Icon
Icon
Icon
Icon
Icon
Icon

Java Game Programing

6:34 AM
0 comments



Attribute Value
CODE
   
Required: The name of the Java class file containing the compiled Appl et
subclass to execute.
WIDTH,
   
Required: The suggested pixel width and height of the area the browser
HEIGHT
   
should reserve for the applet in the Web page.
CODEBAS E
   
The uniform resource locator (URL) of the directory or folder that contains the
applet code. If CODEBAS E is not specified, then the Web browser viewing the
document defaults to the location of the HTML document. COD EBAS E allows
the applet code to be place in a different location than the HTML.
NAME

Download Link

ENTERPRISE AJAX

6:20 AM
0 comments


ENTERPRISE AJAX
Strategies for Building High
Performance Web Applications
Dave Johnson, Alexei White, and
Andre Charland
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as
trademarks. Where those designations appear in this book, and the publisher was aware of a trademark
claim, the designations have been printed with initial capital letters or in all capitals.
The authors and publisher have taken care in the preparation of this book, but make no expressed or
implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed
for incidental or consequential damages in connection with or arising out of the use of the information
or programs contained herein.
The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or
special sales, which may include electronic versions and/or custom covers and content particular to your
business, training goals, marketing focus, and branding interests. For more information, please contact:
U.S. Corporate and Government Sales
(800) 382-3419
corpsales@pearsontechgroup.com
For sales outside the United States, please contact:
International Sales
international@pearsoned.com
Download Link

Social Media

6:19 AM
0 comments



Social Media
or, “How I learned to stop
worrying and love
communication”

“Markets are conversations.

Markets consist of human beings,
not demographic sectors.

Conversations among human beings
sound human. They are conducted in
a human voice.

The internet is enabling
conversations among human beings
that were simply not possible in
the era of mass media.”


The Cluetrain Manifesto “The internet is a powerful tool.
But most attention seems to focus
on its use as a means of vertical
communications: from one to many.

“…But as important as this is — and
it’s very important indeed — it’s
probably dwarfed by the much more
numerous horizontal communications
that the internet, and related
technologies like cell phones, text
message and the like permit. They
allow a kind of horizontal
knowledge that is often less
obvious, but in many ways at least
as powerful, as the vertical kind.

“Horizontal knowledge is
communication among individuals,
who may or may not know each other,
but who are loosely coordinated by
their involvement with something,
or someone, of mutual interest. And
it’s extremely powerful, because it
makes people much smarter.”

Download Link

The Practice of Programming

6:19 AM
0 comments



The Practice of Programming
With the same  insight and authority that made their book The Unix Programming
Environment a classic,  Brian Kernighan and Rob  Pike  have written  The Practice
of Programming  to help make  individual  programmers more  effective and
productive.
The practice of programming  is more  than  just  writing code. Programmers must
also assess  tradeoffs,  choose among design alternatives,  debug and test,  improve
performance,  and maintain  software  written by  themselves  and others.  At  the
same  time,  they must  be  concerned  with  issues  like  compatibility,  robustness,
and reliability, while meeting specifications.
The Practice of Programming covers all  these  topics,  and more. This book  is full
of practical advice and  real-world  examples  in C,  C++,  lava,  and  a  variety  of
special-purpose  languages. It includes chapters on:
debugging:  finding bugs quickly and methodically
testing: guaranteeing that software works correctly and reliably
performance: making programs faster and more compact
portability: ensuring that programs run everywhere without change
design: balancing goals and constraints  to decide which algorithms and data
structures are best
interfaces: using abstraction and information hiding to control the  interactions
between components
style: writing  code that works well and is a pleasure to read
notation:  choosing  languages  and  tools  that  let  the machine  do more of  the
work
Download Link

