More About Me...

Ebook For Programmer and IT Support , Free and Free...

Another Tit-Bit...

It's all about IT , Ebook , Tutorial , News ... Try to Share.... Technoly is Never Ending and Knowledge is Free....

C# , C , C++

Proudly presenting the latest edition of one of the all-time bestselling books on the C++ language, successful author Ivor Horton repeats the formula that has made each previous edition so popular by teaching you both the standard C++ language and C++/CLI as well as Visual C++ 2008. Thoroughly updated for the 2008 release, this book shows you how to build real-world applications using Visual C++ and guides you through the ins and outs of C++ development.
Download









Beginning XML with C# 2008 focuses on XML and how it is used within .NET 3.5. As you’d expect of a modern application framework, .NET 3.5 has extensive support for XML in everything from data access to configuration, from raw parsing to code documentation. This book demystifies all of this. It explains the basics of XML as well as the namespaces and objects you need to know in order to work efficiently with XML.

You will see clear, practical examples that illustrate best practices in action. With this book, you’ll learn everything you need to know from the basics of reading and writing XML data to using the DOM, from LINQ and SQL Server integration to SOAP and web services.
What you’ll learn
* The basics of XML in .NET 3.5
* Validating and transforming XML
* Using XML with LINQ
* Integrating with ADO.NET, SQL Server, and WCF
* Configuring the .NET Framework with XML
Download
Password : www.oxava.com


Microsoft Visual C# is a powerful but simple language aimed primarily at developers creating applications by using the Microsoft .NET Framework. It inherits many of the best features of C++ and Microsoft Visual Basic but few of the inconsistencies and anachronisms, resulting in a cleaner and more logical language. With the advent of C# 2.0 in 2005, several important new features were added to the language, including generics, iterators, and anonymous methods. C# 3.0, available as part of Microsoft Visual Studio 2008, adds further features, such as extension methods, lambda expressions, and, most famously of all, the Language Integrated Query facility, or LINQ. The development environment provided by Visual Studio 2008 makes these powerful features easy to use, and the many new wizards and enhancements included in Visual Studio 2008 can greatly improve your productivity as a developer.
Who This Book Is For
The aim of this book is to teach you the fundamentals of programming with C# by using Visual Studio 2008 and the .NET Framework version 3.5. You will learn the features of the C# language, and then use them to build applications running on the Microsoft Windows operating system. By the time you complete this book, you will have a thorough understanding of C# and will have used it to build Windows Presentation Foundation (WPF) applications, access Microsoft SQL Server databases, develop ASP.NET Web applications, and build and consume a Windows Communication Foundation service.
Finding Your Best Starting Point in This Book
This book is designed to help you build skills in a number of essential areas. You can use this book if you are new to programming or if you are switching from another programming language such as C, C++, Sun Microsystems Java, or Visual Basic. Use the following table to fi nd your best starting point.
Download


ASP.NET


Your Ad Here


Whether you need an approachable on-ramp to .NET or you want to enhance your skills, C# 3.0 Unleashed is a comprehensive, in-depth guide to the solutions you seek. You’ll learn to do more with the new tools that are available, including Visual Studio 2008 and the .NET Framework Class Libraries. Throughout this book, you’ll get a practical look at what can be the most useful tools for any given task. You’ll also learn common traps to avoid and learn insightful tips that will save you time and help you be more productive.C# 3.0 Unleashed contains complete coverage of the C# programming language. The author covers all the essential syntax, but keeps the focus on practical application. The chapters are arranged to take you step-by-step from the core of the C# language to elements of the .NET Framework, and further into advanced concepts on distributed n-tier Internet applications. Additionally, C# 3.0 Unleashed shows you how to debug, monitor, and scale enterprise applications, enabling you to use the C# programming language to ship the right code at the right time.

