Advertisement

Using OpenMP Portable Shared Memory Parallel Programming - MIT Press

I hope that readers will learn to use the full expressibility and power of OpenMP. This book should provide an excellent introduction to beginners, and the performance section should help those with some experience who want to push OpenMP to its limits.

–from the foreword by David J. Kuck, Intel Fellow, Software and Solutions Group, and Director, Parallel and Distributed Solutions, Intel Corporation

OpenMP, a portable programming interface for shared memory parallel computers, was adopted as an informal standard in 1997 by computer scientists who wanted a unified model on which to base programs for shared memory systems. OpenMP is now used by many software developers; it offers significant advantages over both hand-threading and MPI. Using OpenMP offers a comprehensive introduction to parallel programming concepts and a detailed overview of OpenMP.

Using OpenMP discusses hardware developments, describes where OpenMP is applicable, and compares OpenMP to other programming interfaces for shared and distributed memory parallel architectures. It introduces the individual features of OpenMP, provides many source code examples that demonstrate the use and functionality of the language constructs, and offers tips on writing an efficient OpenMP program. It describes how to use OpenMP in full-scale applications to achieve high performance on large-scale architectures, discussing several case studies in detail, and offers in-depth troubleshooting advice. It explains how OpenMP is translated into explicitly multithreaded code, providing a valuable behind-the-scenes account of OpenMP program performance. Finally, Using OpenMP considers trends likely to influence OpenMP development, offering a glimpse of the possibilities of a future OpenMP 3.0 from the vantage point of the current OpenMP 2.5.

With multicore computer use increasing, the need for a comprehensive introduction and overview of the standard interface is clear. Using OpenMP provides an essential reference not only for students at both undergraduate and graduate levels but also for professionals who intend to parallelize existing codes or develop new parallel programs for shared memory

Download here

Password: knowfree.net

The Book of Overclocking - Tweak Your PC to Unleash Its Power

The definitive guide to overclocking — the art of running a PC's processor faster than the manufacturer intended.

**Winner of the Books24×7 Referenceware Excellence Award, Hardware category, April 2004**

If you don't mind voiding the manufacturer's warranty on your CPU, overclocking is for you. Learn how not to fry your system while souping up everything from the Pentium II to the latest Athlon XP and Pentium 4. Sections on cooling, troubleshooting, and benchmarking make sure you get the most out of your machine.

Download Here

Radius - O’Reilly

RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS protocol. Author Jonathan Hassell brings practical suggestions and advice for implementing RADIUS and provides instructions for using an open-source variation called FreeRADIUS.


Download Here

Linksys WRT54G Ultimate Hacking

This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.
Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system.

*Never before seen and documented hacks, including wireless spectrum analysis

*Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform

*Full coverage on embedded device development using the WRT54G and OpenWRT

Download here

Password: knowfree.net

Computer Architecture, Fourth Edition: A Quantitative Approach

The era of seemingly unlimited growth in processor performance is over: single chip architectures can no longer overcome the performance limitations imposed by the power they consume and the heat they generate. Today, Intel and other semiconductor firms are abandoning the single fast processor model in favor of multi-core microprocessors–chips that combine two or more processors in a single package. In the fourth edition of Computer Architecture, the authors focus on this historic shift, increasing their coverage of multiprocessors and exploring the most effective ways of achieving parallelism as the key to unlocking the power of multiple processor architectures. Additionally, the new edition has expanded and updated coverage of design topics beyond processor performance, including power, reliability, availability, and dependability.

Download Here

Hardware Bible 6th Edition

The Winn L. Rosch Hardware Bible provides a background on how things work, puts competing technologies, standards, and products in perspective, and serves as a reference that provides quick answers for common computer and technology questions. It functions as a buying guide, telling not only what to buy, but why. It also lays the foundation for upgrading or repairing a computer, but stops short of the step-by-step mechanics of the process. The chief purpose of the Hardware Bible remains educational. Some new features in this edition include rewritable DVD technology as well as Blu-ray Discs, wireless networking including 802.11a and 802.11b, Bluetooth wireless communications, and extended coverage of digital cameras, scanners, and telecommunications…and much more!
One way is by reading the book you hold in your hand. It's designed to help you understand all the technologies that underlie the modern personal computer and all its peripherals that help make it useful. Although you won't be able to design a computer when you're finished (that is, unless you already knew how to when you started), you will know what it takes to design one, how computers work, and how you can work better with them—and get them to do more for you. It doesn't matter if you regard a screwdriver as a tool, an instrument of torture, or a new curiosity you've never before encountered. Even if you have no technical background whatsoever, this book will guide you to a level of understanding that will let you buy, use, and upgrade your computer with confidence. At the same time, you'll find all the technical information that you need to do a school report or business presentation on nearly any current computer topic.


TABLE OF CONTENT:
Part 1 - Introduction
Part 2 - Processing
Part 3 - Communications
Part 4 - Storage
Part 5 - Human Interface
Part 6 - Infrastructure

Download Here

Password:ganelon

Hardware Hacking : Have Fun while Voiding your Warranty

If I had this book 10 years ago, the FBI would never have found me!" — Kevin Mitnick This book has something for everyone—from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include:

* Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help"
* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case
* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players
* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development
* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC
* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point
* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader
* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB
· Includes hacks of today's most popular gaming systems like Xbox and PS/2.
· Teaches readers to unlock the full entertainment potential of their desktop PC.
· Frees iMac owners to enhance the features they love and get rid of the ones they hate.

Download Here

The Nintendo Wii Pocket Guide

Here is your essential companion to the best-selling Wii game console. The Nintendo Wii Pocket Guide steers you through how to

-Set up your Wii and connect it to your network.
-Make your way around the Wii Channels.
-Pick and use Wii controllers,including the Wii Remote, Nunchuk, and Classic and GameCube controllers.
-Create and edit your own Mii—using Wii software or third-party tools—and take charge of other Miis.
-Go beyond games and use the Wii to browse the Internet, send and receive email, set parental controls, and create memos and calendars.
-Shop the Wii Shop Channel and buy and spend Wii Points to purchase Virtual Console games.
-Choose the best Wii games and play older Nintendo games on the Wii.
-Find handy accessories.
-Tinker with your Wii to get the most out of the game console.

Download Here

SystemVerilog for Design: A Guide to Using SystemVerilog for Hardware Design and Modeling

SystemVerilog is a rich set of extensions to the IEEE 1364-2001 Verilog Hardware Description Language (Verilog HDL). These extensions address two major aspects of HDL-based design. First, modeling very large designs with concise, accurate, and intuitive code. Second, writing high-level test programs to efficiently and effectively verify these large designs.

