Monday, May 4, 2009

Train Signal Lab 22 Linux Admin




Train Signal Lab 22 Linux Admin


http://rapidshare.com/files/224306572/booktraining.net__Lab_22_-_Linux_Admin_1_of_2.part2.rar
http://rapidshare.com/files/224555564/booktraining.net__Lab_22_-_Linux_Admin_1_of_2.part3.rar
http://rapidshare.com/files/224306582/booktraining.net__Lab_22_-_Linux_Admin_1_of_2.part1.rar

VB.NET for Beginners to Programming Workbook and Videos

This unique series features 23 lessons, each lesson containing a workbook chapter with questions, exercises, further readings and one or more videos that step an absolute beginner through learning the most fundamental Visual Basic.NET topic matter. If you have never programmed before and want to learn Visual Basic.NET, this is a great place to start.

Anatomy of The Curriculum

Each of the "First Time Programmers" series contains two workbooks, a Questions edition and an Answers edition, which is identical to the Questions edition but contains the answers to all the questions in blue text.

Each lesson has one or more parts, as follows:

Lesson Objectives - Easily identify what the goals of the lesson are.

Lesson Text- Typically a few pages explaining the concepts for the lesson. The readings are concise and focus on concepts and ideas that are appropriate for the level you are at. The lessons avoid introducing unused or comple

Videos to Watch- Most lessons contain a video that demonstrates the concepts of the lesson. This is a powerful way to learn because its like watching over the shoulder of an expert while he "shows you the ropes."

Source Code - All source code that is created in the video is available for you to inspect on your own.

Extended Readings - These are links to parts of the Microsoft Developer's Network that are important for you to know. These readings extend the Lesson Text and often get into much more detail.

Definitions- While you are reading through the Lesson Text and the Extended Readings, you will come across many new terms that you should make sure you know.

Lesson Questions - Each lesson will have a number of review questions that re-inforce your new-found knowledge and force you to put it into your own words.

Best Practices - Most of the videos make recommendations that are considered "Best Practices" -- approaches that are tried and true. When available the workbook contains an area to record these Best Practices.

Exercises- Most lessons have a project for you to work on that covers concepts introduced in the readings and the video. The exercise requires you to open Visual Studio.NET and get your hands dirty. If you get stuck, you can watch a video that shows how we would have solved that exercise, including the source code.






The following videos are available for this series:

BEGIN1 - Orientation
Orientation video for this series ... please take the time to watch this first.
Loading Source Code for the BEGIN1 Series
This video explains how to unzip, open and review the source code contained in the

BEGIN1_Code.zip file.
Source Code for BEGIN1 Series
This file contains the source code that was used in the videos in the BEGIN1 series and can be used to follow along in your own local copy of Visual Studio.NET. For instructions on how to open the source code projects, please download and watch BEGIN1_LoadingSourceCode.zip.

Workbook QUESTIONS
Includes ONLY the Workbook Questions in PDF format for the ABSOLUTE BEGINNER. Extremely fundamental. PLEASE DO NOT DOWNLOAD IF YOU ALREADY KNOW HOW TO PROGRAM.
Workbook ANSWERS
Includes ONLY the Workbook Answers in PDF format for the ABSOLUTE BEGINNER. Extremely fundamental. PLEASE DO NOT DOWNLOAD IF YOU ALREADY KNOW HOW TO PROGRAM.

Lesson 1 - What is Computer Programming?
Explains the purpose of computer programming languages, compiling code, software layers, benefits of modern programming languages like VB.NET and C#, software development goals and finally some tips for learning Visual Basic.NET. THIS FILE IS JUST A PLACEHOLDER - NO VIDEO IS NECESSARY FOR THIS LESSON.

Lesson 2 - Computer Programming Workflow
Demonstrates the basicss steps of software development workflow, including the purpose of a project and a solution within Visual Studio.NET and the benefit to adding comments within your code.

Lesson 3 - Obtaining the Tools You'll Need
Describes what you'll need to get started and where to find it. Explains the different versions of Visual Basic.NET, and where to download free (legal) versions of Visual Studio.NET as well as ASP.NET Web Matrix. THIS FILE IS JUST A PLACEHOLDER - NO VIDEO IS NECESSARY FOR THIS LESSON.

Lesson 4 - Creating a User Interface
The lessons shows the various controls that are available to Windows Forms applications and how to manupuate a control's properties to change its appearance or behavior using the Property window. Finally, we identify some Best Practices of user interface design.
Lesson 4 - Exercise
Solution to the Exercise for Lesson 4

Lesson 5 - Handling Events
This lesson explains what events are in Windows and how to capture and write code that responds to them in you Windows Forms applications. Finally, it reviews some common events that occur in the lifetime of your applications.
Lesson 5 - Exercise
Solution to Lesson 5 Exercise
Lesson 6 - Setting Properties in Code
This lesson helps you to understand the difference between design time and run time and how to set properties at run time using the dot (.) syntax in the code window.

Lesson 6 - Exercise
Solution for Lesson 6 Exercise

Lesson 7 - Data Types, Variables and Variable Declaration
This lesson defines what data types are and why they are important. It explains what a variable is, why variables need to be declared, and how to assign values to variables. Finally, this lesson will help you understand why and how to do a data type conversion.
Lesson 7 - Exercise
Solution for Lesson 7 Exercise

Lesson 8 - Statements
Statements are the building blocks of code, and this lesson defines what a statement is. Furthermore, it defines what operators are, why they are used, and the families of operators. THIS FILE IS JUST A PLACEHOLDER - NO VIDEO IS NECESSARY FOR THIS LESSON.

