السلام عليكم ورحمه الله وبركاته
بعد التحيه لكل الاعضاء
بصراحه دى اول مشاركاتى ومش عارف بصراحه فى كتب مكرره ولالا بس ان شاء الله متلاقوش حاجه مكرره وتجدو كل ما هو جديد و
بعد التحيه لكل الاعضاء
بصراحه دى اول مشاركاتى ومش عارف بصراحه فى كتب مكرره ولالا بس ان شاء الله متلاقوش حاجه مكرره وتجدو كل ما هو جديد و
ان شاء الله تلاقو كل اللنكات تعمل وتستفيده بيها ان شاء الله
بسم الله نبدأ
Joy Laskar, Babak Matinpour, Sudipto Chakraborty, «Modern Receiver Front-Ends: Systems, Circuits, and Integration»
Wiley-Interscience | ISBN 0471225916 | 2004 Year | PDF | 2,27 Mb | 221 Pages
Wiley-Interscience | ISBN 0471225916 | 2004 Year | PDF | 2,27 Mb | 221 Pages
“* Describes the actual implementation of receiver architectures from the initial design to an IC-based product
* Presents many tricks-of-the-trade not usually covered in textbooks
* Covers a range of practical issues including semiconductor technology selection, cost versus performance, yield, packaging, prototype development, testing, and analysis
* Discusses architectures that are employed in modern broadband wireless systems ”
* Presents many tricks-of-the-trade not usually covered in textbooks
* Covers a range of practical issues including semiconductor technology selection, cost versus performance, yield, packaging, prototype development, testing, and analysis
* Discusses architectures that are employed in modern broadband wireless systems ”
Password: www.AvaxHome.ru
Download from Rapidshare
Authors: Ion Boldea
ISBN: 0849300045
Year: 2001
Publisher: CRC; 1st edition
Uploader: 5n7p3r
“This handbook fills industry’s long-standing need for a comprehensive treatise embracing the wide variety of complex aspects of induction machine analysis and design. It provides an authoritative, up-to-date source of information for practicing and student engineers, including a presentation of all types of induction machines, numerous solved numerical examples of analysis and computer-aided design of induction machines, and interactive computer programs for analysis and design.
ISBN: 0849300045
Year: 2001
Publisher: CRC; 1st edition
Uploader: 5n7p3r
“This handbook fills industry’s long-standing need for a comprehensive treatise embracing the wide variety of complex aspects of induction machine analysis and design. It provides an authoritative, up-to-date source of information for practicing and student engineers, including a presentation of all types of induction machines, numerous solved numerical examples of analysis and computer-aided design of induction machines, and interactive computer programs for analysis and design.
Book Info
This handbook fills industry’s long-standing need for a comprehensive treatise embracing the many intricate facets of induction machine analysis and design. A comprehensive, up to date resource ideal for both the practicing and student engineers.”
This handbook fills industry’s long-standing need for a comprehensive treatise embracing the many intricate facets of induction machine analysis and design. A comprehensive, up to date resource ideal for both the practicing and student engineers.”