The first edition of this book addressed the first aspect of the SystemVerilog extensions to Verilog. Important modeling features were presented, such as two-state data types, enumerated types, user-degined types, structures, unions, and interfaces. Emphasis was placed on the proper usage of these enhancements for simulation and synthesis.

SystemVerilog for Design, Second Edition has been extensively revised on a chapter by chapter basis to include the many text and example updates needed to reflect changes that were made between the first edition of this book was written and the finalization of the new standard. It is important that the book reflect these syntax and semantic changes to the SystemVerilog language.

In addition, the second edition features a new chapter that explanis the SystemVerilog “packages”, a new appendix that summarizes the synthesis guidelines presented throughout the book, and all of the code examples have been updated to the final syntax and rerun using the latest version of the Synopsys, Mentor, and Cadance tools.

Download Here

Microcontroller Programming: The Microchip PIC

Using the popular and pervasive mid-range 8-bit Microchip PIC® as an archetype, Microcontroller Programming offers a self-contained presentation of the multidisciplinary tools needed to design and implement modern embedded systems and microcontrollers. The authors begin with basic electronics, number systems, and data concepts followed by digital logic, arithmetic, conversions, circuits, and circuit components to build a firm background in the computer science and electronics fundamentals involved in programming microcontrollers. For the remainder of the book, they focus on PIC architecture and programming tools and work systematically through programming various functions, modules, and devices.

Download Here

Mirror

Institutionalization of Usability A Step-by-Step Guide

At one time, computer hardware was the key differentiator in information technology—what gave an organization its competitive edge. Then, as hardware prices fell, software took center stage. Today, software has become a broadly shared commodity, and a new differentiator has emerged—usability. Applications, including Web sites, are usable if they are practical, useful, easy to work with, and satisfying. Usability is now the factor likeliest to give an organization a distinct advantage.

Institutionalization of Usability shows how to make user-centered design and development a routine practice within an enterprise. Other excellent books explain precisely how to make software usable; this book builds on that foundation, and focuses instead on how to get usability recognized and incorporated into an organization's values and culture. Based on author Eric Schaffer's extensive experience, the book provides a solid methodology for institutionalizing usability, guiding readers step by step with practical advice on topics like organizational change, milestones, toolsets, infrastructure, and staffing requirements needed to achieve fully mature usability engineering.

Download here

Password:www.ebooksportal.org

PC Repair Bench Book - Wiley

-A get-in, get-out Power Pack guide that focuses strictly on what PC technicians and serious hobbyists need to know to maintain, upgrade, and repair PCs
-Each chapter focuses on one particular hardware feature, briefly explaining its design, operation, characteristics, features, and purpose, with information and tips on installing, upgrading, troubleshooting, diagnosing, and problem solving
-Highly-illustrated approach-at least one figure for every two pages
-Find-a-Fix tool takes readers through all the most common symptoms of computer problems, helps them refine a diagnosis, and provides immediate solutions
-Ron Gilster is bestselling author of A+ Certification For Dummies, Second Edition (0-7645-0812-1) with more than 250,000 copies sold in all editions
-CD-ROM provides valuable diagnostic software, searchable text of the entire book and Find-a-Fix tool

Download here
Password : www.ebooksportal.org

Building the Perfect PC, Second Edition - O’Reilly

This popular Build-It-Yourself (BIY) PC book covers everything you want to know about building your own system: Planning and picking out the right components, step-by-step instructions for assembling your perfect PC, and an insightful discussion of why you'd want to do it in the first place. Most big brand computers from HP, Dell and others use lower-quality components so they can meet their aggressive pricing targets. But component manufacturers also make high-quality parts that you can either purchase directly, or obtain through distributors and resellers. Consumers and corporations alike are opting to build rather than buy PCs to ensure high quality and compatibility.
The new edition of Building the Perfect PC shows you how to construct a variety of top-flight systems with the latest technology, including AMD Socket AM-2 and Intel Core 2 processors, that are Vista- and Linux-ready. The book includes several new options, including:

A Budget PC you can build for approximately $350 that offers performance and reliability similar to that of mainstream systems

A full-blown media-center system that runs Linux and MythTV or Windows MCE with multiple tuners and HDTV support

A fire-breathing high-performance gaming system

A fast, low-power, low-heat, low-noise, Small Form Factor system (the size of a shoe box)

A low-cost SOHO (small office, home office) server system with a 2 terabyte (2,000 GB) disk subsystem that's suitable for a residential environment rather than a server closet

Regardless of your technical experience, Building the Perfect PC will guide you through the entire process of building or upgrading your own computer. You'll use the latest top-quality components, including Intel's Core 2 Duo and AMD's Athlon X2 CPUs. And you'll know exactly what's under the hood and how to fix or upgrade your PC, should that become necessary. Not only is the process fun, but the result is often less expensive and always better quality and far more satisfying than anything you could buy off the shelf.

Download here
Password : www.ebooksportal.org

The Focal Easy Guide to Premiere Pro : For New Users and Professionals - Focal Press

This highly illustrated, full color book tells you all you need to know to get up and running quickly using Adobe Premiere Pro to achieve professional results. It covers the essentials, so you can apply the knowledge to your project immediately.
All the important areas are covered: set up, the interface, editing, effects, integration with other Adobe products, and finishing.

An invaluable first read for users of all levels who want to achieve professional results.
* Companion web site with information on Premiere Pro 1.5
* Get up and running with Premiere Pro quickly
* Clear and concise coverage in full color

Download here
Password : www.ebooksportal.org

PC Hardware Interfaces: A Developer’s Reference - A-List Publishing

Focusing on the latest research on hardware interfaces used in modern information technology, this reference covers universal external interfaces, peripheral device interfaces, external memory interfaces, expansion buses, wireless interfaces, network interfaces, and auxiliary serial interfaces. Specific technologies covered include LPT, COM, USB, FireWire, SCSI, mouse, monitor, printer, audio and video interfaces, Serial ATA and flash cards, ISA, PCI, EISA, PC/104, AGP, LPC, PCMCIA, CardBus, Bluetooth, SPI, MII, SMI, JTAG, and Ethernet. Also included is information on signal line definitions and signal arrangement on I/O connectors, time diagrams, adapters (ATA and NIC), controllers (DMA, PCI IDE, and FDC AT), interrupts, and multifunction cards.