Lesson 9 - Procedures - Sub-Routines and Functions
Creating procedures makes your code modular, meaning that it is well organized, re-usable and more easily modifiable. This video demonstrates
Lesson 9 - Exercise
Solution for Lesson 9 Exercise

Lesson 10 - Program Flow
Defines branching and recursion, and the syntax required to accomplish this. Using branching and recursion you can add powerful business logic to your applications.
Lesson 10 - Exercise
Solution for Lesson 10 Exercise

Lesson 11 - Re-Using Code in Modules
Modules are files that contain general-purpose re-usable procedures. This video explains some of the best practices for using modules and explains the concept of scope.
Lesson 11 - Exercise
Solution for Lesson 11 Exercise

Lesson 12 - Object Oriented Programming with Classes
Object Oriented Programming seeks to reduce the complexity of creating large applications by breaking the application down into smaller, manageable classes of code. Each class represents and idea, whether tanglible and concreate (such as a Product or Employee) or conceptual (such as Inventory or Order). This lesson explains how classes are created and how they are used in Visual Basic.NET. THIS FILE IS JUST A PLACEHOLDER - NO VIDEO IS NECESSARY FOR THIS LESSON.

Lesson 13 - Fields, Properties and Methods
Classes are the building blocks of Object Oriented propgramming and classes are comprised of Fields, Properties and Methods. Includes best practices for using
Lesson 13 - Exercise
Solution for Lesson 13

Lesson 14 - Object Lifetime
This lessons defines what constructors and destructors are, and how to create multiple constructors using overloading. It also explains what happens when an object goes out of scope and how it is removed from memory by the Garbage Collector in .NET.
Lesson 14 - Exercise
Solution for Lesson 14 Exercise

Lesson 15 - What is the .NET Framework?
This lesson describes the various parts of the .NET Framework and how they work together. Also explains the concept behind namespaces and how to utilize namespaces within your applications.

Lesson 16 - Keeping Track of Data with Arrays
Explains what an array is, how to dimension and re-dimension an array, how to use recursion with an array and finally how to create multidimensional arrays.
Lesson 16 - Exercise
Solution to Lesson 16 Exercise

Lesson 17 - Obtaining Data from a Text File
This lesson explains how text files are used in some legacy systems to exchange information between departments or companies and how to use the System.IO namespace to open, read from, write to and close text files.
Lesson 17 - Exercise
Solution for Lesson 17 Exercise

Lesson 18 - Obtaining Data from a Database
This lesson begins by explaining what a database is, and the basic concepts of relational databases including tables, rows and columns, relationships and keys. It explains the different ways that you can access a database from .NET - disconnected or connected and how to achieve both using ADO.NET, a class library provided in the .NET Framework.
Lesson 18 - Exercise
Solution for Lesson 18 Exercise

Lesson 19 - Data-binding Data to User Interface Controls
This lesson explains what data-binding is, how to connect to a database in a disconnected manner then set the DataSource and DataMember properties of a DataGrid.
Lesson 19 - Exercise
Solution for Lesson 19 Exercise

Lesson 20 - Inserting, Updating and Deleting Data in a Database
This lesson explains why data-binding is not always preferable when working with data from a database. It explains how to insert, update and delete data with help from the command object and its collection of parameter objects.

Lesson 21 - Handling Exceptions
This lesson explains what exceptions are and how Visual Basic.NET utilizes Structured Exception Handling. It also explains how to throw exceptions from one software layer to another, and the general principles of designing applications with a solid exception handling scheme.

Lesson 22 - Debugging Applications
This lesson shows the power and utility of Visual Studio.NET when attempting to debug your applications.

Lesson 23 - Building an ASP.NET Application
This lesson shows how to use your new Visual Basic.NET skills to create complex web pages that are dynamic and database driven. It begins by explaining how to create a simple ASP.NET application and points out some of the similarities between Windows Forms and Web Forms. Discusses PostBack, Session and Application objects.

Lesson 23 - Exercise
Solution for Lesson 23 Exercise


Link download

vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.013

http://rapidshare.com/files/220262259/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.013

vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.001

http://rapidshare.com/files/220262510/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.001

vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.002

http://rapidshare.com/files/220262779/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.002

vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.003

http://rapidshare.com/files/220717171/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.003

vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.004

http://rapidshare.com/files/220721237/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.004

vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.005

http://rapidshare.com/files/220723712/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.005

vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.006

http://rapidshare.com/files/220725487/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.006

vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.013

http://rapidshare.com/files/220727921/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.013
vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.007

http://rapidshare.com/files/220728138/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.007
vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.009

http://rapidshare.com/files/220728257/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.009
vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.008

http://rapidshare.com/files/220728282/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.008
vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.012

http://rapidshare.com/files/220728886/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.012
vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.011

http://rapidshare.com/files/220728894/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.011

vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.010

http://rapidshare.com/files/220730363/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.010

vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.004

http://rapidshare.com/files/220729970/vbdotnet_for_beginners_to_programming_workbook_and_videos.rar.004



Password booktraining.net

VTC - Ubuntu Server


DESCRIPTION
Linux is the most important operating system on the Internet. It's recognized everywhere as the cost-effective way to operate all kinds of servers. With the support of powerhouses like IBM, Dell, HP, and Sun, demand for Linux servers is growing. Ubuntu has quickly become the most popular distribution among Linux users. And Ubuntu Server edition is quickly becoming the way to implement Linux in the enterprise. This "how to" course by VTC author Mike Jang, uses practical examples to demonstrate the skills you need to use Ubuntu Server edition.

http://www.vtc.com/products/Ubuntu-Server-Tutorials.htm

Download from Rapidshare

http://rapidshare.com/files/223575151/booktraining.net_Gxc.VTC-U-S_UDS.part4.rar

http://rapidshare.com/files/223575600/booktraining.net_Gxc.VTC-U-S_UDS.part3.rar

http://rapidshare.com/files/223575818/booktraining.net_Gxc.VTC-U-S_UDS.part2.rar

http://rapidshare.com/files/223575918/booktraining.net_Gxc.VTC-U-S_UDS.part1.rar

Password default : booktraining.net

Learnkey - WirelessNetworking

5 Sessions - 15 Hours of Interactive Training

The popularity of wireless networks is exploding, and with it, demand for trained wireless IT professionals. In the Wireless Networking course from LearnKey, you'll learn the fundamentals of wireless LANs from a vendor-neutral perspective. Expert instructor Michael Storm takes you through radio frequency (RF) technologies, industry standards, site surveys, wireless security issues and much more. At the conclusion of this course you'll be prepared to implement, manage, and troubleshoot wireless networks, and be prepared to pass the Certified Wireless Network Administrator (CWNA) exam.

