Intelligentedu
Best New Free Computer IT Training Tutorial Resources


May 27, 2009

Free Oracle DBA Courseware

Here are DBAmetrix Solutions' series of Oracle DBA Courseware that provides free Oracle training via "Learn by Presentation". These free multimedia presentations will help you learn and understand Oracle processes and its fundamental structures. They cover Oracle internals and advanced topics, such as performance tuning, security, automation, Oracle errors, and expert DBA troubleshooting. These learning and training materials are offered in .swf (Flash) and .avi formats. (Free registration is required.)

Free Oracle Training Courseware:
 - Oracle SGA in Nutshell - 9i, 10g, 11g - beginner, intermediate
 - Virtual Index: Oracle Hidden Feature - version 9i - experienced
 - Oracle DBA interview questions - 9i, 10g - beginner, intermediate, experienced
 - Redo Log In Depth  - 9i, 10g, 11g - experienced
 - Oracle 10g Administration I (1Z0-042) - 10g - beginner, intermediate



Tags for this post>>


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 9:09 pm


May 20, 2009

Computer and Programming eBooks at bookvnn.com

Here is bookvnn.com where you can find freely available download links to many Computer and Programming eBooks, as shown in the category links here.


eBook Categories:

 - Ajax
 - Algorithms
 - Business & Investing
 - C & C++
 - Computers & IT
 - Database
 - Delphi
 - Development for Web
 - Dot NET
 - English
 - General programming
 - Graphics & Design
 - Java
 - Magazine
 - Mini Games
 - Networks
 - Office (Access and Excel)
 - Operating System
 - Perl
 - PHP
 - Python
 - Science & Engineering
 - Security
 - Software Development
 - Tutorials & Guide
 - UML
 - Uncategorized
 - Video Training
 - XML



Tags for this post>> |


Filed under: Free Computer and I.T. Books — computer_teacher @ 9:31 pm


May 14, 2009

Many Programming and IT Certification eBooks

Here are many, many downloadable Programming eBooks and Certification Preparation Study Manuals and Books for several technologies, including Linux, Sun, Oracle, Cisco, and Microsoft. Many of the topics for these ebooks and prep guides are listed below.

Update Jan. 8, 2011: There are more freely available ebooks on this site at this location.


Technical and Programming Topics of these ebooks:

 - C++ Programming
 - C Programming
 - Java Programming
 - JSP, Struts
 - Web Design
 - PHP and MySQL
 - C# Programming
 - ASP.NET
 - XML
 - DOM
 - UML
 - Agile Development
 - Extreme Programming
 - Algorithms
 - Security and SSCP
 - Linux Kernel
 - Linux Shell Scripting
 - Linux+ Certification
 - Red Hat RHCE Preparation
 - Sun Certification Preparation
 - Oracle Certification Preparation
 - Database Design, SQL
 - Cisco
 - Networking
 - 4G Wireless, WLAN, WPAN
 - 3G Networks
 - System Architecture
 - Microsoft Certification Prep
 - MCSE, MCSA
 - 3D Game Programming DirectX
 - SQL Server
 - Windows Server 2003
 - Visual Basic .NET (VB.Net)
 - Assembly
 - Bioinformatics
 - Fiber Optics
 - Neural Networks
 - Electricity and Electronics
 - AutoCAD



Tags for this post>> | | | | | | | | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 10:35 pm


May 13, 2009

C# Programming Online Book

Here is an intensive C# tutorial in the form of an online book titled, C# Essentials, hosted by techotopia.com. This C# programming book contains 27 chapters of detailed information that provides everything you need to begin using C# or to increase your C# programming skills and proficiency. C Sharp topics covered include flow control, looping, variables, constants, operators and object-oriented programming (such as inheritance, polymorphism, and abstract classes). Also demonstrated are string manipulation and formatting, and working with arrays and collection of classes.


C# Essentials Table of Contents:

About C# Essentials

The C# Language and Environment
 - A Brief History of Computer Programming Languages
 - What exactly is C#?
 - The Common Language Infrastructure (CLI)
 - Common Intermediate Language (CIL)
 - Virtual Execution System (VES)
 - Common Type System (CTS) & Common Language Specification (CLS)
 - The Framework (Base Class and Framework Class Libraries)
 - Non Microsoft Implementations of the CLI

A Simple C# Console Application
 - Options for Installing a C# Environment
 - C# Source File Naming Conventions
 - Creating a Sample C# Program
 - Compiling C# Code From the Command Line
 - Executing a Compiled C# Program

Creating a Simple C# GUI Application with Visual Studio
 - Installing Visual Studio with C# Support
 - Creating a new Visual Studio C# Project
 - Adding Components to the Windows Form
 - Changing Component Names
 - Changing Component Properties
 - Adding Behavior to a Visual Studio C# Application

C# Variables and Constants
 - What is a C# Variable?
 - What is a C# Constant?
 - C# Integer Variable Types
 - C# Floating Point Variables
 - The C# Decimal Variable Type
 - C# Boolean Variable Type
 - C# Character Variable Type
 - C# String Variables
 - Casting Variable Types in C#