Download Here

Password: www.ebooksportal.org

PC Repair and Maintenance: A Practical Guide - Charles River Media

PC Repair and Maintenance: A Practical Guide is a reader-friendly guide to repairing computers (running either Microsoft Windows 95, 98, Me, 2000, or XP) through easy-to-understand language, detailed diagrams, and video tutorials. The book emphasizes that a deep understanding of “how a computer works” is not necessary to diagnose and repair problems; it concentrates on practical, “hands-on” solutions that can be implemented right away. Focusing mainly on installing and troubleshooting hardware, the book also provides solutions to common operating system-related problems. In addition, thorough explanations for selecting re-placement and expansion components without paying top dollar are providedhelping users get the most out of their newly repaired PC. Regardless of your level of experience, this is the perfect resource for anyone who wants to repair a computer or is considering a career in the computer repair business.

Download Here

Password: www.ebooksportal.org

Performance by Design: Computer Capacity Planning By Example - Prentice Hall

Computing systems must meet increasingly strict Quality of Service (QoS) requirements for performance, availability, security, and maintainability. To achieve these goals, designers, analysts, and capacity planners need a far more thorough understanding of QoS issues, and the implications of their decisions. Now, three leading experts present a complete, application-driven framework for understanding and estimating performance. You’ll learn exactly how to map real-life systems to accurate performance models, and use those models to make better decisions–both up front and throughout the entire system lifecycle. Coverage includes:
  • State-of-the-art quantitative analysis techniques, supported by extensive numerical examples and exercises
  • QoS issues in requirements analysis, specification, design, development, testing, deployment, operation, and system evolution
  • Specific scenarios, including e-Business and database services, servers, clusters, and data centers
  • Techniques for identifying potential congestion at both software and hardware levels
  • Performance Engineering concepts and tools
  • Detailed solution techniques including exact and approximate MVA and Markov Chains
  • Modeling of software contention, fork-and-join, service rate variability, and priority

Download Here

Password: www.ebooksportal.org

PC Hacks

More, better, faster, cheaper, easier, cooler, safer. All of these and more capture our desire to understand and get the most out of the investment we’ve made in our PCs. From making a PC boot faster, to improving its reliability, to using multiple operating systems, to being able to recover quickly when something goes wrong, the PC hacks in this book will improve your PC experience and make you a lot more computer-savvy.The term hacking has a bad reputation in the press. They use it to refer to someone who breaks into systems or wreaks havoc with computers as their weapon. Among people who write code, though, the term hack refers to a “quick-and-dirty” solution to a problem or a clever way to get something done. And the term hacker is taken very much as a compliment, indicating that someone is being creative, having the technical chops to get things done. The Hacks series is an attempt to reclaim the word, document the good ways people are hacking, and pass the hacker ethic of creative participation on to the uninitiated. Seeing how others approach systems and problems is often the quickest way to learn about a new technology.
Since you’ll be hacking your PC, and it probably contains all your data, never more than ever are you most strongly encouraged to follow three basic tenets of PC ownership: back up, Back Up, and BACK UP! While we won’t intentionally lead you through a hack that will harm your system, life with a PC is not a matter of if your system will crash, but when. Backups, system restore points, software and hardware installation disks, and printouts of hard-to-remember or obscure details are very handy to keep safe but close at hand should you need them.


TABLE OF CONTENT:
Chapter 01 - Basic System Board Hacks
Chapter 02 - Basic System Board Setup
Chapter 03 - CPU Hacks
Chapter 04 - Memory Hacks
Chapter 05 - Disk Hacks
Chapter 06 - Disk Drive Performance Hacks
Chapter 07 - Video Hacks
Chapter 08 - I/O Device Hacks
Chapter 09 - Boot-Up Hacks
Chapter 10 - Configuring a New PC

Download here

Password: ganelon

Palm & Treo Hacks - Tips & Tools For Mastering Your Handheld

Palm OS is one of the most popular handheld operating systems on the planet. From the newest Tungstens and Treos all the way down the family tree, Palms are everywhere. Although the Palm OS is simple to learn and use, there is more to it than meets the eye–from new features in the Palm to capabilities you can get with add-on software, the Palm can be made to do quite a lot.

Download here

Password:www.ebooksportal.org

USB Mass Storage Designing and Programming Devices and Embedded Hosts

This developer's guide for designers and programmers of mass-storage devices that use the Universal Serial Bus (USB) interface provides developers with information on how to choose storage media, interface the media to a microcontroller or other CPU, and write device firmware to access the media and perform USB communications. Comparisons of popular storage-media options to help users choose a media type for a project are included, and the types described cover hard drives and flash-memory cards such as the MultiMediaCard (MMC), Secure Digital (SD) card, and CompactFlash card. Helpful tips on developing an embedded host that can access USB mass-storage devices are also covered.



Download Here

Password: www.ebooksportal.org

Upgrading and Repairing PCs 17th Edition

Be a part of the best-selling Upgrading and Repairing series with the latest edition of the flagship book, Upgrading and Repairing PCs. Author Scott Mueller has taught thousands in his seminars and millions through his books, videos and articles. Since 1988, everyon from PC technicians and students to hobbyists, have turned to Scott Mueller’s Upgrading and Repairing PCs books for help with computer problems. Upgrading and Repairing PCs, 17th Edition includes new and updated content covering the latest processors, motherboards, memory, and more, including a fully-loaded DVD with new video and reference material.

Download Here

Hardware Design Verification Simulation and Formal Method Based Approaches - Prentice Hall

As digital logic designs grow larger and more complex, functional verification has become the number one bottleneck in the design process. Reducing verification time is crucial to project success, yet many practicing engineers have had little formal training in verification, and little exposure to the newest solutions. Hardware Design Verification systematically presents today’s most valuable simulation-based and formal verification techniques, helping test and design engineers choose the best approach for each project, quickly gain confidence in their designs, and move into fabrication far more rapidly. College students will find that coverage of verification principles and common industry practices will help them prepare for jobs as future verification engineers.

Author William K. Lam, one of the world’s leading experts in design verification, is a recent winner of the Chairman’s Award for Innovation, Sun Microsystems’ most prestigious technical achievement award. Drawing on his wide-ranging experience, he introduces the foundational principles of verification, presents traditional techniques that have survived the test of time, and introduces emerging techniques for today’s most challenging designs. Throughout, Lam emphasizes practical examples rather than mathematical proofs; wherever advanced math is essential, he explains it clearly and accessibly.

