System and Network Administration introduced a generation of system and network administrators to a modern IT methodology. Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to protégé. This wonderfully lucid, often funny cornucopia of information introduces beginners to advanced frameworks valuable for their entire career, yet is structured to help even the most advanced experts through difficult projects.


Publisher:
Addison-Wesley; 2nd edition (July 15, 2007)
Pages: 1056
Language: English
ISBN-10: 0321492668
ISBN-13: 978-0321492661
Format:
PDF


Descarga/Download

viernes, 28 de marzo de 2008

Advanced Ajax: Architecture and Best Practices

Advanced Ajax: Architecture and Best Practices is the definitive guide to building business-critical, production-quality Web applications with Ajax. Shawn M. Lauriat systematically addresses the design, architecture, and development issues associated with Ajax, offering proven patterns and robust code examples available in no other book. You'll find best practices for addressing the full spectrum of issues enterprise Ajax developers face: scalability, performance, security, reliability, flexibility, maintainability, and reusability.


Publisher:
Prentice Hall (October 25, 2007)
Pages: 384
Language: English
ISBN-10: 0131350641
ISBN-13: 978-0131350649
Format:
PDF


Descarga/Download

Cisco Express Forwarding

Cisco Express Forwarding demystifies the internal workings of Cisco routers and switches, making it easier for you to optimize performance and troubleshoot issues that arise in Cisco network environments. This book addresses common misconceptions about CEF and packet switching across various platforms, helping you to improve your troubleshooting skills for CEF- and non-CEF-related problems.


Publisher: Cisco Press (Apr 24, 2007)
Pages: 288
Language: English
ISBN-10: 1-58705-236-9
ISBN-13: 978-1-58705-236-1
Format:
CHM


Descarga/Download

jueves, 27 de marzo de 2008

Expert Oracle Database Architecture: 9i and 10g Programming Techniques and Solutions

Expert Oracle Database Architecture is the first of a three-book series that completely explores and defines the Oracle database. It covers all of the most important Oracle architecture features, including: Files, memory structures and processes; Locking and latching; Transactions, concurrency and multi-versioning; Tables and Indexes; Datatypes; Partitioning and parallelism.

Each feature is taught in a proof-by-example manner, not only discussing what it is, but also how it works, how to implement software using it, and the common pitfalls associated with it.

This fully revised edition covers both the 9i and 10g versions.


Publisher:
Apress (September 15, 2005)
Pages:
768
Language:
English
ISBN-10:
1590595300
ISBN-13:
978-1590595305
Format:
PDF



Descarga/Download

bash Cookbook: Solutions and Examples for bash Users

The key to mastering any Unix system, especially Linux and Mac OS X, is a thorough knowledge of shell scripting. Scripting is a way to harness and customize the power of any Unix system, and it's an essential skill for any Unix users, including system administrators and professional OS X developers. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards.

bash Cookbook teaches shell scripting the way Unix masters practice the craft. It presents a variety of recipes and tricks for all levels of shell programmers so that anyone can become a proficient user of the most common Unix shell -- the bash shell -- and cygwin or other popular Unix emulation packages. Packed full of useful scripts, along with examples that explain how to create better scripts, this new cookbook gives professionals and power users everything they need to automate routine tasks and enable them to truly manage their systems -- rather than have their systems manage them.


Publisher:
O'Reilly (May 24, 2007)
Pages:
622
Language:
English
ISBN-10:
0596526784
ISBN-13:
978-0596526788
Format:
PDF



Descarga/Download

miércoles, 26 de marzo de 2008

VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers

VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

Drawing on his extensive experience consulting on large-scale ESX Server implementations, Edward L. Haletky brings together an unprecedented collection of tips, best practices, and field-tested solutions. More than any other author, he illuminates the real issues, tradeoffs, and pitfalls associated with ESX Server–and shows how to make the most of it in your unique environment.