Download
Password
5n7p3r
*********************************************************************************************
*********************************************************************************************
Nitesh Dhanjani, Justin Clarke, «Network Security Tools : Writing, Hacking, and Modifying Security Tools»
O'Reilly | ISBN 0596007949 | 2005 Year | CHM | 1,33 Mb | 340 Pages
O'Reilly | ISBN 0596007949 | 2005 Year | CHM | 1,33 Mb | 340 Pages
“If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function. Some of the topics covered include:
Writing your own network sniffers and packet injection tools
Writing plugins for Nessus, Ettercap, and Nikto
Developing exploits for Metasploit
Code analysis for web applications
Writing kernel modules for security applications, and understanding rootkits
While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network. ”
Writing your own network sniffers and packet injection tools
Writing plugins for Nessus, Ettercap, and Nikto
Developing exploits for Metasploit
Code analysis for web applications
Writing kernel modules for security applications, and understanding rootkits
While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network. ”
Password: www.AvaxHome.ru
Download from Rapidshare
**********************************************************************************************
Michael Hicks, «Optimizing Applications on Cisco Networks»
Cisco Press | ISBN 1587051532 | 2004 Year | CHM | 3,9 Mb | 384 Pages
Cisco Press | ISBN 1587051532 | 2004 Year | CHM | 3,9 Mb | 384 Pages
“Maximize the performance and availability of network applications and the network infrastructure with application performance management
Learn and understand the business case for application performance management
Understand how to identify applications critical to your business model
Identify basic application characteristics and how they can be optimized for transmission
Understand the principle of proactive planning in order to maintain the delivery criteria necessary for your business critical applications
Improve service delivery and outsourcing decisions by utilizing meaningful SLAs
Identify and solve network application performance problems, saving valuable time and money
Includes real-world case studies that cover design and performance issues
The astounding growth of computer networking in recent years has been characterized by the struggle of network managers to keep pace with the demand for network resources. As more and more users, running more and more applications, demand increased network bandwidth and performance, network managers find themselves adding expensive capacity in an effort to satisfy the needs of their customers. Yet networks remain congested, and applications continue to run slowly. Moreover, new aggressive applications, an ever expanding set of business stakeholders, and demands for greater reliability and security compound this struggle.
Understand how to identify applications critical to your business model
Identify basic application characteristics and how they can be optimized for transmission
Understand the principle of proactive planning in order to maintain the delivery criteria necessary for your business critical applications
Improve service delivery and outsourcing decisions by utilizing meaningful SLAs
Identify and solve network application performance problems, saving valuable time and money
Includes real-world case studies that cover design and performance issues
The astounding growth of computer networking in recent years has been characterized by the struggle of network managers to keep pace with the demand for network resources. As more and more users, running more and more applications, demand increased network bandwidth and performance, network managers find themselves adding expensive capacity in an effort to satisfy the needs of their customers. Yet networks remain congested, and applications continue to run slowly. Moreover, new aggressive applications, an ever expanding set of business stakeholders, and demands for greater reliability and security compound this struggle.
Optimizing Applications on Cisco Networks takes a practical look at how application performance management can assist in the end-to-end application delivery model by proactively identifying hot spots within an organization. This book covers network dependent application delivery, with an emphasis on optimizing the underlying infrastructure, procedures, and methodologies to aid and measure delivery. The book also covers applications, delivery techniques, and QoS protocols.
Use Optimizing Applications on Cisco Networks to identify and profile business critical applications, define and establish service-level criteria, and ensure that these system configurations are continually assessed to maintain the desired level of service.
This book is part of the Networking Technology Series from Cisco Press‚ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.”
Password: www.AvaxHome.ru
Download from Rapidshare
********************************************************************************************
Salim Hariri (Editor), Manish Parashar (Editor), «Tools and Environments for Parallel and Distributed Computing»
Wiley-Interscience | ISBN 0471332887 | 2004 Year | PDF | 1,08 Mb | 232 Pages
Wiley-Interscience | ISBN 0471332887 | 2004 Year | PDF | 1,08 Mb | 232 Pages
“An invaluable reference for anyone designing new parallel or distributed systems.
Includes detailed case studies of specific systems from Stanford, MIT, and other leading research universities.
The authors emphasize performance, surveying all available techniques.
Includes detailed case studies of specific systems from Stanford, MIT, and other leading research universities.
The authors emphasize performance, surveying all available techniques.
This book is recommended for libraries supporting graduate level programs in computer science and programs utilizing high-performance computing in their research.”
Password: www.AvaxHome.ru
Download from Rapidshare
***********************************************************************************************
Lattice Boltzmann Method is relatively new method of solving Partial Differential Equations. It employes the use of Boltzmann Equation rather than solving the Navier Stokes Equations as done in the conventional CFD. However Navier Stokes Equations can be recovered from the Boltzmann Equation performing 1st and 2nd moments. This book is a good introduction to the subject.