Download Here

Password: www.ebooksportal.org

USB System Architecture (USB 2.0) - Addison Wesley

The MindShare Architecture Series The MindShare Architecture book series includes: ISA System Architecture, EISA System Architecture, 80486 System Architecture, PCI System Architecture, Pentium System Architecture, PCMCIA System Architecture, PowerPC System Architecture, Plug-and-Play System Architecture, CardBus System Architecture,

Protected Mode Software Architecture, Pentium Pro and Pentium II System Architecture, USB System Architecture, FireWire System Architecture, PCI-X System Architecture, and AGP System Architecture. The book series is published by Addison-Wesley. Rather than duplicating common information in each book, the series uses the building-block approach. ISA System Architecture is the core book upon which the others build. Table 1 on page 1 illustrates the relationship of the books to each other. Cautionary Note The reader should keep in mind that MindShare’s book series often deals with rapidly-evolving technologies. This being the case, it should be recognized that the book is a “snapshot” of the state of the targeted technology at the time that the book was
completed. We attempt to update each book on a timely basis to reflect changes in the targeted technology, but, due to various factors (waiting for the next version of the spec to be “frozen,” the time
necessary to make the changes, and the time to produce the books and get them out to the distribution channels), there will always be a delay. Specifications This Book is Based On This book is based on the Universal Serial Bus 2.0 specification


Download Here
Password:
www.ebooksportal.org

The A+ Certification And PC Repair Handbook - CRM

Many A+ certification guides prepare aspiring PC technicians to pass the exam, but don’t put test objectives in a “practical use” context. Other PC repair guides cover A+ exam objectives in a real-world setting, but don’t prepare students well enough to pass the test and get certified. The A+ Certification and PC Repair Handbook solves this problem by combining a complete test preparation for the new A+ examinations (220-301 and 220-302) with a hands on guide that reflects how the A+ exam questions apply to real-world PC repair problems. The book teaches users how to install and troubleshoot hardware, and provides solutions to common operating system-related problems for machines running Microsoft Windows 9x, Me, 2000, and XP. Each chapter includes numerous diagrams and photographs, and explains PC repair techniques using easy-to-understand language and accessible terms. For each chapter explaining these PC repair tactics, another chapter is included on how to effectively pass the corresponding portion of the A+ exam, with sample exam questions based on the actual tests. Test-taking techniques are also covered, including the test’s recent return to conventional linear testing, as opposed to the adaptive format of previous years. The book’s companion CD-ROM contains video tutorials that illustrate PC repair techniques, and full-length, timed, 80-question conventional practice tests covering both modules (Core Hardware and OS Technology) of the A+ certification exam.



Download Here
Password:
www.ebooksportal.org

Repairing and Upgrading Your PC

Most computer users think that fiddling with the insides of their PC is taboo. They fear that by removing the screws that hold the case on, they’re crossing into forbidden territory. And even for those who know they can open the box and fix or upgrade their PC, analysis paralysis often stops them in their tracks:

Which upgrades offer the best bang for the buck? How do you
pinpoint the faulty component that’s making your system freeze? What about compatibility issues?

Get ready to get unstuck and get your PC running fast and running right. Repairing and Upgrading Your PC delivers start-to-finish instructions, simple enough for even the most inexperienced PC owner, for troubleshooting, repairing, and upgrading your computer. Written by hardware experts Robert Bruce Thompson and Barbara Fritchman Thompson, this book covers it all: how to troubleshoot a troublesome PC, how to identify which components make sense for an upgrade, and how to tear it all down and put it back together. This book shows how to repair and upgrade all of your PC’s essential components:

* Motherboard, CPU, and Memory. Choose the optimal match of these core components to keep your PC running at top speed

* Hard Drive, Optical Drive, and Removable Storage

* Give your computer what it needs for long-term and short-term storage

* Audio and Video. Enhance your computing experience with the right sound and graphics devices for your needs

* Input Devices. Pick the best keyboard and mouse to keep your hands happy and healthy

* Networking. Set up secure wireless networking to keep the bits flowing between your computers and the outside world

* Cases and Power Supplies. Keep everything running cool and reliably



Download here

Password: www.ebooksportal.org

PSP Hacks : Tips & Tools for Your Mobile Gaming and Entertainment Handheld

Sure, it’s just what you’ve been clamoring for: an ultra slick, portable version of the most popular console gaming system in the world. But Sony’s new PlayStation Portable (PSP) isn’t just a handheld gaming device. Beyond its killer graphics and spectacular widescreen LCD for unparalleled game play, it also sports wireless connectivity and a variety of multimedia features, including video, music, and digital photography. Your wildly versatile, endlessly powerful PSP practically begs you to hack and repurpose it to your liking.

To save you the trouble and show you how to make the PSP do more than you ever imagined–and more than Sony ever intended–PSP Hacks is one succinct volume of 50 of the coolest, most useful, up-to-the-minute hacks for this amazing device. You’ll learn how to open your PSP’s hardware and what to safely plug into it. You’ll explore and put to good use every hidden feature of the device. You’ll be able to move all sorts of multimedia onto your PSP and find ways to extend its wireless capabilities. And you’ll find out how to get the very best experience out of online game play.

With PSP Hacks, you can accomplish a whole lot more than good gaming on the PSP. You’ll quickly learn to surf the Web with a PSP, chat in IRC, and use the PSP to read web comics, ebooks, and RSS feeds. Other expert tips and tools allow you to sync an address book to your PSP, watch UMD movies, fool iTunes into thinking the PSP is an iPod Shuffle, and much more.

The innovative hacks, tweaks, and how-tos in this essential guide make it easy to customize your PSP, take full advantage of features, capabilities, and functionality far beyond what’s listed in the PSP user manual, and make your PSP perform countless tricks that only an all-in-one portable entertainment unit as remarkable and revolutionary as this one could.


Download Here
Pass : www.ebooksportal.org

Build the Ultimate Custom PC

Take control of your PC! Why do they load up a PC with stuff you don’t need and leave off the things you really want? Don’t take it anymore!
Grab a screwdriver and let these two experts show you how to build the PC of your dreams, even if you’ve never cracked a case before. You’ll learn to choose the right components, install them safely, test your system, find the best prices on parts, and even trick out your new machine with some cool tweaks and mods. Plenty of illustrations and step-by-step directions make it easy, and you just might make your wallet happy, too. How to build what you want Oh, the things you’ll learn! Safety first it’s Chapter 1 Choose your tools Powering this puppy Motherboard knows best RAM it into drive(s) Video and sound are in the cards Bringing your PC to life Testing! Testing! Operate on Windows ; XP Warranties in English


SaveDownload Here

Password : www.ebooksportal.org

J2ME Game Programming

Have you ever seen players? eyes light up as they explore the worlds that you?ve created in your games? If you have, then game development probably has you hooked firmly in its grasp! If you?ve never taken your games beyond the PC, now's the time! "J2ME Game Programming" is a hands-on guide that teaches you how to create games for micro-devices. You?ll be amazed at just how cool the games you create can look and play. Focusing primarily on mobile phone game creation, you?ll jump right in and create your own games as you work your way through the book. The thought has surely crossed your mind that it would be nice to make some money off of this cool hobby of yours. J2ME offers real opportunity to profit from your games. Learn how you can earn revenue from your games by taking them to market. If you have a basic understanding of Java, then you?re ready to explore all that "J2ME Game Programming" has to offer!