Haletky covers the entire lifecycle: planning, installation, system monitoring, tuning, clustering, security, disaster recovery, and much more. Throughout, he supports his recommendations with examples from real-world deployments. He also provides detailed checklists for handling crucial issues such as caching, networking, storage, and hardware selection. Many of his techniques and practices apply to all current virtualization platforms, not just ESX Server.

This book will be an indispensable resource for every network architect, administrator, and IT professional who works with virtual servers. ESX Server newcomers will find the soup-to-nuts introduction they desperately need; experienced users will find an unparalleled source of field-tested answers and solutions.


Publisher: Prentice Hall (January 8, 2008)
Pages:
576
Language:
English
ISBN-10:
0132302071
ISBN-13:
978-0132302074
Format:
PDF



Descarga/Download

Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks

The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it. By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere, and with any device. Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks covers these key technologies used in wireless ad hoc networks. The book is divided into three parts, each providing self-contained chapters written by international experts. Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking, time synchronization, QoS and real-time, security and dependability, applications, modeling and performance evaluation, implementation and experience, and much more. The book is novel in its single source presentation of ad hoc networking and related key technologies and applications over the platforms of personal area, sensory area, and local area networks. It is a valuable resource for those who work in or are interested in learning about the pervasive computing environment.


Publisher:
Auerbach (March 28, 2007)
Pages:
664
Language:
English
ISBN-10:
0849392543
ISBN-13:
978-0849392542
Format:
PDF


Descarga/Download

The CSS Anthology: 101 Essential Tips, Tricks & Hacks (2nd Edition)

A practical guide on CSS (Cascading Style Sheets) for professionals and novices, that can be used both as a tutorial and read cover-to-cover or as a handy and practical reference book to common problems, solutions and effects. The 2nd edition is now full-color throughout and is completely updated and revised with the latest tips & tricks.




Publisher:
SitePoint; 2nd edition (August 14, 2007)
Pages: 400
Language: English
ISBN-10: 097584198X
ISBN-13: 978-0975841983
Format:
PDF


Descarga/Download

martes, 25 de marzo de 2008

Juniper Networks Secure Access SSL VPN Configuration Guide

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.


Publisher:
Syngress (July 18, 2007)
Pages: 656
Language: English
ISBN-10: 1597492000
ISBN-13: 978-1597492003
Format:
PDF


Descarga/Download

Oracle Database 10g Performance Tuning Tips & Techniques

The definitive guide to Oracle performance tuning has been fully expanded to cover every aspect of Oracle Database 10g. This comprehensive resource contains everything database administrators and developers need to know to keep Oracle Database 10g performing at its peak. Real-world case studies and in-depth examples illustrate best practices and highlight the latest tuning options.



Publisher:
McGraw-Hill Osborne Media (July 30, 2007)
Pages: 967
Language: English
ISBN-10: 0072263059
ISBN-13: 978-0072263053
Format:
PDF


Descarga/Download

Integrated Cisco and UNIX Network Architectures

UNIX gateways introduce massive performance possibilities at a fraction of the price of dedicated proprietary appliances by performing network tasks entirely in software. With Cisco Systems routers dominating the Internet and enterprise networking and UNIX routing and gateway solutions spreading from within server farms and data centers, new opportunities and possibilities arise for system and network administrators who understand the benefit of integrated designs. For example, the use of UNIX gateways can enable intrusion detection, firewalling, cable and DSL access, terminal servers and access concentrators, VPNs, roaming user support, and other LAN and WAN services. Far from being mutually exclusive, Cisco devices, UNIX operating systems, and open source applications can enjoy a peaceful, perhaps even inevitable, coexistence for years to come. Integrated Cisco and UNIX Network Architectures shows how Cisco routers, switches, and firewalls seamlessly work together with UNIX operating systems in an integrated networking and security environment.