Enjoy
Enjoy
URL:
http://rapidshare.de/files/20244648/GAS-LATTICE_CELLULAR_AUTOM.rar.html
***********************************************************************************************
http://rapidshare.de/files/20244648/GAS-LATTICE_CELLULAR_AUTOM.rar.html
***********************************************************************************************
Marc Farley, «Storage Networking Fundamentals : An Introduction to Storage Devices, Subsystems, Applications, Management, and File Systems»
Cisco Press | ISBN 1587051621 | 2004 Year | CHM | 10,71 Mb | 480 Pages
Cisco Press | ISBN 1587051621 | 2004 Year | CHM | 10,71 Mb | 480 Pages
“An Introduction to Storage Devices, Subsystems, Applications, Management, and File Systems
Learn fundamental storage concepts with this comprehensive introduction
Compare storage device technologies, including Fibre Channel, SCSI, ATA, and SATA and understand their uses in network storage subsystems
Learn about key storage processes such as volume management, storage virtualization, data snapshots, mirroring, RAID, backup, and multipathing
Clarify the roles of file systems and databases within network storage
Take the next step—this book prepares you to become a storage networking expert
Storage networking has become an essential ingredient in Internet information infrastructures. Becoming competent in this new and important technology area requires a sound understanding of storage technologies and principles. Storage Networking Fundamentals gives you an in-depth look into the most important storage technologies. The entire storage landscape is described, incorporating a complete view of system, device, and subsystem operations and processes. Learn how to protect data effectively using mirroring, RAID, remote copy, and backup/ recovery systems. Virtual storage technologies, such as volume management, RAID, and network virtualization, are analyzed and discussed in detail. High-availability storage through dynamic multipathing and clustered/distributed file systems is explained as are designs for robust storage subsystems. Finally, the confusing and arcane worlds of file systems and SCSI are clarified, including the role of initiators, targets, logical units, and LUNs.
Compare storage device technologies, including Fibre Channel, SCSI, ATA, and SATA and understand their uses in network storage subsystems
Learn about key storage processes such as volume management, storage virtualization, data snapshots, mirroring, RAID, backup, and multipathing
Clarify the roles of file systems and databases within network storage
Take the next step—this book prepares you to become a storage networking expert
Storage networking has become an essential ingredient in Internet information infrastructures. Becoming competent in this new and important technology area requires a sound understanding of storage technologies and principles. Storage Networking Fundamentals gives you an in-depth look into the most important storage technologies. The entire storage landscape is described, incorporating a complete view of system, device, and subsystem operations and processes. Learn how to protect data effectively using mirroring, RAID, remote copy, and backup/ recovery systems. Virtual storage technologies, such as volume management, RAID, and network virtualization, are analyzed and discussed in detail. High-availability storage through dynamic multipathing and clustered/distributed file systems is explained as are designs for robust storage subsystems. Finally, the confusing and arcane worlds of file systems and SCSI are clarified, including the role of initiators, targets, logical units, and LUNs.
Storage Networking Fundamentals is a comprehensive overview of storage technologies that also provides insights on designing and running SAN and NAS implementations.
This book is part of the Cisco Press Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.”
Password: www.AvaxHome.ru
Download from Rapidshare
*****************************************************************************************
IEEE papers about Service Oriented Architecture SOA
This file is contain of some papers about Service Oriented Architecture (SOA) that collected from IEEE website.
