Excel Advanced Report Development, Sql and Excel
xcel Advanced Report Development
Timothy Zapawa
ISBN: 0-7645-8811-7
Paperback
468 pages
July 2005
£24.99 / €34.80
If you're a SQL programmer or an experienced Excel user, here at last is the ultimate resource on developing reporting solutions with Excel. Focused on report development using OLTP databases, this book is packed with comprehensive information on both technical and strategic aspects. You'll thoroughly examine the main features of Excel's reporting technology-PivotTable reports, Spreadsheet reports, parameter queries, and web components. With notes, tips, warnings, and real-world examples in each chapter, you'll be able to put your knowledge to work immediately.
PDF - 9,168,084 Bytes
Where?
CODE
http://rapidshare.de/files/5603416/WPEARD.rar.html
CODE
Unrar pass: Sudoku
Timothy Zapawa
ISBN: 0-7645-8811-7
Paperback
468 pages
July 2005
£24.99 / €34.80
If you're a SQL programmer or an experienced Excel user, here at last is the ultimate resource on developing reporting solutions with Excel. Focused on report development using OLTP databases, this book is packed with comprehensive information on both technical and strategic aspects. You'll thoroughly examine the main features of Excel's reporting technology-PivotTable reports, Spreadsheet reports, parameter queries, and web components. With notes, tips, warnings, and real-world examples in each chapter, you'll be able to put your knowledge to work immediately.
PDF - 9,168,084 Bytes
Where?
CODE
http://rapidshare.de/files/5603416/WPEARD.rar.html
CODE
Unrar pass: Sudoku
Handbook of Eating Disorders 2nd. Edition
In this second edition of the Handbook of Eating Disorders every chapter has been rewritten. This was necessary to reflect not only the many advances in knowledge and understanding of eating disorders, but also the advances in communication between clinical and academic branches, and between countries. The second edition embraces this more coherent, integrated approach. The spectrum of what is termed an eating disorder now includes obesity, and new conditions such as binge eating disorder have emerged. In this new edition, many chapters now encompass both the lean and obese ends of the spectrum so that each may benefit from understanding gained in the other. To further encourage this synthesis and consensus, chapter authors have been paired with colleagues in other schools, countries or disciplines. However, like the previous edition, the Handbook of Eating Disorders, Second Edition provides a clear, coherent, readable and authoritative overview of this rapidly developing field that will be welcomed by all clinicians and researchers in the eating disorders field.
download: 1.83 MB
LINK:
http://rapidshare.de/files/6965842/H...ition.rar.html
download: 1.83 MB
LINK:
http://rapidshare.de/files/6965842/H...ition.rar.html
World's Greatest Speeches
WORLD'S GREATEST SPEECHES
The timbre of FDR\'s voice as he addressed Congress on December 8, 1941, is chillingly immediate when heard on this CD-ROM that contains more than 400 notable speeches in text, two hours of original audio, and 30 minutes of video clips. History-making political and spiritual speeches range over time from 1250 BC (Moses) to 1994 (Mandela), and in substance from Nixon\'s \"Checkers Speech\" and Pericles\'s funeral oration to Edward VIII\'s abdication and Lou Gehrig\'s farewell to baseball. More than 100 comprehensive biographies (with pictures) help to put the speeches in context. Easy to use and heavily cross-referenced, this program is indexed in five ways (country, date, category, author, and title) and has a keyword search option. Grades 7 and up. Social Studies School Service. c1995.
This complete and user-friendly multimedia reference library on CD-ROM will provide your students with an in-depth experience of history\'s greatest moments from antiquity to the most contemporary events in foreign policy. World\'s Greatest Speeches provides over 400 speeches, in audio, video, and text formats, supplemented by pictures and over 100 original, comprehensive biographies of the speakers. Your students can experience history as they view over 30 minutes of video and listen to over two hours of audio presentations, featuring many of the actual voices of the original speakers.
Download:
LINK:
http://rapidshare.de/files/3782437/wgs.part1.rar.html
http://rapidshare.de/files/3782401/wgs.part2.rar.html
http://rapidshare.de/files/3782418/wgs.part3.rar.html
http://rapidshare.de/files/3780449/wgs.part4.rar.html
http://rapidshare.de/files/3780442/wgs.part5.rar.html
http://rapidshare.de/files/3777879/wgs.part6.rar.html
The timbre of FDR\'s voice as he addressed Congress on December 8, 1941, is chillingly immediate when heard on this CD-ROM that contains more than 400 notable speeches in text, two hours of original audio, and 30 minutes of video clips. History-making political and spiritual speeches range over time from 1250 BC (Moses) to 1994 (Mandela), and in substance from Nixon\'s \"Checkers Speech\" and Pericles\'s funeral oration to Edward VIII\'s abdication and Lou Gehrig\'s farewell to baseball. More than 100 comprehensive biographies (with pictures) help to put the speeches in context. Easy to use and heavily cross-referenced, this program is indexed in five ways (country, date, category, author, and title) and has a keyword search option. Grades 7 and up. Social Studies School Service. c1995.
This complete and user-friendly multimedia reference library on CD-ROM will provide your students with an in-depth experience of history\'s greatest moments from antiquity to the most contemporary events in foreign policy. World\'s Greatest Speeches provides over 400 speeches, in audio, video, and text formats, supplemented by pictures and over 100 original, comprehensive biographies of the speakers. Your students can experience history as they view over 30 minutes of video and listen to over two hours of audio presentations, featuring many of the actual voices of the original speakers.