Integrated Cisco and UNIX Network Architectures reveals not just the feasibility but also the desirability of Cisco/UNIX integrated routing with regard to systems integration, interoperability, and feature requirements. Detailed, progressively complex lab scenarios emphasize enterprise and ISP requirements, casting light on the similarities and differences of these two worlds. Platform issues, such as behavior of firewall filters, kernel features, and proper standards compliance, are discussed, analyzed with sniffers, and tested with handcrafted traffic from packet generators and test applications.


Publisher: Cisco Press (Sep 14, 2004)
Pages: 600
Language: English
ISBN-10: 1587051214
ISBN-13: 978-1587051210
Format:
CHM


Descarga/Download

lunes, 24 de marzo de 2008

Software Testing and Analysis: Process, Principles and Techniques

You can't "test quality into" a software product, but neither can you build a quality software product without test and analysis. Software test and analysis is increasingly recognized, in research and in industrial practice, as a core challenge in software engineering and computer science. Software Testing and Analysis: Process, Principles, and Techniques is the first book to present a range of complementary software test and analysis techniques in an integrated, coherent fashion. It covers a full spectrum of topics from basic principles and underlying theory to organizational and process issues in real-world application. The emphasis throughout is on selecting a complementary set of practical techniques to achieve an acceptable level of quality at an acceptable cost.


Publisher:
Wiley (April 13, 2007)
Pages: 488
Language: English
ISBN-10: 0471455938
ISBN-13: 978-0471455936
Format:
CHM


Descarga/Download

Hacking Exposed Wireless: Wireless Security Secrets & Solutions

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.


Publisher:
McGraw-Hill (March 26, 2007)
Pages: 386
Language: English
ISBN-10: 0072262583
ISBN-13: 978-0072262582
Format:
CHM


Descarga/Download

Java 2: Sun Certified Programmer & Developer for Java 2 Study Guide (Exams 310-035 & 310-027)

Revised and updated by one of the co-developers of the (310-035) Programmer exam, this edition offers complete coverage of the Sun Certified Programmer for Java 2 exam objectives and newly added, complete coverage of both portions of the Sun Certified Java 2 Developers exam. More than 250 challenging practice questions have been completely revised to closely model the format, tone, topics, and difficulty of the real exam. An integrated study system based on proven pedagogy, exam coverage includes step-by-step exercises, special Exam Watch notes, On-the-Job elements, and Self Tests with in-depth answer explanations to help reinforce and teach practical skills.


Publisher:
McGraw-Hill Osborne Media (Dec 11, 2002)
Pages: 752
Language: English
ISBN-10: 0072226846
ISBN-13: 978-0072226843
Format:
PDF


Descarga/Download

domingo, 23 de marzo de 2008

Beginning C# 2008 From Novice to Professional

Get comfortable with the most powerful version of the .NET Framework devised yet, by embracing new techniques and innovations to create your applications faster, using a wide range of tools.

The C# 2008 language is your gateway to the powerful .NET platform. C# combined with Visual Studio gives you the freedom to create your applications faster and with a greater range of tools than any other coding environment.

The new .NET "Orcas" Framework is the most powerful yet, devised with new innovations such as Language Integrated Query, making it easy for you to query your databases directly from your C# code; and ASP.NET AJAX, giving you drag-and-drop access to AJAX techniques for your web pages.


Publisher:
Apress (November 12, 2007)
Pages: 487
Language: English
ISBN-10: 1590598695
ISBN-13: 978-1590598696
Format:
PDF


Descarga/Download

sábado, 22 de marzo de 2008

The Ethical Hack: A Framework for Business Value Penetration Testing

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible. The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization. Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.


Publisher: Auerbach (September 29, 2004)
Pages:
352
Language:
English
ISBN-10:
084931609X
ISBN-13:
978-0849316098
Format:
PDF



Descarga/Download

Windows Workflow Foundation Step By Step

Get hands-on guidance for using Microsoft Windows Workflow Foundation to create process-managed applications for Microsoft Windows-one step at a time. Understanding Windows Workflow Foundation is essential for every developer who works with multiple applications and services that must exchange data or results. Windows Workflow Foundation defines a process flow amongst people, applications, and services-mapping dependencies and sequences to allow automation of tasks across previously stand-alone programs. With STEP BY STEP, you work at your own pace through hands-on, learn-by-doing exercises to understand the core capabilities and fundamental techniques for working with Windows Workflow Foundation. New-to-topic developers can take a sequential approach to understanding workflows and learning how to create Windows Workflow Foundation-enabled applications and services. This book includes a CD with practice exercises and code samples to help developers accelerate their productivity.