What’s included in this book:

* A complete reference for C# syntax, object oriented programming, and component programming with C#
* Comprehensive data coverage through ADO.NET and LINQ
* An introduction to UI technologies, including Windows Forms, WPF, ASP.NET Ajax, and Silverlight
* Coverage of traditional ASMX and WCF Web Services
* Coverage of multiple .NET technologies, including networking, instrumentation, interop, and multi-threading
* In-depth discussion of platform concepts including CLR, Garbage Collection, Type System, Assemblies, and Code Access Security
* Guidance on design and architecture for a big-picture view and essential help in piecing together all you’ve learnedJoe Mayo has more than 21 years of software engineering experience and has worked with C# and .NET since July 2000. He regularly contributes to the community through his Web site, http://www.csharp-station.com/, which has been running since July 2000. He enjoys giving presentations on .NET and you can oftentimes find him online in a forum or news group, doing what he loves to do–talk about .NET. For his ongoing contributions to the .NET community, he has been a recipient of multiple Microsoft Most Valuable Professional (MVP) Awards. These days, Joe makes a living through the company he founded, Mayo Software Consulting, Inc., delivering solutions to customers through custom .NET software development services.
Download

ASP.NET Website Programming shows you how to build an interactive website from design to deployment.
Packed with solutions to website programming problems, this book will have you building well-engineered, extendable ASP.NET websites quickly and easily.
With ASP.NET Website Programming you will learn to:
*Establish a solid, scalable website foundation
*Provide flexible user accounts integrating with ASP.NET's built-in security
*Create message forums that enable formatted messages but defend against cross-site scripting
*Generate revenue from advertising
*Build a web interface for uploading, downloading, editing, and managing the files on your site
*Add opinion polls, email newsletters, and news management
*Deploy the finished site on a live server
*Build websites using good, n-tier coding techniques
The site we build is modular. You can slot the modules into your own website, modify them, or use them as examples of particular ASP.NET techniques.
The book's P2P forum is a platform for exchanging code and ideas, helping to extend the website with new modules and modifications.

Download


In just 24 sessions of one hour or less, you’ll learn how to build advanced web sites and applications with ASP.NET Ajax--and upgrade existing pages to deliver more power and business value. Using a straightforward, step-by-step approach, each lesson equips you with sufficient information and guides you to mastery of Ajax in real-world applications.

One step at a time, you’ll discover how to make the most of the Microsoft Ajax Library and Ajax Server Extensions. You’ll develop secure, reliable Web services and applications that solve real problems--including a complete sample e-commerce application.

Step-by-step instructions carefully walk you through the most common questions, issues, and tasks.
Quizzes help you build and test your knowledge.
Notes, tips, and cautions point out shortcuts, solutions, and potential problems to avoid.New terms are clearly defined and explained.
Learn how to…
* Incorporate ASP.NET Ajax into any new or existing web site or application
* Use ASP.NET architecture, key concepts, and client-side scripting techniques
* Design and build a complete e-commerce application
* Use ASP.NET Ajax to create higher-performance web applications
* Use all the key Ajax Server Extensions, including the Ajax Control Toolkit
* Work with the ASP.NET Ajax authentication and profile services
* Extend the Microsoft Ajax Library
* Efficiently debug and trace ASP.NET Ajax code
* Leverage the benefits of Ajax by implementing a sample application
Joydip Kanjilal, honored by Microsoft as an ASP.NET MVP, writes frequently on ASP.NET and other .NET technologies for web sites such as www.asptoday.com, www.devx.com, www.aspalliance.com, and www.aspnetpro.com. He is currently lead architect for a consulting company based in Hyderabad, India. He has designed and architected solutions for various domains. Sriram Putrevu, lead developer for a consulting company in Hyderabad, specializes in Microsoft .NET technologies. He has extensive experience developing large-scale applications in healthcare, supply chain/logistics, EAI, and e-commerce
Download


Web Parts are reusable components that extract data from existing Microsoft or non-Microsoft applications for use in ASP.NET Web pages; they can also be used to build user controls
  • Presents developers with an understanding of how Web Parts work and how they can be developed
  • Examines how to secure and integrate Web Parts into other Windows systems (SQL Server, Office, ASP.NET, Content Manager)