C# Operators and Expressions
 - What is an Expression?
 - The Basic Assignment Operator
 - C# Arithmetic Operators
 - C# Operator Precedence
 - Compound Assignment Operators
 - Increment and Decrement Operators
 - Comparison Operators
 - Boolean Logical Operators
 - The Ternary Operator

C# Flow Control Using if and else
 - Using the if Statement
 - Using if  else  Statements
 - Using if  else  if  Statements

The C# switch Statement
 - Why Use a switch Statement?
 - Using the switch Statement Syntax
 - A switch Statement Example
 - Explaining the Example
 - Using goto in a C# switch Statement
 - Using continue in a C# switch Statement

C# Looping - The for Statement
 - The C# for Loop
 - C# Loop Variable Scope
 - Creating an Infinite for Loop
 - Breaking Out of a for Loop
 - Nested for Loops
 - Breaking From Nested Loops
 - Continuing for Loops

C# Looping with do and while Statements
 - The C# while Loop
 - C# do ... while loops
 - Breaking from Loops
 - The continue Statement

C# Object Oriented Programming
 - What is an Object?
 - What is a Class?
 - Declaring a C# Class
 - Creating C# Class Members
 - Static, Read-only and Const Data Members
 - Instantiating an Object from a C# Class
 - Accessing C# Object Members
 - Adding Methods to a C# Class
 - C# Constructors and Finalizers

C# Inheritance
 - What is Inheritance?
 - An Example of Inheritance
 - Creating a Subclass in C#
 - Passing Arguments to the Base Class Constructor

Understanding C# Abstract Classes
 - What is a C# Abstract Class?
 - Abstract Members
 - Declaring a C# Abstract Class
 - Deriving from an Abstract Class
 - The Difference Between abstract and virtual Members

Introducing C# Arrays
 - Creating Arrays in C#
 - Declaring a Multidimensional Array
 - Accessing Array Values
 - Getting the Length of an Array
 - Sorting and Manipulating C# Arrays

C# List and ArrayList Collections
 - What are C# Collection Classes
 - Creating C# List Collections - List<T> and ArrayList
 - Adding Items to Lists
 - Accessing List Items
 - Removing Items From Lists
 - Inserting Items into a C# List
 - Sorting Lists in C#
 - Finding Items in a C# List or ArrayList
 - Obtaining Information About a List
 - Clearing and Trimming C# Lists

Working with Strings in C#
 - Creating Strings in C#
 - Obtaining the Length of a C# String
 - Treating Strings as Arrays
 - Concatenating Strings in C#
 - Comparing Strings in C#
 - Changing String Case
 - Splitting a C# String into Multiple Parts
 - Trimming and Padding C# Strings
 - C# String Replacement

Formatting Strings in C#
 - The Syntax of the String.Format() Method
 - A Simple C# String Format Example
 - Using Format Controls
 - As Simple Format Control Example
 - The C# String.Format() Format Controls

Working with Dates and Times in C#
 - Creating a C# Date Time Objects
 - Getting the Current System Time and Date
 - Adding or Subtracting from Dates and Times
 - Retrieving Parts of a Date and Time
 - Formatting Dates and Times in C#

C# and Windows Forms
 - Creating a New Form
 - Changing the Form Name
 - Changing the Form Title
 - Changing the Form Background Color
 - Changing The Form Background Image
 - Configuring the Minimize, Maximize and Close Buttons
 - Setting Minimum and Maximum Form Sizes
 - Specifying the Position of a Form on the Display
 - Changing the Form Border
 - Stopping a Form from Appearing the Windows Taskbar
 - Creating a Transparent Form

Designing Forms in C# and Visual Studio
 - Visual Basic Forms and Controls
 - Double Clicking the Control in the Toolbox
 - Dragging a Dropping Controls onto the Form
 - Drawing a Control on the Form
 - Positioning and Sizing Controls Using the Grid
 - Positioning Controls Using Snap Lines
 - Selecting Multiple Controls
 - Aligning and Sizing Groups of Controls
 - Setting Properties on a Group of Controls
 - Anchoring and Auto sizing Form Controls
 - Setting Tab Order in a Form

Understanding C# GUI Events
 - Event Triggers
 - Wiring Up Events in Visual Studio
 - Compile and Running the Application
 - Setting Up a C# Timer Event

C# Events and Event Parameters
 - The Anatomy of an Event Handler
 - A C# EventArgs Example
 - C# EventArg Object Properties
 - Identifying which Mouse Button was Clicked

Hiding and Showing Forms in C#
 - Creating a C# Application Containing Multiple Forms
 - Understanding Modal and Non-modal Forms
 - Writing C# Code to Display a Non-Modal Form
 - Writing C# Code to Display a Modal Form
 - Hiding Forms in C#
 - Closing Forms in C#