Papers list:
- Impact of SOA on Enterprise Information Architectures
- Charging for Information Services in Service-Oriented Architectures
- Security Requirements in Service Oriented Architectures for Ubiquitous Computing
- A UML Profile For Service Oriented Architectures
- Cooperative Middleware Specialization for Service Oriented Architectures
- Using Web Service Technologies to create an Information Broker: An Experience Report
- A Service-Oriented Architecture for Digital Libraries
- Modeling and Validation of Service-Oriented Architectures: Application vs. Style
- Hot Service Deployment in an Ad Hoc Grid Environment
- Charging for Information Services in Service-Oriented Architectures
- Security Requirements in Service Oriented Architectures for Ubiquitous Computing
- A UML Profile For Service Oriented Architectures
- Cooperative Middleware Specialization for Service Oriented Architectures
- Using Web Service Technologies to create an Information Broker: An Experience Report
- A Service-Oriented Architecture for Digital Libraries
- Modeling and Validation of Service-Oriented Architectures: Application vs. Style
- Hot Service Deployment in an Ad Hoc Grid Environment
No Password
Files format: PDF
***********************************************************************************************
Bill Foust, «Mobile Guide to BlackBerry»
Que | ISBN 0789733439 | 2005 Year | CHM | 8,19 Mb | 240 Pages
Que | ISBN 0789733439 | 2005 Year | CHM | 8,19 Mb | 240 Pages
“Exploit your BlackBerry for all its worth. Mobile Guide to BlackBerry is based on the expertise of the BlackBerry and technology authority, Mobile magazine. This step-by-step guide goes well-beyond the BlackBerry 7100 and 7200 owner's manual. With the help of the author, BlackBerry evangelist and BlackBerry developer publication contributor Bill Foust, you will be able to configure and customize your BlackBerry device to ensure and maximize usability and productivity. You will learn how to:
Configure and customize your BlackBerry
Send and receive text and email messages
Set alarms and reminders to keep you on schedule
Browse the web any time, anywhere
Install and use add-on applications such as expense trackers or interactive games
Send and receive text and email messages
Set alarms and reminders to keep you on schedule
Browse the web any time, anywhere
Install and use add-on applications such as expense trackers or interactive games
This quick and concise approach will reduce your frustration as you learn all about your BlackBerry. Discover hidden tasks that your BlackBerry is capable of and get the most out of your BlackBerry with the help of Mobile Guide to BlackBerry.”
Password: www.AvaxHome.ru
Download from Rapidshare
************************************************************************************************
Chemical And Engineering Thermodynamics, 3Rd Edition
for Stanley I. Sandler | Solution Manual
for Stanley I. Sandler | Solution Manual
Link:
No pass
*************************************************************************************************
*************************************************************************************************
Advanced Modern Algebra
Prentice Hall | ISBN 0130878685 | 2002 Year | PDF | 5.64mb | 1040 Pages
Prentice Hall | ISBN 0130878685 | 2002 Year | PDF | 5.64mb | 1040 Pages
“This book’s organizing principle is the interplay between groups and rings, where “rings” includes the ideas of modules. It contains basic definitions, complete and clear theorems (the first with brief sketches of proofs), and gives attention to the topics of algebraic geometry, computers, homology, and representations. More than merely a succession of definition-theorem-proofs, this text put results and ideas in context so that students can appreciate why a certain topic is being studied, and where definitions originate. Chapter topics include groups; commutative rings; modules; principal ideal domains; algebras; cohomology and representations; and homological algebra. For individuals interested in a self-study guide to learning advanced algebra and its related topics.”
Password: 5n7p3r
Download http://rapidshare.de/files/20244110/Advanced_Modern_Algebra.rar
********************************************************************************************8
Download http://rapidshare.de/files/20244110/Advanced_Modern_Algebra.rar
********************************************************************************************8
Deepak Kakadia, Francesco DiMambro, «Networking Concepts and Technology : A Designer's Resource»
Prentice Hall PTR | ISBN 0131482076 | 2004 Year | CHM | 6,38 Mb | 400 Pages
Prentice Hall PTR | ISBN 0131482076 | 2004 Year | CHM | 6,38 Mb | 400 Pages
“This book is a resource for network architects who must create solutions for emerging network environments in enterprise data centers. You'll find information on how to leverage Sun(TM) Open Network Environment (Sun ONE) technologies to create Services on Demand solutions, as well as technical details about the networking internals. The information presented here is based on actual network engineering experience that includes network product development and real-world customer experiences. The focus of this book is limited to the design of network architectures that support Web services-based, multi-tier architectures. However, it covers everything from the edge data center switch to the server network protocol stacks.”