Session 1

Section A: CWNP Introduction
· CWNP Certification Program
· Levels of Certification
· Course Overview
· Course Objectives

Section B: Wireless Application
· History
· Standards
· Roles
· Last Mile Delivery
· Mobility
· Wireless LANs
Section C: Radio Frequency Technology
· Radio Frequency
· Behaviors
· Gain/Loss
· Reflection/Refraction
· Diffraction/Scattering
· Absorption
· VSWR
· VSWR Measurements

Section D: Antennas
· Principals
· Line of Sight/Fresnel Zone
· Obstructions
· Antenna Gain
· Intentional Radiator
· EIRP

Section E: RF Mathematics
· Power Calculation
· Units of Measure
· Power Gain/Loss
· dBm
· dBi
· Sample Calculation

Section F: Spread Spectrum
· Overview
· Narrowband/High Power
· Wideband/Low Power
· Usage
· Wireless LANs
· Wireless PANs
· Wireless MANs

Session 2

Section A: Spread Spectrum Technologies
· FCC Specifications
· FHSS
· FHSS Interference
· FHSS Channel
· Timing
· DSSS
· DSSS Channels
· DSSS Interference

Section B: FHSS vs. DSSS
· Comparison Factors
· Interference/Cost
· Co-location
· Equipment
· Data Rates
· Security
· Standards Support

Section C: Wireless Access Points
· Device Types
· Access Points
· Access Modes
· Access Point Options
· Antenna Options
· Filtering/Modular Cards
· Variable Power/Wired Connectivity
· Mounting Access Points

Section D: Access Point Features
· SOHOs
· Enterprises
· Management

Section E: Client Devices
· LAN Devices
· Adaptors
· USB
· PCI & ISA Adaptors
· Configuring Devices

Section F: Infrastructure Devices
· Wireless Bridges
· Workgroup Bridges
· Common Options
· Residential Gateways
· Enterprise Wireless Gateways
· Device Management

Section G: Antenna Types
· Antenna Selection
· Dipole
· Semidirectional
· Highly Directional

Session 3

Section A: Tuning Antennas
· RF Antenna Concepts
· Polarization
· Antenna Gain/Beamwidth
· Free Space Path Loss
· Installation
· Orientation/Alignment
· Safety

Section B: Power Over Ethernet
· Usage
· Compatibility
· Voltage Pinout Standards

Section C: RF Accessories
· Accessory Types
· RF Amplifier
· RF Attenuators
· Lightning Arrestors
· RF Splitters
· RF Connectors
· RF Cables
· RF Pigtail

Section D: Organizations
· Organizational Roles
· FCC Role
· ISM vs. U-NII
· IEEE
· IEEE 802-11b
· IEEE 802.11a/IEEE 802.11g
· Other Organizations
· Competition

Section E: Locating Access Points
· 802.11 Architectures
· SSIDs
· Beacons
· Passive Scanning
· Active Scanning

Sesion4

Section A: Authentication
· Authentication Process
· Association Process
· States
· Authentication Methods
· Authentication Security
· EAP Types
· VPN Solutions

Section B: Service Sets
· Service Sets Overview
· Roaming
· Roaming Standards
· Connections
· Limitations
· Load Balancing

Section C: WAN Communication
· Frames
· Management Frames
· Collision Handling
· Fragmentation
· Fragment Bursting
· DCF & PCF
· Interframe Spacing
· Random Backoff/Slot Time

Section D: Troubleshooting
· RF Environments
· Multipath Problems
· Multipath Solutions
· Hidden Node Problem
· Hidden Node Solutions
· Near/Far Problems
· Near/Far Solution
· Co-location Problems
· Co-location Solutions

Session 5

Section A: WEP/TKIP
· Wireless Security
· WEP
· WEP Attacks
· WEP Implementation
· WEP Keys
· WEP Key Deployment
· Usage
· TKIP

Section B: Security Options
· AES
· Filtering
· SSID Filtering
· MAC Address Filtering
· Protocol Filtering

Section C:Wireless Attacks
· Attacks on Wireless LANs
· Passive Attacks
· Active Attacks
· Jamming
· Man-in-the-Middle Attacks

Section D: Corporate Security Policy
· Security Policies
· Public Wireless Networks
· Security Recommendations

Section E: Site Survey
· Specifications
· Preparation/Facility Analysis
· Networks & Network Needs
· Area Usage & Towers
· Requirements
· Available Resources
· Security Requirements

Section F: Preparation
· Preparation Checklist
· Site Survey Equipment
· Site Survey Kit Checklist
· Gathering RF Information
· Site Survey Reporting
· Additional Information

http://rapidshare.com/users/4BX7DN

Password booktraining.net

Learnkey Security+ Cd's


CompTIA Security+™ is a foundation level certification for IT professionals who have day-to-day information security responsibilities. In the Security+ self-paced training course from LearnKey, expert instructor Cameron Hunt demonstrates the skills needed for certification and successful management of information security job tasks. You will find the MasterExam a very useful tool to help you prepare for the real exam. The study guide is a text book that accompanies your training providing in depth explanations of all concepts presented in the training.
CompTIA Security+ Cameron Hunt
Benefits • Increase earning potential with information security credentials.
• Enhance employment opportunities with IT security knowledge.
• Meets all CompTIA® certification objectives for exam SY0-101. Author Expert Cameron Hunt is a technical trainer and author with a diverse background in major computer technologies. When he is not writing about security, lecturing on information technology and business culture, or implementing Linux servers with small businesses, he can be found performing urban archeology in abandoned buildings, tunnels and mines.