Creating Top-Level Menus in C#
 - Creating a Top-Level Menu
 - Deleting and Moving Menu Items
 - Assigning Keyboard Shortcuts to Menu Items
 - Programming Menu Items in C#

Creating Context Menus in C#
 - Adding Context Menus to a C# Form
 - Associating a Component with a Context Menu
 - Programming C# Context Menu Options
 - Compiling and Running the Application

Building a Toolbar with C# and Visual Studio
 - Creating a Toolbar
 - Adding Tooltip Text to Toolbar Controls
 - Programming Toolbar Controls
 - Changing the Toolbar Position

Drawing Graphics in C#
 - Persistent Graphics
 - Creating a Graphics Object
 - Creating a Pen In C#
 - Drawing Lines in C#
 - Drawing Squares and Rectangles in C#
 - Drawing Ellipses and Circles in C#
 - Drawing Text with C#

Using Bitmaps for Persistent Graphics in C#
 - Why Use Bitmaps for Graphics Persistence in C#?
 - Creating a Bitmap
 - Instantiating a Bitmap and Creating a Graphics Object
 - Drawing onto the Bitmap
 - Rendering a Bitmap Image on a Control
 - Changing the Background Color of a Bitmap



Tags for this post>>




Windows Server 2008 and Terminal Services Videos

These video tutorials on Windows Server 2008 and Windows Server Terminal Services at Microsoft TechNet explain some aspects of managing these two technologies. Windows Server 2008 is the latest version of Microsoft Windows’ server based operating systems. Windows Server Terminal Services permit users to connect to a remote computer's desktop over a network, so they can gain access to applications or to the desktop. It is Microsoft's implementation of thin-client terminal server computing.


Windows Server 2008 How-to Videos
The first video tutorial here provides a quick overview of how to modify boot records in Windows Vista and Windows Server 2008 using BCDEDIT. The second video explains the Read Only Domain Controllers which allows domain controllers to be deployed in locations where security is a concern. The last one teaches you how Group Policy can be set up and managed in Windows Vista and Windows Server 2008. This includes the new format of Group Policy templates, the central store and multiple group policies. See this Windows Server 2008 Technet site for more information about this operating system.

 - Modifying Boot Records in Windows Vista and Windows Server 2008 Using BCDEDIT
 - Windows Server 2008 Read Only Domain Controllers - Password Replication Policies
 - Using Group Policy in Windows Vista and Windows Server 2008


Windows Server Terminal Services How-to Videos
The Overview of Terminal Services video tutorial provides a quick overview of the new features available in Terminal Services. The TS Gateway Server video tutorial explains the TS Gateway that enables a secure scenario and authorizes remote users to connect to resources. The last video tutorial in this section explains about the RemoteApp capabilities in Terminal Services, which allow the sharing of applications. For more information about this technology, please see Windows Server Terminal Services Home, Terminal Services Step-by-Step Guides, and Terminal Services in Windows Server 2008.

 - Overview of Terminal Services
 - Terminal Services - TS Gateway Server
 - Terminal Services - RemoteApp



Tags for this post>>


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 10:02 pm


May 12, 2009

Many IT and Programming eBooks

Here are many Computer, I.T., and Programming eBooks that you can download immediately. These are in pdf and chm format, and some of the downloads are in a compressed format. These ebooks were linked from this earlier post of mine, but that site is not longer online.


eBook Topics at this site:

  • Java, J2ME, JSP, Jakarta Struts, Wireless Java, Java Certification,
  • Ajax, Eclipse, Rails, Ruby, C++ Programming, C# (C Sharp), Python, Game Programming, Subversion
  • PHP, Perl, HTML, CGI, Tcl-Tk, XML, Apache, Tomcat
  • Linux, Red Hat Linux, RHCE, JBoss, Debian Linux, Programming Linux, Slackware, Linux Kernel, Ubuntu, Bash
  • Unix, Solaris, AIX, Unix Programming, Shell Programming
  • MySQL, Oracle 10g, Oralce PL-SQL, DB2, PostgreSQL, JDBC, Data Mining, Data Structures, 
  • Cisco, Firewalls, Linux Networking, Internet Security, Zope, Samba, LDAP, Networking Performance, SOAP, VPN, VOIP, DNS




Tags for this post>> |

Filed under: Free Computer and I.T. Books — computer_teacher @ 8:55 pm


XML, GWT, and PHP Tutorial from IBM Developworks

Here is an excellent XML, GWT, and PHP Tutorial at ibm.com/developerworks that explains the bridge between GWT and PHP using XML. Applications created using GWT (Google Web Toolkit) uses PHP web services to send and receive information in XML. GWT allows the creation and access of servlets in Java through which data can be passed between clients and servers. GWT does not limit communication with such servlets, but can freely communicate with almost all types of web services. This web development tutorial discusses and demonstrates these concepts in detail. You can also download (pdf) this tutorial, titled XML: The bridge between GWT and PHP Tutorial.


