Intelligentedu
Free Computer and I.T. Books


April 25, 2005

4 Free Books: Java, Perl, Theory of Programming, & Algorithms

Here are 4 more free online books, one each will help you learn Java and Perl; and the other 2 will teach you important programming techniques and how to think like a developer.


Bleeding at the Keyboard: A Guide to Modern Programming with Java:
http://www.roxie.org/books/bleeding/tableofcontents.html

A free 16 chapter book on learning how to program in Java. It is broken into 3 parts: 1) Learning About Objects, 2) Learning About Types, and 3) Designing Programs. Another good book on learning Java is How to Think Like a Computer Scientist, Java Version: http://www.ibiblio.org/obp/thinkCS/java/english/
Other versions are here: http://www.ibiblio.org/obp/thinkCS/.


************************************************************

Perl 5 By Example:
http://www.codebits.com/p5be/

Teach yourself Internet programming and CGI scripting -this book teaches you how to use the Perl programming language by showing examples that demonstrate the concepts being discussed. The examples are designed to give you a chance to experiment-which in turn should clarify the material.


************************************************************

A Practical Theory of Programming:
http://www.cs.toronto.edu/~hehner/aPToP/

A 12 chapter book you can download in 4 parts, each one a pdf file. Lecture slides are also available in pdf format. The book covers the following:
1. Basic Theories
2. Basic Data Structures
3. Function Theory
4. Program Theory
5. Programming Language
6. Recursive Definition
7. Theory Design and Implementation
8. Concurrency
9. Interaction


************************************************************

Algorithms and Complexity:
http://www.cis.upenn.edu/~wilf/AlgComp.html

This is the first edition of this book, in the form of a single 1.1 Mb pdf file. Here is the link to download it:
http://www.math.upenn.edu/%7Ewilf/AlgoComp.pdf




Filed under: Free Computer and I.T. Books — computer_teacher @ 10:49 pm


Free Security Training by Microsoft and Learning How to Program in C++

Today I have found more free training from Microsoft covering, what else: Security. And I am posting a classic tutorial on learning how to write object-oriented C++ programs.


Free Microsoft Security E-Clinics and Labs:
https://www.microsoftelearning.com/security/

These Security E-Learning Clinics follow the same content outline as Microsoft's Security Webcasts, but deliver that information via a learner-centered format. You can access the security topic you want, when you want it, and learn at your own pace.


************************************************************

Introduction to Object-Oriented Programming Using C++:
http://www.zib.de/Visual/people/mueller/Course/Tutorial/tutorial.html

This 10-chapter tutorial on how to write object-oriented programs in C++ has been on the internet for quite a few years now, and is still beneficial to those who want to learn this important programming language.




Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 10:32 pm


April 22, 2005

Free PC Intro book

Go to [URL]www.CTStraining.com[/URL] to receive a free Intro to PC's manual. We've been conducting computer training classes in Chicago since 1991. Just click on the email link from that site and request your free Intro to PC's student manual.


Filed under: Free Computer and I.T. Books — computer_teacher @ 3:51 pm


April 21, 2005

IP Multicasting Training and MCSE 70-290 Certification Prep

Here are 2 resources for free computer training, the first offers IP multicasting and the second covers the Microsoft 70-290 exam.


12 Cisco IP Multicast Training Modules:
ftp://ftpeng.cisco.com/ipmulticast/training/index.html

These IP Multicast training modules have previously been used for internal Cisco training only, but are now available for "self-training". They have been updated and are even better than before. (pdf format)


************************************************************

Computer Based Training Videos for MSCE 70-290 Certification Exam:

To access the download link for these, click on the Free button at the bottom of the page, wait about 30 seconds, then the link to download will appear. You will have to wait 1 hour between downloads, unless you ipconfig flushdns/release/renew and delete your cookies.