Publisher:
Microsoft Press (March 28, 2007)
Pages: 512
Language: English
ISBN-10: 073562335X
ISBN-13: 978-0735623354
Format:
PDF


Descarga/Download

viernes, 21 de marzo de 2008

VBScript WMI and ADSI Unleashed


If you're a Windows administrator, scripting expertise can liberate you from boring, repetitive work -- so you can take on the sophisticated, high-value projects you really want. Top scripting guru Don Jones has written the definitive administrator's guide to getting results with Microsoft's key scripting technologies: VBScript, WMI, and ADSI.



Publisher: SAMS (June 3, 2007)
Pages: 576
Language: English
ISBN-10: 0321501713
ISBN-13: 978-0321501714
Format:
PDF


Descarga/Download

The Business Case for Storage Networks

The Business Case for Storage Networks covers the problem of direct-attached storage (DAS) and the solutions offered by storage area networks. It details the experiences of IT decision makers and implementers who have deployed SAN solutions to address the formidable problems facing their companies, which are now overwhelmed with expensive, inefficient, and difficult-to-manage DAS solutions. The Business Case for Storage Networks addresses the problems of storage growth and increased consumption, the role of the IT department as a cost center, and how SAN technologies can help save money in the long run, helping you make an informed decision about your storage networking investment.


Publisher: Cisco Press (Oct 19, 2004)
Pages: 264
Language: English
ISBN-10: 1-58720-118-6
ISBN-13: 978-1-58720-118-9
Format:
CHM


Descarga/Download

Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.


Publisher:
Addison-Wesley (August 11, 2007)
Pages: 384
Language: English
ISBN-10: 0321437349
ISBN-13: 978-0321437341
Format:
PDF


Descarga/Download

The Best Damn IT Security Management Book Period

The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedakers, this volume is an indispensable addition to a serious security professional's toolkit.

Coverage includes Business Continuity, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration.


Publisher:
Syngress (October 19, 2007)
Pages:
900
Language:
English
ISBN-10:
1597492272
ISBN-13:
978-1597492270
Format:
PDF



Descarga/Download

miércoles, 19 de marzo de 2008

WiMAX/MobileFi: Advanced Research and Technology

WiMAX is bringing about a worldwide revolution in broadband wireless access, including both fixed and mobile handsets. The IEEE 802.16 working group standardized most aspects of WiMAX signaling messages. However, several algorithms were left unspecified opening the door for innovations in protocol engineering for 802.16/802.20-based broadband wireless systems.
Get Connected to the WiMAX Revolution
WiMAX/MobileFi: Advanced Research and Technology brings together the worlds leading WiMAX researchers to present progressive techniques in the design, analysis, and optimization of protocols for WiMAX. This ground-breaking, previously unpublished, collection of papers addresses topics such as connection admission control, integration with WiFi Networks, QoS support, handoff management, scheduling algorithms, and load-balancing just to name a few.


Publisher:
Auerbach (Dec 10, 2007)
Pages: 448
Language: English
ISBN-10: 142004351X
ISBN-13: 978-1420043518
Format:
PDF


Descarga/Download

Professional Search Engine Optimization with PHP: A Developer's Guide to SEO

Maybe you’re a great programmer or IT professional, but marketing isn’t your thing. Or perhaps you’re a tech-savvy search engine marketer who wants a peek under the hood of a search engine optimized web site. Search engine marketing is a field where technology and marketing are both critical and interdependent, because small changes in the implementation of a web site can make you or break you in search engine rankings. Furthermore, the fusion of technology and marketing know-how can create web site features that attract more visitors.