Password: www.AvaxHome.ru
Download from Rapidshare
*************************************************************************************************
Fred Johnson, «Global Mobile : Connecting without walls, wires, or borders»
Peachpit Press | ISBN 0321278712 | 2005 Year | CHM | 1,15 Mb | 144 Pages
Peachpit Press | ISBN 0321278712 | 2005 Year | CHM | 1,15 Mb | 144 Pages
“With the proliferation of Wi-Fi hotspots and advances in mobile-phone technology, there aren't many excuses today for not being in contact with your friends, family and business associates when you travel. Using just your laptop computer and cell phone, you can stay connected from all around the globe. But not so fast -- do you "really" know how to use your gadgets when traveling? And furthermore, do you have the RIGHT gadgets?
Enter Global Mobile. This slim, compact guide outlines how to choose and use the gear you’ll need to stay connected no matter where you’re going. Author Fred Johnson walks you through all things wireless -- from getting online while you sip your favorite latte at Starbucks, to swapping SIM cards in your GSM phone, to learning the ins and outs of new technologies like Bluetooth, you’ll learn how simple it is to stay "plugged-in" during a business trip or an international adventure.
Crammed with helpful tips on choosing services, useful charts (such as international phone numbers and GSM coverage), a helpful packing checklist, and priceless advice, this handy guide should be packed with your laptop before you leave on your next trip. ”
Password: www.AvaxHome.ru
Download from Rapidshare
***************************************************************************************
A.E. Roy, «Astronomy: Principles and Practice» (4th edition)
Taylor & Francis | ISBN 0750309172 | 2003 Year | PDF | 5,37 Mb | 475 Pages
Taylor & Francis | ISBN 0750309172 | 2003 Year | PDF | 5,37 Mb | 475 Pages
“"I'm pleased to see that the strengths of the old version have been retained (i.e. the sections on positional astronomy are largely unaltered) and the book has been brought up to date with, for example, the sections on CCDs and modern telescopes. I will have absolutely no hesitation in continuing to recommend that the ~50 students in my first-year "Celestial Sphere" course buy this book." -- Vik Dhillon, Sheffield University "It claims to be written for students working for degrees in astronomy, and as such it is admirably acceptable. There are four main sections - an introduction, which is an excellent survey of the fundamentals, written in a clear and well-balanced way; the celestial sphere and elementary celestial mechanics; observational techniques, and finally a number of suggestions for experimental work. But this book should not be dismissed by those whose grasp of mathematics is not up to university standard. We all, at times, want to go deeper into some aspects of the subject and will find much of help and value in this book, even if we miss out the formulae and calculations. Members will find themselves returning to it again and again for help with those really searching questions. A book worth considering. -- Jeffrey Barham, Popular Astronomy, January-March 2004 ”
Password: www.AvaxHome.ru
Download from Rapidshare
********************************************************************************************
Carol Tenopir, Donald W. King, «Communication Patterns of Engineers»
Wiley-IEEE Press | ISBN 047148492X | 2004 Year | PDF | 1,69 Mb | 280 Pages
Wiley-IEEE Press | ISBN 047148492X | 2004 Year | PDF | 1,69 Mb | 280 Pages
“Communication Patterns of Engineers brings together, summarizes, and analyzes the research on how engineers communicate, presenting benchmark data and identifying gaps in the existing research. Written by two renowned experts in this area, the text:
Compares engineering communication patterns with those of science and medicine
Offers information on improving engineering communication skills, including the use of communication tools to address engineering departments' concerns about the inadequacies of communication by engineers
Provides strong conclusions to address what lessons engineering educators, librarians, and communication professionals can learn from the research presented ”
Offers information on improving engineering communication skills, including the use of communication tools to address engineering departments' concerns about the inadequacies of communication by engineers
Provides strong conclusions to address what lessons engineering educators, librarians, and communication professionals can learn from the research presented ”
Password: www.AvaxHome.ru
Download from Rapidshare
*****************************************************************************************
Artech House Publishers «Wireless Sensor Networks»
Nirupama Bulusu, Sanjay Jha | ISBN 1580538673 | PDF | July 31, 2005 | 3,83 MB | 326 pages
Nirupama Bulusu, Sanjay Jha | ISBN 1580538673 | PDF | July 31, 2005 | 3,83 MB | 326 pages
“Book Description
This first-of-its-kind resource offers you an in-depth understanding of wireless sensor networks from a systems perspective. The book describes and categorizes the technological trends, leading applications, state-of-the-art platform developments, future trends, and challenges.