Logon:
http://rapidshare.de/files/1315584/logon.rar.html

License and sus:
http://rapidshare.de/files/1315852/licsus.rar.html

Terminal Services:
http://rapidshare.de/files/1319126/ts1.rar.html
http://rapidshare.de/files/1319317/ts2.rar.html

IIS:
http://rapidshare.de/files/1319572/iispart1.rar.html
http://rapidshare.de/files/1319781/iispart2.rar.html

Disaster Recovery:
http://rapidshare.de/files/1344599/disast1.rar.html
http://rapidshare.de/files/1344877/disast2.rar.html

Users:
http://rapidshare.de/files/1331627/users1.rar.html
http://rapidshare.de/files/1346505/useracc2.rar.html

Profiles:
http://rapidshare.de/files/1346695/profiles.rar.html

Disks:
http://rapidshare.de/files/1346854/disks1.rar.html
http://rapidshare.de/files/1347590/disks2.rar.htm

Groups:
http://rapidshare.de/files/1348578/shares_groups.rar.html




Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 10:10 pm


Free Computer Book Chapters and a Free Book Link Site

Here are 2 free computer books sites, the first one hosts free chapters covering the latest IT and software development technologies, and the 2nd one offer many links to free programming and IT books.


Free Book Chapters from Programmersheaven.com:
http://www.programmersheaven.com/other/BookSamples/index.htm

Check out over 30 free IT book chapters hosted by programmersheaven.com. Topics include Linux, C#, .Net, ADO.Net, Java, Visual Basic.Net, ASP.Net, CSS, Web Services, PHP, and XML.


**********************************************************

FreeTechBooks.com:
http://www.freetechbooks.com

This site has links to many free computer books, including computer science and engineering books, lecture notes, documentation and references.

Introduction to Programming (11):
http://www.freetechbooks.com/viewforum.php?f=10

Assembly (2):
http://www.freetechbooks.com/viewforum.php?f=27

C and C++ (16):
http://www.freetechbooks.com/viewforum.php?f=3

Java (18):
http://www.freetechbooks.com/viewforum.php?f=4

Perl (6):
http://www.freetechbooks.com/viewforum.php?f=5

Python (8):
http://www.freetechbooks.com/viewforum.php?f=6

Unix (1):
http://www.freetechbooks.com/viewforum.php?f=8

Linux (21):
http://www.freetechbooks.com/viewforum.php?f=7

FreeBSD (3):
http://www.freetechbooks.com/viewforum.php?f=29

Algorithms and Data Structures (10):
http://www.freetechbooks.com/viewforum.php?f=11

Object Oriented Programming (8):
http://www.freetechbooks.com/viewforum.php?f=12

Functional Programming (5):
http://www.freetechbooks.com/viewforum.php?f=34

Language Design and Construction (12):
http://www.freetechbooks.com/viewforum.php?f=14

Computer Network (2):
http://www.freetechbooks.com/viewforum.php?f=31

Information Management (4):
http://www.freetechbooks.com/viewforum.php?f=31

Software Engineering (9):
http://www.freetechbooks.com/viewforum.php?f=15

Image Processing (2):
http://www.freetechbooks.com/viewforum.php?f=33

Game Development (9):
http://www.freetechbooks.com/viewforum.php?f=16




Filed under: Free Computer and I.T. Books — computer_teacher @ 10:04 pm


April 11, 2005

Free IT Training: Full Streaming Audio/Video and Cert. Practice Exams

Here are more great free learning resources and training content on the web that you can access today.

Learnkeydirect.com Expert Trainers in Full Streaming Audio/Video:
http://www.learnkeydirect.com/expert.asp

Learnkeydirect will give you full access (for a limited time) to see how you like their IT training! This is not a standard demo, everything is active, you get a complete module of their training for free. Interactive Labs are included so you can practice what you've learned and pre-tests and post tests at any time are available. Free registration is required.

************************************************************

Xams R Us:
http://www.xamsrus.com

This visitor suggested site offers over 50 Free Honest IT Certification Practice Exams. Free registration required. Practice exams include Cisco, CIW, CompTIA (A+, Network+, Server+, Security+, Linux+), Microsoft MCSE and MCSD, Oracle, Red Hat, and Security.