download

http://rapidshare.com/files/185108267/booktraining.net_Security_20.7z.001.tar
http://rapidshare.com/files/185107430/booktraining.net_Security_20.7z.002.tar
http://rapidshare.com/files/185107372/booktraining.net_Security_20.7z.003.tar
http://rapidshare.com/files/185108245/booktraining.net_Security_20.7z.004.tar
http://rapidshare.com/files/185108142/booktraining.net_Security_20.7z.005.tar
http://rapidshare.com/files/185108183/booktraining.net_Security_20.7z.006.tar
http://rapidshare.com/files/185108763/booktraining.net_Security_20.7z.007.tar
http://rapidshare.com/files/185108625/booktraining.net_Security_20.7z.008.tar
http://rapidshare.com/files/185107955/booktraining.net_Security_20.7z.009.tar
http://rapidshare.com/files/185107732/booktraining.net_Security_20.7z.010.tar

Password booktraining.net

Integrating Linux and Windows


From the Inside Flap
Introduction

In early 1998, I was looking at re-installing Windows 95 for the third time. Granted, I stress computers more than the average user, but this was getting old. I had been playing around with Linux since early 1995 and it looked like a good time to use it as my primary desktop.
I already knew how to install and configure Linux, but I had never used it as a desktop. I found plenty of books on Linux configuration, a few on using it as a server, but nothing on using it as a desktop. Instead I had to scour the Internet for useful information. What I have tried to do for this book is compile what I have learned over the past two years. Hopefully, this will save you the time and frustration of finding it yourselves.

So, how does Linux compare to Windows? As with anything else, each one has its own strengths and weaknesses.

Windows is king of the desktop for good reason. It has a polished interface and more end-user applications than any other operating system. It is also pre-installed on most new PCs, making it an easy, safe choice for most PCs. These factors combine to give Windows about 90% of the desktop market.

Linux is based on UNIX and inherits its security and stability from it. Linux is the most popular choice for public Web servers and it also holds about 25% of the small server market. It is also free (or nearly so) and comes packed with lots of useful tools for programming and server management.

These distinctions aren’t permanent, however. Several groups are working on polishing Linux’s interface. There is also a rush to develop more end-user applications for Linux. Large PC makers such as Dell, Compaq, and IBM are starting to offer Linux pre-installed on PCs.

While the market for Linux is comparatively small, Linux grew from less than 1% of the desktop market in 1998 to about 4% in 1999. This is amazing considering the Apple Macintosh, which has been around for 15 years, is holding at 5% of the desktop market.

Windows is also working to gain a foothold in the traditional strengths of the UNIX (and Linux) market: security, stability, and scalability. Microsoft put billions of dollars into the recently released Windows 2000 to address these issues. While the jury is still out on whether it succeeded, early reports say that Windows 2000 is much improved over earlier versions of Windows in these areas.

There are also many other reasons for choosing an operating system. They can often draw fanatical devotion (just ask a dedicated MacIntosh user). Despite (or maybe because of) its success, Microsoft has some very dedicated enemies. Just search the Internet for “Satan” or “Antichrist” and you will be surprised how many anti-Microsoft sites you hit. The Microsoft Antitrust case was also pushed forward by some dedicated foes. Some users try Linux as an alternative to Windows. It may not be the best way to choose an operating system, but never discount the power of fanatical devotion.

Such devotion is not necessary. Linux and Windows can peacefully coexist on the same computer. It is even possible to run Linux and Windows at the same time! The whole first section of this book is devoted to making coexistence as easy as possible.

The middle section is dedicated to finding useful applications for your Linux systems. Sometimes the same application is available for both Linux and Windows; in other cases, equivalent applications are available; and in a few cases, the applications are only available for Windows. The good news is that most people can do everything they need to do with either Linux or Windows.

The last section deals with networking. This is a rather advanced topic, but networking is moving from the Fortune 500 into homes and small businesses at a rapid rate. Networking is getting inexpensive enough to offer the same advantages that large businesses have long enjoyed: sharing files, printers, and Internet connections. The increasing use of high-speed Internet connections in the home will continue to drive up demand for home networking.

Fortunately, both Linux and Windows have programs that allow easy connection to each other. Samba allows Linux to act as a Windows file server. Additionally, the NFS and LPD programs allow Windows to use Linux’s native protocols.

So which is better, Linux or Windows? That is like asking whether a car or truck is better. They are built for different purposes. Windows plays the traditional role of the car; it is more polished and aimed at the mass market. Linux plays the traditional role of a truck; it is durable and intended to be used as a work vehicle. But like cars and trucks, the roles are starting to overlap. Linux is becoming more polished and easier to use and Windows is concentrating more on security and stability. Windows is still the choice for most users’ desktops, but it is no longer the only choice. As you will see in this book, Linux is a solid choice for a server and a viable alternative in the desktop market.

Back Cover Copy
The complete solutions guide for every Linux/Windows system administrator!

* Your complete Linux/Windows integration guide
* Detailed coverage of dual-boot issues, data compatibility, and networking
* Implementing Samba file/print services for Windows workstations
* Providing cross-platform database access

Running Linux and Windows in the same environment? Here’s the comprehensive, up-to-the-minute solutions guide you’ve been searching for!