Download:
LINK:
http://rapidshare.de/files/3782437/wgs.part1.rar.html
http://rapidshare.de/files/3782401/wgs.part2.rar.html
http://rapidshare.de/files/3782418/wgs.part3.rar.html
http://rapidshare.de/files/3780449/wgs.part4.rar.html
http://rapidshare.de/files/3780442/wgs.part5.rar.html
http://rapidshare.de/files/3777879/wgs.part6.rar.html
Nice Ftp Site, Ebooks
Content:
Computer Programming
* Art of Assembly language [pdf,tgz]
* Art of Assembly language (High Level Assembler) [pdf]
* Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)]
* Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz]
* C++ Programming style [txt]
* Multithreaded Programming Guide (Sun Microsystems) [pdf]
* POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf]
* pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) [ps,pdf]
* Thinking in Java, 2nd Edition [online(frames,no frames)]
* Thinking in Java, 2nd Edition, Example Codes [online,tgz]
* Intel Architecture optimizations [pdf]
* HTML 4.0 Reference [online]
* Data Display Debugger (DDD) 3.3.1 Manual [online]
* Writing Multithreaded Code in Solaris [pdf]
* Intel Architecture Optimization Manual [pdf]
* Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf]
* Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf]
* Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf]
* Performance of Various Computers Using Standard Linear Equations Software [pdf]
* The SPARC Architecture Manual, Version 8 [pdf]
* The SPARC Architecture Manual, Version 9 [pdf]
* UltraSPARC I-II User's Manual [pdf]
* UltraSPARC IIi User's Manual [pdf]
* microSPARC IIep User's Manual [pdf]
* SuperSPARC II Addendum [pdf]
* Alpha Architecture Handbook, Version 4 [pdf]
* System V Application Binary Interface, Edition 4.1 [pdf]
* System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf]
* MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf]
* The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf]
* The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf]
* ANSI/ISO C++ Professional Programmer's Handbook [pdf]
VHDL
* VHDL CookBook by Peter J. Ashenden [pdf]
* Analog and Mixed-Signal Modeling using VHDL-AMS [pdf]
* European Space Agency (ESA) VHDL Modelling Guidelines [pdf]
* US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)]
Operating systems
* Introduction to OS [pdf]
* Process scheduling [pdf]
* Resource management and deadlocks [pdf]
* I/O Management [pdf]
* Filesystem [pdf]
* Memory management [pdf]
* Interprocess communication [pdf]
* System security [pdf]
Cryptography
* A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
* Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
* Cryptography - The myths [pdf]
* A Cryptograpgic Compendium [link]
* Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
* Security protocols overview by RSA Laboratories [pdf]
* Security Pitfalls in Cryptography [pdf]
* Stream ciphers [pdf]
* Understanding Public Key Infrastructure [pdf]
* Trust Models and Management in Public-Key Infrastuctured [pdf]
* Why Cryptography is Harder than it looks [pdf]
* Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
* CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
* RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
* Smartcard security [pdf]
* Digital Signatures, Certificates and Electronic Commerce [pdf]
* Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
* Implementation Experience with AES Candidate Algorithms [pdf]
* Performance Analysis of AES candidates on the 6805 CPU core [pdf]
* UK Government Organisations Involved in Communications and Information Systems Security [pdf]
* The block cipher Square [pdf]
* Attacks on Cryptoprocessor Transaction Sets [pdf]
* Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
* Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
* Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
* Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
* Compliance Defects in Public-Key Cryptography [pdf]
* Architectural considerations for cryptanalytic hardware [pdf]
* WEP Fix using RC4 Fast Packet Keying [pdf]
* RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
* Block Ciphers [pdf]
* Stream Ciphers [pdf]
* C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
* Universal Hashing and Multiple Authentication [pdf]
* Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
* The simple ideal cipher system [pdf]
* An FPGA Implementation of the Linear Cruptanalysis [pdf]
* The math behind the RSA cipher [txt]
* RSA hardware implementation [pdf]
* High-Speed RSA implementation [pdf]
* Are 'Strong' Primes Needed for RSA? [pdf]
* RSAES-OAEP Encryption scheme [pdf]
* Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
* Are 'Strong' Primed Needed for RSA? [pdf]
* Why Textbook ElGamal and RSA Encryption are Insecure [pdf]
* The DES algorithm [txt]
* The RC5 encryption algorithm [pdf]
* On The Security of the RC5 Encryption Algorithm [pdf]
* The ESP RC5-CBC Transform [txt]
* The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]
* The RC6 block cipher [pdf]
* RC6 as the AES [pdf]
* The security of RC6 block cipher [pdf]
* Statistical testing of RC6 block cipher [pdf]
* Blowfish algorithm in plain English [txt]
* Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]
* Twofish: A 128-bit Block Cipher [pdf]
* Upper bounds on differential characteristics in Twofish [pdf]
* Impossible differentials in Twofish [pdf]
* A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]
* Further observations on the Key Schedule of Twofish [pdf]
* Empirical verification of Twofish key uniqueness properties [pdf]
* Key separation in Twofish [pdf]
* Improved Twofish implementations [pdf]
* Implementation of the Twofish Cipher using FPGA devices [pdf]
* Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]
* The Rijndael Block Cipher [pdf]
* A Specification of Rijndael, the AES Algorithm [pdf]
* Efficient Implementation of the Rijndael S-box [pdf]
* The Elliptic Curve Cryptosystem [pdf]
* Elliptic Curce Cryptosystems [pdf]
* Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
* The Elliptic Curve Cryptosystem for Smart Cards [pdf]
* The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
* Recommendation on Elliptic Curve Cryptosystems [pdf]
* Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]
Security
* Program Stack vulnerability [txt]
* Non-executable Program Stack vulnerability [txt]
* Strange Attractors and TCP/IP Sequence Number Analysis [link]
* Rainbow book series [link]
* Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]
* Attacks on and Countermeasures for USB Hardware Token Devices [pdf]
* UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]