The mission of this book is to help web developers create web sites that rank well with the major search engines, and to teach search engine marketers how to use technology to their advantage. We assert that neither marketing nor IT can exist in a vacuum, and it is essential that they not see themselves as opposing forces in an organization. They must work together. This book aims to educate both sides in that regard.


Publisher:
Wrox (April 16, 2007)
Pages: 350
Language: English
ISBN-10: 0470100923
ISBN-13: 978-0470100929
Format:
PDF


Descarga/Download

Router Security Strategies: Securing IP Network Traffic Planes

Router Security Strategies: Securing IP Network Traffic Planes provides a comprehensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data, control, management, and services planes that provide the infrastructure for IP networking.

Publisher: Cisco Press (Dec 21, 2007)
Pages: 672
Language: English
ISBN-10: 1-58705-508-2
ISBN-13: 978-1-58705-508-9
Format:
PDF


Descarga/Download

martes, 18 de marzo de 2008

Fast Track to Sun Certified Java Programmer (SCJP) 5.0 Upgrade Exam


If you'd like to learn the new features in Java SE 5.0 and pass the Sun Certified Java Programmer Upgrade Exam (CX-310-056), then this book is for you. It covers all the Java SE 5.0 new features required in the exam. You don't need to read about the existing features that you already know. 117 review questions and mock exam questions are included.






Publisher:
TipTec Development (November 30, 2006)
Pages:
248
Language:
English
ISBN-10:
143030393X
ISBN-13:
978-1430303930
Format:
PDF


Descarga/Download

Windows Vista: The Missing Manual

Windows Vista is Microsoft's most important software release in more than a decade. It offers users an abundance of new and upgraded features that were more than five years in the making: a gorgeous, glass-like visual overhaul; superior searching and organization tools; a multimedia and collaboration suite; and above all, a massive, top-to-bottom security-shield overhaul. There's scarcely a single feature of the older versions of Windows that hasn't been tweaked, overhauled, or replaced entirely.

But when users first encounter this beautiful new operating system, there's gonna be a whole lotta head-scratchin', starting with trying to figure out which of the five versions of Vista is installed on the PC (Home, Premium, Business, Enterprise, Ultimate).


Publisher:
O'Reilly (Dec 27, 2006)
Pages:
848
Language:
English
ISBN-10:
0596528272
ISBN-13:
978-0596528270
Format:
CHM



Descarga/Download

lunes, 17 de marzo de 2008

Fedora 6 and Red Hat Enterprise Linux Bible

With Fedora Core 6, you get the latest Linux technology and previews of upcoming Red Hat Enterprise Linux software. Run Fedora Core 6 live (no install required), install it to hard disk when you're ready, and add hundreds of Fedora Extras packages. Everything comes on the DVD and two CDs included with this book. Use the latest Linux desktop, server, and systems administration features as you learn skills that scale up to professional, commercial-quality Linux systems.


Publisher:
Wiley (December 18, 2006)
Pages:
1082
Language:
English
ISBN-10:
047008278X
ISBN-13:
978-0470082782
Format:
CHM



Descarga/Download

Pro CSS and HTML Design Patterns

Design patterns have been used with great success in software programming. They improve productivity, creativity, and efficiency in web design and development, and they reduce code bloat and complexity. In the context of CSS and HTML, design patterns are sets of common functionality that work across various browsers and screen readers, without sacrificing design values or accessibility or relying on hacks and filters. But until now they have not been applied systematically to HTML and CSS web design and development.

With the help of Pro CSS and HTML Design Patterns, you can reap the benefits of using design patterns in your HTML and CSS code. The book provides you with all the CSS and HTML design patterns you need. Web development expert and author Michael Bowers then takes you through multiple design patterns for text, backgrounds, borders, images, forms, layouts, and much more. He shows you exactly how each one works, and how to use them most effectively in your own projects. After you learn about these design patterns, you’ll wonder how you ever developed web sites without them!