Download Here

J2ME in a Nutshell

J2ME in a Nutshell provides a solid, no-nonsense reference to the "alphabet soup" of micro edition programming, covering the CLDC, CDC, KVM and MIDP APIs. The book also includes tutorials for the CLDC, KVM, MIDP and MIDlets, MIDlet user interfaces, networking and storage, and advice on programming small handhelds. Combined with O'Reilly's classic quick reference to all the core micro-edition APIs, this is the one book that will take you from curiosity to code with no frustrating frills in between.

Convergent Architecture Building Model-Driven J2EE Systems with UML

The only complete technical guide to building integrated business systems using the convergent architecture approach
In his groundbreaking Business Engineering with Object Technology (0-471-04521-7), David Taylor introduced the concept of convergent architecture (CA), a framework for building the business design directly into the software systems that support it. Now, in this important follow-up to that 1995 classic, expert Richard Hubert provides systems developers and architects with their first complete blueprint for building integrated CA business systems using the hottest technologies, including Enterprise JavaBeans, XML, UML, Rational Rose, and others. Following a detailed introduction to the elements of CA, he walks readers through the entire CA design and implementation process, using examples in Java and EJB to illustrate key points.
Companion Website provides hands-on tutorials, links to related tool sites, and updates to the CA methodology.

Download here

Password:www.ebooksportal.org

Pro J2ME Polish Open Source Wireless Java Tools Suite - Apress

Pro J2ME Polish: Open Source Wireless Java Tools Suite is written for wireless and other mobile Java programmers who want to “polish” their efficiency and acquire in-depth knowledge about programming real-world J2ME applications. It also uncovers all common device limitations and quirks, and explains how these can be circumvented.

The book describes the Open Source tools collection, “J2ME Polish,” and shows how the tools can be used for creating professional J2ME applications. Building multiple devices and multiple locales is easy after studying this book. Author Robert Virkus offers tips about the more hidden features of J2ME Polish, like the logging framework, the preprocessor, and the game-engine. You will learn to polish up your applications with the powerful GUI that enables you to design standard J2ME applications with simple CSS text files. You’ll also learn to write portable, fast applications while using all available features on your target devices simultaneously.

Download here

Password:www.ebooksportal.org

MIDP 2.0 Style Guide For J2ME

MIDP 2.0 Style Guide for the Java2 Platform, Micro Edition, is the comprehensive reference for designing and creating interactive Java applications for consumer-oriented mobile devices. Readers learn how to best exploit MIDP 2.0 features, such as the gaming API, multimedia, and security for user-friendly MIDlets. Readers who create MIDP environments (MIDP implementors) also learn how to best support developers and users.

This book begins by introducing readers to the unique requirements of the consumer market and to the characteristics of MIDs and the MIDP 2.0 environment. Readers have a first look at the process of designing applications for MIDP in general terms before examining the nuts and bolts of creating usable, predictable applications. The authors provide user interface designers, application developers, and MIDP implementers with clearly illustrated standards for working with screen layouts, lists, text boxes, forms,
alerts, canvas screens, and game screens. Visual examples demonstrate both what does and what does not work. The book ends with the authors’ strategies for improving usability, security, and performance.

Download Here
Password:
www.ebooksportal.org

Enterprise J2ME Developing Mobile Java Applications - Prentice Hall

Industrial-strength J2ME for enterprise developers, architects, and decision-makers J2ME offers an extraordinarily flexible and robust platform for developing mobile applications with enterprise-class performance, reliability, and value. Now, leading mobile developer

Michael Yuan covers every aspect of building industrial-strength applications with J2ME: design, architecture, tools, processes, business issues, and more. Yuan introduces innovations that make the platform even more powerful, ranging from new J2ME profiles and wireless messaging APIs to mobile databases and web services tools. These innovations allow existing Java developers (especially J2EE developers) to leverage their skills and add mobility to enterprise applications. Yuan also presents more than a dozen complete sample applications-;including the application that earned him the grand prize
in Nextel, Sun, and Motorola’s nationwide wireless developer contest. Coverage includes: Patterns and best practices for building end-to-end mobile applications Emerging mobile killer applications : driving productivity and cost reduction Smart client applications: architecture and construction Advanced HTTP techniques for authentication and session tracking Overcoming hardware and network limitations Leading-edge mobile enterprise messaging techniques Mobile databases and synchronization engines XML and mobile web services, including the J2ME Web Services Optional Package New options for mobile security in the enterprise

Download Here
Password:
www.ebooksportal.org

Wireless J2ME Platform Programming - Prentice Hall

The authoritative tutorial for wireless J2ME application developers.
  • The essential tutorial for every J2ME platform developer: no wireless experience necessary
  • Complete coverage of architecture, design, coding, debugging, and deployment
  • Advanced topics include-persistent storage, networking, distributed processing, and internationalization
  • The J2ME platform: key terminology, concepts, and application development processes

The
Java 2 Micro Edition (J2ME) platform gives developers breakthrough tools for building advanced wireless applications. Now, one of the leading wireless application consultants at Sun has written a step-by-step guide to successful wireless development using the J2ME SDK. Vartan Piroumian illuminates every key feature of the J2ME platform and every step of the development process: planning, architecture, design, coding, compilation, execution, debugging, and deployment. Wireless J2ME Platform Programming covers all this, and more:

  • Using the Mobile Information Device Profile’s (MIDP) high-level and low-level APIs
  • Building effective wireless user interfaces with the J2ME platform
  • Leveraging the J2ME platform’s facilities for persistent storage
  • Managing, provisioning, and internationalizing wireless applications
  • Integrating
    complete wireless solutions: Internet portal interfaces, wireless
    application interfaces, and the wireless Internet environment
Wireless J2ME Platform Programming: The must-have guide for writing robust, highly usable, cross-platform wireless applications.