In Integrating Linux and Windows, top consultant Mike McCune brings together hundreds of solutions for the problems that Linux/Windows system administrators encounter most often. McCune focuses on the critical interoperability issues real businesses face: networking, program/data compatibility, dual-boot systems, and more. You’ll discover exactly how to:

* Use Samba and Linux to deliver high-performance, low-cost file and print services to Windows workstations
* Compare and implement the best Linux/Windows connectivity techniques: NFS, FTP, remote commands, secure shell, telnet, and more
* Provide reliable data exchange between Microsoft Office and StarOffice for Linux
* Provide high-performance cross-platform database access via ODBC
* Make the most of platform-independent, browser-based applications
* Manage Linux and Windows on the same workstation: boot managers, partitioning, compressed drives, file systems, and more

For anyone running both Linux and Windows, McCune delivers honest and objective explanations of all your integration options, plus realistic, proven solutions you won’t find anywhere else. This book will help you keep your users happy, your costs under control, and your sanity intact!

About the Author

MIKE McCUNE is a Chicago-based consultant specializing in PC-based networks and workstations running Windows, Linux, and NetWare. He has been consulting since 1990 for clients including IBM, Hewlett Packard, ITT, and GE.

Download
http://uploading.com/files/5TTY2GF1/Integr_ting_L_nux_and_W_nd0ws_Rilwis.tk.rar.html


Password booktraining.net

Learn-Key's CISSP; 11 CDs


Description:
Quote: CISSP: Access Control Systems & Methodology
Access Control Systems & Methodology is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon teaches you aboutaccess control techniques and implementation, identification and authentication processes and commonly employed types of attacks. At the conclusion of this course, you'll be familiar with the issues and concepts required to pass the CISSP exam.

CISSP: Applications & Systems Development Security
Applications & Systems Development Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over software development, databases, data storage, and common attacks that must be protected against. At the conclusion of this course, you will be familiar with the issues and concepts of the Applications & Systems Development domain required to pass the CISSP exam.

CISSP: Business Continuity & Disaster Recovery Planning
Business Continuity & Disaster Recovery Planning is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers preliminary activities including defining project scope and conducting Business Impact Analysis (BIA), as well as the planning process, plan implementation and testing. At the conclusion of this course, you'll be familiar with issues and concepts of this domain required to pass the CISSP exam.

CISSP: Cryptography
Cryptography is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the history, methodologies and practices of cryptography, as well as common security protocols employing cryptography. At the conclusion of this course, you will be familiar with the issues and concepts of the Cryptography domain required to pass the CISSP exam.

CISSP: Law, Investigation & Ethics
Law, Investigation & Ethics is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon helps you become familiar with principles of computer law and crime, incident handling, evidence, investigation and ethics. At the conclusion of this course, you will be familiar with the issues and concepts of the Law, Investigation & Ethics domain required to pass the CISSP exam.

CISSP: Operations Security
Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over security administration, intrusion detection, auditing, threats and countermeasures. At the conclusion of this course, you will be familiar with the issues and concepts of the Operations Security domain required to pass the CISSP exam.

CISSP: Physical Security
Physical Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon reviews common threats, security controls, facility requirements and environmental issues. At the conclusion of this course, you will be familiar with the issues and concepts of the Physical Security domain required to pass the CISSP exam.

CISSP: Security Architecture & Models
Security Architecture & Models is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses Bell-LaPadula, Clark-Wilson and other security models, as well as common security flaws. At the conclusion of this course, you will be familiar with the issues and concepts of the Security Architecture & Models domain required to pass the CISSP exam.

CISSP: Security Management Practices
Security Management Practices is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon covers the CIA triangle, security risk assessment, policy and other CBK elements of the Security Management Practices domain. At the conclusion of this course, you will be familiar with the issues and concepts of the Security Management Practices domain required to pass the CISSP exam.

CISSP: Telecommunications, Network & Internet Security
Telecommunications, Network & Internet Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses LAN technologies, devices and architectures, as well as network security techniques, protocols and common attacks. At the conclusion of this course, you'll be familiar with the issues and concepts required to pass the CISSP exam.


Code: http://rapidshare.com/files/116634435/learn-key_s_CISSP.part01.rar
http://rapidshare.com/files/116634453/learn-key_s_CISSP.part02.rar
http://rapidshare.com/files/116636233/learn-key_s_CISSP.part03.rar
http://rapidshare.com/files/116638161/learn-key_s_CISSP.part04.rar
http://rapidshare.com/files/116866453/learn-key_s_CISSP.part05.rar
http://rapidshare.com/files/116872591/learn-key_s_CISSP.part06.rar
http://rapidshare.com/files/116881881/learn-key_s_CISSP.part07.rar
http://rapidshare.com/files/116883418/learn-key_s_CISSP.part08.rar
http://rapidshare.com/files/116883391/learn-key_s_CISSP.part09.rar
http://rapidshare.com/files/116883413/learn-key_s_CISSP.part10.rar
http://rapidshare.com/files/116886756/learn-key_s_CISSP.part11.rar
http://rapidshare.com/files/117107763/learn-key_s_CISSP.part12.rar
http://rapidshare.com/files/117107778/learn-key_s_CISSP.part13.rar
http://rapidshare.com/files/117107773/learn-key_s_CISSP.part14.rar
http://rapidshare.com/files/117107777/learn-key_s_CISSP.part15.rar
http://rapidshare.com/files/117107801/learn-key_s_CISSP.part16.rar
http://rapidshare.com/files/117124459/learn-key_s_CISSP.part17.rar
http://rapidshare.com/files/117124524/learn-key_s_CISSP.part18.rar
http://rapidshare.com/files/117124900/learn-key_s_CISSP.part19.rar
http://rapidshare.com/files/117127827/learn-key_s_CISSP.part20.rar
http://rapidshare.com/files/117126076/learn-key_s_CISSP.part21.rar
http://rapidshare.com/files/117138936/learn-key_s_CISSP.part22.rar
http://rapidshare.com/files/118148044/learn-key_s_CISSP.part23.rar
http://rapidshare.com/files/118148267/learn-key_s_CISSP.part24.rar
http://rapidshare.com/files/118148432/learn-key_s_CISSP.part25.rar
http://rapidshare.com/files/118149582/learn-key_s_CISSP.part26.rar
http://rapidshare.com/files/118393371/learn-key_s_CISSP.part27.rar
http://rapidshare.com/files/118393383/learn-key_s_CISSP.part28.rar
http://rapidshare.com/files/118393318/learn-key_s_CISSP.part29.rar
http://rapidshare.com/files/118393312/learn-key_s_CISSP.part30.rar
http://rapidshare.coearn-key_s_CISSP.part32.rar