This first-of-its-kind resource offers you an in-depth understanding of wireless sensor networks from a systems perspective. The book describes and categorizes the technological trends, leading applications, state-of-the-art platform developments, future trends, and challenges.
About the Author
Nirupama Bulusu is an Assistant Professor of Computer Science at the Maseeh College of Engineering and Computer Science at Portland State University. An author of numerous highly cited publications on sensor networks, she received her Ph.D in Computer Science in 2002 from the University of California at Los Angeles.
Sanjay Jha is an Associate Professor at the School of Computer Science and Engineering at the University of New South Wales. He is also a project leader for the Smart Internet CRC and an associate of the Australian National Information and Communication Technology Center (NICTA). Dr. Jha is the author of Engineering Internet QoS (Artech House, 2002).
”
Nirupama Bulusu is an Assistant Professor of Computer Science at the Maseeh College of Engineering and Computer Science at Portland State University. An author of numerous highly cited publications on sensor networks, she received her Ph.D in Computer Science in 2002 from the University of California at Los Angeles.
Sanjay Jha is an Associate Professor at the School of Computer Science and Engineering at the University of New South Wales. He is also a project leader for the Smart Internet CRC and an associate of the Australian National Information and Communication Technology Center (NICTA). Dr. Jha is the author of Engineering Internet QoS (Artech House, 2002).
”
No Password
*****************************************************************************************
*****************************************************************************************
High Performance Computing in Science and Engineering
Springer | ISBN 3540443266 | 2005 Year | PDF | 69.0 MB | 484 Pages
Springer | ISBN 3540443266 | 2005 Year | PDF | 69.0 MB | 484 Pages
“Leading-edge research groups in the field of scientific computing present their outstanding projects using the High Performance Computer in Bavaria (HLRB), Hitachi SR8000-F1, one of the top-level supercomputers for academic research in Germany. The projects address modelling and simulation in the disciplines Biosciences, Chemistry, Chemical Physics, Solid-State Physics, High-Energy Physics, Astrophysics, Geophysics, Computational Fluid Dynamics, and Computer Science. The authors describe their scientific background, their resource requirements with respect to top-level supercomputers, and their methods for efficient utilization of the costly high-performance computing power. Contributions of interdisciplinary research projects that have been supported by the Competence Network for Scientific High Performance Computing in Bavaria (KONWIHR) complete the broad range of supercomputer research and applications covered by this volume.”