A test application
This section provides a step-by-step explanation to create a simple applications using XML, PHP and the Google Web Toolkit (GWT). This example shows how to use XML as a bridge between PHP and GWT.

Sending XML with PHP
This section uses a simple form to send XML data using PHP. The XML data that is sent is used to demonstrate XML’s many capabilities.

Processing XML with GWT
Google Web Toolkit provides the XMLParser for reading and writing XML. For this section, the GWT documentation is provided for further reference.

Sending XML with GWT
Applications in GWT allow users to edit various fields and then send this updated data back to the database. This section discusses two algorithms used to send XML with GWT.

Reading XML in PHP
This section discusses how XML data can be read and manipulated in PHP using elements of arrays or directly, as attributes of the XML object.

Conclusion
The conclusion explains the relation between XML, GWT and PHP.

Downloads
The code that is used for the examples for all the sections discussed above are available for download here.

Resources
Further learning material and additional resources for XML, GWT and PHP are provided here.



Tags for this post>> | | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 8:14 pm


May 9, 2009

8 Java Programming eBooks

Here are 8 Java Programming eBooks and 2 tutorials for running JUnit. These downloadable Java ebooks will help you with your training efforts to become a better and more efficient Java programmer.


Java Programming ebook (711 pages, 3.9mb, pdf)

Extreme Java Programming ebook (358 pages, 2.2mb, pdf)

Java Programming Reference ebook (rar)

Java Threads ebook (219 pages, 1.3mb, pdf)

Java Servlet and JSP ebook (3.2mb, chm)

3 JSP ebooks (2 chm, 1 pdf)

JUnit in Eclipse (9 pages, 110kb, pdf)

JUnit Testing Utility Tutorial (6 pages, 25kb, pdf)



Tags for this post>> |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 11:15 pm


May 7, 2009

Downloadable IT and Programming eBooks

Here are many freely available, downloadable Computer, Information Technology and Programming eBooks in pdf and chm formats.


Technical, Computer, and Programming eBooks
This directory provides programming and technical ebooks in the areas below.

eBooks on Programing Languages:

ClientScript
 - JavaScript eBooks

Language
 - C
 - Classics
 - Delphi
 - Delpi
 - Java
 - Project manadgment
 - Ruby
 - Theory
 - UML
 - Visual basic

Server Script
 - ASP
 - avaScriptServer
 - PHP
 - Perl
 - Pyton
 - SSI

Operating System eBooks: Linux, Unix, and Windows

Java 2 Web Developer Certification eBook

C++ Distributed programming ebook

MSCE CIW Site Designer and Foundation eBooks


Networking eBooks

Computer Security eBooks

eBooks for Flash, Fireworks, Dreamweaver, Director, Authorware, and Cold Fusion


Programming and I.T. eBooks
This directory contains I.T. and programming ebooks in areas such as A+ Certification, C++ Programming, Web Development, ASP.Net, C# Programming,  Cisco, Algorithms, Engineering, and Graphics.

JavaScript and XHTML eBooks

Extreme Programming eBook

Unix eBooks

Programming Languages eBooks:
 - Assembler
 - C and C++
 - C_sharp
 - Caml
 - Delphi
 - Fortran
 - Java and JavaScript
 - PHP4
 - Pascal
 - Perl
 - SQL
 - VB

More Technical and Programming eBooks



Tags for this post>> | | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 10:38 pm


3 Javascript and AJAX Tutorials

These three tutorials on Javascript and AJAX at ibm.com/developerworks introduce and teach you server side scripting, remote function calls and generation of Javascript code with JSP tag files. These Javascript and Ajax learning materials show you how to execute scripts that access Java objects on the server and manipulate them, and generate dynamic Javascript code. Each of these tutorials is accompanied by their respective code samples, in the text and also available for download for later use.


JavaScript EE, Part 1: Run JavaScript files on the server side
This Javascript tutorial explains the running of Javascript scripts on the server and how they respond to calls made to them. These server side scripts will have access to implicit objects in JSP pages, such as request and response. The accompanied code explains this in detail. The pdf file for this tutorial can be downloaded from here.

 - Using the javax.script API
 - Building a script runner
 - Developing server-side scripts
 - Download and Resources


JavaScript EE, Part 2: Call remote JavaScript functions with Ajax
This Javascript-Ajax tutorial provides an in-depth explanation of how remote calls to Javascript functions with Ajax work. To do this, the creation and implementation of a JVM monitoring application is explained. The demonstrated application monitors calls made to Ajax. The pdf file for this tutorial can be downloaded from here.

 - Developing a JVM-monitoring application
 - Building the XMLHttpRequest wrapper
 - Implementing the JavaScript-RPC mechanism
 - Download and Resources


Ajax and Java development made simpler, Part 1: Generate JavaScript code dynamically with JSP tag files
This tutorial explains the generation of dynamic Javascript code with JSP tag files. The use of frameworks and code generators are discussed along with various development tips that will help build better components. The pdf file for this tutorial can be downloaded from here.