************************************************************

Introduction to Programming Using Java,
Version 4.1, June 2004:

http://math.hws.edu/javanotes/

Full Table of Contents:
http://math.hws.edu/javanotes/contents.html

Chapter 1: Overview: The Mental Landscape:
http://math.hws.edu/javanotes/c1/index.html

Chapter 2: Programming in the Small I: Names and Things:
http://math.hws.edu/javanotes/c2/index.html

Chapter 3: Programming in the Small II: Control:
http://math.hws.edu/javanotes/c3/index.html

Chapter 4: Programming in the Large I: Subroutines:
http://math.hws.edu/javanotes/c4/index.html

Chapter 5: Programming in the Large II: Objects and Classes:
http://math.hws.edu/javanotes/c5/index.html

Chapter 6: Applets, HTML, and GUI's:
http://math.hws.edu/javanotes/c6/index.html

Chapter 7: Advanced GUI Programming:
http://math.hws.edu/javanotes/c7/index.html

Chapter 8: Arrays:
http://math.hws.edu/javanotes/c8/index.html

Chapter 9: Correctness and Robustness:
http://math.hws.edu/javanotes/c9/index.html

Chapter 10: Advanced Input/Output:
http://math.hws.edu/javanotes/c10/index.html

Chapter 11: Linked Data Structures and Recursion:
http://math.hws.edu/javanotes/c11/index.html

Chapter 12: Generic Programming and Collection Classes:
http://math.hws.edu/javanotes/c12/index.html

Appendix 1: Other Features of Java:
http://math.hws.edu/javanotes/advanced.html

Appendix 2: Some Notes on Java Programming Environments:
http://math.hws.edu/javanotes/progenv.html

Appendix 3: Source Code for All Examples in this Book:
http://math.hws.edu/javanotes/source/index.html

************************************************************

Need Scripts:
http://www.needscripts.com

One stop Web Development Resource providing reviews, articles, code and information. Covers ASP, ASP.Net, C, C++, Flash, HTML, Java, JavaScript, Perl, PHP, Python, Visual Basic, XML, and tools and utilities.

************************************************************

Funducode:
http://www.funducode.com

Tutorials and code examples covering C, C++, C#, and .Net.



Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 2:10 pm


2 Free Book Sites

Here are 2 more free computer and IT book sites, the first one has many links to online documents and learning materials, and the 2nd one features 3 ebooks made up of many free online book chapters.

Free-itebooks.com:
http://www.free-itebooks.com

Many ebooks about programming are free to download at this site, covering C#, C++,C, Linux, VB, .Net, ASP, and Java.

************************************************************

PublicJoe's Programming Tutorial Website:
http://publicjoe.justbe.com/

A C#, VB.Net and general programming website aimed at the beginner or intermediate programmer. Here you will find a C# Tutorial and a VB.Net Tutorial. Also C# Articles, C# Snippets, a free C# eBook, a free VB.Net eBook and a free Visual C++ 6.0 eBook.

Free C# eBook:
http://publicjoe.justbe.com/csharp/samples/ebook.html

Free VB.Net eBook:
http://publicjoe.justbe.com/vbnet/samples/ebook.html

Free Visual C++ 6.0 eBook:
http://publicjoe.justbe.com/cpp/samples/ebook.html



Filed under: Free Computer and I.T. Books — computer_teacher @ 1:58 pm


April 6, 2005

Linux Security and Hacking Tutorials

Here is a great learning resource for becoming more acquainted with getting Linux more secure and understanding where you could be vulnerable.

Hacking Linux Exposed:
http://www.hackinglinuxexposed.com/articles/

These are excellent Linux security tutorial articles written by Brian Hatch.