Download
Password = www.lemonshare.net

Windows


Your Ad Here



We waited more than five years for Vista. As you may recall, Windows XP was released with much fanfare in October 2001. But instead of the next Windows version shipping in just a couple of years, as originally expected, Microsoft lost its way in the development process. Vista didn’t make it to consumers until early 2007.
TABLE OF CONTENT:
Chapter 01 - Selecting the Right Vista Version
Chapter 02 - Installing and Upgrading to Windows Vista
Chapter 03 - Vista Compatibility
Chapter 04 - What’s New in the Windows Vista User Interface
Chapter 05 - Where’s My Stuff?
Chapter 06 - Using Windows Sidebar
Chapter 07 - Fonts
Chapter 08 - Windows Vista Security Features
Chapter 09 - New User Account Features
Chapter 10 - Windows Media Player 11
Chapter 11 - Enjoying Digital Photos
Chapter 12 - Making Movies and DVD Movies
Chapter 13 - Digital Media in the Living Room
Chapter 14 - Having Fun: Games and Vista
Chapter 15 - Computing to Go
Chapter 16 - New Tablet PC Features
Chapter 17 - Browsing the Web with Internet Explorer 7
Chapter 18 - Windows Mail and Contacts
Chapter 19 - Using and Understanding Windows Live Services
Chapter 20 - Managing Your Schedule with Windows Calendar
Chapter 21 - Keeping Your Data Safe
Chapter 22 - Microsoft PowerShell
Download Part 1
Download Part 2


"I highly recommend this book, the ‘Vista Manual That Microsoft Never Wrote,' since it has everything about Vista that you need, and nothing you don't." --Stu Sjouwerman, Editor, WServerNews, wservernews.com; Founder, Sunbelt Software
Your Hands-On Microsoft Windows Vista Administration Guide
Set up and manage Windows Vista in the enterprise using the detailed information contained in this authoritative resource. Microsoft Windows Vista Administration shows you how to leverage Vista's powerful new productivity, security, and management tools to give your business the competitive edge. Inside, you'll learn to design and implement Windows Vista installation and migration plans, create network connections, configure Internet services, and utilize Vista's remote access features. You'll also learn to secure your Windows Vista environment, proactively prevent performance problems, and tune Vista PCs.
-Plan and execute enterprise Windows Vista installations and migrations
-Implement Vista's next-generation TCP/IP and DNS features
-Connect to and navigate wired and wireless networks
-Enable enterprise-wide collaboration and communication
-Configure Remote Assistance and Remote Desktop
-Create and manage users, accounts, privileges, rights, and permissions
-Secure Vista PCs and networks
-Customize and use Internet Explorer 7 and Internet Information Server 7
-Set up and configure Vista on mobile devices, laptops, and tablet PCs
-Monitor, tune, and troubleshoot Vista machines.
Download


Description: Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn"t mean that Windows is inherently less secure than other operating systems; it"s simply a numbers game. More machines running Windows Server. More targets for attackers to hack.
As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including:
1. Network Access Protection, which gives administrators the power to isolate computers that don"t comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.
2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.
3. Protection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.
4. Protection against malicious software with User Account Control with a new authentication architecture.
5. Increased control over your user settings with Expanded Group Policy.
...to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.
Download

Hacking


Your Ad Here

























Download


Admit it. You’re addicted to your BlackBerry. That’s okay. Most usersare, and this book is just going to make it worse. Now you’ll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or drawing tool; even control yourcomputer over a network with it. And we haven’t even gotten to theway-out stuff.
Pick a few of these hacks
* Play games with BlackBerry
* Search the Web
* Connect to your PC wirelessly
* Use BlackBerry as a USB thumb drive
* Install custom ringtones
* Supersize security
* Draw sketches on your screen
* Play your BlackBerry like a piano
. . . and more!
Tweaks, tricks, and add-on apps to customize your BlackBerry–plus Java code for even cooler hacks

Download
Password : www.oxava.com


Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices.
You’ll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks Defend against WEP key brute-force, aircrack, and traffic injection hacks Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles Prevent rogue AP and certificate authentication attacks Perform packet injection from Linux Launch DoS attacks using device driver-independent tools Exploit wireless device drivers using the Metasploit 3.0 Framework Identify and avoid malicious hotspots Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys



Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot. Cyber-Thriller focusing on increasing threat of terrorism throughout the world.
Provides a fascinating look at covert forms of communications used by terrorists over the Internet.
Accompanying CD-ROM allows users to “hack along” with the fictional narrative within the book to decrypyt.
Download






The latest Windows security attack and defense strategies
“Securing Windows begins with reading this book.” –James Costello (CISSP) IT Security Specialist, Honeywell