Password: 5n7p3r
Download http://rapidshare.de/files/20493713/High_Performance_Computing_in_Science_and_Engineering.part1.rar
http://rapidshare.de/files/20494555/High_Performance_Computing_in_Science_and_Engineering.part2.rar
Download http://rapidshare.de/files/20493713/High_Performance_Computing_in_Science_and_Engineering.part1.rar
http://rapidshare.de/files/20494555/High_Performance_Computing_in_Science_and_Engineering.part2.rar
********************************************************************************
Minoru Etoh (Editor), "Next Generation Mobile Systems: 3G & Beyond"
John Wiley & Sons | ISBN 0470091517 | 2005 Year | PDF | 4,18 Mb | 404 Pages
John Wiley & Sons | ISBN 0470091517 | 2005 Year | PDF | 4,18 Mb | 404 Pages
“What will the future of wireless communications look like? What drives mobile communications systems beyond 3G? In Next Generation Mobile Systems the authors answer these questions and others surrounding the new technologies. The book examines the current research issues driving the wireless world and provides an inclusive overview of how established technologies will evolve to suit next generation mobile systems. While the term '4G' already dominates research in industry and academia, there are still numerous hurdles to take before this ambitious concept can become reality. Acclaimed researchers from NTT-DoCoMo take up the debate of what type of mobile communications will emerge in the post-3G era. Next Generation Mobile Systems: Covers the evolution of IP-based systems and IP mobility. Gives a detailed overview of radio-access technologies and wireless LANs. Explains APIs for mobile systems and IP mobility. Addresses middleware and applications, including terminal platform technologies, multimedia, and wireless web services. Discusses security in future mobile networks, including sections on Cryptographic Algorithms and Protocols for XG, Authentication, Authorization, and Accounting, and Security Policy Enforcement for Downloaded Code. This valuable resource will provide communications engineers, telecommunications managers and researchers in industry and academia with a sound understanding of the future direction of mobile technology.”
Password: www.AvaxHome.ru
Download from Rapidshare
***********************************************************************
John Phyper, Philippe Ducas, Peter J. Baish, «Global Materials Compliance Handbook»
John Wiley & Sons | ISBN 0471467391 | 2004 Year | PDF | 1,2 Mb | 477 Pages
John Wiley & Sons | ISBN 0471467391 | 2004 Year | PDF | 1,2 Mb | 477 Pages
“Whether a company operates global facilities or just imports/exports goods to the United States, personnel and advisors must understand regulatory requirements. Most companies that ship or receive goods internationally have developed MCS that address regulatory requirements; however, these typically are labor intensive, independent of other company systems, adequately address only their primary location, and are not updated in a timely manner. Supply chain logistics is complicated, and this book details how to avoid security holds on shipments and gives sound advice on how to cope if another "9/11" occurs. The book provides easy to understand guidance to shipping/receiving personnel, safety inspectors, transportation and logistics managers on the movement of hazardous cargo from one location to another ensuring compliance to the maze of regulatory requirements. ”
Password: www.AvaxHome.ru
Download from Rapidshare
*************************************************
Ted G. Lewis, «Critical Infrastructure Protection in Homeland Security : Defending a Networked Nation»
Wiley-Interscience | ISBN 0471786284 | 2006 Year | PDF | 4,77 Mb | 474 Pages
Wiley-Interscience | ISBN 0471786284 | 2006 Year | PDF | 4,77 Mb | 474 Pages
“This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve, where they are vulnerable, and how they can best be protected. The author demonstrates that infrastructure sectors as diverse as water, power, energy, telecommunications, and the Internet have remarkably similar structures. This observation leads to a rigorous approach to vulnerability analysis in all of these sectors. The analyst can then decide the best way to allocate limited funds to minimize risk, regardless of industry sector.
The key question addressed in this timely book is: What should be protected and how? The author proposes that the answer lies in allocating a nation's scarce resources to the most critical components of each infra-structure-the so-called critical nodes. Using network theory as a foundation, readers learn how to identifya small handful of critical nodes and then allocate resources to reduce or eliminate risk across the entire sector.
A comprehensive set of electronic media is provided on a CD-ROM in the back of the book that supports in-class and self-tutored instruction. Students can copy these professionally produced audio-video lectures onto a PC (Microsoft Windows(r) and Apple Macintosh(r) compatible) for repeated viewing at their own pace. Another unique feature of the book is the open-source software for demonstrating concepts and streamlining the math needed for vulnerability analysis. Updates, as well as a discussion forum, are available from www.CHDS.us.
This book is essential for all corporate, government agency, and military professionals tasked with assessingvulnerability and developing and implementing protection systems. In addition, the book is recommended for upper-level undergraduate and graduate students studying national security, computing, and other disciplines where infrastructure security is an issue. ”
Password: www.AvaxHome.ru
Download from Rapidshare
*********************************************
*****************