Password booktraining.net

ASP.NET 3.5 Social Networking


ASP.NET 3.5 Social Networking
Packt Publishing | December 11, 2008 | ISBN: 1847194788 | 580 pages | PDF | 7 Mb

Social Networking is all about developing connections or ties between friends and associates. While people have always networked with one another the Internet has allowed us to network with people all over the world easily. Any interest or cause can support its own social network, where fans and followers can meet, chat, and share their views. But building a social networking site from scratch involves some complex logic, and some serious coding.

This book shows how to build a scalable, enterprise-ready social network using ASP.NET. The book uses the latest features of ASP.NET to provide a platform that is efficient, easy to maintain, and extensible. Whether you want to build your own social network, are developing a social site for a customer or employer, or just want a practical guide to developing complex ASP.NET applications then this book is ideal for you.

The book starts by planning the essential features of our social network, and then building a 'community framework' that will give our site a solid foundation and enable us to add all our social networking features. We then go on to create user accounts, profile pages, messaging systems, 'friend' relationships between members, media galleries, blogs, message boards, groups, and more. Along the way you will see LINQ, MVC, AJAX, and other features of ASP.NET 3.5 put to practical and interesting uses.


Download
http://rapidshare.com/files/228911385/ebook_ASP.rar


Password booktraining.net

ASP.NET 3.5 Enterprise Application Development with Visual Studio 2008: Problem Design Solution


ASP.NET 3.5 Enterprise Application Development with Visual Studio 2008: Problem Design Solution

Product Description
Aimed at enterprise developers who use Visual Studio 2008, ASP.NET, C#, and SQL Server to deliver business applications, this book focuses on implementing patterns that can be used for real-world solutions.

Each chapter establishes a problem, examines which solution will provide the best results, and then demonstrates how to go about executing that solution. The experienced author addresses building a framework for corporate intranet apps, designing the data access layer, implementing the Microsoft exception handling app block, customizing view and reports with Query Builder Control, installing the application, and much more.

download
http://rapidshare.com /files/228919314/booktraining.net_ASP.dot.NET.3.5.
Enterprise.App.Dev.with.VS2008.Prm.Desg.Solution.rar


Password booktraining.net

Saturday, April 25, 2009

Sun MicroSystems Java Training CBT


A nine CD set of Sun MicroSystems JAVA training CBTs.
CDJ-110A-Fundamentals of the Java Programming Language
CDJ-275A-Java Programming Language
CDJ-310- Java 2 Platform, Enterprise Edition J2EE Platform Overview for Managers
CDJ-310A-Developing Applications for the J2EE Platform
CDJ-314A-Web Component Development with Servlet and JSP Technologies
CDJ-351A-Advanced Business Component Development with Enterprise Javabeans Technology
CDJ-450- Introduction to Mobile Java Technologies
CDJ-455-Mobile Desktop Development with Java Technologies
CDJ-460- J2ME and Mobile Phone Development Topics

download links:
http://rapidshare.com/files/223799052/S.MicroSystems.part12.rar
http://rapidshare.com/files/223799611/S.MicroSystems.part08.rar
http://rapidshare.com/files/223799628/S.MicroSystems.part07.rar
http://rapidshare.com/files/223799667/S.MicroSystems.part10.rar
http://rapidshare.com/files/223799714/S.MicroSystems.part04.rar
http://rapidshare.com/files/223799756/S.MicroSystems.part09.rar
http://rapidshare.com/files/223799773/S.MicroSystems.part11.rar
http://rapidshare.com/files/223799841/S.MicroSystems.part06.rar
http://rapidshare.com/files/223799872/S.MicroSystems.part03.rar
http://rapidshare.com/files/223799885/S.MicroSystems.part02.rar
http://rapidshare.com/files/223799915/S.MicroSystems.part01.rar
http://rapidshare.com/files/223799936/S.MicroSystems.part05.rar

Password default: netbks.com

Live Lessons PERL Fundamental


In this unique video package, renowned Perl author and speaker Peter Scott takes you through the fundamental elements of the Perl 5 language so that you have a strong foundation for creating robust Perl programs and learning more advanced aspects of the language.

Even if you’ve never run a Perl program before, you’ll learn what you need to know to get started on every popular platform. Scott advances through the language in a logical progression, from the basics of printing strings to the use of regular expressions for pattern matching and text manipulation. In between, he covers the core components of the language, demonstrating through many examples exactly how each one works. In the final lesson, he shows the power of Perl’s objects and modules for writing web programs. A uniquely valuable aspect of this video is Scott’s demonstrations of many common pitfalls and how to avoid them. You’ll learn a carefully crafted subset of the language that enables you to create powerful, robust programs while avoiding the traps that can result from learning Perl in the wrong sequence.

download links:
http://rapidshare.com/files/223789805/LL.Perl.Scott.part7.rar
http://rapidshare.com/files/223789889/LL.Perl.Scott.part1.rar
http://rapidshare.com/files/223789919/LL.Perl.Scott.part6.rar
http://rapidshare.com/files/223789945/LL.Perl.Scott.part5.rar
http://rapidshare.com/files/223789995/LL.Perl.Scott.part4.rar
http://rapidshare.com/files/223790025/LL.Perl.Scott.part2.rar
http://rapidshare.com/files/223790114/LL.Perl.Scott.part3.rar
Password default: netbks.com