* Countermeasures against Buffer Overflow Attacks [pdf]
* Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]
* Flaw in NTRU Signature Scheme (NSS) [pdf]
* Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]
* Secure Programming with Linux and Unix [pdf]
* Reverse Compilation Techniques [pdf]
* What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]
* Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]
Networking
* Networking concepts [pdf]
* Introduction to Internet Protocols [txt]
* Network planning and design [pdf]
* Queuing analysis [pdf]
* Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf]
* Compete WAP Security [pdf]
* Cryptographic Authentication fo Real-Time Network Protocols [pdf]
* Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf]
* IP Multicast Configuration [pdf]
* Can Shortest-path Routing and TCP Maximize Utility [pdf]
* A new TCP congestion control with empty queues and scalable stability [pdf]
* FAST Kernel: Backgroung Theory and Experimental Results [pdf]
* Robustness and the Internet: Design and evolution [pdf]
* Robust congestion control for the Internet [pdf]
* A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf]
* On the stability of networks operating TCP-like congestion control [pdf]
* Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf]
Computer Clusters
* High Performance Computing and Beowulf Clusters [pdf]
* Web Search for a Planet: The Google Cluster Architecture [pdf]
LINK:
http://www.comms.scitech.susx.ac.uk/fft/
Computer Programming
* Art of Assembly language [pdf,tgz]
* Art of Assembly language (High Level Assembler) [pdf]
* Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)]
* Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz]
* C++ Programming style [txt]
* Multithreaded Programming Guide (Sun Microsystems) [pdf]
* POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf]
* pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) [ps,pdf]
* Thinking in Java, 2nd Edition [online(frames,no frames)]
* Thinking in Java, 2nd Edition, Example Codes [online,tgz]
* Intel Architecture optimizations [pdf]
* HTML 4.0 Reference [online]
* Data Display Debugger (DDD) 3.3.1 Manual [online]
* Writing Multithreaded Code in Solaris [pdf]
* Intel Architecture Optimization Manual [pdf]
* Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf]
* Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf]
* Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf]
* Performance of Various Computers Using Standard Linear Equations Software [pdf]
* The SPARC Architecture Manual, Version 8 [pdf]
* The SPARC Architecture Manual, Version 9 [pdf]
* UltraSPARC I-II User's Manual [pdf]
* UltraSPARC IIi User's Manual [pdf]
* microSPARC IIep User's Manual [pdf]
* SuperSPARC II Addendum [pdf]
* Alpha Architecture Handbook, Version 4 [pdf]
* System V Application Binary Interface, Edition 4.1 [pdf]
* System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf]
* MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf]
* The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf]
* The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf]
* ANSI/ISO C++ Professional Programmer's Handbook [pdf]
VHDL
* VHDL CookBook by Peter J. Ashenden [pdf]
* Analog and Mixed-Signal Modeling using VHDL-AMS [pdf]
* European Space Agency (ESA) VHDL Modelling Guidelines [pdf]
* US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)]
Operating systems
* Introduction to OS [pdf]
* Process scheduling [pdf]
* Resource management and deadlocks [pdf]
* I/O Management [pdf]
* Filesystem [pdf]
* Memory management [pdf]
* Interprocess communication [pdf]
* System security [pdf]
Cryptography
* A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
* Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
* Cryptography - The myths [pdf]
* A Cryptograpgic Compendium [link]
* Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
* Security protocols overview by RSA Laboratories [pdf]
* Security Pitfalls in Cryptography [pdf]
* Stream ciphers [pdf]
* Understanding Public Key Infrastructure [pdf]
* Trust Models and Management in Public-Key Infrastuctured [pdf]
* Why Cryptography is Harder than it looks [pdf]
* Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
* CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
* RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
* Smartcard security [pdf]
* Digital Signatures, Certificates and Electronic Commerce [pdf]
* Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
* Implementation Experience with AES Candidate Algorithms [pdf]
* Performance Analysis of AES candidates on the 6805 CPU core [pdf]
* UK Government Organisations Involved in Communications and Information Systems Security [pdf]
* The block cipher Square [pdf]
* Attacks on Cryptoprocessor Transaction Sets [pdf]
* Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
* Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
* Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
* Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
* Compliance Defects in Public-Key Cryptography [pdf]
* Architectural considerations for cryptanalytic hardware [pdf]
* WEP Fix using RC4 Fast Packet Keying [pdf]
* RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
* Block Ciphers [pdf]
* Stream Ciphers [pdf]
* C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
* Universal Hashing and Multiple Authentication [pdf]
* Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
* The simple ideal cipher system [pdf]
* An FPGA Implementation of the Linear Cruptanalysis [pdf]
* The math behind the RSA cipher [txt]
* RSA hardware implementation [pdf]
* High-Speed RSA implementation [pdf]
* Are 'Strong' Primes Needed for RSA? [pdf]
* RSAES-OAEP Encryption scheme [pdf]
* Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
* Are 'Strong' Primed Needed for RSA? [pdf]
* Why Textbook ElGamal and RSA Encryption are Insecure [pdf]
* The DES algorithm [txt]
* The RC5 encryption algorithm [pdf]
* On The Security of the RC5 Encryption Algorithm [pdf]
* The ESP RC5-CBC Transform [txt]
* The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]
* The RC6 block cipher [pdf]
* RC6 as the AES [pdf]
* The security of RC6 block cipher [pdf]
* Statistical testing of RC6 block cipher [pdf]
* Blowfish algorithm in plain English [txt]
* Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]
* Twofish: A 128-bit Block Cipher [pdf]
* Upper bounds on differential characteristics in Twofish [pdf]
* Impossible differentials in Twofish [pdf]
* A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]
* Further observations on the Key Schedule of Twofish [pdf]