 - Using frameworks and code generators
 - Creating a simple Ajax application
 - Developing the JavaScript functions
 - Using JSP tag files to generate JavaScript code
 - Download and Resources



Tags for this post>> |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 8:08 pm


May 6, 2009

ASP.Net AJAX Tutorials and Cheat Sheets

Here are 6 ASP .Net AJAX Tutorials and 7 AJAX Library Cheat Sheets. These tutorials and sheets explain and demonstrate ASP .Net Ajax by showing and exploring techniques in building ASP .Net applications. The Ajax tutorials describe various topics, such as partial page updates, UpdatePanel triggers, authentication and profile application services, and localization. The Ajax Library Cheat Sheets list the commonly used methods and types.


6 ASP .Net AJAX Tutorials

#1 Understanding Partial Page Updates with ASP .Net AJAX
This tutorial will teach you about ASP .Net AJAX Extensions which has the ability to do partial or incremental updates with out doing a full post back to the web server.

#2 Understanding ASP .Net AJAX UpdatePanel Triggers
This tutorial explains about one of  the two child elements of an UpdatePanel control, the Triggers element, which specifies the controls on the page that will trigger a partial render of the UpdatePanel control in which the element resides.

#3 Understanding ASP .Net AJAX Authentication and Profile Application Services
This tutorial explains about the Authentication service which allows users to provide credentials in order to receive an authentication cookie, and is the gateway service to allow custom user profiles provided by ASP .Net.

#4 Understanding ASP .Net AJAX Localization
This tutorial explains about Localization which is the process of designing and integrating support for a specific language and culture into an application or an application component.

#5 Understanding ASP .Net AJAX Web Services
This tutorial explains about ASP .Net AJAX web services which are an integral part of the .NET framework that provide a cross-platform solution for exchanging data between distributed systems.

#6 Understanding ASP .Net AJAX Debugging Capabilities
This tutorial explains about various debugging techniques which could be very useful for a ASP .Net AJAX programmer.


7 AJAX Library Cheat Sheets
These are seven pdfs in one zip download.

MS Ajax Array extensions
This cheat sheet list out array type extensions available in Microsoft Ajax Library. This pdf document helps to remember the functions and operations that can be done with arrays.

MS Ajax Client Life-Cycle Events
This sheet shows the ASP .Net AJAX life cycle events with a diagram. This pdf also lists out PageRequestManager and Application events.

MS Ajax Date and Boolean extensions
This cheat sheet lists out the boolean type extensions and date type extensions of Microsoft Ajax library.

MS Ajax DomElement class
This pdf document lists out the DomElement class and its methods.

MS Ajax DomEvent class
This cheat sheet lists out the event handlers of DomEvent. This pdf also lists the event properties and its description.

MS Ajax Number and Error extensions
This cheat sheet list out the Number type extensions and error type extensions with sample code.

MS Ajax String and Object extensions
This cheat sheet lists out the String and Object type extensions available in the Microsoft Ajax Library.



Tags for this post>> |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 9:50 pm


May 5, 2009

Learn to Program Tutorial using Ruby

Here is a nice Learn to Program Tutorial that explains how to program using Ruby as the programming language. This tutorial is arranged in such a manner that a beginner programmer will find it easy to get started using the syntaxes, control flows, etc. of the programming language.


Contents of Learn to Program Tutorial:

Getting Started
In this lesson the simplicity, power and benefits of Ruby are explained. The installation of Ruby in Windows, Macintosh and Linux are also explained here.

Numbers
Numbers are very important in programming. This lesson details about integer, float, simple arithmetic and printing the output to screen.

Letters
Strings are used in every programming language. This lesson explains about strings in Ruby and its manipulations.

Variables and Assignment
To store a number or a string and assign a name to that value for reference purposes we use variables. This lesson explains how variables are declared and converted with examples.

Mixing It Up
In this lesson the author talks about the functions which can be used to cast the variables to get the required output. It also explains how to get a user input to the program.

More About Methods
This lesson explains about methods and its usage with examples. String, arithmetic, random methods are also explained here.

Flow Control
We can control the flow of the program using comparison, branching and looping. This lesson explains about different ways to do this.

Arrays and Iterators
This lesson describes about arrays and iterators used to process the data in array in Ruby. Different array methods are also explained here.

Writing Your Own Methods
Ruby methods are very similar to normal functions which are used to bundle one or more repeatable statements into a single unit. This lesson tells how to create your own methods, methods with parameters, local variables and return values of methods.

Classes
Ruby is considered a pure object-oriented language, which consists of objects that are instances of some class. This lesson explains different classes available in Ruby and how to extend that. This lesson also explains how to create a class and its members.

Blocks and Procs
This lesson explains about Blocks and Procs which is the coolest feature of Ruby. The different usage of procs are explained with examples here.

Beyond This Tutorial
The resources and references explained in this lesson helps in Ruby programming.