Publisher:
Apress (April 23, 2007)
Pages: 494
Language: English
ISBN-10: 1590598040
ISBN-13: 978-1590598047
Format:
PDF


Descarga/Download

Microsoft Exchange Server 2007 Administrator´s Pocket Consultant

Here’s the practical, pocket-sized reference for IT professionals who administer and support Microsoft Exchange Server 2007. This unique guide provides essential details for using this next-generation messaging and collaboration platform to deliver better performance, interoperability, and end-user experience. Written by an award-winning author of more than two dozen computer books, this guide puts expert installation, migration, administration, and troubleshooting advice right at your fingertips. Featuring quick-reference tables, concise lists, and step-by-step instructions, this handy, one-stop guide provides fast, accurate answers on the spot—whether you’re at your desk or in the field.


Publisher:
Microsoft Press (Jan 31, 2007)
Pages:
560
Language:
English
ISBN-10:
0735623481
ISBN-13:
978-0735623484
Format:
CHM



Descarga/Download

domingo, 16 de marzo de 2008

CCNA Video Mentor: (CCNA Exam 640-802)

CCNA Video Mentor is a unique video product that provides you with more than two hours of personal visual instruction from best-selling author and instructor Wendell Odom. In the 12 videos presented on the CD-ROM, Wendell walks you through common Cisco router and switch configuration topics.

Designed to develop and enhance hands-on skills, each 10-15 minute video covers essential configuration tasks, including navigating router and switch CLI, router configuration, managing configuration files, configuring Virtual LANs, static and connected routes, RIPv1 configuration, RIPv1 with split horizon, route poisoning and poison reverse, single-area OSPF configuration, EIGRP configuration, Network Address Translation overload, Point-to-Point Protocol and Challenge Handshake Authentication Protocol configuration, and configuring access lists.


Publisher: Cisco Press (Aug 23, 2006)
Pages: 80

Language: English
ISBN-10: 1-58720-168-2
ISBN-13: 978-1-58720-168-4
Format:
ISO


Download:

Part1
Part2
Part3

jueves, 13 de marzo de 2008

Routing TCP/IP, Volume II

The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. Routing TCP/IP, Volume II, provides you with the expertise necessary to understand and implement Border Gateway Protocol Version 4 (BGP-4), multicast routing, Network Address Translation (NAT), IPv6, and effective router management techniques.


Publisher: Cisco Press (Apr 11, 2001)
Pages: 976
Language: English
ISBN-10: 1-57870-089-2
ISBN-13: 978-1-57870-089-9
Format:
PDF


Descarga/Download

Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks


The implementation of IPv6 is essential to the continued growth of the internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6.







Publisher:
Auerbach (December 6, 2007)
Pages:
248
Language:
English
ISBN-10:
0849385164
ISBN-13:
978-0849385162
Format:
PDF


Descarga/Download

Network Virtualization

Today's enterprises have several groups of users with specific needs. The differences between these groups translate into specific network requirements. Within some organizations, these requirements are so dissimilar that the different groups need to be treated as totally separate customers by the enterprise's IT department. As the number of groups increases, keeping them separate and secure is a challenge to IT departments, particularly with the advent of wireless networks, the requirement for enterprise-wide user mobility, and the need for cross group collaboration with resource sharing on a per project basis. Network Virtualization provides design guidance for virtualized enterprise networks and arms network architects with the background necessary to make sound technological choices in the face of different business requirements.


Publisher: Cisco Press (Jul 19, 2006)
Pages: 408
Language: English
ISBN-10: 1-58705-248-2
ISBN-13: 978-1-58705-248-4
Format:
CHM


Descarga/Download

miércoles, 12 de marzo de 2008

Simply JavaScript

Packed with full-color examples, Simply JavaScript is all you need to start programming in JavaScript the right way. Learn how easy it is to use JavaScript to solve real-world problems, build smarter forms, track user events (such as mouse clicks and key strokes), and design eye-catching animations. Then move on to more powerful techniques using the DOM and Ajax.