* Empirical verification of Twofish key uniqueness properties [pdf]
* Key separation in Twofish [pdf]
* Improved Twofish implementations [pdf]
* Implementation of the Twofish Cipher using FPGA devices [pdf]
* Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]
* The Rijndael Block Cipher [pdf]
* A Specification of Rijndael, the AES Algorithm [pdf]
* Efficient Implementation of the Rijndael S-box [pdf]
* The Elliptic Curve Cryptosystem [pdf]
* Elliptic Curce Cryptosystems [pdf]
* Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
* The Elliptic Curve Cryptosystem for Smart Cards [pdf]
* The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
* Recommendation on Elliptic Curve Cryptosystems [pdf]
* Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]
Security
* Program Stack vulnerability [txt]
* Non-executable Program Stack vulnerability [txt]
* Strange Attractors and TCP/IP Sequence Number Analysis [link]
* Rainbow book series [link]
* Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]
* Attacks on and Countermeasures for USB Hardware Token Devices [pdf]
* UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]
* Countermeasures against Buffer Overflow Attacks [pdf]
* Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]
* Flaw in NTRU Signature Scheme (NSS) [pdf]
* Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]
* Secure Programming with Linux and Unix [pdf]
* Reverse Compilation Techniques [pdf]
* What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]
* Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]
Networking
* Networking concepts [pdf]
* Introduction to Internet Protocols [txt]
* Network planning and design [pdf]
* Queuing analysis [pdf]
* Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf]
* Compete WAP Security [pdf]
* Cryptographic Authentication fo Real-Time Network Protocols [pdf]
* Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf]
* IP Multicast Configuration [pdf]
* Can Shortest-path Routing and TCP Maximize Utility [pdf]
* A new TCP congestion control with empty queues and scalable stability [pdf]
* FAST Kernel: Backgroung Theory and Experimental Results [pdf]
* Robustness and the Internet: Design and evolution [pdf]
* Robust congestion control for the Internet [pdf]
* A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf]
* On the stability of networks operating TCP-like congestion control [pdf]
* Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf]
Computer Clusters
* High Performance Computing and Beowulf Clusters [pdf]
* Web Search for a Planet: The Google Cluster Architecture [pdf]
LINK:
http://www.comms.scitech.susx.ac.uk/fft/
part 2
Bluetooth
* Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf]
* Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf]
* SyncML Over Bluetooth [pdf]
* Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf]
* Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf]
* Personal Area Networking (PAN) Profile [pdf]
* Bluetooth Security White Paper [pdf]
* Security Comparison: Bluetooth vs 802.11 [pdf]
Mathematics
* SOS Mathematics [link]
* Mathematics archives [link]
* Dave's math tables [link]
* On-line Encyclopedia of Integer Sequences [link]
* Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)]
* p-adic Chaos and Random Number Generation [pdf]
* Introduction to Probability Theory [pdf]
* Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf]
* Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf]
* Tables of Integrals and other Mathematical data [pdf]
* Random Generators and Normal Numbers [pdf]
* Ramanujan's Notebooks [pdf(pdf,pdf)]
* Prime Percolation [pdf]
* Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf]
* Perturbation Theory of Dynamical Systems [pdf]
* On Fourier and Zeta(s) [pdf]
* Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf]
* Linear Algebra [pdf]
* Linear Algebra - Answers [pdf]
* New Representations for the Madelung Constant [pdf]
* Sums of Squares, Cubes, and Higher Powers [pdf]
* Computing A Glimpse of Randomness [pdf]
* Computing the Generating Function of a Series Given its First Few Terms [pdf]
* Asymptotic Behavior of Excitable Cellular Automata [pdf]
* An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf]
* Algebraic Topology [pdf]
* A Proof of a Conjecture of Knuth [pdf]
* A Practical Version of the Generalized Lagrange Algorithm [pdf]
Engineering
* Theoretical Computer Science cheat sheet [pdf]
* A mathematical theory of Communication [pdf]
* A Primer on Asynchronous Modem Communication [pdf]
* Dictionary of Algorithms, Data Structured, and Problems [link]
* Computing dictionary [link]
* Acronym lookup engine [link]
* StudyWeb search engine [link]
UNIX
* Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf]
* Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf]
* UNIX [pdf]
* Intermediate Unix Training [pdf]
* VI lovers [link]
* Unix Programming Tools [pdf]
* Unix history timeline (1969-2000) [pdf]
* Executable and Linkable Format (ELF) [txt]
* A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online]
* Guide to Unix IPC [link]
* The Linux Kernel API [pdf]
* Unreliable guide to Linux kernel locking [pdf]
* Unreliable guide to hacking the Linux kernel [pdf]
* Linux 2.4 NAT Howto [pdf]
* Linux advanced routing Howto [pdf]
* Linux Netfilter hacking Howto [pdf]
* Samba 2.2 [online]
* Samba TNG [online]
USENIX
* Token-Mediated Certification and Electronic Commerce [pdf]
* The Linux BIOS [pdf]
* LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf]
Miscelaneous
* CVS Manual [online]
* The Ultimate Memory Guide [pdf]
* The RAM Guy's Tech Notes [link]
* Sun-Tzu The Art of Warfare [online]
* Ko Ko Ko [avi]
ISO Images
* Slackware
* Splackware
* FreeBSD
* Solaris
LINK:
http://www.comms.scitech.susx.ac.uk/fft/
* Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf]
* Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf]
* SyncML Over Bluetooth [pdf]
* Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf]
* Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf]
* Personal Area Networking (PAN) Profile [pdf]
* Bluetooth Security White Paper [pdf]
* Security Comparison: Bluetooth vs 802.11 [pdf]
Mathematics
* SOS Mathematics [link]
* Mathematics archives [link]
* Dave's math tables [link]
* On-line Encyclopedia of Integer Sequences [link]
* Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)]
* p-adic Chaos and Random Number Generation [pdf]
* Introduction to Probability Theory [pdf]
* Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf]
* Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf]
* Tables of Integrals and other Mathematical data [pdf]