Tags for this post>> | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 3:14 pm


May 4, 2009

Security+ Essentials Online Book

Here is an excellent online book at techotopia, Security+ Essentials Online Book, that provides essential computer and networking security information. This computer security book gives you the knowledge needed to pass the CompTIA Security+ certification exam. It provides a clear understanding of both the threats faced by I.T. and with implementing a comprehensive security infrastructure. The 15 sections cover a variety of computer security topics and will assist anyone who needs to understand these when deploying and administering a secure I.T. environment.


Table of Contents  of Security+ Essentials:

About Security+ Essentials

Mandatory, Discretionary, Role and Rule Based Access Control
 - An Overview of Access Control
 - Mandatory Access Control
 - Discretionary Access Control
 - Role Based Access Control
 - Rule Based Access Control

Authentication and Identity Verification
 - What is Authentication?
 - Username and Password
 - Challenge Handshake Authentication Protocol (CHAP)
 - Kerberos Authentication
 - Mutual Authentication
 - Certificates
 - Authentication using Tokens
 - Biometrics

An Overview of IT Security Threats and Attacks
 - TCP and UDP Based Denial of Service (DoS) Attacks
 - Distributed Denial of Service (DDoS) Attacks
 - Back Door Attacks
 - IP and DNS Spoofing Attacks
 - Man in the Middle Attacks
 - Replay Attacks
 - TCP/IP Hijacking
 - Mathematical Attacks
 - Password Guessing
 - Brute Force Password Attacks
 - Dictionary Password Attacks
 - Password Cracking

Software Exploitation, Malicious Code and Social Engineering
 - Software Exploitation
 - Malicious Code
 - Viruses
 - Trojan Horses
 - Logic Bombs
 - Worms
 - Social Engineering

Identifying Common and Nonessential TCP/IP Ports and Services
 - Understanding Ports and Services
 - Securing Ports and Services
 - Port Scanning
 - Primary TCP/IP Ports and Assignments

Understanding Communications Security
 - Remote Access
 - Virtual Private Network (VPN) Communications
 - Point-to-Point-Tunneling Protocol (PPTP)
 - Layer 2 Tunneling Protocol (L2TP)
 - Internet Protocol Security (IPSec)
 - 802.11x Wireless Connections
 - Dial-Up Access
 - Terminal Access Controller Access Control System (TACACS)
 - Remote Authentication Dial-In User Service (RADIUS)
 - Terminal Access Controller Access Control System Plus(TACACS+)
 - Secure Shell (SSH)

The Basics of Email and Web Security
 - Email Security
 - Pretty Good Privacy (PGP)
 - Secure Multipurpose Internet Mail Extension (S/MIME)
 - Dealing with Spam Email
 - Web Based Security (SSL and TLS)

IT Infrastructure Security
 - Understanding Firewalls
 - Packet-Filtering Firewalls
 - Proxy Service Firewalls
 - Stateful Inspection Firewalls
 - Routers
 - Switches
 - Wireless
 - DSL and Cable Modems
 - Remote Access Service (RAS)
 - Telecom/PBX
 - Virtual Private Networks (VPN)
 - Intrusion Detection Systems (IDSs)
 - Network Monitoring and Diagnostics
 - Simple Network Management Protocol (SNMP)

IT Media Security Basics
 - Cable Media
 - Coax Cable
 - Shielded and Unshielded Twisted Pair Cable (UTP/STP)
 - Fiber Optic Cable
 - Removable Storage Media
 - Hard Drives
 - Diskettes
 - Tape Storage
 - CD-R/DVD
 - Electronic Media

Network Security Topologies
 - DMZ
 - Internet
 - Intranet
 - Extranet
 - Virtual Local Area Network (VLAN)
 - Network Address Translation (NAT)
 - Tunneling

Intrusion Detection Systems
 - An Overview of Intrusion Detection Systems
 - IDS Architecture
 - Host-based Intrusion Detections Systems (HIDS)
 - Strengths of Host-based Intrusion Detection Systems
 - Weaknesses of Host-based Intrusion Detection Systems
 - Network-based Intrusion Detection Systems (NIDS)
 - Strengths of Network-based Intrusion Detection Systems
 - Weaknesses of Network-based Intrusion Detection Systems
 - Responding to Incidents

Security Baselines and Operating System, Network and Application Hardening
 - Security Baselines
 - Operating System Hardening
 - Network Hardening
 - Application Hardening
 - Web Servers
 - Email Servers
 - FTP Servers
 - DNS Servers

Cryptography Basics
 - What is Cryptography?
 - Algorithms
 - Hashing Algorithms
 - Symmetric Encryption Algorithms
 - Data Encryption Standard (DES)
 - Triple DES (3DES)
 - Advanced Encryption Standard (AES)
 - Blowfish
 - International Data Encryption Algorithm (IDEA)
 - CAST
 - Rivest Cipher (RC2, RC3, RC4, RC5, RC6)
 - Asymmetric Algorithms
 - RSA
 - Diffie-Hellman
 - ElGamal
 - Elliptic Curve Cryptography (ECC)
 - Cryptography Usage
 - Confidentiality
 - Integrity
 - Nonrepudiation
 - Authentication
 - Digital Signatures