Publisher:
SitePoint (June 21, 2007)
Pages:
424
Language:
English
ISBN-10:
0980285801
ISBN-13:
978-0980285802
Format:
PDF



Descarga/Download

Networking with Microsoft Windows Vista

Your Guide to Easy and Secure Windows Vista Networking is a complete beginner's guide to creating, configuring, administering, and using a small network using Windows Vista computers. Inside you'll find comprehensive coverage of networking hardware, including Ethernet (wired) hardware (from NICs to cables to switches to routers) and wireless Hardware--from wireless NICs to access points to range extenders. If you have even one computer on the Internet or if you use wireless in your home or office, you need this book! Extensive hardware coverage that shows you what equipment to buy and how to set it up! Easy to follow buyer's guides that enable anyone to make smart and informed choices when purchasing networking hardware. Complete and comprehensive coverage of Windows Vista's networking features.


Publisher:
QUE (February 14, 2008)
Pages:
552
Language:
English
ISBN-10:
0-7897-3777-9
ISBN-13:
978-0-7897-3777-9
Format:
PDF



Descarga/Download

martes, 11 de marzo de 2008

Accelerated C# 2008

C# 3.0 offers powerful new features, and Accelerated C# 3.0 is the fastest path to mastering them, and the rest of C#, for both experienced C# programmers moving to C# 3.0 and programmers moving to C# from another object-oriented language. Many books introduce C#, but very few also explain how to use it optimally with the .NET common language runtime (CLR). This book teaches both core C# language concepts and how to wisely employ C# idioms and object-oriented design patterns to exploit the power of C# and the CLR.

This book is both a rapid tutorial and a permanent reference. Youll quickly master C# syntax while learning how the CLR simplifies many programming tasks. Youll also learn best practices that ensure your code will be efficient, reusable, and robust.


Publisher:
Apress (November 12, 2007)
Pages: 510
Language: English
ISBN-10: 1590598733
ISBN-13: 978-1590598733
Format:
PDF


Descarga/Download

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.


Publisher:
No Starch Press (September 15, 2007)
Pages:
336
Language:
English
ISBN-10:
1593271417
ISBN-13:
978-1593271411
Format:
PDF



Descarga/Download

lunes, 10 de marzo de 2008

Patterns for Performance and Operability: Building and Testing Enterprise Software

It is a scenario too familiar to the software industry: new software is delivered to customers and suddenly unforeseen and devastating bugs cause everything to crash. Patterns for Performance and Operability is filled with practical, hands-on software development and testing techniques to ensure customers enjoy properly running software rather than complain about bugs and system crashes. The book explores in-depth nonfunctional design and testing that too many software professionals overlook to their peril. It shows how to avoid a range of real world user problems, unexpected data permutations, and unforeseen input that lead to software failure. Designers, developers and testers can refer to the book's catalog of defensive software patterns to guarantee high-quality performance.


Publisher:
Auerbach (Dec 22, 2007)
Pages:
344
Language:
English
ISBN-10:
1420053345
ISBN-13:
978-1420053340
Format:
PDF


Descarga/Download

Cisco CallManager Best Practices: A Cisco AVVID Solution

Cisco CallManager Best Practices offers best practice solutions for CallManager and related IP telephony components such as IP phones, gateways, and applications. Written in short, to-the-point sections, this book lets you explore the tips, tricks, and lessons learned that will help you plan, install, configure, back up, restore, upgrade, patch, and secure Cisco CallManager, the core call processing component in a Cisco IP Telephony deployment. You’ll also discover the best ways to use services and parameters, directory integration, call detail records, management and monitoring applications, and more.


Publisher: Cisco Press (Jun 28, 2004)
Pages: 624
Language: English
ISBN-10: 1-58705-139-7
ISBN-13: 978-1-58705-139-5
Format:
CHM


Descarga/Download