* Random Generators and Normal Numbers [pdf]
* Ramanujan's Notebooks [pdf(pdf,pdf)]
* Prime Percolation [pdf]
* Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf]
* Perturbation Theory of Dynamical Systems [pdf]
* On Fourier and Zeta(s) [pdf]
* Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf]
* Linear Algebra [pdf]
* Linear Algebra - Answers [pdf]
* New Representations for the Madelung Constant [pdf]
* Sums of Squares, Cubes, and Higher Powers [pdf]
* Computing A Glimpse of Randomness [pdf]
* Computing the Generating Function of a Series Given its First Few Terms [pdf]
* Asymptotic Behavior of Excitable Cellular Automata [pdf]
* An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf]
* Algebraic Topology [pdf]
* A Proof of a Conjecture of Knuth [pdf]
* A Practical Version of the Generalized Lagrange Algorithm [pdf]
Engineering
* Theoretical Computer Science cheat sheet [pdf]
* A mathematical theory of Communication [pdf]
* A Primer on Asynchronous Modem Communication [pdf]
* Dictionary of Algorithms, Data Structured, and Problems [link]
* Computing dictionary [link]
* Acronym lookup engine [link]
* StudyWeb search engine [link]
UNIX
* Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf]
* Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf]
* UNIX [pdf]
* Intermediate Unix Training [pdf]
* VI lovers [link]
* Unix Programming Tools [pdf]
* Unix history timeline (1969-2000) [pdf]
* Executable and Linkable Format (ELF) [txt]
* A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online]
* Guide to Unix IPC [link]
* The Linux Kernel API [pdf]
* Unreliable guide to Linux kernel locking [pdf]
* Unreliable guide to hacking the Linux kernel [pdf]
* Linux 2.4 NAT Howto [pdf]
* Linux advanced routing Howto [pdf]
* Linux Netfilter hacking Howto [pdf]
* Samba 2.2 [online]
* Samba TNG [online]
USENIX
* Token-Mediated Certification and Electronic Commerce [pdf]
* The Linux BIOS [pdf]
* LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf]
Miscelaneous
* CVS Manual [online]
* The Ultimate Memory Guide [pdf]
* The RAM Guy's Tech Notes [link]
* Sun-Tzu The Art of Warfare [online]
* Ko Ko Ko [avi]
ISO Images
* Slackware
* Splackware
* FreeBSD
* Solaris
LINK:
http://www.comms.scitech.susx.ac.uk/fft/
The Richest Man In Babylon.
Description and Reviews
From The Publisher:
This book holds the secrets to acquiring money, keeping money, and making money earn more money.
Millions of readers have become familiar with George S. Clason's famous "Babylonian parables" through the distribution of these success secrets of the ancients by banks, insurance companies, investment houses and employers. Acclaimed as the greatest of all inspirational works on the subject of thrift and financial planning, these fascinating and informative stories have become a modern classic in their field.
In language as simple as that of the Bible, this book presents a sure path to prosperity and happiness. It offers an understanding of?and a solution to?your personal financial problems which will guide you successfully through a lifetime. The Richest Man in Babylon is a book you will want to read yourself, recommend to friends, and give to young people just starting out in life.
Table of Contents
Foreword 7
The Man Who Desired Gold 13
The Richest Man In Babylon 21
Seven Cures for a Lean Purse 34
Meet the Goddess of Good Luck 55
The Five Laws of Gold 71
The Gold Lender of Babylon 86
The Walls of Babylon 101
The Camel Trader of Babylon 106
The Clay Tablets from Babylon 118
The Luckiest Man in Babylon 132
An Historical Sketch of Babylon 152
download: 160 kb
LINK:
http://rapidshare.de/files/6688042/T...bylon.rar.html
From The Publisher:
This book holds the secrets to acquiring money, keeping money, and making money earn more money.
Millions of readers have become familiar with George S. Clason's famous "Babylonian parables" through the distribution of these success secrets of the ancients by banks, insurance companies, investment houses and employers. Acclaimed as the greatest of all inspirational works on the subject of thrift and financial planning, these fascinating and informative stories have become a modern classic in their field.
In language as simple as that of the Bible, this book presents a sure path to prosperity and happiness. It offers an understanding of?and a solution to?your personal financial problems which will guide you successfully through a lifetime. The Richest Man in Babylon is a book you will want to read yourself, recommend to friends, and give to young people just starting out in life.
Table of Contents
Foreword 7
The Man Who Desired Gold 13
The Richest Man In Babylon 21
Seven Cures for a Lean Purse 34
Meet the Goddess of Good Luck 55
The Five Laws of Gold 71
The Gold Lender of Babylon 86
The Walls of Babylon 101
The Camel Trader of Babylon 106
The Clay Tablets from Babylon 118
The Luckiest Man in Babylon 132
An Historical Sketch of Babylon 152
download: 160 kb
LINK:
http://rapidshare.de/files/6688042/T...bylon.rar.html
Chess: 700 Chess Problems
Compositions of Mrs. W. J. Baird [1902].
"The Chess Problems contained in this volume are the product of the labour and recreation of some fourteen years. I say "labour," because I am not such a Chess enthusiast as to believe that a collection such as this can be produced without persistent application partaking of the nature of work; and "recreation," because the work has been a pleasure - how great a pleasure only a composer can fully realize".
download: 600KB
LINK:
http://rapidshare.de/files/6931298/7...Baird.rar.html
"The Chess Problems contained in this volume are the product of the labour and recreation of some fourteen years. I say "labour," because I am not such a Chess enthusiast as to believe that a collection such as this can be produced without persistent application partaking of the nature of work; and "recreation," because the work has been a pleasure - how great a pleasure only a composer can fully realize".
download: 600KB
LINK:
http://rapidshare.de/files/6931298/7...Baird.rar.html
Sap
SAP R/3 for Everyone : Step-by-Step Instructions, Practical Advice, and Other Tips and Tricks for Working with SAP
Category: Other
Language: English
FileType: CHM
File size: 35636 KB
Date added: 2005-9-7
Note:
SAP R/3 for Everyone is the nontechnical user's guide to working with SAP R/3, the leading business enterprise software product in the world. Written and road-tested by experienced SAP R/3 users and trainers, this book saves typical SAP R/3 users time and trouble by providing them with the universal skills needed to work with any module of this complex software.