Webster’s New World® Hacker Dictionary

6:16 AM
0 comments



Webster’s New World® Hacker Dictionary
Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com
Copyright © 2006 by Bernadette Schell and Clemens Martin
Published by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN-13: 978-0-470-04752-1
ISBN-10: 0-470-04752-6
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
1O/QZ/QY/QW/IN
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, elec-
tronic,mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976
United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment
of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers,MA 01923, (978)
750-8400, fax (978) 646-8600.Requests to the Publisher for permission should be addressed to the Legal Department,
Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at
http://www.wiley.com/go/permissions.
Download Link

Nautilus500 Installation Manual

6:15 AM
0 comments



Included Parts
In the accessories bag you will find the
following parts:
1pc. Cool block with 8ft of tubing
(4 ft on each for intake and exhaust)
1pc. AMD Athlon64 (Socket 754, 939, and 940)
retention bracket (2 pc. bracket + 1 pc. screw +
1 pc. metal plate)
1pc. Intel LGA 775 retention bracket
(1 pc. bracket + 4 pc. standoff)
1pc. Intel Socket 478 retention bracket
1pc. Foam Pad
1pc. Syringe with thermal grease
1pc. PCI pass through bracket
with internal 4 pin power connecter
1pc. Power extension cable
2pc. Quick connect self sealing connectors
2pc. Quick grip clamps
1pc. Bottle of coolant
1pc. Operation manual
Attaching the CPU water block
For all types of Central Processing Units  (CPU)
you will need to turn off your system and
disconnect the power. It is recommended to
ground yourself in order to prevent any transfer of
Electrostatic Discharge (ESD) to your system
components while installing the Nautilus500
external water cooling kit. It is required to remove
the current CPU cooling mechanism
from your system prior to installing the
Nautilus500 CPU water block. This includes
removal of the thermal interface material (TIM)
that is used in conjunction with the stock CPU
cooling mechanism. Please see the specific
installation instructions listed below for your
specific type of CPU.
Download Link

CCNA STUDY GUIDE

6:14 AM
0 comments




Congratulations!!
You have purchased a Troy Technologies USA Study Guide.
This study guide is a selection of questions and answers similar to the ones
you will find on the official CCNA exam. Study and memorize the follow-
ing concepts, questions and answers for approximately 15 to 20 hours and
you will be prepared to take the exams.  We guarantee it!
Remember, average study time is 15 to 20 hours and then you are ready!!!
GOOD LUCK!
This study guide and/or material is not sponsored by, endorsed by or affiliated with Cisco
Systems, Inc.  Cisco®, Cisco Systems®, CCDA™, CCNA™, CCDP™, CCNP™,
CCIE™, CCSI™, the Cisco Systems logo and the CCIE logo are trademarks or registered
trademarks of Cisco Systems, Inc. in the United States and certain other countries.  All
other trademarks are trademarks of their respective owners.
Guarantee
If you use this study guide correctly and still fail the exam, send your offi-
cial score notice and mailing address to:
Troy Technologies USA
8200 Pat Booker Rd. #368
San Antonio, TX 78233
We will gladly refund the cost of this study guide. However, you will not
need this guarantee if you follow the above instructions
Download Link

XML Schema Essentials

6:13 AM
0 comments


XML Schema Essentials
Publisher: Robert Ipsen
Editor: Cary Sullivan
Developmental Editor: Scott Amerman
Associate Managing Editor: Penny Linskey
Associate New Media Editor: Brian Snapp
Text Design & Composition: D&G Limited, LLC
Designations used by companies to distinguish their products are often claimed as
trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product
names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact
the appropriate companies for more complete information regarding trademarks and
registration.
This book is printed on acid-free paper.
Copyright © 2002 by R. Allen Wyke and Andrew Watt. All rights reserved.
Published by John Wiley & Sons, Inc.
Published simultaneously in Canada.No part of this publication may be reproduced, stored in a retrieval system or transmitted
in any form or by any means, electronic, mechanical, photocopying, recording, scanning or
otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copy-
right Act, without either the prior written permission of the Publisher, or authorization
through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222
Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the
Publisher for permission should be addressed to the Permissions Department, John Wiley
& Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-
6008, E-Mail: PERMREQ @ WILEY.COM.
Download Link