Meet the challenges of Windows security with the exclusive Hacking Exposed “attack-countermeasure” approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors’ and contributors’ many years as security professionals hired to break into the world’s largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to:
* Establish business relevance and context for security by highlighting real-world risks
* Take a tour of the Windows security architecture from the hacker’s perspective, exposing old and new vulnerabilities that can easily be avoided
* Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems
* Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques
* Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable services
* See up close how professional hackers reverse engineer and develop new Windows exploits
* Identify and eliminate rootkits, malware, and stealth software
* Fortify SQL Server against external and insider attacks
* Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats
* Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomization

Download




Overview: The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog
Download







“Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are false, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else; it provides a glimpse into the creative minds of some of today’s best hackers, and even the best hackers will tell you that the game is a mental one.”
Download











Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker’s perspective.
Download

PHP




Your Ad Here


With over 3 million users worldwide, Adobe’s Dreamweaver is the most popular web development software in the world, and it just took another step forward with CS3, the new version released in 2007. Having come a long way from its humble beginnings as a simple web design tool, CS3 allows you to rapidly put together standards compliant web sites and dynamic web sites with server-side languages and Ajax, and much more. To complement this great new application, David Powers has written the ultimate guide to itThe Essential Guide to Dreamweaver CS3 teaches you everything you need to know about the application, from setting up your development environment environment to publishing your sites and applications on the web, and everything in between.
Download



Want to assert yourself as a cutting–edge PHP web developer? Take a practical approach, learning by example from author Quentin Zervaas, and discover how to bring together the many technologies needed to create a successful, modern web application. In Practical Web 2.0 Applications with PHP, PHP, MySQL, CSS, XHTML, and JavaScript/Ajax development techniques are brought together to show you how to create the hottest PHP web applications, from planning and design up to final implementation, without going over unnecessary basics that will hold you back. This book includes must–have application features such as search functionality, maps, blogs, dynamic image galleries, and personalized user areas. The Zend Framework is used extensively to build the application, allowing you to focus on developing the application rather than on reinventing the wheel. Topics covered include application planning and design; setting up the application framework; using CSS for easier styling; adding dynamic effects the easy way using JavaScript libraries such as Prototype and script.aculo.us; and implementing several must–have web application features such as user login, blogs, dynamic image galleries, search functionality, mapping with Google Maps, and much more. Zervaas covers everything in a practical, tutorial style so you can start working on your own projects as quickly as possible.

Download


Written by an experienced PHP expert who is in sync with the most common uses of PHP and MySQL, this tutorial presents basic code for twelve functional projects that exemplify the basic concepts and syntax of PHP and MySQL that are used to develop web-based applications.
As you walk through the detailed steps of each project, you’ll learn the many aspects of design as well as how to properly secure your applications for real-world implementation. While some projects build upon previous projects, others stand alone. Whether you are looking for guidance in how to program different applications, seeking inspiration to write projects of your own, or planning to modify and reapply the featured projects, you can look forward to expanding your skill set with these projects.
Download
Pass : WwW.PalDDL.Com



Beginning PHP and MySQL: From Novice to Professional, Third Edition offers a comprehensive introduction to two of the most prominent open source technologies on the planet: the PHP scripting language and the MySQL database server. Updated to introduce the features found in MySQL’s most significant release to date, readers learn how to take advantage of the latest features of both technologies to build powerful, manageable, and stable web applications.

Essentially three books in one, readers not only profit from extensive introductions to the core features of each technology, but also learn how to effectively integrate the two in order to build robust data-driven applications. Packed with practical examples and insight into the real-world challenges faced by developers based on author W. Jason Gilmore’s 7 years of expertise working with these technologies, readers will repeatedly return to this book as both a valuable instructional tool and reference guide.
What you’ll learn

  • The PHP language
  • How to back your web site with MySQL
  • Templating so that you can apply a consistent design across all pages on your site
  • How to authenticate your web site users
  • How to use cookies to maintain information (such as items in a shopping cart) while a user is browsing your site

  • Download


If you’re developing a content management system in PHP 5, there are times when you simply have to roll-your-own, for whatever reason. In those situations, this book will be invaluable. If you’re looking for an inside guide to putting together the working framework of a flexible, robust content management system in PHP 5, this book is for you.