An Overview of Public Key Infrastructures (PKI)
 - What is a Public Key Infrastructure?
 - Certificate Authorities (CA)
 - Registration Authorities (RA)
 - Certificate Repositories
 - Digital Certificate Structure
 - Certificate Lifecycles and Key Management
 - Centralized and Decentralized Infrastructures



Tags for this post>> |




7 API Design Tutorials and Guidelines

These seven API Design and Best Practices Tutorials explain why APIs are required and why their design is very important, requiring a good amount of time and effort. These API Design tutorials and guidelines explain the salient features of API design and their intricacies.  An Application Programming Interface (API) comprises reusable functionality accessible through parameterized commands or functions. Examples include the Java and .NET class libraries, the C++ standard template library, and the system calls exposed by operating systems. An API serves as a foundation for creating applications by saving programmers the time necessary to code basic functionality from scratch.


How to Design a Good API and Why it Matters
This document explains how a good API is written and how it would affect customers. (49 pages, 566 kb, pdf format)
Why is API Design Important to You?
 - If you program, you are an API designer
     Good code is modular–each module has an API
 - Useful modules tend to get reused
     Once module has users, can’t change API at will
     Good reusable modules are corporate assets
 - Thinking in terms of APIs improves code quality

Why are APIs Difficult to Learn and Use?
APIs are difficult to write as it deals with system components. This technical paper explains this concept in detail. (7 pages, 144 kb, pdf format)

Java API Design Guidelines
Learn how to design effective Java APIs that can be used in various software applications.

API Design Guidelines
All APIs have design guidelines and this document explains these guidelines in detail.

How To Design a (module) API
Modular APIs are the way to go when designing complex ones, and this API tutorial explains this concept in detail.

API Design Matters
There are good APIs and bad APIs and this tutorial explains both with code samples.

How to Design Good APIs and Why They Matter
This tutorial explains why an API design is important and also talks about the methodology of API design.



Tags for this post>>


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 7:16 pm


May 1, 2009

Xen Virtualization Online Book

This is an 18-chaper online book on Xen Virtualization Essentials at virtuatopia.com. Managing computer and servers using virtualization is becoming a very common method popular of provisioning machines, as it provides maximized hardware utilization, decreased hardware costs, lowered power consumption, articulated system management, and better security. These important benefits have led to a significant increase in both the deployment of virtualization and the number of available virtualization solutions. This online book coving Xen Virtualization presents several easy to understand approaches to virtualization, along with detailed steps, instructions, and examples on deploying virtualization using Xen technology. Practical implementations are given emphasis over theory. This site also provides 8 Xen Virtualization Tutorials.


Contents of Xen Virtualization Essentials:

An Overview of Virtualization Techniques
 - Guest Operating System Virtualization
 - Shared Kernel Virtualization
 - Kernel Level Virtualization
 - Hypervisor Virtualization
 - Paravirtualization
 - Full Virtualization
 - Hardware Virtualization

Configuring and Installating a Xen Hardware Virtual Machine (HVM) domainU Guest
 - Checking Hardware Support for Xen Hardware Virtual Machines (HVM)
 - Preparing to Install a Xen HVM domainU Guest
 - Creating a Xen HVM Configuration File
 - Booting the HVM Guest
 - Connecting to the HVM dominU Guest Graphical Console

Installing and Running Windows XP or Vista as a Xen HVM domainU Guest
 - Pre-Requisites for Installing a Windows Xen Guest
 - Preparing to Install Windows
 - Preparing the Windows XP / Windows Vista for Xen HVM Installation
 - Configuring the Xen Windows Guest Configuration File
 - Starting the Xen Windows HVM Guest

Virtualizing Windows Server 2008 with Xen
 - Requirements for Xen Windows Server 2008 Virtualization
 - Windows Server 2008 Installation Media
 - Preparing Storage Space for Windows Server 2008
 - Creating the Xen Windows Server 2008 Configuration File
 - Starting the Xen Windows Server 2008 HVM Guest

Adding USB Devices to a Xen HVM domainU Guest
 - Identifying USB Devices on the Xen Host System
 - A Trick to Identify the Correct USB Device
 - Adding the New USB Device to the Xen domainU Configuration File
 - Temporarily Adding a USB Device to a running Xen HVM Guest

Building a Xen Virtual Guest Filesystem on a Disk Image (Cloning Host System)
 - Xen Requirements
 - Creating a Disk Image for the Root Filesystem
 - Creating a Swap Space Disk Image
 - Cloning the Host OS on the Guest Domain
 - Creating a Xen Configuration File
 - Configuring System Files for the Guest Operating System
 - Modifying /etc/fstab for the Guest System
 - Booting the Guest OS
 - Xen Guest Boot Problems