Everyone Needs Backup:
http://www.hackinglinuxexposed.com/articles/20020219.html
Security with Obscurity is Great:
http://www.hackinglinuxexposed.com/articles/20020312.wml
No Reboot Necessary (OpenSSH):
http://www.hackinglinuxexposed.com/articles/20020319.html
The Hazards of Inconsistency:
http://www.hackinglinuxexposed.com/articles/20020402.html
Our Electronic Entry System:
http://www.hackinglinuxexposed.com/articles/20020409.html
SSL is Not a Magic Bullet:
http://www.hackinglinuxexposed.com/articles/20020423.html
Challenging the Man-in-the-Middle:
http://www.hackinglinuxexposed.com/articles/20020416.html
Solution to Challenging the Man in the Middle:
http://www.hackinglinuxexposed.com/articles/20020430.html
Recovering files from /Proc:
http://www.hackinglinuxexposed.com/articles/20020507.html
Investigating Processes, Part 1:
http://www.hackinglinuxexposed.com/articles/20020514.html
Our Continuing /proc and lsof Investigation:
http://www.hackinglinuxexposed.com/articles/20020521.html
Sign Everything, My Friends:
http://www.hackinglinuxexposed.com/articles/20020528.html
Architecture Diversity: A Security Perspective:
http://www.hackinglinuxexposed.com/articles/20020611.html
Boot Access is Root Access:
http://www.hackinglinuxexposed.com/articles/20020618.html
Hardening LILO Against Unauthorized Access:
http://www.hackinglinuxexposed.com/articles/20020625.html
Another Backdoor to Root Access:
http://www.hackinglinuxexposed.com/articles/20020702.html
Using DJBDNS and Getting Out of a BIND:
Installing the DJBDNS Software:
http://www.hackinglinuxexposed.com/articles/20020723.html
DJBDNS: The Pieces:
http://www.hackinglinuxexposed.com/articles/20020730.html
Making the Conversion: From BIND to tinydns:
http://www.hackinglinuxexposed.com/articles/20020806.html
Wrapping Up DJBDNS:
http://www.hackinglinuxexposed.com/articles/20020813.html
Executing Code From Non-executable Files:
http://www.hackinglinuxexposed.com/articles/20020827.html
Stunnel 4.00 Builds on Prior Success:
http://www.hackinglinuxexposed.com/articles/20020910.html
Greasing the Squeaky Wheels:
http://www.hackinglinuxexposed.com/articles/20020917.html
A Slap Upside the Head:
http://www.hackinglinuxexposed.com/articles/20020924.html
Creating an Anonymous FTP server with Publicfile:
http://www.hackinglinuxexposed.com/articles/20021001.html
Ten minute Firewall:
http://www.hackinglinuxexposed.com/articles/20021008.html
Firewalling /proc entries:
http://www.hackinglinuxexposed.com/articles/20021015.html
Vet the code or pay the price:
http://www.hackinglinuxexposed.com/articles/20021022.html
Audit trails are vital for post-compromise investigations:
http://www.hackinglinuxexposed.com/articles/20021106.html
Identifying a deleted account:
http://www.hackinglinuxexposed.com/articles/20021113.html
Keeping User-Level Access When Locked Out:
http://www.hackinglinuxexposed.com/articles/20021120.html
Challenge: How Did These Processes Get Here?:
http://www.hackinglinuxexposed.com/articles/20021127.html
/etc/inittab - The Most Overlooked Cracker Haven:
http://www.hackinglinuxexposed.com/articles/20021205.html
Secure Passwordless Logins with SSH Part 1:
http://www.hackinglinuxexposed.com/articles/20021211.html
Secure Passwordless Logins with SSH Part 2:
http://www.hackinglinuxexposed.com/articles/20021226.html
Secure Passwordless Logins with SSH Part 3:
http://www.hackinglinuxexposed.com/articles/20030109.html
The Authprogs SSH Command Authenticator (Passwordless SSH part 4):
http://www.hackinglinuxexposed.com/articles/20030115.html
Home grown crypto is bad crypto:
http://www.hackinglinuxexposed.com/articles/20030122.html
Cracking an algorithm bit by bit conclusion:
http://www.hackinglinuxexposed.com/articles/20030205.html
Egress filtering for a healthier Internet:
http://www.hackinglinuxexposed.com/articles/20030213.html
Preventing Syslog Denial of Service attacks:
http://www.hackinglinuxexposed.com/articles/20030220.html
SSH Tunneling part 1 - Local Forwarding:
http://www.hackinglinuxexposed.com/articles/20030228.html
SSH Tunneling part 2 - Remote Forwarding:
http://www.hackinglinuxexposed.com/articles/20030309.html
SSH Tunneling part 3 - Where does the crypto end?:
http://www.hackinglinuxexposed.com/articles/20030316.html
Beware the Ides of March:
http://www.hackinglinuxexposed.com/articles/20030323.html
The Upgrade Process: Restarting vs Rebooting:
http://www.hackinglinuxexposed.com/articles/20030409.html
Linux File Permission Confusion:
http://www.hackinglinuxexposed.com/articles/20030417.html
Linux File Permission Confusion pt 2:
http://www.hackinglinuxexposed.com/articles/20030424.html
Linux: the Securable Operating System:
http://www.hackinglinuxexposed.com/articles/20030427.html
Who's listening on that port?:
http://www.hackinglinuxexposed.com/articles/20030515.html
/proc/config offers a post-intrusion clue:
http://www.hackinglinuxexposed.com/articles/20030522.html
Linux file locking mechanisms - Flock, Lockf, and Fcntl:
http://www.hackinglinuxexposed.com/articles/20030616.html
Linux file locking mechanisms - Mandatory Locking:
http://www.hackinglinuxexposed.com/articles/20030623.html
Ten minute host firewall, Part 1:
http://www.hackinglinuxexposed.com/articles/20030703.html
Ten minute host firewall, Part 2:
http://www.hackinglinuxexposed.com/articles/20030709.html
Using iptables chains to simplify kernel ACL management:
http://www.hackinglinuxexposed.com/articles/20030722.html
Sniffing with Net::Pcap to stealthily managing iptables rules remotely, Part 1:
http://www.hackinglinuxexposed.com/articles/20030730.html
Running programs in response to sniffed DNS packets - stealthily managing iptables rules remotely, Part 2:
http://www.hackinglinuxexposed.com/articles/20030814.html
Running custom DNS queries - stealthily managing iptables rules remotely, Part 3:
http://www.hackinglinuxexposed.com/articles/20030825.html
The wrong way to upgrade your RPMs:
http://www.hackinglinuxexposed.com/articles/20030911.html
Nmap Version Detection Rocks:
http://www.hackinglinuxexposed.com/articles/20031006.html
File and email encryption with GnuPG (PGP) part one
http://www.hackinglinuxexposed.com/articles/20031204.html
The mysteriously persistently exploitable program explained:
http://www.hackinglinuxexposed.com/articles/20031214.html
File and email encryption with GnuPG (PGP), part 2:
http://www.hackinglinuxexposed.com/articles/20031231.html
File and email encryption with GnuPG (PGP) part 3:
http://www.hackinglinuxexposed.com/articles/20040219.html
File and email encryption with GnuPG (PGP) part 4:
http://www.hackinglinuxexposed.com/articles/20040311.html
File and email encryption with GnuPG (PGP) part 5:
http://www.hackinglinuxexposed.com/articles/20040414.html
File and email encryption with GnuPG (PGP) part 6:
http://www.hackinglinuxexposed.com/articles/20040427.html
The ease of (ab)using X11, Part 1:
http://www.hackinglinuxexposed.com/articles/20040513.html
The ease of (ab)using X11, Part 2:
http://www.hackinglinuxexposed.com/articles/20040608.html
SSH Users beware: The hazards of X11 forwarding:
http://www.hackinglinuxexposed.com/articles/20040705.html
SSH Bouncing - How to get through firewalls easily:
http://www.hackinglinuxexposed.com/articles/20040830.html
SSH Bouncing - How to get through firewalls easily, Part 2:
http://www.hackinglinuxexposed.com/articles/20040923.html
The big Hiatus:
http://www.hackinglinuxexposed.com/articles/20041127.html



Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 10:12 pm


Powered by WordPress