As a former development team leader on the renowned Mambo open-source content management system, author Martin Brampton offers unique insight and practical guidance into the problem of building an architecture for a content management system. Following the scene-setting first chapter, each chapter in the book tackles a different aspect of developing the author’s new Aliro PHP 5 CMS framework, with: . A concise statement of the problem . Discussion of the important design issues and problems faced . Creation of the framework solution The framework is built on a strongly object-oriented architecture throughout, including adherence to MVC principles, and you will learn how to create classes for handling such things as menus, modules, components, sessions, and user tracking. Administration and security issues are discussed as an integral part of the design and implementation of framework features. The final chapter discusses the key issues that affect a wide range of specific content handlers and explores a practical example in detail. You will learn about: . The general characteristics of systems to create websites . Effective coding and object architectures to fully exploit PHP 5 . A foundation for database processing to ease further development . Technical functions such as handling sessions, caches, errors, XML, mail, and files . Management of website users . Flexible, practical deployment of role based access control . Internationalization . Handling extensibility beyond the basic framework . General concepts of menus without prior commitments to detail . Delivery and presentation of different kinds of user-oriented content Approach The book includes extensive discussion of the design issues, and how to overcome them in the framework. Each chapter of the book focuses on a particular requirement of the framework. The book will not present the total code for the framework, showing only the parts that raise critical design or implementation issues. For these, detailed explanation is given, leaving the less problematic parts to the code download itself

Download



Oh, and forward compatibility. Now optimization is definitely more Greg’s kind of thing than mine, and Marcus doesn’t have much spare time these days, so I took it on myself to focus on that other thing. I went to look at PHP 6. The good news is that from now, all phars created using PHP 5.2.1 and up should run under PHP 6 and vice versa. The structure’s unchanged. Sing hallelujah.
The bad news is that a phar with a default stub won’t run under versions of PHP prior to PHP 5.2.1, whereas we had PHP 5.1 support this time last week. Blame: b and the binary cast. The default stub calls unpack(), you see, and PHP 6 needs to be told that the second argument to unpack() is a binary string and not a Unicode string. The only ways we have of telling PHP 6 this will throw a parse error in PHP 5.2.0 and under. There’s no way to have both backward compatibility and forward compatibility: we have to choose….
Download



“PHP and MySQL Everyday Apps For Dummies” is a one-stop reference providing all you need to build dynamic, real-world, ready-to-use apps with the popular PHP (a scripting language) and MySQL (a database system) software. The book is a hands-on, go-to-guide that: Walks you through installing the applications files from the CD-ROM and setting up your programming environment. It contains all the code needed to create seven applications such as: user authentication with HTTP; user login; on-line catalog; shopping cart; CMS ; Web forum; and, building and managing a mailing list (on the CD-ROM). It automates the programming process and walks you through building the application from start to finish. It explains how to write secure code. It features complete code not just snippets, but neatly assembled packages with “instant” real-world functionality. It shows how to build the applications in two forms - procedural and object-oriented programming - providing programmers who want to switch to the object-oriented method of coding (which is new in PHP 5!) with the essential know-how
Download


Java




Your Ad Here


There is something for every programmer in this book, which presents a number of practical, high-powered applications of Java. Included are pure code subsystems such as the expression parser, which readers will adapt for use in their own programs, financial calculations and statistics programs that feature ready-for-use applets/servlets, interpreter or the AI-based search engine, and much more.
Text shows how to apply Java to a wide variety of high-powered applications, each demonstrating different features and techniques. Examples range from language interpreters, Web crawlers, and e-mail subsystems to expression parsers, statistical tools, and financial applets. For Java programmers.
Download




This book is a guide for the experienced Java programmer who wants to take his Java skills beyond simple animation and applets. It will show the reader how to streamline his Java code, how to achieve unique results with undocumented tricks, and how to add advanced level functions to his existing Java programs. - Skilled Java professionals show how to improve garbage collection before and after compilation for improved performance
Download









Anyone involved with the open source community or using open source software knows there are tons of tools available on the market. Keeping up with these tools, and knowing which tools to use and how to use them, is an intimidating road to travel. We hope to simplify your journey by showing concise, useful recipes for some of the more popular open source Java tools on the market today. We show you tools like JUnit, JUnitPerf, Mock Objects (more of a concept), and Cactus for testing Java code. We show how to generate EJB files using XDoclet, too. All tools discussed in this book are completely executable through Ant, allowing for a complete and stable build environment on any Java-enabled platform. This is also a book about Extreme Programming (XP), which led us to choose the tools that we did. The XP software development approach does not depend on a particular set of tools; however, the right tools certainly make following XP practices easier. For instance, test-first development is a cornerstone of XP, so most of the tools in this book are testing frameworks. XP also demands continuous integration, which is where Ant fits in. We are big fans of automation, so we cover the XDoclet code generator as well as describe ways to automate deployment to Tomcat and JBoss
Download