Building a Xen Virtual Guest Filesystem on a Physical Disk Partition (Cloning Host System)
 - An Overview of the Xen Host and Guest Physical Disks
 - Preparing the Xen Disk Partitions
 - Creating the a Filesystem on the Xen Guest Root Partition
 - Configuring the Swap Partition for the Xen Guest System
 - Mounting the Root Filesystem
 - Cloning the Host OS on the Guest Root Partition
 - Creating a Xen Configuration File
 - Configuring System Files for the Guest Operating System
 - Modifying /etc/fstab for the Guest System
 - Booting the Guest OS
 - Xen Guest Boot Problems

Building a Xen Virtual Guest Filesystem using Logical Volume Management (LVM)
 - The Key Components of Logical Volume Management
 - Preparing for an LVM based Xen Guest Domain
 - Converting Physical Disks into Physical Volumes
 - Creating a Volume Group
 - Creating a Logical Volume for the Xen Guest System
 - Creating a Filesystem on the Logical Volume
 - Configuring the Swap Partition for the Xen Guest System
 - Mounting the Root Filesystem
 - Cloning the Host OS on the Guest Root Partition
 - Creating a Xen Configuration File
 - Configuring System Files for the Guest Operating System
 - Modifying /etc/fstab for the Guest System
 - Booting the Guest OS
 - Xen Guest Boot Problems

Building a Xen Guest Root Filesystem using yum and rpm
 - An Overview of Repository Based Installation
 - Preparing to Create a Xen Guest Root Filesystem from Repositories
 - Beginning the Installation
 - Configuring the Guest System using chroot
 - Booting the Xen Guest System
 - Xen Guest Boot Problems

Building a Debian or Ubuntu Xen Guest Root Filesystem using debootstrap
 - Creating the Xen Guest Root Filesystem
 - Creating Swap for the Xen Guest Domain
 - Installing the Base Ubuntu/Debian System using debootstrap
 - Configuring the root Password
 - Creating a Configuration File for the Guest Domain
 - Configuring System Files for the Guest Operating System
 - Modifying /etc/fstab for the Guest System
 - Booting the Guest OS
 - Xen Guest Boot Problems

Building a Xen Guest Domain using Xen-Tools
 - Getting Xen-Tools
 - Configuring Xen-Tools
 - Specifiy Xen-Tools Installation Location
 - Specifying the Xen-Tools Installation Source and Method
 - Configuring Disk Space and Memory for the Xen Guest
 - Choosing a Linux Distribution
 - Configuring Xen Guest Network Options
 - Configuring the Kernel and RAM Disk
 - Defining the Installation Source
 - Miscellaneous Settings Xen-Tools Configuration
 - Xen Guest Console Settings
 - Options Disk Drive Device Naming
 - Building the Xen Guest Images
 - Booting the Xen Guest System

Using QEMU Disk Images for Xen DomainU Systems
 - Creating a QEMU Disk Image for the Xen domainU
 - Installing the Guest Operating System
 - Configuring the Guest Operating System for Xen
 - Mounting QEMU Disk Image Partitions
 - pyGRUB and the Xen Configuration File
 - Booting the Xen domainU System

Creating and Booting a Xen Guest domainU using an NFS Mounted Root Filesystem
 - Kernel Requirements for NFS based Root Filesystems
 - Populating the Root Filesystem
 - Exporting and Mounting the Xen Guest Root Filesystem
 - Creating the Xen Configuration File for the NFS Root Filesystem
 - Booting the Xen domainU

Configuring a VNC based Graphical Console for a Xen Paravirtualized domainU Guest
 - What is VNC?
 - VNC Security
 - Configuring a Xen domainU for VNC Access
 - Connecting to the Guest Desktop using VNC Viewer
 - Starting a Graphical Desktop on the Xen domainU Guest
 - Establishing a Secure Remote Desktop Session

Running and Connecting to VNC Servers on a Xen Guest (domainU) System
 - Installing VNC on the Xen domainU Guest
 - Creating Xen domainU VNC Desktop Sessions
 - Connecting to a Xen domainU Remote Desktop
 - Configuring the Xen domainU Desktop Environment
 - Closing Down a domainU VNC Desktop Session

Adding Disk, CDROM and DVD Devices to a Running Xen domainU Guest System
 - Requirements for Xen domainU Block Device Attachment
 - An Overview of xm block-attach
 - Attaching a Device to a domainU Guest
 - Mounting the Device in the domainU Guest
 - Detaching a Device from the domainU Guest

Xen Monitoring Tools and Techniques
 - Why Monitor a Xen Environment?
 - Obtaining Xen Configuration and System Information
 - Monitoring Xen Performance with XenMon
 - Monitoring Performance with XenTop

Migrating Xen domainU Guests Between Host Systems
 - Requirements for Xen domainU Migration
 - Enabling Xen Guest Migration
 - Xen Migration Firewall Configuration
 - Preparing the Xen Migration Environment
 - Running the DomainU Guest
 - Performing the Migration
 - Checking the Xen Log for Migration Errors

Solving Common Xen Problems



Tags for this post>>




Powered by WordPress