APR Creating a First Web Site with Flash CS4 Professional

Information on how to learn Flash is prevalent, but it can be frustrating to understand how to make an entire working web site using this unique technology. Here’s a course that cuts through the clutter and offers practical tools for creating a dynamic web site, even for first-time developers. In Creating a First Web Site with Flash CS4 Professional, veteran Flash instructor Paul Trani simplifies the process of integrating animation, video, audio, and user interactivity to create a site that is dynamic and appealing. The goal of this hands-on workshop is to teach web site-building skills for today’s demanding interactive industry. Exercise files accompany the course.


download links:
http://rapidshare.com/files/223609446/lcafwswf.part1.rar
http://rapidshare.com/files/223609275/lcafwswf.part2.rar
http://rapidshare.com/files/223608513/lcafwswf.part3.rar
http://rapidshare.com/files/223608364/lcafwswf.part5.rar
http://rapidshare.com/files/223608328/lcafwswf.part4.rar
Password default: netbks.com

Thursday, April 23, 2009

Cbt Nugget CompTIA Security+ 2008

Here's what you'll learn in each video of the CompTIA Security+ Series


Video 1 - "Introduction to the Security+ 2008 Series" - In this introductory movie you will find out about the six domains of the Security+ Exam, the Security+ certification and the information to be covered in this series.

Video 2 - "Evaluating Common Security Threats" - In this nugget you will get an overview of common security threats such as various forms of malware, spyware, adware, botnets and logic bombs. You will also learn about security risks to hardware and peripherals.

Video 3 - "Operating System Hardening" - You will really enjoy this nugget as you explore the procedures for hardening workstations and servers. Topics include: hotfixes, service packs, security templates, patches, and more.

Video 4 - "Application Security" - This nugget of the Security+ series covers methodologies for establishing application security. You will learn about Active X and Java, cookies, instant messaging, P2P file-sharing, SMTP open relays, scripting, and XSS.

Video 5 - "Implementing Security Applications" - This nugget is a broad overview of functionality of the common application threat mitigation tools like HIDS, HIPS, personal firewalls, security suites, Antivirus, anti-spam. and pop-up blockers.

Video 6 - "Network Infrastructure Attacks (Part 1)" - This nugget will differentiate between the different ports and protocols, their threats and mitigation techniques. Concepts include: TCP/IP hijacking, Null sessions, Spoofing, Man-in-the-middle, Replay, DOS, DDOS, Domain Name Kiting, DNS poisoning, ARP poisoning, weak passwords, back doors, and default account vulnerability.

Video 7 - "Network Infrastructure Attacks (Part 2)" - This is a step-by-step exploration of DMZs, VLAN, NAT, Network interconnections, NAC, and subnetting.

Video 8 - "Network Design Elements and Components" - In this nugget, you will get an overview of security design elements and components.

Video 9 - "Network Security Tools" - This nugget presents the appropriate use and application of network security tools such as NIDS, NIPS, Firewalls, Proxy servers, Honeypot, Content filters, and Protocol analyzers.

Video 10 - "Wireless Network Security" - This very interesting nugget takes on the topic of wireless networking security including data emanation, war driving, SSID broadcast, Blue jacking, Bluesnarfing, Rogue access points and weak encryption.

Video 11 - "Access Control (Part 1)" - Probably one of the most vital aspects of network security is access control. This nuggets teaches you how to identify and apply industry best practices for access control methods. You explore common access control models like MAC, DAC, and RBAc as well as the differences between each. You'll learn how to organize users and computers into appropriate security groups and roles, apply appropriate security controls to file and print resources, and compare logical access control methods.

Video 12 - "Access Control (Part 2)" - Taking up where Access Control Part 1 leaves off, this nugget presents various authentication models and identify the components of each - such as Biometric readers, RADIUS, TACACS, RAS, VPN, Kerberos, CHAP, 802.1x and much more. We also explore physical access security methods including tokens, surveillance, and man-traps.

Video 13 - "Assessments and Audits (Part 1)" - This nugget tackles the following topics: Port scanners, Vulnerability scanners, Protocol analyzers, OVAL, Password crackers, Network mappers, Performance monitor, Systems monitor, and Performance baselines.

Video 14 - "Assessments and Audits (Part 2)" - This nugget covers the various types of monitoring methodologies including Behavior-based, Signature-based, and Anomaly-based. You'll learn about proper logging procedures and evaluation of DNS, System, Performance, Access, Firewall, and Antivirus. User access and rights review, storage and retention policies, and group policies are also covered.

Video 15 - "General Cryptography Concepts" - This nugget covers the fundamentals of cryptography including symmetric vs. asymmetric encryption. The security assurance model of C.I.A.N. is explored as well as comparative strength of algorithms.

Video 16 - "Cryptography Algorithms and Protocols" - This second nugget of the Cryptography domain lays out hashing concepts and algorithms like MD5 and SHA. Basic algorithms and encryption concepts are explored including: DES, 3DES, RSA, PGP, Elliptic curve (ECC), AES/AES256, One time pad, SSL/TLS, S/MIME, and PPTP/L2TP.
Video 17 - "Public Key Infrastructure (PKI)" - The final nugget of the Cryptography domain lays out the core concepts of a Public Key Infrastructure (PKI).

Video 18 - "Organizational Security (Part 1)" - This nugget explains redundancy planning and the components, implementation of disaster recovery procedures, and incident response procedures.

Video 19 - "Organizational Security (Part 2)" - A wide array of organizational security topics and terms are covered here including: Secure disposal of computers, Acceptable use policies, Password complexity, Change management, Classification of information, Mandatory vacations, Personally Identifiable Information (PII), Due care/diligence/process, SLA, Security-related HR policy, and User education and awareness training.