MySQL Database

6:12 AM
0 comments



Creating your MySQL Database:
Practical Design Tips and
Techniques
A short guide for everyone on how to structure their
data and set up their MySQL database tables eficiently
and easily
Copyright © 2006 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written
permission of the publisher, except in the case of brief quotations embedded in
critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of
the information presented. However, the information contained in this book is sold
without warranty, either express or implied. Neither the author, Packt Publishing,
nor its dealers or distributors will be held liable for any damages caused or alleged to
be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all the
companies and products mentioned in this book by the appropriate use of capitals.
However, Packt Publishing cannot guarantee the accuracy of this information.
First published: November 2006
Production Reference: 1141106
Published by Packt Publishing Ltd.
32 Lincoln Road Olton Birmingham, B27 6PA, UK.
ISBN 1-904811-30-2
www.packtpub.com
Download Link

Ajax In Action

6:11 AM
0 comments



Ajax in Action
DAVE CRANE ERIC PASCARELLO
WITH DARREN JAMES


For online information and ordering of this and other Manning books, please go to
www.manning.com. The publisher offers discounts on this book when ordered in quantity.
For more information, please contact:
Special Sales Department
Manning Publications Co.
209 Bruce Park Avenue Fax: (203) 661-9018
Greenwich, CT 06830 email: orders@manning.com
©2006 by Manning Publications Co. All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted,
in any form or by means electronic, mechanical, photocopying, or otherwise, without
prior written permission of the publisher.
Many of the designations used by manufacturers and sellers to distinguish their products
are claimed as trademarks. Where those designations appear in the book, and Manning
Publications was aware of a trademark claim, the designations have been printed in initial
caps or all caps.
Recognizing the importance of preserving what has been written, it is Manning’s policy
to have the books they publish printed on acid-free paper, and we exert our best efforts
to that end
Download Link

Cisco Security Setup

6:10 AM
0 comments



Introduction
This paper is the first in a three-part series of white papers, each of which focuses on a functional area of
securing your network. The three papers work together to create a complete picture of how to configure your
network appliances for complete corporate security. It will discuss a starting point for network security, sug-
gested technology types, ideal points for securing your network using a layered approach, and secure ways to
manage your new or existing network.
This first paper in the series introduces concepts to get started on network security and begin the process of
securing your network at the switch level.
Security Policy: Start at the Beginning
Security is one of the fastest growing branches within the networking industry, and current trends point to a
steady increase in growth over the years to come. This is largely due to the integration of so many critical data
types over a single network and the increased realization by companies as to just how vulnerable their net-
works can be.With security becoming such a focal point of networks, it is increasingly important to understand
how to integrate security into a network.
As with any new project, you must start with some direction. I’m sure you have heard the adage, “If you fail to
plan, then you plan to fail.” This is never more true than when planning network security. Create your security
policy to serve as a starting point and future road map for securing your corporation.
A security policy, originally defined in request for comment (RFC) 2196 and now updated in RFC 3704, con-
tains the whys, whats, and hows of securing your corporate environment.
Download Link

C++ Professional Programer's

6:08 AM
0 comments



ANSI/ISO C++ Professional
Programmer's Handbook
The precursors of object-oriented programming can be traced back to the late 1960's: Classes, inheritance
and virtual member functions were integral features of Simula67, a programming language that was
mainly used for writing event-driven simulations. When Smalltalk first appeared back in 1972, it offered
a pure object-oriented programming environment. In fact, Smalltalk defined object-oriented
programming. This style of programming was so innovative and revolutionary at the time that it took
more than a decade for it to become a standard in the software industry. Undoubtedly, the emergence of
C++ in the early '80s provided the most considerable contribution to this revolution.
The Origins of C++
In 1979, a young engineer at Bell (now AT&T) Labs, Bjarne Stroustrup, started to experiment with
extensions to C to make it a better tool for implementing large-scale projects. In those days, an average
project consisted of tens of thousands of lines of code (LOC).
Download Link