SAP R/3 can be used effectively by anyone who can perform a handful of simple procedures that are employed in nearly every SAP R/3 transaction. The authors explain these procedures in plain English, using illustrations and real-world examples.
After a brief explanation of the architecture and operation of SAP R/3, readers get step-by-step instruction in
Logging on and off, managing passwords, and customizing the SAP application window and screens
Navigating between screens with menu folders, transaction codes, and the menu bar
Setting up customized favorites folders with quick links to the initial screens of transactions and other useful resources
Understanding the four basic transaction types
Working on initial screens, including tips and techniques for entering codes, searching for codes, customizing initial screens, and using multiple selection screens and selection options
Customizing output reports with filters, sorts, sums, and display variants
Exporting output reports to Microsoft Excel and Word and e-mailing output reports to other SAP users
Practical and jargon-free, SAP R/3 for Everyone provides readers with the skills and confidence they need to efficiently conduct any business activity with SAP R/3.
Download
http://www.templateen.com/ebook/{412...1D06A2F82}.htm
Category: Other
Language: English
FileType: CHM
File size: 35636 KB
Date added: 2005-9-7
Note:
SAP R/3 for Everyone is the nontechnical user's guide to working with SAP R/3, the leading business enterprise software product in the world. Written and road-tested by experienced SAP R/3 users and trainers, this book saves typical SAP R/3 users time and trouble by providing them with the universal skills needed to work with any module of this complex software.
SAP R/3 can be used effectively by anyone who can perform a handful of simple procedures that are employed in nearly every SAP R/3 transaction. The authors explain these procedures in plain English, using illustrations and real-world examples.
After a brief explanation of the architecture and operation of SAP R/3, readers get step-by-step instruction in
Logging on and off, managing passwords, and customizing the SAP application window and screens
Navigating between screens with menu folders, transaction codes, and the menu bar
Setting up customized favorites folders with quick links to the initial screens of transactions and other useful resources
Understanding the four basic transaction types
Working on initial screens, including tips and techniques for entering codes, searching for codes, customizing initial screens, and using multiple selection screens and selection options
Customizing output reports with filters, sorts, sums, and display variants
Exporting output reports to Microsoft Excel and Word and e-mailing output reports to other SAP users
Practical and jargon-free, SAP R/3 for Everyone provides readers with the skills and confidence they need to efficiently conduct any business activity with SAP R/3.
Download
http://www.templateen.com/ebook/{412...1D06A2F82}.htm
Some List
The Computer Engineering Handbook
Guyz, if u like my ebook posts, please add reps
Now , for the book, here is the info
Title:The Computer Engineering Handbook
Author: Vojin G. Oklobdzija Richard C. Dorf
ISBN: 0849308852
Publisher: CRC Press - 26 December, 2001
Format: Hardcover
Code:
http://www.megaupload.com/?d=T975O4U6
Guyz, if u like my ebook posts, please add reps
Now , for the book, here is the info
Title:The Computer Engineering Handbook
Author: Vojin G. Oklobdzija Richard C. Dorf
ISBN: 0849308852
Publisher: CRC Press - 26 December, 2001
Format: Hardcover
Code:
http://www.megaupload.com/?d=T975O4U6
Books on MATLAB
Books on MATLAB
Basics Of MATLAB And Beyond
LINK:
http://rapidshare.de/files/6220929/B...eyond.rar.html
Graphics.And.Guis.With.MATLAB.3ed
LINK:
http://rapidshare.de/files/6221419/G...B.3ed.rar.html
Password: www.AvaxHome.ru
Numerical.Analysis.Using.MATLAB.2ed
LINK:
http://rapidshare.de/files/6221601/N...B.2ed.rar.html
Password: www.AvaxHome.ru
Signals and Systems with MATLAB
LINK:
http://rapidshare.de/files/6224526/S...ATLAB.rar.html
Password: www.AvaxHome.ru
Electronics And Circuit Analysis Using MATLAB
LINK:
http://rapidshare.de/files/6224336/E...ATLAB.rar.html
Password: www.AvaxHome.ru
Computational Statistics Handbook With MATLAB
LINK:
http://rapidshare.de/files/6222357/C...ATLAB.rar.html
Password: www.AvaxHome.ru
Basics Of MATLAB And Beyond
LINK:
http://rapidshare.de/files/6220929/B...eyond.rar.html
Graphics.And.Guis.With.MATLAB.3ed
LINK:
http://rapidshare.de/files/6221419/G...B.3ed.rar.html