Video 20 - "Organizational Security (Part 3)" - The final nugget of the Security+ series lays out the importance of environmental controls like Fire suppression, HVAC, and Shielding. Social Engineering threats such as phishing, hoaxes, shoulder surfing, and dumpster diving are explored.



http://rapidshare.com/files/174062857/New-CbtNugget-Comptia-Security_.part01.rar
http://rapidshare.com/files/174072426/New-CbtNugget-Comptia-Security_.part02.rar
http://rapidshare.com/files/174081079/New-CbtNugget-Comptia-Security_.part03.rar
http://rapidshare.com/files/174089014/New-CbtNugget-Comptia-Security_.part04.rar
http://rapidshare.com/files/174095801/New-CbtNugget-Comptia-Security_.part05.rar
http://rapidshare.com/files/174102588/New-CbtNugget-Comptia-Security_.part06.rar

Wednesday, April 22, 2009

Network Troubleshooting Tools


Book description
Network Troubleshooting Tools helps you sort through the thousands of tools that have been developed for debugging TCP/IP networks and choose the ones that are best for your needs. It also shows you how to approach network troubleshooting using these tools, how to document your network so you know how it behaves under normal conditions, and how to think about problems when they arise so you can solve them more effectively.
Over the years, thousands of tools have been developed for debugging TCP/IP networks. They range from very specialized tools that do one particular task, to generalized suites that do just about everything except replace bad Ethernet cables. Even better, many of them are absolutely free. There's only one problem: who has time to track them all down, sort through them for the best ones for a particular purpose, or figure out how to use them? Network Troubleshooting Tools does the work for you–by describing the best of the freely available tools for debugging and troubleshooting. You can start with a lesser-known version of ping that diagnoses connectivity problems, or take on a much more comprehensive program like MRTG for graphing traffic through network interfaces. There's tkined for mapping and automatically monitoring networks, and Ethereal for capturing packets and debugging low-level problems. This book isn't just about the tools available for troubleshooting common network problems. It also outlines a systematic approach to network troubleshooting: how to document your network so you know how it behaves under normal conditions, and how to think about problems when they arise, so you can solve them more effectively. The topics covered in this book include:
* Understanding your network
* Connectivity testing
* Evaluating the path between two network nodes
* Tools for capturing packets
* Tools for network discovery and mapping
* Tools for working with SNMP
* Performance monitoring
* Testing application layer protocols
* Software sources
If you're involved with network operations, this book will save you time, money, and needless experimentation.

http://uploading.com/files/AGXSVGCQ/Netw0rk_Tr0ubl3shoot_ng_T00ls_Rilwis.tk.rar.html

or
http://rapidshare.com/files/131554382/Netw0rk_Tr0ubl3shoot_ng_T00ls_Rilwis.tk.rar

Tuesday, April 21, 2009

Lynda.com - Photoshop CS4 One-on-One: Fundamentals


Lynda.com - Photoshop CS4 One-on-One: Fundamentals 2.48 GB

with: Deke McClelland
Anyone who is serious about mastering Photoshop CS4 can follow industry expert and Photoshop Hall of Fame member Deke McClelland as he demonstrates this program's powerful tools and photo-altering effects. In Photoshop CS4 One-on-One: Fundamentals, Deke examines the essential capabilities of Photoshop CS4, from making basic color corrections to harnessing the power of the Brush tool.

He also covers retouching, working with layers, using the selection tools, and more. This tips-and-tricks series offers a chance to really learn and understand Photoshop. Exercise files accompany the course.

Rapidshare:
http://rapidshare.com/files/170434962/LAP.CS4.One-on-One.Fundamentals-QUASAR.part01.rar
http://rapidshare.com/files/170435017/LAP.CS4.One-on-One.Fundamentals-QUASAR.part02.rar
http://rapidshare.com/files/170434970/LAP.CS4.One-on-One.Fundamentals-QUASAR.part03.rar
http://rapidshare.com/files/170435179/LAP.CS4.One-on-One.Fundamentals-QUASAR.part04.rar
http://rapidshare.com/files/170435152/LAP.CS4.One-on-One.Fundamentals-QUASAR.part05.rar
http://rapidshare.com/files/170435230/LAP.CS4.One-on-One.Fundamentals-QUASAR.part06.rar
http://rapidshare.com/files/170435217/LAP.CS4.One-on-One.Fundamentals-QUASAR.part07.rar
http://rapidshare.com/files/170435348/LAP.CS4.One-on-One.Fundamentals-QUASAR.part08.rar
http://rapidshare.com/files/170435391/LAP.CS4.One-on-One.Fundamentals-QUASAR.part09.rar
http://rapidshare.com/files/170435393/LAP.CS4.One-on-One.Fundamentals-QUASAR.part10.rar
http://rapidshare.com/files/170435413/LAP.CS4.One-on-One.Fundamentals-QUASAR.part11.rar
http://rapidshare.com/files/170435575/LAP.CS4.One-on-One.Fundamentals-QUASAR.part12.rar
http://rapidshare.com/files/170435146/LAP.CS4.One-on-One.Fundamentals-QUASAR.part13.rar



Megaupload:
http://www.megaupload.com/?d=1EXVV05O
http://www.megaupload.com/?d=SI9WSXEK
http://www.megaupload.com/?d=4MXQD8LC
http://www.megaupload.com/?d=S86NL4JJ
http://www.megaupload.com/?d=FW60UK7F
http://www.megaupload.com/?d=GAWTL9FD
http://www.megaupload.com/?d=RRZ7JHBY
http://www.megaupload.com/?d=7ANTQDLT
http://www.megaupload.com/?d=MHG8BAON
http://www.megaupload.com/?d=HBJTNDUY
http://www.megaupload.com/?d=CPNVI90K
http://www.megaupload.com/?d=YV11DA30
http://www.megaupload.com/?d=SP9JYJWH


pass:irfree.com