Download Here
Password:
www.ebooksportal.org

Programming Wireless Devices with the Java 2 Platform, Micro Edition (J2ME)

This book presents the Java 2 Platform, Micro Edition (J2ME) standards that support the development of applications for consumer devices such as mobile phones, two-way pagers, and wireless personal organizers. To create these standards, Sun collaborated with such consumer device companies as Motorola, Nokia, NTT DoCoMo, Research In

Motion, Samsung, Siemens, Sony Ericsson, and many others. The result is a highly portable, small-footprint application development environment that brings the unique capabilities of Java technology, including platform independence and enhanced security, to the rapidly growing wireless market.

This definitive Java Series guide provides a programmer’s introduction to the Java 2 Platform, Micro Edition. It presents a general description of wireless technology and an overview of the J2ME platform. In addition, the book details the Connected Limited Device Configuration (CLDC) version 1.1 and the Mobile Information Device Profile (MIDP) version 2.0, the standards that define the Java platform features and libraries for wireless, resource-constrained devices.

Written by a team of authors that includes the original J2ME technology experts from Sun, Motorola, and Nokia, this book provides a description of the Java 2 Platform, Micro Edition, as well as practical implementation advice.

Download Here
Password:
www.ebooksportal.org

Effective Java(TM) Programming Language Guide

Written for the working Java developer, Joshua Bloch's Effective Java Programming Language Guide provides a truly useful set of over 50 best practices and tips for writing better Java code. With plenty of advice from an indisputable expert in the field, this title is sure to be an indispensable resource for anyone who wants to get more out of their code.

As a veteran developer at Sun, the author shares his considerable insight into the design choices made over the years in Sun's own Java libraries (which the author acknowledges haven't always been perfect). Based on his experience working with Sun's best minds, the author provides a compilation of 57 tips for better Java code organized by category. Many of these ideas will let you write more robust classes that better cooperate with built-in Java APIs. Many of the tips make use of software patterns and demonstrate an up-to-the-minute sense of what works best in today's design. Each tip is clearly introduced and explained with code snippets used to demonstrate each programming principle.

Download Here

Or

Mirror

Beginning Java SE 6 Platform - Apress

Beginning Java™ SE 6 Platform: From Novice to Professional

steers you through the maze of the new Java Standard Edition (SE) 6 core and desktop platform and its programming API and concepts. You will learn these through action and example. Individual chapters introduce a particular API area, discuss the API, and provide a hands-on example.

This book guides you from beginning to advanced techniques by starting off with a very simple Java SE 6 application, and then covering the fundamentals of generics, collections, annotations, reflections, IO, threads, and networking in Java SE 6. You'll also have some fun learning and creating GUIs, and even use the latest in AWT and Swing as the foundation for a Java-based game application. And the chapters on JavaSound and Java 2D will be an enjoyable learning experience you'll want to share with friends.

Last of all, this book covers data access using the latest JDBC 4 API, security, and dynamic Java scripting language support (which may later open your Java experience to languages like Groovy, BeanShell, and JRuby). By the time you finish this book, you will have mastered the core techniques essential to professional Java developers.

Download here

Password: knowfree.net

Beginning JSP JSF and Tomcat Web Development - Apress

Start building Java-based web applications now, even if you’re a complete newcomer to Java. Comprehensive and example-driven, Beginning JSP™, JSF™, and Tomcat Web Development is all you need to develop dynamic web applications using JSP, connect to databases with JSF, and put them into action using the world’s most popular open source Java web server, Apache Tomcat.
  • A comprehensive introduction to JavaServer Pages (JSP), JavaServer Faces (JSF), and the Apache Tomcat web application server
  • Key concepts made easy to grasp by numerous working examples and a walkthrough of the development of a complete e-commerce project
  • Written for professionals by a practicing Java web application professional and expert
Download here

Password: knowfree.net

JavaFX Script - Apress

JavaFX Script makes it easy for developers to quickly develop high-quality UI-intensive applications very quickly. As JavaFX Script: Dynamic Java Scripting for Rich Internet/Client-side Applications demonstrates, developers can develop Rich Internet Applications and rich client-side user interfaces quickly and easily with this potential replacement for Ajax and perhaps even ActionScript and other scripting found in Flash. This firstPress book on JavaFX Scriptcovers the following topics:
  • The fundamentals of the JavaFX suite of technologies and the foundations of JavaFX Script and available tools
  • How to create a Wordsearch application
  • How to augment and enhance the Wordsearch application after learning more advanced JavaFX Script features such as classes, objects, UI components, and constructs.

Download here

Password: knowfree.net

Ruby on Rails for PHP and Java Developers

The web framework Ruby on Rails for developing database based web applications provides a Model-View-Controller framework. The required web server WEBrick is included with Ruby on Rails. The framework is configured with the MySQL database by default, but may be configured with another database.

The book covers developing web applications with Ruby on Rails. Technologies discussed include Ajax, directory services, and web services. A comparison is made with PHP, the most commonly used scripting language for developing web applications.


Download here

Password: knowfree.net

Refactoring : Improving the design of existing code

As the application of object technology-particularly the Java programming language-has become commonplace, a new problem has emerged to confront the software development community. Significant numbers of poorly designed programs have been created by less-experienced developers, resulting in applications that are inefficient and hard to maintain and extend. Increasingly, software system professionals are discovering just how difficult it is to work with these inherited, "non-optimal" applications. For several years, expert-level object programmers have employed a growing collection of techniques to improve the structural integrity and performance of such existing software programs. Referred to as "refactoring," these practices have remained in the domain of experts because no attempt has been made to transcribe the lore into a form that all developers could use. . .until now. In Refactoring: Improving the Design of Existing Software, renowned object technology mentor Martin Fowler breaks new ground, demystifying these master practices and demonstrating how software practitioners can realize the significant benefits of this new process.

With proper training a skilled system designer can take a bad design and rework it into well-designed, robust code. In this book, Martin Fowler shows you where opportunities for refactoring typically can be found, and how to go about reworking a bad design into a good one. Each refactoring step is simple-seemingly too simple to be worth doing. Refactoring may involve moving a field from one class to another, or pulling some code out of a method to turn it into its own method, or even pushing some code up or down a hierarchy. While these individual steps may seem elementary, the cumulative effect of such small changes can radically improve the design. Refactoring is a proven way to prevent software decay.

In addition to discussing the various techniques of refactoring, the author provides a detailed catalog of more than seventy proven refactorings with helpful pointers that teach you when to apply them; step-by-step instructions for applying each refactoring; and an example illustrating how the refactoring works. The illustrative examples are written in Java, but the ideas are applicable to any object-oriented programming language.


Topics Covered: Refactoring, improving software code, redesign, design tips, patterns, unit testing, refactoring research, and tools.