Password: www.AvaxHome.ru
Numerical.Analysis.Using.MATLAB.2ed
LINK:
http://rapidshare.de/files/6221601/N...B.2ed.rar.html
Password: www.AvaxHome.ru
Signals and Systems with MATLAB
LINK:
http://rapidshare.de/files/6224526/S...ATLAB.rar.html
Password: www.AvaxHome.ru
Electronics And Circuit Analysis Using MATLAB
LINK:
http://rapidshare.de/files/6224336/E...ATLAB.rar.html
Password: www.AvaxHome.ru
Computational Statistics Handbook With MATLAB
LINK:
http://rapidshare.de/files/6222357/C...ATLAB.rar.html
Password: www.AvaxHome.ru
XML EBooks
XML EBooks
Please find the xml ebooks below:
Title: Beginning XML, Second Edition
Publisher : Wrox Press
Author(s) : David Hunter, Kurt Cagle, Chris Dix, Roger Kovack, Jonathan Pinnock, Jeff Rafter
Page : 816
LINK:
http://rapidshare.de/files/4039967/B...L_2Ed.zip.html
Password:flazx
Title XML in a Nutshell, Second Edition
Publisher O'Reilly
Author(s) Elliotte Rusty Harold, W. Scott Means
LINK:
http://resource.xml.org.cn/XMLInANutshell.rar
or
http://mirrors.cn99.com/books/OReilly - XML in a Nutshell Second Edition.chm
Title XML Bible
Publisher Hungry Minds
Author(s) Harold
LINK:
http://rapidshare.de/files/1654073/I...-1999.rar.html
Please find the xml ebooks below:
Title: Beginning XML, Second Edition
Publisher : Wrox Press
Author(s) : David Hunter, Kurt Cagle, Chris Dix, Roger Kovack, Jonathan Pinnock, Jeff Rafter
Page : 816
LINK:
http://rapidshare.de/files/4039967/B...L_2Ed.zip.html
Password:flazx
Title XML in a Nutshell, Second Edition
Publisher O'Reilly
Author(s) Elliotte Rusty Harold, W. Scott Means
LINK:
http://resource.xml.org.cn/XMLInANutshell.rar
or
http://mirrors.cn99.com/books/OReilly - XML in a Nutshell Second Edition.chm
Title XML Bible
Publisher Hungry Minds
Author(s) Harold
LINK:
http://rapidshare.de/files/1654073/I...-1999.rar.html
Beyond Brawn: The Insider's Encyclopedia on How to Build Muscle & Might
Beyond Brawn: The Insider's Encyclopedia on How to Build Muscle & Might
by Stuart McRobert
Quote:
512 pages
Publisher: CS Publishing; Revised edition (September 1, 1999)
Language: English
ISBN: 9963616062
Format: PDF
Archive: RAR
Size: 3.60 MB (3,777,454 bytes)
MD5: 7cc8c9ab3bde2bd43d48b86e1e082de9
http://www.qfile.de/dl/104431/iehbm.rar.html
by Stuart McRobert
Quote:
512 pages
Publisher: CS Publishing; Revised edition (September 1, 1999)
Language: English
ISBN: 9963616062
Format: PDF
Archive: RAR
Size: 3.60 MB (3,777,454 bytes)
MD5: 7cc8c9ab3bde2bd43d48b86e1e082de9
http://www.qfile.de/dl/104431/iehbm.rar.html
Teach Yourself - Collections
1.Teach.Yourself.MS.Office.Word.2003.In.24Hours.ch m. zip (13182392 Bytes).
2.Teach.Yourself.PHP.In.24hours.chm.zip (2333359 Bytes).
3.Teach.Yourself.TCP.-.IP.in.24.Hours.chm.zip (3778866 Bytes).
4.Teach_Yourself_C.Sharp_In_24_Hours.chm.zip (6052926 Bytes).
5.Teach_Yourself_Extreme_Programming_In_24_Hours.c hm .zip (2335101 Bytes).
6.Teach_Yourself_Flash_MX_ActionScript_In_24_Hours .c hm.zip (2061379 Bytes).
7.Teach_Yourself_Game_Programming_in_24_Hours.chm. zi p (3143862 Bytes).
8.Teach_Yourself_JSP_2.0_with_Apache_Tomcat_in_24_ Ho urs.chm.zip (2970319 Bytes).
9.Teach_Yourself_Microsoft_Office_Access_2003_in_2 4_ Hours.chm.zip (12002766 Bytes).
10.Teach_Yourself_Microsoft_Office_Excel_2003_In_2 4_H ours.chm.zip (9472524 Bytes).
11.Teach_Yourself_Microsoft_Office_Powerpoint_2003 _In _24_Hours.chm.zip (14011563 Bytes).
12.Teach_Yourself_Microsoft_Outlook_2003_In_24_Hou rs. chm.zip (8801535 Bytes).
13.Teach_Yourself_MS_Visual_C___.NET_in_24_Hours.z ip (4352496 Bytes).
14.Teach_Yourself_PHP_MySQL_and_Apache_in_24_Hours .ch m.zip (3401037 Bytes).
LINKS:
1)http://dl3.rapidshare.de/files/30568...4Hours.chm.zip
2)http://dl4.rapidshare.de/files/30563...4hours.chm.zip
3)http://dl3.rapidshare.de/files/30558....Hours.chm.zip
4)http://dl4.rapidshare.de/files/30525..._Hours.chm.zip
5)http://dl2.rapidshare.de/files/30526..._Hours.chm.zip
6)http://dl2.rapidshare.de/files/30529..._Hours.chm.zip
7)http://dl3.rapidshare.de/files/30531..._Hours.chm.zip
8)http://dl4.rapidshare.de/files/30532..._Hours.chm.zip
9)http://dl3.rapidshare.de/files/30536..._Hours.chm.zip
10)http://dl3.rapidshare.de/files/30540..._Hours.chm.zip
11)http://dl3.rapidshare.de/files/30545..._Hours.chm.zip
12)http://dl3.rapidshare.de/files/30551..._Hours.chm.zip
13)http://dl4.rapidshare.de/files/30554...n_24_Hours.zip
14)http://dl1.rapidshare.de/files/30555..._Hours.chm.zip
2.Teach.Yourself.PHP.In.24hours.chm.zip (2333359 Bytes).
3.Teach.Yourself.TCP.-.IP.in.24.Hours.chm.zip (3778866 Bytes).
4.Teach_Yourself_C.Sharp_In_24_Hours.chm.zip (6052926 Bytes).