Today’s digital environment demands that every application design consider security early on in the design process. To achieve this, developers must be fluent in basic cryptographic nomenclature and comprehend the strengths and weaknesses of each algorithm or architecture before making a final design decision. One of Java’s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of an interface and programming tools that provide both a framework and the implementations for encryption, key generation and key agreement, and Message Authentication Code (MAC) algorithms. This set of Java Cryptography Extensions (JCE) has now been integrated into the Java 2 SDK, v. 1.4, making it a crucial tool for developers to understand and use.
In Java Cryptography Extensions: Practical Guide for Programmers, the JCE is explored using numerous code examples and instructional detail. It does not delve deeply into mathematical algorithms but instead gives the busy professional the tools to work with the JCE and the ability to write programs in Java right away. A supplemental open-source cryptography toolkit and the sample code is also available online to help those who are new to the JCE understand it through practical application. With this guide, programmers finally have a source that goes beyond the spec and gives them the details necessary for successful cryptography solutions in Java.
Download




JavaTech is a practical introduction to the Java programming language with an emphasis on the features that benefit technical computing. After presenting the basics of object-oriented programming in Java, it examines introductory topics such as graphical interfaces and thread processes. It goes on to review network programming and develops Web client-server examples for tasks such as monitoring remote devices. The focus then shifts to distributed computing with RMI. Finally, it examines how Java programs can access the local platform and interact with hardware.
Download
Pass : www.lemonshare.net





Uses an object-based approach to the introduction of Computer Science using Java.
Summary: good choice of teaching language
Since this book came out, there have been at least 2 major revisions of Java. But, you know what, don't worry. At the level of treatment in the text, it is not closely connected to the latest in Java. Beside, as Java gets upgraded, it tends to be a superset of older versions.

What Hughes does is use Java as a good language in which to imbue the precepts of computing. If you have never programmed before, you should probably start with an object oriented language. Skip Fortran, Pascal and C. Well, given Java's popularity, it's a natural choice.
Some of the early chapters deal with material that is not restricted to OO languages. Like the if-else construct. Or for loops. You should not have any problems with these. Later in the text, it actually goes into how you can think in OO terms, and how to map these into actual source code.
Download

Once again, Robert Sedgewick provides a current and comprehensive introduction to important algorithms. The focus this time is on graph algorithms, which are increasingly critical for a wide range of applications, such as network connectivity, circuit design, scheduling, transaction processing, and resource allocation. In this book, Sedgewick offers the same successful blend of theory and practice that has made his work popular with programmers for many years. ichael Schidlowsky and Sedgewick have developed concise new Java implementations that both express the methods in a natural and direct manner and also can be used in real applications. Algorithms in Java, Third Edition, Part 5: Graph Algorithms is the second book in Sedgewick’s thoroughly revised and rewritten series. The first book, Parts 1-4, addresses fundamental algorithms, data structures, sorting, and searching. A forthcoming third book will focus on strings, geometry, and a range of advanced algorithms. Each book’s expanded coverage features new algorithms and implementations, enhanced descriptions and diagrams, and a wealth of new exercises for polishing skills. The natural match between Java classes and abstract data type (ADT) implementations makes the code more broadly useful and relevant for the modern object-oriented programming environment.
Download



Develop Web business applications using XML and Java through real-world examples and code * Quickly obtain XML programming skills * Become familiar with Document Object Models (DOM) and the Simple API for XML (SAX) * Understand the Electronic Document Interchange (EDI) system design using XML and Document Type Definition (DTD), including * coverage on automating business-to-business message exchange * Leverage JavaBean components * Learn a hands-on, practical orientation to XML and Java
XML has strong support from industry giants such as IBM, Sun, Microsoft, and Netscape. Java, with its “write once, run anywhere” capabilities, is a natural companion to XML for building the revolutionary Internet applications described in this book. XML and Java demonstrates how developers can harness the power of these technologies to develop effective Web applications. If you want to learn Java-based solutions for implementing key XML features–including parsing, document generation, object tree manipulation, and document processing–there is no better resource than this book.
Download