Voic XML2.0

6:05 AM
0 comments



VoiceXML 2.0
Developer’s Guide
Building Professional Voice-Enabled
Applications with JSP™
, ASP, & ColdFusion®
About the Authors
Charul Shukla is a senior programmer at DreamTech Software India, Inc. He has an
excellent track record designing and implementing large-scale applications for the latest
environments. An expert in web-based development and voice-based applications, he is
actively engaged in designing and developing solutions using VoiceXML and related
technologies.
Avnish Dass and Vikas Gupta are the co-founders of DreamTech Software India, Inc.
Avnish is a talented and seasoned programmer with 15 years of experience in systems and
database programming. He has developed numerous security systems, anti-virus programs,
wireless and communication technologies, and voice-based solutions. Vikas holds a B.E. in
electronics, with postgraduate degrees in sales and marketing and in Publishing and Printing
Studies. He is currently engaged in developing and designing new technologies for wireless
and voice-based applications, e-learning, and other cutting-edge areas.
Download Link

Practical Web 2.0 Applications with PHP

6:05 AM
0 comments

Practical Web 2.0 Applications with PHP


Practical Web 2.0
Applications with PHP
Practical Web 2.0 Applications with PHP
Copyright © 2008 by Quentin Zervaas
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any information storage or retrieval
system, without the prior written permission of the copyright owner and the publisher.
ISBN-13 (pbk): 978-1-59059-906-8
ISBN-10 (pbk): 1-59059-906-3
ISBN-13 (electronic): 978-1-4302-0474-9
ISBN-10 (electronic): 1-4302-0474-5
Printed and bound in the United States of America 9 8 7 6 5 4 3 2 1
Trademarked names may appear in this book. Rather than use a trademark symbol with every occurrence
of a trademarked name, we use the names only in an editorial fashion and to the benefit of the trademark
owner, with no intention of infringement of the trademark.
Lead Editor: Ben Renow-Clarke
Technical Reviewer: Jeff Sambells
Editorial Board: Steve Anglin, Ewan Buckingham, Tony Campbell, Gary Cornell, Jonathan Gennick,
Jason Gilmore, Kevin Goff, Jonathan Hassell, Matthew Moodie, Joseph Ottinger, Jeffrey Pepper,
Ben Renow-Clarke, Dominic Shakeshaft, Matt Wade, Tom Welsh
Project Manager: Richard Dal Porto
Copy Editors: Andy Carroll, Kim Wimpsett
Assistant Production Director: Kari Brooks-Copony
Production Editor: Liz Berry
Compositor: Diana Van Winkle
Proofreader: Lisa Hamilton
Indexer: Broccoli Information Management
Artist: Diana Van Winkle
Cover Designer: Kurt Krames
Manufacturing Director: Tom Debolski
Distributed to the book trade worldwide by Springer-Verlag New York, Inc., 233 Spring Street, 6th Floor,
New York, NY 10013. Phone 1-800-SPRINGER, fax 201-348-4505, e-mail orders-ny@springer-sbm.com, or
visit http://www.springeronline.com.
For information on translations, please contact Apress directly at 2855 Telegraph Avenue, Suite 600,
Berkeley, CA 94705. Phone 510-549-5930, fax 510-549-5939, e-mail info@apress.com, or visit
http://www.apress.com.
The information in this book is distributed on an “as is” basis, without warranty. Although every precaution
has been taken in the preparation of this work, neither the author(s) nor Apress shall have any liability to any
person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by
the information contained in this work.
The source code for this book is available to readers at http://www.apress.com.
Download Link