Download Here

The Definitive Guide to Jasper Reports

JasperForge.org is the open source development portal for the JasperSoft Business Intelligence Suite, the JasperSoft Business Intelligence solution that delivers comprehensive tools for data access, data integration, analysis, and reporting, including JasperReports. This definitive, authoritative covers the following:
  • Shows the power this open source Java reporting tool has and the ability to deliver rich content onto the screen, to the printer, or into PDF, HTML, XLS, CSV and XML files
  • Demonstrates how JasperReports can be used in a variety of Java-enabled applications, including Java EE or web applications, to generate dynamic content
  • Teaches you how to create page-oriented, ready-to-print documents in a simple and flexible manner

Download here

Password: knowfree.net

Scripting in Java: Using Apache Bsf, Groovy, and PHP

Scripting languages have played an important role in the information technology infrastructure for many years. They have been used for all kinds of tasks, ranging from job automation to prototyping and implementation of complex software projects. The Java development platform can also benefit from scripting concepts and languages. Java developers can use scripting languages in areas that are proven to be the most suitable for this technology. This synergy of the Java platform and scripting languages adds an extra quality to the overall software development process. As more Java developers are coming from web-oriented (i.e., HTML, JavaScript, a bit of PHP or JSP) backgrounds, more Java developers are turning to scripting as an option to increase code efficiency within their Java applications. In this book Bosanac describes the concepts behind scripting languages, summarizes solutions available to Java developers, and explores use cases and design patterns for applying scripting languages in Java applications.

Download Here

Mirror

Practical JBoss Seam Projects

Practical JBoss® Seam Projects, written by renowned author and enterprise Java practitioner Jim Farley, is expected to be the first practical projects book of its kind on this groundbreaking open source lightweight JSF-EJB3 framework.
  • Practical application scenarios are used to demonstrate the nature of the JBoss Seam framework, its efficacy, and its limitations.
  • The series of scenarios and cases demonstrate key elements of the framework (e.g., basic web application development, rich web clients with Ajax, and so forth).
  • Real-world case studies offer valuable insight into the new practices of JBoss Seam Web 2.0 development


Download here

Password: knowfree.net

Inside Java 2 Platform Security Second edition

An expert tour of security on the new Java 2 platform, Inside Java 2 Security will find an enthusiastic audience among advanced Java developers and system administrators. As the author notes during the general discussion on network security, safeguarding your system goes far beyond mere cryptography.

This book reviews multiple security threats and the strategies used to combat them, such as denial of service attacks, Trojan horses, and covert channels. In addition, it touches on the evolution of Java security from the restrictive days of the JDK 1.0 sandbox to the sophisticated security features available in Java 2, including a section that presents a list of 11 security bugs found in early versions of Java.

Because Java 2 security is now policy-based, it must be managed by system administrators as part of enterprise security. A chapter on Java 2 security presents the "big picture" as well as the classes used to implement policy-based security where developers can control access to an entire system like files, network resources, or runtime permissions on code. The book also discusses the rather primitive tools used for Java 2 security management such as the policytool utility. For advanced developers, further sections demonstrate how to create new permission classes and how to make JDK 1.1 security code migrate to Java 2.

A section on the Java Cryptography Architecture (JCA) shows that Java 2 supports the latest in encryption standards like SHA, DSA, RSA, and X.509 certificates. The text concludes with some well-considered predictions for the future of security on the Java platform. In the meantime, this book shows you what you will need to know about security when committing to Java 2 on the enterprise. Security is now part of the picture and will require both extra development time and administrative effort. –Richard Dragan –This text refers to an out of print or unavailable edition of this title.

Download here

Password: knowfree.net

Thinking in Java (4th Edition)

Thinking in Java is a printed version of Bruce Eckel’s online materials that provides a useful perspective on mastering Java for those with previous programming experience. The author’s take on the essence of Java as a new programming language and the thorough introduction to Java’s features make this a worthwhile tutorial.

Thinking in Java begins a little esoterically, with the author’s reflections on why Java is new and better. (This book’s choice of font for chapter headings is remarkably hard on the eyes.) The author outlines his thoughts on why Java will make you a better programmer, without all the complexity. The book is better when he presents actual language features. There’s a tutorial to basic Java types, keywords, and operators. The guide includes extensive source code that is sometimes daunting (as with the author’s sample code for all the Java operators in one listing.) As such, this text will be most useful for the experienced developer.

The text then moves on to class design issues, when to use inheritance and composition, and related topics of information hiding and polymorphism. (The treatment of inner classes and scoping will likely seem a bit overdone for most readers.) The chapter on Java collection classes for both Java Developer’s Kit (JDK) 1.1 and the new classes, such as sets, lists, and maps, are much better. There’s material in this chapter that you are unlikely to find anywhere else.

Chapters on exception handling and programming with type information are also worthwhile, as are the chapters on the new Swing interface classes and network programming. Although it adopts somewhat of a mixed-bag approach, Thinking in Java contains some excellent material for the object-oriented developer who wants to see what all the fuss is about with Java.

Download Here

Beginning Apache Struts: From Novice to Professional

Beginning Apache Struts will provide you a working knowledge of Apache Struts 1.2. This book is ideal for you Java programmers who have some JSP familiarity, but little or no prior experience with Servlet technology. Organized in a condensed tutorial and lab format, the material in this book has been tested in real classroom environments. It takes a step-by-step, hands-on approach to teaching you Struts. The book even previews the next generation of Struts, the Apache Shale. The overall result is that you can quickly apply Struts to your work settings with confidence.

Download Here

Practical Embedded Security: Building Secure Resource-Constrained Systems

The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance in their designs than ever before. This is particularly challenging due to embedded devices inherent resource constraints such as limited power and memory. Therefore, traditional security solutions must be customized to fit their profile, and entirely new security concepts must be explored. However, there are few resources available to help engineers understand how to implement security measures within the unique embedded context. This new book from embedded security expert Timothy Stapko is the first to provide engineers with a comprehensive guide to this pivotal topic. From a brief review of basic security concepts, through clear explanations of complex issues such as choosing the best cryptographic algorithms for embedded utilization, the reader is provided with all the information needed to successfully produce safe, secure embedded devices.

The ONLY book dedicated to a comprehensive coverage of embedded security!


Covers both hardware and software-based embedded security solutions for preventing and dealing with attacks


Application case studies support practical explanations of all key topics, including network protocols, wireless and cellular communications, languages (Java and C/++), compilers, web-based interfaces, cryptography, and an entire section on SSL.