5.Teach_Yourself_Extreme_Programming_In_24_Hours.c hm .zip (2335101 Bytes).
6.Teach_Yourself_Flash_MX_ActionScript_In_24_Hours .c hm.zip (2061379 Bytes).
7.Teach_Yourself_Game_Programming_in_24_Hours.chm. zi p (3143862 Bytes).
8.Teach_Yourself_JSP_2.0_with_Apache_Tomcat_in_24_ Ho urs.chm.zip (2970319 Bytes).
9.Teach_Yourself_Microsoft_Office_Access_2003_in_2 4_ Hours.chm.zip (12002766 Bytes).
10.Teach_Yourself_Microsoft_Office_Excel_2003_In_2 4_H ours.chm.zip (9472524 Bytes).
11.Teach_Yourself_Microsoft_Office_Powerpoint_2003 _In _24_Hours.chm.zip (14011563 Bytes).
12.Teach_Yourself_Microsoft_Outlook_2003_In_24_Hou rs. chm.zip (8801535 Bytes).
13.Teach_Yourself_MS_Visual_C___.NET_in_24_Hours.z ip (4352496 Bytes).
14.Teach_Yourself_PHP_MySQL_and_Apache_in_24_Hours .ch m.zip (3401037 Bytes).
LINKS:
1)http://dl3.rapidshare.de/files/30568...4Hours.chm.zip
2)http://dl4.rapidshare.de/files/30563...4hours.chm.zip
3)http://dl3.rapidshare.de/files/30558....Hours.chm.zip
4)http://dl4.rapidshare.de/files/30525..._Hours.chm.zip
5)http://dl2.rapidshare.de/files/30526..._Hours.chm.zip
6)http://dl2.rapidshare.de/files/30529..._Hours.chm.zip
7)http://dl3.rapidshare.de/files/30531..._Hours.chm.zip
8)http://dl4.rapidshare.de/files/30532..._Hours.chm.zip
9)http://dl3.rapidshare.de/files/30536..._Hours.chm.zip
10)http://dl3.rapidshare.de/files/30540..._Hours.chm.zip
11)http://dl3.rapidshare.de/files/30545..._Hours.chm.zip
12)http://dl3.rapidshare.de/files/30551..._Hours.chm.zip
13)http://dl4.rapidshare.de/files/30554...n_24_Hours.zip
14)http://dl1.rapidshare.de/files/30555..._Hours.chm.zip
Asp.net
With help from Microsoft ASP.NET insider Bradley Millington, John Kaufman covers both VB.NET and C# coding for ASP.NET databases so you don't have to decide up front which language you want more and retailers no longer have to manage inventory on separate language versions.
download:-
http://rapidshare.de/files/3549680/z...D.B.P.rar.html
password :- www.Chipollo.Info
download:-
http://rapidshare.de/files/3549680/z...D.B.P.rar.html
password :- www.Chipollo.Info
C For Dummies, 2nd Edition
C For Dummies, 2nd Edition
If you’re like most people, the above seems like nonsense. Actually, it’s computer sense—C programming. After digesting C For Dummies, 2nd Edition, you’ll understand it. C programs are fast, concise and versatile. They let you boss your computer around for a change. So turn on your computer, get a free compiler and editor (the book tells you where), pull up a chair, and get going. You won’t have to go far (page 13) to find your first program example. You’ll do short, totally manageable, hands-on exercises to help you make sense of:
* All 32 keywords in the C language (that’s right—just 32 words)
* The functions—several dozen of them
* Terms like printf(), scanf(), gets (), and puts ()
* String variables, numeric variables, and constants
* Looping and implementation
* Floating-point values
In case those terms are almost as intimidating as the idea of programming, be reassured that C For Dummies was written by Dan Gookin, bestselling author of DOS For Dummies, the book that started the whole library. So instead of using expletives and getting headaches, you’ll be using newly acquired skills and getting occasional chuckles as you discover how to:
* Design and develop programs
* Add comments (like post-it-notes to yourself) as you go
* Link code to create executable programs
* Debug and deploy your programs
* Use lint, a common tool to examine and optimize your code
A helpful, tear-out cheat sheet is a quick reference for comparison symbols, conversion characters, mathematical doodads, C numeric data types, and more. C For Dummies takes the mystery out of programming and gets you into it quickly and painlessly.
download:-
http://rapidshare.de/files/1658196/W...-2004.rar.html
If you’re like most people, the above seems like nonsense. Actually, it’s computer sense—C programming. After digesting C For Dummies, 2nd Edition, you’ll understand it. C programs are fast, concise and versatile. They let you boss your computer around for a change. So turn on your computer, get a free compiler and editor (the book tells you where), pull up a chair, and get going. You won’t have to go far (page 13) to find your first program example. You’ll do short, totally manageable, hands-on exercises to help you make sense of:
* All 32 keywords in the C language (that’s right—just 32 words)
* The functions—several dozen of them
* Terms like printf(), scanf(), gets (), and puts ()
* String variables, numeric variables, and constants
* Looping and implementation
* Floating-point values
In case those terms are almost as intimidating as the idea of programming, be reassured that C For Dummies was written by Dan Gookin, bestselling author of DOS For Dummies, the book that started the whole library. So instead of using expletives and getting headaches, you’ll be using newly acquired skills and getting occasional chuckles as you discover how to:
* Design and develop programs
* Add comments (like post-it-notes to yourself) as you go
* Link code to create executable programs
* Debug and deploy your programs
* Use lint, a common tool to examine and optimize your code
A helpful, tear-out cheat sheet is a quick reference for comparison symbols, conversion characters, mathematical doodads, C numeric data types, and more. C For Dummies takes the mystery out of programming and gets you into it quickly and painlessly.
download:-
http://rapidshare.de/files/1658196/W...-2004.rar.html
No comments:
Post a Comment