Download Here

J2EE AntiPatterns

The flip-side of Patterns, AntiPatterns provide developers with formal descriptions of common development gaffes that can derail a project along with practical guidelines on how to avoid them. In this book, the authors present dozens of Java AntiPatterns that tackle many of Java's biggest trouble spots for programming with EJB, JSP, Servlets, and more. Each AntiPattern is documented with real-world examples, code, and refactored (or escape-route) solutions, and the book uses UML (where appropriate) to diagram improved solutions. All code examples from the book are available to the reader on the book's companion Web site.

Download Here

Regular Expression Pocket Reference: Regular Expressions for Perl, Ruby, PHP, Python, C, Java and .NET

This handy little book offers programmers a complete overview of the syntax and semantics of regular expressions that are at the heart of every text-processing application. Ideal as a quick reference, Regular Expression Pocket Reference covers the regular expression APIs for Perl 5.8, Ruby (including some upcoming 1.9 features), Java, PHP, .NET and C#, Python, vi, JavaScript, and the PCRE regular expression libraries.

This concise and easy-to-use reference puts a very powerful tool for manipulating text and data right at your fingertips. Composed of a mixture of symbols and text, regular expressions can be an outlet for creativity, for brilliant programming, and for the elegant solution. Regular Expression Pocket Reference offers an introduction to regular expressions, pattern matching, metacharacters, modes and constructs, and then provides separate sections for each of the language APIs, with complete regex listings.Iincluding:

  • Supported metacharacters for each language API
  • Regular expression classes and interfaces for Ruby, Java, .NET, and C#
  • Regular expression operators for Perl 5.8
  • Regular expression module objects and functions for Python
  • Pattern-matching functions for PHP and the vi editor
  • Pattern-matching methods and objects for JavaScript
  • Unicode Support for each of the languages

With plenty of examples and other resources, Regular Expression Pocket Reference summarizes the complex rules for performing this critical text-processing function, and presents this often-confusing topic in a friendly and well-organized format. This guide makes an ideal on-the-job companion.

Download Here

Java Methods for Financial Engineering: Applications in Finance and Investment

In order to build a successful, Java-based application it is important to have a clear understanding of the principles underlying the various financial models. Those models guide the application designer in choosing the most appropriate Java data structures and implementation strategy. This book describes the principles of model building in financial engineering and explains those models as designs and working implementations for Java-based applications.

Throughout the book a series of packaged classes are developed to address a wide range of financial applications. Java methods are designed and implemented based on the most widely used models in financial engineering and investment practice. The classes and methods are explained and designed in a way which allows the financial engineer complete flexibility. The classes can be used as off-the-shelf working solutions or the innovative developer can re-arrange and modify methods to create new products.

Download Here

Performance Analysis for Java Websites

Java-based Web sites. It approaches these sites as systems, and considers how the various components involved, such as networks, Java™ Virtual Machines, and backend systems, potentially impact overall performance. This book provides detailed best practices for designing and developing high-performance Java Web applications, and instructions for building and executing relevant performance tests to gauge your site's ability to handle customer traffic. Also included is information on how to use the results of performance testing to generate accurate capacity plans.

Readers will find easy-to-understand explanations of fundamental performance principles and terminology. The book runs through performance profiles for common types of Web sites, including e-commerce, B2B, financial, and information exchange. Numerous case studies illustrate important ideas and techniques. Practical throughout, the book also offers a discussion on selecting the right test tools and troubleshooting common bottlenecks frequently revealed by testing.

Download Here

Mirror 1

Mirror 2

MySQL And Java Developer’s Guide (with source code)

Have you ever been assigned a project and realized that you had no idea how you were going to accomplish it? Many developers have experienced this feeling when asked to interface their code with a database. With a few exceptions, most developers were busy learning Lisp, linked lists, and big-O notation during their formal education instead of learning the fundamentals of relationship database management systems. When the time comes to interface their code with a database, they turn to a book like the one you are holding.

Whatever the situation, interfacing an application to a database is one of the most fundamental tasks a developer is required to perform. This book is designed for developers who either have a pressing task ahead of them or who are curious about how to read database information into their application.

The primary goal of this book is to provide a comprehensive approach to writing code from a Java application to a MySQL database using the industry standard: JDBC. As you will see later in this Introduction, the chapter titles indicate what area of database connectivity and manipulation they cover. The chapters are ordered to reflect the JDBC specification, but we aren’t here to simply describe the specification.


TABLE OF CONTENT:
Chapter 01 - An Overview of MySQL
Chapter 02 - JDBC and Connector/J
Chapter 03 - Working with MySQL SQL
Chapter 04 - Installing MySQL, Java, and Connector/J
Chapter 05 - Using JDBC with Java Applications and Applets
Chapter 06 - Achieving Advanced Connector/J Functionality with Servlets
Chapter 07 - MySQL Type Mapping
Chapter 08 - Transactions and Table Locking with Connector/J
Chapter 09 - Using Metadata
Chpater 10 - Connection Pooling with Connector/J
Chapter 11 - EJBs with MySQL
Chapter 12 - Building a General Interface for MySQL
Chapter 13 - Database Administration
Chapter 14 - Performance and Tuning
Appendix A - MySQL Development and Test Environments
Appendix B - Databases and Tables
Appendix C - The JDBC API and Connector/J
Appendix D - MySQL Functions and Operators
Appendix E - Connector/J Late-Breaking Additions

Download here

Password:ganelon

Jython for Java Programmers

This book will help Java developers to increase application development and deployment, thus optimizing their overall efficiency.

A brief introduction is provided that shows the differences between Java and Jython, important to include so that the reader will have a better understanding of why their union is beneficial.

The remainder of the book teaches, through examples, how to use Jython. Intended for an experienced Java developer, this book assumes you understand the fundamentals to programming (i.e. loop statements, if.then, etc.). So, page space is focused on utilizing Jython with Java by covering the following: extending Python with java classes, modules, compiling, interpreters, design integration, etc.

Download Here

JavaServer Faces in Action

Helping front-end developers, back-end developers, and architects understand how they can get the most out of JavaServer Faces (JSF), this guide to the new official standard for simplifying Java web development explains what JSF is, how it works, and how it relates to other frameworks and technologies like Struts, Servlets, Portlets, JSP, and JSTL. Also provided is coverage of all the standard components, renderers, converters, and validators, along with advice on how to use them to create solid applications. The building of complete JSF applications is demonstrated with an in-depth case study covering complex user interface layouts, prototyping, and integrating templates with back-end model objects. Also covered are advanced techniques like internationalization, integration with Struts, and extending JSF with custom components, renderers, converters, and validators.

Download Here